Linux FINAL
What operator below is known as the NOT operator?
!
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
#!
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?
$
The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?
$
The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.
$PS1
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
$PS1
What metacharacter indicates background command execution?
&
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
(h0,0)
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.
*
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. + b. ^ c. ? d. *
*
The _____ regular expression metacharacter matches 0 or more occurrences of the previous character.
*
In a file's mode, a permission that is unavailable is represented by what character?
-
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory? a. -o loop b. --mode l c. --option l d. --loop
--loop
To view a list of files and their type, use the _____ switch to the ls command.
-F
Which switch below can be added to the ls command to show a list of files and their type?
-F
Which switch command can be added to the ls command to show a list of files and their type?
-F
When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.
-c
To remove a package from the system, you can use the ____ option to the rpm command.
-e
When used with the compress command, the ____ option can be used to compress symbolic links.
-f
Select the command below that can be used to provide a long listing for each file in a directory:
-l
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
-l
When using the cpio utility, the ____ option causes a new archive to be created.
-o
When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.
-p
What option, when added to the rm command, is commonly referred to as the -resume option?
-r
The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t
-t
The ____ option can be used with the tar command to extract a specified archive.
-x
dd
. In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?
200 MB
. What is the recommended size for the /home directory?
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.
.Z
The filename extension given to files compressed with bzip2 is ____.
.bz2
The File system Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/boot
The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/boot
Under what directory is the Linux kernel stored?
/boot
Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1
/dev/hdb1
What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0
/dev/ttyS1
In Fedora 20, where are user configured settings for Xorg stored?
/etc/X11/xorg.conf.d/
The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
/etc/profile
What two files below are the first two BASH environment files to be executed and controlled by the sysadmin (root user)?
/etc/profile /etc/bashrc
The File system Hierarchy Standard specifies what directory as the root user's home directory?
/home
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
/root
Under the root directory in Linux, which directory contains system commands and utilities?
/usr
What directory under / contains the log files and spools for a Linux system?
/var
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
0
On Linux, the root user always has a UID of what number?
0
The file descriptor stdin is represented by the number ____.
0
What number represents the stdin file descriptor?
0
What number represents the stdout file descriptor?
1
In Linux, what runlevel is also known as the multiuser mode?
2
The file descriptor stderr is represented by the number ____.
2
What number represents the stderr file descriptor?
2
What is the recommended size for the /home directory?
200MB
-wx-w-r-x
325
A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?
4
r--
4
The compression algorithm used by the compress utility has an average compression ratio of ____%.
40-50
what are the three numbers representing rwx?
421
r-x
5
Select the mode below that corresponds to setting r-x:
5
If no level of compression is specified, the gzip command assumes the number ____.
6
rw-
6
The average compression ratio for gzip is ____%.
60-70
rw-r-xrwx
657
rw- rw- rw-
666
When using the chmod command, the mode rwx can be represented by which number?
7
rwx
7
What hex code is associated with a Linux swap type partition? a. 96 b. 83 c. 12 d. 82
82
At the vi command mode prompt, what key combination will force a quit from the vi editor without saving changes?
:q!
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? a. :q! b. :! c. :exit d. :q
:q!
What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?
;
You can redirect a file to the standard input of a command using the ____ metacharacter.
<
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
>
You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.
>
What metacharacter should be used to append stdout to a file?
>>
The _____ symbol indicates a linked file.
@
When issuing the ls -F command, what special character indicates a linked file?
@
RAID-Z
A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:
cal
A calendar for the current month can be shown on the command line by issuing which command?
character
A device that transfers data in a character-by-character fashion is referred to as what type of device?
4
A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?
env
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
pwconv
A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?
-L
A user account can be locked with the usermod command using what option?
lpstat
Adding the -t option to what command below will provide a list of all printers on the system and their status?
fg
After a background process has been started, what command below can be used to move it to the foreground?
exit
After a shell is no longer needed, what command can be given to exit the shell?
Run the ldconfig command.
After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated?
shell
After logging into a terminal, a user will receive an interface known as which option below?
newaliases
After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?
grub-mkconfig
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
chmod a+x file1
All categories (the user, the primary group and all others) have execute permission.
hexadecimal
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
rpm2cpio
An RPM package can be converted to a cpio archive using what command?
tarball
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
A utility that can be used to manage DPM packages using a graphical interface.
