cit 371
After issuing the history command, you see the following output: 351 pwd 352 ls -l /etc 353 cd .. 354 ls -a 355 cd /etc 356 cat passwd 357 ls /home We want to re-execute instruction 355. Aside from !355, what is the shortest instruction we can enter to re-execute it?
!cd
To start a process from a shell so that the process runs in the background rather than the foreground, you would append which of these characters to your command? a) & b) % c) * d) + e) !
&
Which option would you use with tar to add to an already existing archive? a) -a b) -A c) -add d) -append e) -u
-A
Which option would you use with tar to add to an already existing archive? a) -a b) -A c) -add d) -append e) -u
-A
If /tmp is not given its own partition, it will be part of which partition? a) / b) /home c) /usr d) /var e) swap
/
A logical volume manager can be used to create partitions for most top-level directories but should not be used for which of these? a) / b) /boot c) /dev d) /home e) Swap
/boot
Under which top-level directory will you find the Linux kernel? a) /bin b) /boot c) /dev d) /sbin e) /usr
/boot
Under which top-level directory will you find the Linux kernel? a) /bin b) /boot c) /dev d) /sbin e)/usr
/boot
Which top-level directory contains configuration files and scripts? a) /bin b) /boot c) /dev d) /etc e) /var
/etc
If you want to avoid using a DNS name server, you can establish IP alias to IP address mapping in which of the following files? a) /etc/avoid b) /etc/dns c) /etc/hosts d) /etc/mapper e) /etc/resolv.conf
/etc/hosts
Of the following top-level directories, which should always be on a separate partition from the root partition? a) /bin and /sbin b)/boot c) /home d) /var e)/usr
/home
You are currently in the directory /etc. You enter the command cd /home/foxr. What does the environment variable PWD store? a) /etc b) /home c) /home/foxr d) / e) There is no way to know
/home/foxr
You will find the various .target files in which directory(ies)? (Choose two) a) /etc b) /etc/systemd c) /lib/systemd/system d) /lib/systemd/user e) /run/systemd f) /usr/systemd
/lib/systemd/system /lib/systemd/user
Of the various partitions, which one has a file system that is not physically stored on a storage device? a) / b) /home c) swap d) /proc e) /mnt/stuff
/proc
Assume the following page table: Page Frame Valid 0 16 1 1 -- 0 2 -- 0 3 39 1 4 -- 0 5 63 1 Of the pages of this process, a memory reference to which page(s) would cause a page fault? a) 0 b) 1 c) 2 d) 3 e) 4 f) 5
1 2 4
Assume the following partitioning on a Linux system: Device Size MountPoint Type LVM Volume Group (MB) VolGroup lv_vol00 6000 / ext4 lv_vol01 2000 /var ext4 lv_vol02 2000 /home ext4 lv_vol03 2000 swap Hard Drives sda sda1 500 /boot ext4 sda2 12000 VolGroup What is the size of this computer's hard disk? a) 24,500 MB b) 12,500 MB c) 12,000 MB d) 500 MB
12,500 MB
To set the group permission ID (GUID), you would use which of the following 4-digit permissions in chmod? a) 1755 b) 2755 c) 4755 d) 6755 e) 7755
2755
How many times is bar called in the following code? for((i=0;i<=3;i++)); do foo $i 0; bar $i; done
4
Digital certificates will contain which of the following? a) A symmetric key b) A private key c) A public key d) Both a private and a public key e) None of the above
A public key
Which of the following best describes software emulation and virtual machines? a) A software emulator creates a virtual machine of a specific operating system. b) A virtual machine performs software emulation. c) A virtual machine does not perform software emulation. d) Both terms mean the same thing. e) The two terms have nothing in common.
