Linux+ Certification Exam Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following commands is the same as the "whatis" command in Linux?

man -f

Which of the following commands is the same as the "apropos" command?

man -k

Which of the following specifies the maximum permissions that anyone besides the user owner and "others" have on the file?

mask value

Which of the following shell commands is used to create a new directory?

mkdir

Every Linux user is a member of at least one group, and the first group is called the user's (_____) group.

primary

Which of the following is a software tool that can be used to keep track of all commands executed by users?

psacct

To see if there are any errors in the /etc/passwd file, execute the (_____) command while logged in as the root user.

pwck

The goal in terms of (_____) is to make systems, services, and data available to the correct entities while denying access to these resources by unauthorized entities.

security

To execute a sequence of shell commands, separate each command with a (_____) and press the Enter key after the last command has been entered.

semicolon ;

Which of the following commands is used to create an ACL on a file or directory?

setfacl

To find text in the vi editor, which character do you type before the search text to search forward in the document?

/ (forward slash)

If one line in the /etc/passwd file appears as root:x:0:0:root:/root:/bin/bash, which field in this example represents the user's login shell?

/bin/bash

Which of the following filesystems contains files such as the kernel, bootloader, and initramfs files?

/boot

Which of the following files stores information about each group, including the group name, group ID (GID), and secondary user membership?

/etc/group

Which of the following files stores additional information for a group, such as group administrators and the group password?

/etc/gshadow

Which of the following files contains user account information, including the primary group membership for each user?

/etc/passwd

Which of the following files stores the primary account data for local users of a Linux system?

/etc/passwd

Which of the following files stores user passwords and password-related data for local users of a Linux system?

/etc/shadow

While in insert mode, which key do you press to return to the default mode of operation for the vi editor?

Escape

Which of the following, also known as a wildcard, refers to any character provided on the command line that represents a portion of a filename?

File glob

When removable media, such as a CD-ROM or DVD, is automatically mounted, it is typically made available under which of the following directories?

/media

You can find additional user documentation in which of the following directories?

/usr/share/doc

In the standard vi editor, you can undo how many actions?

1

Which of the following is not a command used to change the contents of the /etc/group file?

groupins

Which command checks the /etc/group file for errors while logged as root.

grpck

Which of the following commands can be used to move forward five words in the vi editor?

5w

Which of the following directories is the top of the virtual filesystem structure?

/ (Root)

To remove a user and keep the user's home directory and mail spool, use the (_____) command without any additional arguments.

userdel

As an administrator, you can modify user accounts using the (_____) command.

usermod

Which of the following options for the useradd command displays the default values?

-D

Which option for the chattr command is used to recursively apply changes to an entire directory structure?

-R

Which option for the "cp" shell command copies an entire directory structure?

-r

To create a restricted shell account for guest users, the first step is to use the (_____) option with the useradd command and provide an argument of /bin/rbash.

-s

Which of the following options for the useradd command specifies the user's UID?

-u

Default group accounts in a typical Linux system often have GID values under (_____).

1000

The wall command used to broadcast urgent real-time messages on a system is limited to how many lines of text?

20

At any given time, there are about (_____) active Linux distributions.

250

If one line in the /etc/shadow file appears as bob:*:16484:3:90:5:30:16584:, which field in this example represents the minimum password age?

3

A system with at least (_____) of RAM should be able to support at least one VM.

8GB

Which command do you use in the vi editor if you want to close a document without saving all recent changes?

:q!

Which of the following commands is used to save and quit a document in the vi editor?

:wq

What might want to place in the /etc/motd file?

A friendly welcome message

Which of the following is the best solution for allowing the owner of a file to give permissions for specific users and groups?

Access Control Lists (ACLs)

When system logs are used to determine if someone is trying to gain unauthorized access to a system, this is an example of which of the following?

Account Security

Which of the following is a component of the Linux operating system?

All of the above User utilities Server software File systems

The Python scripting language is often used for which of the following applications?

All of these Network-based applications Scientific applications System tools

When securing user accounts, which of the following components must be considered?

All of these Physical security of the system or network Ensuring accounts are not susceptible to attack Education of users

Which of the following provides additional information for a shell command, such as a filename or user account name, to determine which specific action to take?

Argument

Which type of Linux distribution, which includes Red Hat Enterprise Linux, is designed to be used in a business setting?

Commercial

Which button do you click in the Johnny utility to see what john command was executed?

Console log

Which of the following methods can be used to help determine the likely cause of a problem with a Linux system?

Contacting another system administrator and asking for advice Reading documentation,such as man and info pages Researching your problem on Linux forum sites All of these

Which of the following refers to a specific implementation of a Linux operating system?

Distribution

Which of the following is the most commonly overlooked step in the process of troubleshooting a problem with a Linux system?

Document the actions you plan to perform to solve the problem before taking any action.