Aptitude
____ are back-up copies of files and directories.
Archives
Universal Access
Assistive technologies are configured using what utility on Fedora 20 in GNOME?
:q!
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes
0
At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?
____ is burning software that comes with Red Hat Fedora Core 2.
Brasero Disc Burner
1024
By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?
To display the contents of a text file called data, what command should be used?
Cat data
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?
Cd ../..
____ are values that are calculated using a MD5 algorithm, a SHA-1 algorithm, or a SHA-256 algorithm. Read Answer Items for Question 13.
Checksum
The software whose source code is not freely available from the original author; Windows 98 is an example.
Closed Source Software
Most configuration files on Linux systems are delimited using ____ characters.
Colon
A ____ is a standard set of instructions used to compress a file.
Compression algorithm
The rate of compression is called the ____.
Compression ratio
In order to switch between terminals in Linux, a user can press what two keys in combination with the F1-F6 keys?
Ctrl + Alt
What key combinations, commonly used in the vi editor command mode, displays current line statistics?
Ctrl + g
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
Ctrl +g
What key combination is commonly used in the vi editor command mode, displays current line statistics?
Ctrl+g
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line? a. Ctrl+k b. dd c. Ctrl+a d. Ctrl+d
Ctrl+k
What installation media source is the most common source for Linux packages?
DVD
tracks
Data is read from physical hard drives in concentric circles known as which of the following?
____ are constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.
Decision construct
C
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?
The _____ is a special file that serves as placeholders to organize other files.
Directory
target ID
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
8-bit
Each octet in an IP address represents a binary number consisting of how many bits / bytes?
An alternative to the vi editor that offers an equal set of functionality is the GNU _____ editor.
Emacs
An alternative to the vi editor that offers an equal set of functionality is the GNU _________________________.
Emacs (Editor MACroS) editor
The LISP artificial intelligence programming language can be used with which text editor ?
Emacs editor
The LISP artificial intelligence programming language can be used with which text editor below? a. Kedit editor b. Nedit editor c. Joe editor d. Emacs editor
Emacs editor
The _____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.
Emacs editor
____ are shell variables that are typically set by the system and contain information that the system and programs access regularly.
Environment variables
filesystem corruption
Errors on a filesystem are common on most filesystems. What do these errors indicate?
ln file1 file2
Everything about the files is the same and the link count is increased by one.
____________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
__________defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.
FHS
1. A symbolic link is also known as a soft link and is depicted by an @ appearing at the beginning of the filename when viewed using the ls -l command. True or False?
False
3. There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file and the other that it is on a directory. True or False?
False
A swap partition contains a filesystem.
False
Each device attached to a system can be represented by multiple device files.
False
In Linux, you are restricted to using only one type of filesystem on a system.
False
In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE).
False
Shell scripts do not require the execute permission in order to be run the same way binary programs are run.
False
T/F - Filenames can include up to 200 characters.
False
T/F - Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.
False
T/F - If a compression utility compresses a file to 52% of its original size, it has a compression ratio of 52%.
False
T/F - In Linux, the root directory is represented by a \ character.
False
T/F - In a decision construct, you can have an unlimited number of if then statements.
False
T/F - Is the graphical Emacs editor harder to use than the Emacs editor?
False
T/F - Is vim the Linux equivalent of vi?
False
T/F - It is acceptable to use shell metacharacters when naming files.
False
T/F - Pressing the Esc key at the prompt while using the more command displays a help screen.
False
T/F - The command strings /bin/echo displays the binary characters inside the /bin/echo binary executable program.
False
T/F - The rmdir command automatically removes a directory and all of its subdirectories and files.
False
T/F - To decompress files that have been compressed with the compress utility, you can use the decompress command followed by the names of the files to be decompressed.
False
T/F - To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?
False
T/F - To perform a case-insensitive grep search, would you use the -a option to the grep command?
False
T/F - To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
False
T/F - Traditionally, CDs/DVDs were used to back up data.
False
T/F - Users can create their own custom variables, called shell variables.
False
T/F - When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
False
T/F - When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
False
T/F - When using the less command, can you use the cursor keys on the keyboard to scroll up and down the contents of the file?
False
T/F - When you first open the vi editor, you are placed in edit mode.
False
T/F - You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
False
Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.