A virtual machine performs software emulation
What does the ~ character represent? a) Relative path b) Absolute path
Absolute path
A Linux shell allows the user to enter commands and definitions of various types which can be recalled. Which of the following is not something that Linux saves so that you can recall it? a) Aliases b) Commands c) Functions d) Variables e) All of the above are saved and can be recalled
All of the above are saved and can be recalled
Which of the following best describes the regular expression ^[^ ]+$ (there is a blank space after the second ^)? a) Any string that contains at least one blank space b) Any string that starts with at least one blank space c) Any string that consists solely of blank spaces d) Any string that contains no blank spaces e) Any string that contains only ^ (caret symbols) and blank spaces
Any string that contains no blank spaces
The /etc/shadow file contains the following: foxr:...:16104:0:30:5:20:: How often can this user change his password? a) Any time desired b) As much as every day c) Every 30 days d) Every 5 days e) Every 20 days
Any time desired
We view a computer system in layers with the user at the top and hardware at the bottom. Directly underneath the user we would see which layer? a) Application software b) Operating system utilities c) Operating system services Shells d) ROM BIOS
Application software
In Gnome, which top-level menu would you access to run various accessories like gedit or open a terminal window? a) Accessories b) Applications c) Favorites d) Places e) Systems
Applications
Several versions of Unix were created by 1990 based on which earlier version of Unix? a) Unics b) GNU Unix c) AT&T Unix d) BSD Unix e) None of the above, versions of Unix around 1990 were all independently created
BSD Unix
Which of the following forms of memory is volatile? a) SRAM b) DRAM c) ROM d) Both SRAM and DRAM e) All of SRAM, DRAM and ROM
Both SRAM and DRAM
Which programming language was used to develop the initial Unix operating system? a) PDP-11 Assembly Language b) C c) C++ d) FORTRAN e) Java
C
Which of the following would you expect to see in ps for the status of a process that is in uninterruptible sleep? a) D b) R c) S d) s e) T
D
What subdirectories do you expect to find under /proc? a) Directories for every connected device b) Directories for every running process c) Directories for every user of the system who has a home directory d) Directories for every user of the system who does not have a home directory e) Directories for various types of application software
Directories for every running process
The WantedBy directive does not list other units but instead it lists a(n) _________. a) file b) symbolic link c) directory d) dependency
Directory
We denote formatting commands in Latex by a) Using the GUI b) Embedding the commands using notation like \command c) Embedding the commands using notation like {command} d) Embedding the commands using notation like <command> e) None of the above, LaTeX does not permit formatting commands
Embedding the commands using notation like \command
All variables defined in a Bash shell are environment variables, defined from within scripts or other software. (T/F)
False
All versions of Linux are open source and available for free.(T/F)
False
An alias' name must start with a letter, for instance you could not write an alias whose name starts with a punctuation mark. (T/F)
False
Assume A=1, B=5, C=3. Is the condition [[ $((A+B)) -lt $C && $C -gt $A ]] true or false or does it yield an error? a) True b) False c) Error
False
Booting is nothing more than the process of turning on your computer from when it had been shut off.(T/F)
False
In entering the ls command, you can include options but you must include parameters.(T/F)
False
In the IPOS cycle, storage refers only to permanent storage devices like the disk drive. (T/F)
False
Linux is equally popular today as Windows. (T/F)
False
Logging in as root in Linux is the same as the computer running in privileged mode.(T/F)
False
Once a process is started in the foreground, it is not possible to move it to the background.(T/F)
False
Once an environment variable has been defined, a user is unable to alter it.(T/F)
False
Streaming video uses lossless compression.(T/F)
False
The EUID (effective user ID) of a process will always be the same as the UID.(T/F)
False
The Linux Mail program, when invoked by the command mail <enter> (that is, without a specified username) will allow you to send an email to all users in your address book.(T/F)
False
The first completed implementation of Linux was developed by Richard Stallman as part of the GNU Project.(T/F)
False
The initramfs file system includes all of these subdirectories: /dev, /bin, /sbin, /etc and /home.(T/F)
False
The killall command will kill all running processes except for init. (T/F)
False
The regular expression ... will only match any single character that appears three times.(T/F)
False
The regular expression [a-z]{1,3} will match only a finite number of lines in a file.(T/F)
False
The top command will only display processes of the current user. (T/F)
False
When assigning a variable a value, you must include the $ prior to the variable name as in $VAR=0. (T/F)
False
When installing CentOS, you must set up disk partitions from scratch.(T/F)
False
With MAX_MEMBERS_PER_GROUP, a directive from /etc/login.defs, you establish the maximum number of users permitted in any single group. If you attempt to add a user to a group that has reached this limit, you are given an error message.(T/F)
False
With the change from init to systemd, all of the old init-based scripts and directories along with the scripts that control services have all been removed(T/F)
False
openssl is the only encryption software tool available in Linux.(T/F)
False
If FIRST=Frank and LAST=Zappa and we execute echo $FIRST; echo -n $LAST. What is output? a) Frank -n Zappa b) Frank Zappa c) Frank Zappa d)Frank Zappa e)$FIRST $LAST
Frank Zappa
You want to set your computer to dual boot both Red Hat Linux and Windows 7. Between GRUB and LILO, which boot loader should you pick? a) GRUB b) LILO
GRUB
Assume str="Hot Rats". What is the result of echo ${str:-4}?