Which of the following Linux components refers to a well-defined structure that stores file and directories?

File system

Which of the following is rarely installed on Linux server systems because it requires additional hard drive space, CPU cycles, and RAM usage, and also could pose a security risk?

GUI software

Which of the following is specifically designed to be used as the filesystem on CD-ROM discs?

ISO9660

A(n) (_____) file is completely unchangeable; it cannot be deleted or modified by anyone, including the root user.

Immutable

When a system is compromised, which of the following should include who is notified, what actions should be taken, and so on?

Incident Response Plan (IRP)

Which of the following login servers can provide both user and group account data and is commonly used for network-based accounts on Linux distributions?

LDAP

Where are traditional partition tables stored?

MBR

Which of the following actions can be performed to prevent a user from changing an account password?

Make the min field of the /etc/shadow file a higher value than the max field.

Which term refers to a software package that often costs nothing?

Open source

Which of the following are used to separate a hard disk into smaller components, so that each component can then be treated as a different storage device?

Partitions

(_____) filesystems are structures used to organize data on a device, such as a partition, logical volume, or RAID.

Physical

In relation to the steps for troubleshooting a problem with a Linux system, what does POA stand for?

Plan of attack

PAM, a powerful tool that allows an administrator to provide many restrictions to user accounts, stands for which of the following?

Pluggable Authentication Module

Which of the following is not one of the categories of Kali Linux tools?

Pre-Exploitation

Which of the following permissions can be used to execute a command that has access to files and directories using the group ownership of the command?

SGID

Which of the following refers to creating small programs based on the Linux commands that you want to routinely (or occasionally) execute?

Scripting

In reference to special permission sets, SUID is short for which of the following?

Set User ID

Which of the following is a technique for gathering system information from users by using nontechnical methods?

Social Engineering

Which of the following permissions changes the behavior of the write permission when applied to a directory?

Sticky bit

Which of the following commands can be used to determine if SELinux is available (and actively being used) on a system?

getenforce

Man pages have been around since the early days of (_____) in the early 1970s.

UNIX

The vi (short for visual) text editor was introduced to (_____) in the mid-1970s.

UNIX

Which of the following is not a Red Hat-based distro?

Ubuntu

When you encourage users to report any suspicious activity immediately, you are implementing which of the following?

User Education

If one line in the /etc/group file appears as adm:x:4:syslog,bo, which field in this example represents the group name?

adm

Which of the following refers to a shell feature that allows a collection of commands to be executed by issuing a single command?

alias

Which of the following default user accounts is used by the software that provides DNS (Domain Name System) functions?

bind

Which of the following is a GUI-based text editor that includes tools and features like syntax highlighting, insertion of code by clicking a button, and automatic formatting?

bluefish

Which of the following shell commands is used to move the shell's current directory to another directory?

cd

After a Linux user creates a new file, the user can change the group ownership of the file to another group by using which of the following commands?

chgrp

Which of the following commands is used to delete the current line in the vi editor?

dd

Which of the following commands displays usage of partitions and logical devices?

df

A Linux distribution is also called a Linux (_____).

distro

Which of the following commands can you use to create an MBR partition?

fdisk

Which of the following commands is used to view the permissions of a file or directory?

ls -l

To discover additional information about a Linux command or configuration file, you can use the (_____) page.

man

When a user starts a new shell after initially logging in to the system, it is referred to as a .

non-login shell

Which of the following special group accounts is reserved for the system administrator?

root

Which of the following compression commands is used to merge multiple files into a single file?

tar

Linux offers (_____) of command-line utilities, each of which is designed to perform a specific task.

thousands

Which of the following shell commands is useful for updating the timestamps of critical files for inclusion in automated system backups?

touch

Which of the following commands is used to specify which default permissions to exclude when creating a new file or directory?

umask

To edit a new file with the vi editor, you can just type the command with no arguments or type (_____).

vi filename

An improved version of the vi editor, available on some Linux distributions, is called (_____).

vim

While in the command mode of the vi editor, which key do you press to move to the beginning of the next word or punctuation mark?

w

If one line in the /etc/group file appears as adm:x:4:syslog,bo, which field in this example represents the password placeholder?

x

Which of the following commands is used to copy the current line to the end of the document in the vi editor?

yG


Conjuntos de estudio relacionados

Evolve - STI, Sexuality, Reproduction, Alzheimer's/Dementia/Delirium

View Set

Practical Law Chapter 19 Basic Concepts

View Set

cspp Chapter 8 - Intrusion Detection - Stallings 4th ed.

View Set

Measures of Central Tendency - A measure of central tendency is a single value that attempts to describe a set of data by identifying the central position within that set of data.

View Set

Collection Agencies and Credit Reporting

View Set

Marketing Research and Seminar Chapter 1, 2, 3

View Set