False
You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
False
What command is most effective at identifying different types of files?
File
What command is most effective at identifying different types of files?
File command
____ are labels representing command input and output.
File descriptors
What software type is software that is distributed free of charge, but the source code is not available?
Freeware
Archiving all data on a filesystem is performing a ____.
Full backup
An alternative to the vi editor that offers an equal set of functionality is the_______ editor.
GNU Emacs
The way in which a hard disk or SSD partition is formatted to allow data to reside on the physical media.
GUID Partition Table
State two ways of linking files in Linux.
Hard Link Symbolic Link (Symlink)
Filenames that start with a period, such as .file, are referred to as
Hidden Files
@server
How can you specify the intended DNS server to query with the dig command?
three
How many DNS servers can be configured in the /etc/resolv.conf file?
64
How many different kill signals can be sent by the kill command to a given process?
every ten minutes
How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?
vim file1
I order to quickly create an empty file, what command can be used?
:
IPv6 IP addresses are delimited by what character below?
xwininfo
If X Windows fails to start, what command can be used to troubleshoot the issue?
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
SIGHUP
If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:
Tab
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?
TCP wrapper
If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?
6
If no level of compression is specified, the gzip command assumes what compression level?
chmod +x file2
If no user is specified, all categories have execute permission.
umask (user mask)
If these default permissions are too permissive, a special variable on the system named ___ takes away permissions on new files and directories immediately after they are created. This command is meant to be used for newly created files and directories.
journald
In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?
tty1
In Fedora 20, what terminal is used for graphical login?
tty1
In Fedora 20, what terminal is used for graphical login?
/etc/X11/xorg.conf.d/
In Fedora 20, where are user configured settings for Xorg stored?
X Windows
In Linux, the core component of the GUI is known as:
2
In Linux, what runlevel is also known as the multiuser mode?
0
In NTP, what stratum consists of atomic devices or GPS clocks?
7
In a SCSI chain the highest priority SCSI device is given what SCSI ID?
sixth
In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
-
In a file's mode, a permission that is unavailable is represented by what character?
system-config-keyboard
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
tzselect
In order to change the time zone of a system after installation, what command must be used?
ln
In order to create a hard link, what command must be used?
useradd
In order to create user accounts on a Linux system, what command should be utilized?
-l
In order to display a list of at job IDs, what option can be specified to the at command?
apt-get
In order to download DPM packages, what command should be used below?
net.ipv4.ip_forward
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?
zfs get all
In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?
cd ../..
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?
<
In order to redirect a file to the standard input of a command, what metacharacter should be used?
lp
In order to send a print job to a printer using CUPS, what command must be used?
chmod 7777 filename
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
rmdir proj_files
In our book this directory is not deleted since it contains files.
1024
In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?
(hd0,0)
In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.
image=
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
Ctrl+k
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?
Ctrl+k
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?
swapoff
In the event that you wish to disable a swap partition, what command must be used?
swapoff
In the event that you wish to disable a swap partition, what command must be used?
w
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?
process state
In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?
The process is currently running on the processor.
In the process state column, what does an "R" indicate?
dd
In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?
root
In what filesystem are most of the operating system files contained?
command mode
In what mode does the vi editor open by default?
command mode
In what mode does the vi editor open by default?
chown -R user1.root Desktop
It changes the file owner to user1 and the group membership to root.
cp /etc/hosts
It copies the /etc/hosts file to the current directory.
touch file1
It creates an empty file called file1.
ls -li
It indicates a long listing of the files including the inode number
which grep
It lists the subdirectory that contains the grep executable file.
chmod 6755 file1
It sets the SUID and SGID for file1.
chmod 1777 dir1
It sets the sticky bit to dir1 so that the users can only delete their own files.
_____ are files that have an association with one another.
Linked files
_____ is a file that contains the most recent entries at the bottom of the file.
Log file
RPM
Most Linux distributions make use of what package manager?
15
Most Parallel SCSI controllers are capable of supporting up to how many devices?
A _____ identifies a channel that passes information from one process in memory to another, and in some cases can be mediated by files on the hard drive.
Named pipe
You can perform up to ____ different incremental backups using the dump/restore utility.
Nine
Is the graphical Emacs editor harder to use than the Emacs editor?
No
To perform a case-insensitive grep search, would you use the -a option to the grep command?