Hot Rats
The loopback device, lo, is used for which purpose? a) It allows your network interface to communicate with your own computer b) It allows software to communicate with your computer as if the software was sending messages over the network c) It allows your computer to communicate to your subnet rather than the Internet d) It is a troubleshooting device for your network interface e) It is your network interface device
It allows software to communicate with your computer as if the software was sending messages over the network
Which of the following encryption activities does openssl not perform? a) Encrypt a message b) Generate a certificate c) Generate a private key d) Generate a public key e) It can do all of these
It can do all of these
What does the command tar -cf somedir.tar /home/somedir do? a) It outputs the contents of the file somedir.tar to the directory /home/somedir b) It creates a new archive called somedir.tar of the directory /home/somedir c) It appends the contents of /home/somedir to the archive somedir.tar d) It compares the contents of somedir.tar to the contents of /home/somedir to indicate whether content in the directory is newer e) It updates somedir.tar with any newer content from /home/somedir
It creates a new archive called somedir.tar of the directory /home/somedir
Which of the following best describes what vmlinuz is? a) It is a Linux boot loader program b) It is your Linux kernel c) It is your Linux kernel in a compressed and non-executable format d) It is your Linux kernel which is mostly compressed but part of it is an executable that will start loading the kernel e) It is your Linux kernel which is mostly compressed but part of it is an executable that will uncompress and load the remainder of the kernel
It is your Linux kernel which is mostly compressed but part of it is an executable that will uncompress and load the remainder of the kernel
Assume you have declared the variable A as A=(Annie Barbara Christina Karen Rachel). What happens to the array if you execute the instruction A[1]=${A[2]}? a) It replaces the entry Annie to store Barbara, which now appears twice b) It replaces the entry Barbara to store Annie, which now appears twice c) It replaces the entry Barbara to store Christina, which now appears twice I d) t replaces the entry Christina to store Barbara, which now appears twice e) It causes an error
It replaces the entry Barbara to store Christina, which now appears twice
Which of the following steps is not part of the power-on self-test? a) Testing CPU's registers b) Testing interrupt controllers c) Identifying devices connecting to the system bus d) Loading the operating system e) All of these are part of the power-on self-test.
Loading the operating system
Which of these types of computers costs more than a server? a) Desktop b) Laptop c) Mainframe d) Tablet e) None of the above, the server is more expensive than all of these
Mainframe
One of the defaults available specifies GROUP=100. What does this mean? a) New users by default will have a directory that can store 100KB b) New users by default will have a directory that can store 100MB c) New users by default will have an account that lasts only 100 days d) New users who are not given a specified user ID will have an ID generated starting at 100 e) New users who are not given their own private group will be assigned to group 100
New users who are not given their own private group will be assigned to group 100
The operating system can boot off of the following devices except for a) hard disk b) optical disk c) USB d)floppy disk e) None of the above, the operating system can boot from any of these
None of the above, the operating system can boot from any of these
You are currently in the directory /etc. You enter the command cd /home/foxr. Which of the following environment variables would now be storing the value /etc? a) HOME b) OLDPWD c) PWD d) PATH e) None of the above, no environment variable would take on the old directory
OLDPWD
Virtual memory is an extension to a) Cache memory b) Main memory c) Hard disk space d) All of the above e) Registers
Registers
Which of the following features will allow you to enter a portion of a filename, as long as it is unique, in a Linux command and have Bash fill in the full filename for you? a) Brace expansion b) Filename completion c) Filename expansion d) Escape completion e) Tab completion
Tab completion
In top, CPU utilization is provided broken down by different types of processes. What would 3.9%sy represent? a) The CPU is spending 3.9% of its time on user processes b) The CPU is spending 3.9% of its time on idle processes c) The CPU is spending 3.9% of its time on all processes d) The CPU is spending 3.9% of its time on kernel (or system) processes
The CPU is spending 3.9% of its time on kernel (or system) processes
Assume a PAM configuration file consists of the following directives. auth required pam_env.so account sufficient pam_succeed_if.so uid=0 account sufficient pam_unix.so password requisite pam_deny.so session optional pam_console.so close Assume that there is only one module that we want to call for the auth step, what can you conclude about the directives? a) The control flag required should be changed to sufficient b) The control flag required should be changed to requisite c) The control flag required should be changed to optional d) The control flag required should be changed to include e) The module for auth should be changed to pam_succeed_if.so
The control flag required should be changed to requisite
Assume the file foo.txt contains 40 lines and 4000 characters. Which characters are output if you issue the command head -c -1000 foo.txt? a) The first 10 lines of foo.txt b) The first 15 lines of foo.txt c) The first 100 lines of foo.txt d) The first 10 characters of foo.txt e) The first 15 characters of foo.txt f) The first 100 characters of foo.txt g) The first 1000 characters of foo.txt
The first 1000 characters of foo.txt
Under /proc, we see a subdirectory called 5813 which has files cmdline, environ, fd, io, mounts, cwd, exe and root. The file cmdline will be empty under what circumstance(s)? a) The process was started from the command line b) The process was started by root c) The process was started through the GUI d) The process was started by another process e) None of the above, this file will never be empty
The process was started through the GUI
Assume a PAM configuration file consists of the following directives. auth required pam_env.so account sufficient pam_succeed_if.so uid=0 account sufficient pam_unix.so password requisite pam_deny.so session optional pam_console.so close If the pam_console.so module fails, what would be the result? a) The program that uses this configuration file will fail b) The program that uses this configuration file will not fail but it will log an error c) The program that uses this configuration file will not fail but it will call the close command d) The program will try to use another module in place of pam_console.so e) There is no way to know
The program that uses this configuration file will not fail but it will call the close command
You perform man command for some command. Which portion of the man page provides you the syntax for how to use the command by stating the optional and required components of the command? a) The name b) The synopsis c) The description d) Examples e) See also
The synopsis
What is wrong with the following script? #!/bin/bash FIRST=Frank SECOND=Zappa FULL=$FIRST $SECOND echo $FULL a) There should be quote marks around $FIRST $SECOND b) There should be no $ before FIRST, SECOND or FULL c) There should be quote marks around Frank and around Zappa d) You did not declare the variables FIRST, SECOND and FULL e) There is nothing wrong with the script
There should be quote marks around $FIRST $SECOND
Which of the following types of storage would not be part of a file space? a) Magnetic tape b) Optical disk c) RAM disk d) USB drive e) They could all be part of a file space
They could all be part of a file space
Of the four TCP/IP layers, which layer is implemented using either or both TCP and UDP? a) Application layer b) Transport layer c) Internet layer d) Link layer e) Both Application and Transport layers
Transport Layer
All computers have at least one processor. (T/F)
True
All unit files contain a [Unit] section, an [Install] section and a type specific section such as [Service], [Path], [Mount] or [Target].(T/F)
True
Assume FIRST=Frank and LAST=Zappa. There is a difference in the output between echo "$FIRST $LAST" and echo '$FIRST $LAST' but no difference in the output between echo "$FIRST $LAST" and echo $FIRST $LAST.(T/F)
True
Assume the following partitioning on a Linux system: Device Size MountPoint Type LVM Volume Group (MB) VolGroup lv_vol00 6000 / ext4 lv_vol01 2000 /var ext4 lv_vol02 2000 /home ext4 lv_vol03 2000 swap Hard Drives sda sda1 500 /boot ext4 sda2 12000 VolGroup The logical volume consists of four partitions, /, /var, /home, swap.(T/F)
True
By default when creating a new user, the user is given the same user ID as group ID.(T/F)
True
If a program requires access to a character device, the program must wait until the character is transferred, but if a program requires access to a block device, the program does not necessarily have to wait for the block to be transferred before continuing execution.(T/F)
True
In emacs, there is a keystroke command that will convert all of the letters from the cursor to the end of the current word into upper case.(T/F)
True
In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files All three of the items listed here are owned by the same user, foxr. (T/F)
True
In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files All three of the items listed here are owned by the same user, foxr.(T/F)
True
In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files The first character in the output denotes the type of entity, in this case whether the item is a file or a directory.(T/F)
True