No
jabbering
Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?
chkconfig
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
0
On Linux, the root user always has a UID of what number?
/var/spool/at
On a Fedora based system, where are the shell environment and scheduled commands for at stored?
xvidtune
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
Options
Hardware Compatibility List (HCL)
Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?
Hardware Compatibility List (HCL)
Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?
0
Processes are started with what nice value by default?
Network Address Translation (NAT)
Proxy servers keep track of the information passed to each client by maintaining what type of table?
Most Linux distributions today use ____ as their package manager.
RPM
package dependency
RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?
State the three regular permissions that may be assigned to each user.
Read Write Execute
If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.
Read and execute
Text wildcards used to ease the searching of specific text information are called _________________________.
Regular expressions (regexp)
nohup
Running background processes using what command allows you to exit your command-line shell without ending any background processes?
What two disk systems allow for the use of more than four hard drives or SSDs in a single system?
SATA, SCSI
What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?
SHELL and PWD
State the three special permissions.
SUID (Set User ID) SGID (Set Group ID) Sticky bit
/etc/named.conf
Select below the configuration file that is used to configure the BIND / DNS server:
DROP DATABASE
Select the SQL statement below that can be used to delete a database:
ls -l
Select the command below that can be used to provide a long listing for each file in a directory:
du
Select the command below that shows the size of a directory and its contents in kilobytes:
du
Select the command below that shows the size of a directory and its contents in kilobytes:
chroot
Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment
mke2fs
Select the command that can be used to check an ext2, ext3, or ext4 filesystem:
e2fsck
Select the command that can be used to check an ext2, ext3, or ext4 filesystem:
fdisk
Select the command that can be used to create partitions that will be stored in an MBR after installation:
ping
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:
\f
Select the escape sequence that is used for a form feed:
\n
Select the escape sequence that starts a new line when used with echo:
\n
Select the escape sequence that starts a new line when used with echo:
loadavg
Select the file in the /proc directory that contains statistics on the performance of the processor
-d
Select the iptables option that specifies the destination address of packets for a rule:
|
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
5
Select the mode below that corresponds to setting r-x:
-p
Select the option that can be used with the lpstat command to display a list of printers that are enabled:
-l
Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:
-B
Select the option that, when used with the sar command, displays swap statistics:
*
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.
d. *
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.
[ A gt B ]
Select the test statement that can be used to determine if A is numerically greater than B
[ A -gt B ]
Select the test statement that can be used to determine if A is numerically greater than B:
memtest86
Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:
memtest86
Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:
____ are files that are typically used to create custom programs that perform administrative tasks on Linux systems.
Shell scripts
_____ is a file that allows a process on another computer to write to a file on the local computer while another process reads from that file.
Socket file
live media image
Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?
live media image
Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?
_____ is a file that represents a device on the system, such as a hard disk or serial port.
Special device file
A file descriptor that represents any error messages generated by a command.
Standard Error (stderr)
A file descriptor that represents information input to a command during execution.
Standard Input (stdin)
A file descriptor that represents the desired output from a command.
Standard Output
What option can be used in the journald configuration file to specify a file size limit to the event log?
SystemMaxUse
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Tab b. Ctrl c. Alt d. Esc
Tab
If you type enough unique letters of a directory and press _____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.
Tab
To display a text file in reverse order, what command should be used?
Tac command
What command can be used to display the last five lines of a text file?
Tail -5
Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives are called ____.
Tarball
40-50
The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?
TCP 80
The Apache daemon listens for HTTP requests on what port by default?
631
The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?
/boot
The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?
/root
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
Free Software Foundation (FSF)
The GNU General Public License (GPL) was developed by which organization?
4GB
The GUI components and related software take up how much space on a typical Linux installation?
Emacs editor
The LISP artificial intelligence programming language can be used with which text editor below?
vmlinuz
The Linux kernel exists as a file named:
vmlinuz
The Linux kernel exists as a file named:
Linus Torvalds
The Linux kernel was developed and released in 1991 by:
KDE
The QT toolkit is utilized by which GUI environment?
514
The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
man -k list
The apropos list command produces the same results as which command below?
$
The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?
echo $PS1
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
nine
The dump/restore utility is limited to a maximum of how many different incremental backups?
set
The environment variables that are set by default and their current values can be viewed with what command?