Making changes to the firewall, by default, only impacts the running firewall, and restaring the firewall will return it to its permanent settings.(T/F)
True
Run levels are no longer used to indicate which services should be started or stopped at system initialization time in RedHat 7.(T/F)
True
Since most Linux commands accept input from file rather than keyboard, the redirection operator < is seldom used when issued on Linux operations.(T/F)
True
Status information displayed using systemctl gives you more information than what you would have received using service ____ status.(T/F)
True
The desktops KDE and Gnome have different accessory programs but you can run KDE accessories in Gnome if you have both desktops installed in your operating system(T/F)
True
The first implementation of Unix, called Unics at the time, was not platform independent but instead only ran on DEC PDP-11 computers.(T/F)
True
The initramfs is the initial Linux root file system. This is not the same as the Linux root file system that you find once Linux has fully initialized and is ready for use.(T/F)
True
The regular expressions [a-z]+ and [a-z]{1,} will match the same things.(T/F)
True
Through systemctl, you can add targets to Wants= and/or Requires= directives of a given unit file. True (T/F)
True
To communicate over a network, your computer uses a network interface device and not the loopback device.(T/F)
True
To increase a process' priority, you must be root.(T/F)
True
To launch a process or script in the current directory, you add the notation ./ before the process name as in ./foo. This is not necessary if you use a full path or the current directory is part of your PATH variable (T/F)
True
Under the Places top-level menu you will find Home Folder, Desktop, Documents, Music, Pictures, Videos and Downloads. These are all locations of the currently logged in user's file space. (T/F)
True
Under the Places top-level menu you will find Home Folder, Desktop, Documents, Music, Pictures, Videos and Downloads. These are all locations of the currently logged in user's file space.(T/F)
True
Unless you mount or unmount partitions after system initialization, you should find the same information available when looking at /etc/fstab and /etc/mtab.(T/F)
True
Unlike vi, emacs has only one mode.(T/F)
True
Unmounting a file system does not impact mounted file systems' availability.(T/F)
True
Using a logical volume manager to partition your storage devices allows a logical volume (partition) to be divided and placed among multiple hard disks.(T/F)
True
Using virtual machine software, you can have access to a number of different operating systems and their application software from your computer even if those operating systems are not native to the hardware you are using.(T/F)
True
When using systemctl to control a service, you do not need to add the .service extension to the unit's name, but when using systemctl to control any other unit type, you need to add the extension (e.g., .target or .timer) to the unit's name.(T/F)
True
Whereas the service command only operated on services, systemctl can operate on any unit type and can also operate on unit files.(T/F)
True
You are in a Bash shell. Typing in the bash instruction results in the starting of a new shell such that any definitions from the outer shell are "hidden" (unavailable).(T/F)
True
You can enter multiple instructions at once by separating the instructions with a semicolon as in who; pwd; ls <enter>. (T/F)
True
You can specify content negotiation such as preferred language via an HTTP header.(T/F)
True
Of the following unit file directives, which would you expect to find in both .target and .service files? a) EnfironmentFile b) WantedBy c) ExecStart d) PIDFile e) Type
WantedBy
After issuing a sudo command, what happens? a) you are listed in the /etc/sudoers file, the command executes, otherwise an error is output b) If you are listed in the /etc/sudoers file as having access to this command, it executes, otherwise an error is output c)The /etc/sudoers file is updated to indicate that you submitted a sudo command d) The command is logged e)You are asked to enter your password
You are asked to enter your password
When you do a man on a command, it tells you how to use the command. Imagine for some command, you get the following. What does the notation [-aeiou] mean? command [-aeiou] [file]... a) You must use at least one of the options listed (a, e, i, o or u) b) You must use no more than one of the options listed c) You may use as many options as listed but must use at least one of them d) You may use any combination of the options listed including none at all e) You must use the same number of options as files listed so that if you have no files listed, you cannot use any options
You may use any combination of the options listed including none at all
If you see this prompt in the Linux command window, [zappaf@mycomputer foxr]$ And you type "cd ~", which of the following prompts would you most likely see next? a) [~@mycomputer foxr]$ b) [zappaf@~ foxr]$ c) [~@~ foxr]$ d) [zappaf@mycomputer ~]$ e) [~@~ ~]$
[zappaf@mycomputer ~]$
Given the following chain of processes, init \gnome \gnome_terminal \bash \program1 \program2 \program3 which process is the parent for bash? a) \gnome b) \init c) \program1 d) \gnome_terminal
\gnome_terminal
The NetworkManager service can be configured through a) configuration files b) using a text-based helper tool called nmcli t c) hrough a GUI-based helper tool called control-center d) through a GUI-based helper tool called nm-connection-editor e) all of the above
all of the above
Assume X=1, Y=2 and Z=5. What is output from the statement if [ $((X+Y)) -gt $Z ]]; then echo yes; else echo no; fi a) yes b) no c) 3 d) 5 e) an error occurs
an error occurs
Which of the following forms of process management runs without any user interaction? a) Single tasking b) Batch processing c) Multitasking d) Multithreading e) Multiprocessing
batch processing
Which of the following commands would you use after you have processed a LaTeX document to generate its bibliography section? a) biblio b) bibtex c) dvipdf d) latex (the bibliography section is generated at the same time you process the LaTeX file) e) None of the above, LaTeX does not provide a mechanism to generate a bibliography
bibtex
You can place disk quotas on a) individual users b) individual groups c) individual directories d) both individual users and individual groups e) all of individual users, groups and directories
both individual users and individual groups
The target file default.target a) is a symbolic link to the target file used by default to initialize the system b) is a symbolic link to systemd c) is a symbolic link to init d) is a duplicate of graphical.target that allows you to modify the target file so that you do not risk damaging graphical.target e) calls upon either graphical.target or multi-user.target depending on the runlevel
calls upon either graphical.target or multi-user.target depending on the runlevel
In order to determine if a received packet has an error in it, TCP/IP uses which error detection mechanism? a) checksum b) hamming distance codes c) parity bits d) rotation algorithm e) it might use any of the above
checksum
Which of the following chmod commands would set the sticky bit for the directory mystuff? a) chmod 755 mystuff b) chmod 766 mystuff c) chmod 777 mystuff d) chmod 1000 mystuff e) chmod 1777 mystuff
chmod 1777 mystuff
The directory mystuff currently has the sticky bit set. Which of these commands would remove it? a) chmod u-t mystuff b) chmod g-t mystuff c) chmod o-t mystuff d) chmod s-t mystuff e) There is no way to remove it
chmod o-t mystuff
Assume the following listing and that the user zappaf is a member of the group cool and marst is not part of the group cool. -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 filea.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 fileb.txt -rwxrw----. 1 foxr cool 4183 Aug 5 2014 filec.txt -rw-r--r--. 1 foxr foxr 0 Aug 19 2014 filed.txt -rwxr-----. 1 foxr foxr 1183 Aug 20 2014 filee.txt -rw-r-----. 1 foxr cool 431 Sep 12 2014 filef.txt Provide a chmod command so that filea.txt is not executable by owner and is writable by group. Use the ugo+/- method. a) chmod u-x,g+w filea.txt b) chmod u+x,g+x filea.txt c) chmod u-x filea.txt d) chmod u+r,g+x filea.txt
chmod u-x,g+w filea.txt
Which of the following is a block device? a) disk drive b) keyboard c) mouse d) terminal window e) all of these are block devices
disk drive
Which of these built-in zones would be considered the least trustworthy? a) dmz b) drop c) external d) internal e) public
drop
Which vi command is used to delete the word in which the cursor currently lies? a) d b) db c) dd d) dw e) yy
dw
If FIRST=Frank and LAST=Zappa, which of these echo statements properly outputs Frank Zappa? a) echo FIRST LAST b) echo "FIRST LAST" c) echo $FIRST LAST d) echo $FIRST $LAST e) echo '$FIRST $LAST'
echo $FIRST $LAST
The EUID (effective user ID) of a process will always be the same as the UID.
false
The number of inodes in a file system is based on the number of files stored in that file system.
false
The top command will only display processes of the current user.
false
Under /proc, we see a subdirectory called 5813 which has files cmdline, environ, fd, io, mounts, cwd, exe and root. Which of the following files would store information about open files? a) cwd b) envion c) fd d) io e)mounts
fd
Assume the following listing and that the user zappaf is a member of the group cool and marst is not part of the group cool. -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 filea.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 fileb.txt -rwxrw----. 1 foxr cool 4183 Aug 5 2014 filec.txt -rw-r--r--. 1 foxr foxr 0 Aug 19 2014 filed.txt -rwxr-----. 1 foxr foxr 1183 Aug 20 2014 filee.txt -rw-r-----. 1 foxr cool 431 Sep 12 2014 filef.txt Which of the files is zappaf able to write to? a) filea.txt b) fileb.txt c) filec.txt d) filed.txt e) filee.txt f) filef.txt
fileb.txt filec.txt