There are several different ways to identify a symbolic link. State them
The file type character (before the permission) is l. ls -F The output from this command will have @ after the file name, i.e., file4@. ls -li The output from this command will be file4 -> file3.
127
The first software RAID volume on a system will use a multiple disk device file that starts with what number?
Firewall
The iptables software on Linux is an example of what kind of software?
-t
The mkfs command can be issued with what switch in order to specify a filesystem type?
Total cost of ownership (TCO)
The overall cost of using a particular operating system is known as?
edquota
The quotas for certain users can be edited by using which command?
the mode of the file
The section of an inode that stores permissions is referred to as what?
/etc/ssh/sshd_config
The sshd daemon is configured by editing what configuration file?
>
The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?
State the three main structural sections of a filesystem.
The superblock The inode table Data blocks
chmod u=rw,g=r,o=r file2
The user is given the read & write permission, the primary group is given read permission and all others are given the read permission.
chmod u+w,g+r-w,o+r-x file1
The user is given the write permission, the primary group is given read permission and loses write permission and all others add the read permission and loses the execute permission.
locate inittab
The user will be able to view all files with the word inittab in the filename.
chmod 644 file*
This command changes the permissions of all files that have the format filex to rw-r--r--.
chmod 540 file1
This command changes the permissions of file1 to r-xr-----.
chmod -R 755 Desktop
This command changes the permissions of the Desktop directory and all of the files in the Desktop directory to rwxr-xr-x.
find /boot -type d
This command will find all directories underneath the /boot directory only.
find /var -size +4096
This command will find files that are larger than 4096 K (Kilobytes) underneath the /var directory.
find /etc -name "host*"
This command will find files that start with the letters "host" underneath the /etc directory.
groups
This command will let the user view his/her current group memberships.
rm -Rf proj_files
This command will remove the proj_files directory along with the files within the directory and the user will not be prompted about the deletion of these files.
newgrp
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
tac
To display a text file in reverse order, what command should be used?
tac
To display a text file in reverse order, what command should be used?
cat data
To display the contents of a text file called data, what command should be used?
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
mount -a
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?
16. Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?
True
At minimum, Linux typically requires only two partitions to be created: a partition that is mounted to the root directory, and a partition for virtual memory.
True
By default, Fedora 20 allows the root user to log into the GNOME desktop.
True
T/F - Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.
True
T/F - Any command that can be executed on the command line can also be placed inside any environment file.
True
T/F - Because its primary use is to back up files in case of system failure, cpio uses absolute pathnames by default when archiving.
True
T/F - It is good form to read the Makefile after you run the configure script.
True
T/F - Linux uses a logical directory tree to organize files into different folders.
True
T/F - The BASH shell assumes stdout in the absence of a numeric file descriptor.
True
T/F - The ENV environment variable represents the location of the BASH run-time configuration file.
True
T/F - The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
True
T/F - The dump/restore utility can only work with files on ext2 and ext3 filesystems.
True
T/F - The more command should not be used on binary files.
True
T/F - The most common way to search for information using regular expressions is the grep command.
True
T/F - The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
T/F - The three characters following a period in a file name are referred to as the filename extension.
True
T/F - You can use the sed command to remove unwanted lines of text.
True
T/F - You can use wildcard metacharacters with the find command.
True
T/F. A file that is hard-linked to another file shares two inodes, and thus has a link count of two.
True
T/F. A quick way to deny a user from accessing a directory and all of its contents in Linux is to take away the execute permission on that directory.
True
T/F. A user who does not have the execute permission to a directory is prevented from listing the directory's contents, adding and removing files, and working with files and subdirectories inside that directory, regardless of what permissions has to them.
True
T/F. A user with write permission to a directory has the ability to delete all files and subdirectories within it.
True
T/F. Access to resources depends on username and group membership. The user must have the required permissions.
True
T/F. All of these linked files have the same size, and when one file is modified, the other hard-linked files are updated as well.
True
T/F. All permissions are stored in the inode of a file or directory as binary powers of two.
True
T/F. All users must login with a username and password to gain access to a Linux system.
True
T/F. Although hard links share the same inode, deleting a hard-linked file does not delete all the other hard-linked files.
True
T/F. During file or directory creation, the user's name and primary group become the owner and group owner of the file, respectively.
True
T/F. Each file and directory must have an inode.