Write a find command to find all files in the current user's home directory with permissions of 664. a) find ~ permission 664 b) find ~ 664 c) find ~ perm 664 d) find 664 e) find ~ -p 664
find ~ perm 664
An anonymous login is most commonly applied with which of the following programs? a) ftp b) Mail c) openssl d) rsh e) ssh
ftp
We have the following information stored in /etc/fstab. /dev/sda1 / ext4 defaults 1 1 /dev/sda3 /home ext4 defaults 1 2 /dev/sda5 swap swap pri=1000 0 0 /dev/sda4 /var ext3 noexec 0 0 proc /proc proc defaults 0 0 10.11.12.13: /mnt/stuff nfs ro,async 0 0 The notation ro,async listed as an option for the partition /mnt/stuff indicates a) that content in this partition is read only b) that content in this partition is read only and not executable c) that content in this partition is read only and access is not synchronous d) that content in this partition is read only and that access has a lower priority e) that content in this partition is not synchronous
hat content in this partition is read only and access is not synchronous
Which of the following commands could you use to obtain the IP address of a remote computer? a) host b) ip c) ping d) route e) ss
host
Which of the following best describes the roles of init and inittab in RedHat 7? a) they no longer exist b) they exist but do nothing c) init is a symbolic link to systemd, inittab no longer exists d) init is a symbolic link to systemd, inittab contains only comments e) init is still the startup process which launches systemd, inittab contains information about how init runs but this information is all commented out
init is a symbolic link to systemd, inittab contains only comments
One drawback of using dump for backups is a) it can only be used on individual files so that creating a backup of a full partition is unwieldy b) it can only be used on file systems so that you cannot backup individual directories or files c)_ it only allows for full backups, not incremental backups d) to perform incremental backups, you must use another program like find in conjunction with dump e) it is primarily used to copy files across a network, not to storage
it can only be used on file systems so that you cannot backup individual directories or files
Where is a virtual file system stored? a) could be stored on any device b) hard disk under file system storage c) memory d) swap space e)none of these, it is not stored anywhere
memory
What is the purpose of the -m option for the usermod command. a) moves the user's home directory to the directory specified as an option parameter b) specifies that the users home directory should be automatically created under /home c) specifies that the user's home directory should not be created d) creates the user's home directory to the directory specified as an option parameter
moves the user's home directory to the directory specified as an option parameter
Which of the following services is required to be for your computer to communicate via your network interface device? a) dnsmasq b) network c) nfs d) snmp e) xinetd
network
Which of these nmcli instructions provides IP address information much like ip addr? a) nmcli b) nmcli addr c) nmcli connection show d) nmcli show all e) nmcli interface
nmcli connection show
Given the following chain of processes, init \gnome \gnome_terminal \bash \program1 \program2 \program3 Is program1 the parent of program2? a) yes b) no
no
n vi, you have copied an entire line into the buffer and wish to paste it into place below the current line. Which of these keystrokes would you use? a) yy b) p c) P d) control+y e) J
p
Which of the following is not a built-in zone for firewalld in RedHat 7? a) block b) drop c) external d) public e) private
private
The ssh program uses which of the following technologies? a) File transfer b) Hypertext transfer c) IP alias resolution d) Public key encryption e) Private key encryption
public key encryption
The command to create a quota database is a) edquota b) quotacheck c) quotaon d) quotascan e) setquota
quotacheck
With RedHat 7, which of the following target files is used as a replacement to runlevel 1? a) graphical.target b) multi-user.target c) powerofff.target d) reboot.target e) rescue.target
rescue.target
In Linux, the privileged account that can perform system-level operations (like account creation) is called the ______ account. a) absolute b) administrator c) master d) root e) system
root
Which of the following is not a piece of metadata stored about a file? a) creation date/time b) last access date/time c) owner d) permissions e) starting block in storage
starting block in storage
Assume you have issued the command split -d -C 10 foo stuff. What files do you expect to be created? a) fooaa, fooab, fooac, etc b) stuffaa, stuffab, stuffac, etc c) foo00, foo01, foo02, etc d) stuff00, stuff01, stuff02, etc e) There is no way to know
stuff00, stuff01, stuff02, etc
Assume you are allowed to execute the instruction cat /etc/shadow via sudo. Write the sudo command you would use to do this.
sudo cat /etc/shadow
We have the following information stored in /etc/fstab. /dev/sda1 / ext4 defaults 1 1 /dev/sda3 /home ext4 defaults 1 2 /dev/sda5 swap swap pri=1000 0 0 /dev/sda4 /var ext3 noexec 0 0 proc /proc proc defaults 0 0 10.11.12.13: /mnt/stuff nfs ro,async 0 0 Of the above partitions, which does not have a mount point? a) /var b) swap c) /proc d) /mnt/stuff e) all of them have mount points
swap
Which of the following directories is not a virtual file system? a) /dev b) /proc c) /sys d) swap e) all of these are virtual file systems
swap
In a long listing, the notation name1->/somedirectory/name2 indicates that name1 is a a) hard link b) symbolic link c) a file with a hard link pointing at it d) a file with a symbolic link pointing at it e) a named pipe
symbolic link
When viewing directories through the GUI file system folder, you might find some of the items (icons) have an X near them (such as with lost+found shown below). The X means _______. a) that you can view the contents but cannot access the contents b) that you can view the contents and access them but only if you first copy the contents to another location c) that you cannot view the contents at all d) that the directory is empty e) that the directory has been deleted
that you cannot view the contents at all
One entry in /etc/sysconfig/network-sripts/ifcfg-eth0 reads ONBOOT=yes. This means that a) the eth network interface should be automatically started at boot time b) this file should be updated after every boot c) this file will be automatically updated after every boot d) your computer's IP address is static e) your computer's IP address will be obtained at boot time
the eth network interface should be automatically started at boot time
In order to execute a program, the CPU performs an operation over and over. This operation is a) data computation b) data movement c) interrupts d) program compilation e) the fetch-execute cycle
the fetch-execute cycle
As a system administrator for a company, you want to issue all users with a text file containing a list of dos and don'ts in their computer system. You want this file to automatically be placed into every new user's home directory when their account is created. How will you set this up? a) the file should be copied to /etc/skel b) the file should be copied to each user's home directory manually c) the file should be copied to /etc/files d) the file should be copied to /home/skel
the file should be copied to /etc/skel
In a long listing, the second item listed is a number. This number indicates for a file a) the number of soft links pointing at the file b) the number of hard links pointing at the file c) the number of physical copies of the file d) the number of times the file has been modified e) the size of the file
the number of hard links pointing at the file
The difference between a program and a process is a) the process is started by the operating system while the program is started by the user b) the process can run in the background, the program must run in the foreground c) the process is an active entity, the program is a static entity d) the process is executable, the program is not e) none of the above, there is no difference between a program and a process
the process is an active entity, the program is a static entity
Under /proc, we see a subdirectory called 5813 which has files cmdline, environ, fd, io, mounts, cwd, exe and root. The file root will store a) a link to the process' executable code b) the PID of the process that spawned this process c) the UID of the user who started the process d) the root directory of the process e) whether the process was launched by root (1) or a normal user (0)
the root directory of the process
In the following listing: -rwxr--r--. 1 foxr foxr 183 Jul 23 2014 file1.txt -rw-rw-rw-. 1 foxr foxr 577 Jul 28 2014 file2.txt drwxr-xr-x. 1 foxr cool 1024 Jul 16 2014 files The fifth entry on each line is a) The time that the item was created on the given day b) The number of times the item has been accessed since it was created c)The number of links to the item d) The size of the item e) The owner's ID number
the size of the item
The seek time is a) the time it takes to move the read/write head to the proper disk track b) the time it takes for the proper disk sector to spin underneath the read/write head c) the time it takes to transfer data between disk drive and memory d) the time it takes the operating system to communicate with the disk drive e) a, b and c combined but not d
the time it takes to move the read/write head to the proper disk track
Multiprogramming differs from multitasking in that in multitasking the current process can be forced to surrender the CPU when what event occurs? a) the current process requires I/O b) the current process finishes I/O c) a higher priority process becomes available d) the timer interrupts the CPU e) all of the above
the timer interrupts the CPU
In Ubuntu, the system administration password is not made available to the first user of the /+system (taken to be the administrator). How then can that person execute administration commands? a) the user cannot b) the user must contact the Ubuntu distributors for the password c) the user must contact the Ubuntu programmers for the password d) the user must try to break (crack) the password e) the user uses the sudo command
the user uses the sudo command
Of the programs top, ps and the System Monitor, which two are similar in that they show you changes over time? a) top b) ps c) System Monitor
top system monitor
An interrupt request may be generated by either hardware or software.
true
The reason that both /usr and /usr/local exist is more historic than practical.
true
The microkernel is smaller than the monolithic kernel because the microkernel utilizes lesser _____ to handle some of its duties. a) device drivers b) modules c) services d) servers e) utility programs
utility programs
An orphan is a process a) that has no children b)which has finished executing but cannot leave the system yet because it must report to its children c) which has finished executing but cannot leave the system yet because it must report to its parent d) whose parent has terminated e) whose children have all terminated
whose parent has terminated
Which of the following can you not do to an interface using the nmcli command? a) bring it up b) bring it down c) change its information d) remove it e) you can do all of these
you can do all of these
What happens if you enter the command nmcli with no options or parameters? a) you get an error b) you get status information of your network connectivity c) you get the man page d) you get a list of options, as if you issued nmcli help e) you get no response at all
you get status information of your network connectivity
If you see this prompt in the Linux command window, [zappaf@mycomputer foxr]$ who are you logged in as?
zappaf