True
T/F. If the information returned does not fit on the screen, the user can use the more or less commands with the locate command.
True
T/F. If you want to override the interactive option, use the mv -f or cp -f. The -f (force) option will override the interactive mode of the alias.
True
T/F. In filesystem-neutral terminology, blocks are also known as allocation units because they are the unit by which disk space is allocated for storage.
True
T/F. New files are given rw-rw-rw- permissions and new directories are given rwxrwxrwx by default.
True
T/F. Note the special permissions have no meaning since the execute permissions are denied.
True
T/F. Permissions are not additive.
True
T/F. Removing a hard link can be achieved by removing one of its files, which then lowers the link count.
True
T/F. Shell scripts are text files containing instructions for the shell to execute. The user must have execute permission to run these scripts.
True
T/F. Since special permissions require execute permission, they mask the execute permission when displayed by the ls -l command.
True
T/F. Some implications of these permissions are a user with read only permission for a file can open the file and make changes to it but cannot save the changes in the file.
True
T/F. Special permissions may be set even if file or directory does not have execute permission. This is done via the chmod command and an extra digit is added to the front of the permissions argument.
True
T/F. Symbolic links do not need to reside on the same filesystem as the target.
True
T/F. Symbolic links do not share the same inode and inode number with their target file. One file is simply a pointer to another file and thus both files have different sizes.
True
T/F. The data blocks in a symbolically linked file contain only the pathname to the target file.
True
T/F. The file can not be recovered once it is deleted.
True
T/F. The hard linked files must reside on the same filesystem. The inode numbers are unique only on the same filesystem and hard links are recognized by ignoring this unique inode number rule.
True
T/F. The inode table consists of several inodes (information nodes).
True
T/F. The last three digits of the number displayed are the current umask.
True
T/F. The most common umask is 022. This umask is saying that nothing is taken away from the user, write permission is taken away from the group and write permission is also taken away from everyone else.
True
T/F. The mv (move) command can also be used to rename files.
True
T/F. The owner of the file or directory and the root user are the only two users on a Linux system who can modify permissions on a file or directory or change its ownership.
True
T/F. The primary group is the user's default group.
True
T/F. The recursive option refers to itself and its own contents. A recursive search includes all subdirectories in a directory and their contents.
True
T/F. The rmdir (remove directory) command only removes a directory if it contains no files. The -R and -f options are helpful.
True
T/F. The root user supersedes all file and directory permissions. The root user has all permissions to every file and directory regardless of what the mode of the file or directory indicates.
True
T/F. The user can copy a directory full of files in Linux by using the -R option (recursive option) with the cp command.
True
T/F. The user might choose to use numeric criteria with the chmod command to change permissions.
True
T/F. To add or remove a file from a directory, the user must have write permission to that directory.
True
T/F. To change the umask, the user can use a new umask as an argument to the umask command, i.e., umask 007.
True
T/F. Users are identified by a username and group memberships.
True
T/F. When a file is deleted, only its inode (which serves as a pointer to the actual data) is deleted.
True
T/F. With special permissions, rw-rw-rw- will become rwSrwSrwT.
True
T/F. With special permissions, rwxrwxrwx will become rwsrwsrwt.
True
T/F. You can use the alias command to see all of the defaults. An alias is a shortcut for a command.
True
T/F. rw-r--r-- can be represented as 644.
True
T/F. rwxr-x--- can be represented as 750.
True
The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.
True
The database for the locate command can be updated manually by using the updatedb command.
True
When a user interacts with his computer, he interacts directly with the kernel of the computer's operating system.
True
When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.
True
You can modify the PS1 variable to customize the shell prompt layout.
True
/var
Under the root directory in Linux, which directory contains system commands and utilities?
usr
Under the root directory in Linux, which directory contains system commands and utilities?
/boot
Under what directory is the Linux kernel stored?
The mode is divided into three sections, based on the user(s) that receives the permission to that file or directory. State them.
User (owner) permissions Group (group owner) permissions Other (everyone else on the Linux System) permissions
[1-4]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4 (shortest form)?
[1-4]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
MX
What DNS resource record type is used to provide the IP address for the e-mail server for a zone?
!
What FTP command runs a shell on the local computer?
Red Hat
What Linux distribution is the most commonly used distribution within organizations today?
pg_dump
What PostgreSQL command-line utility backs up PostgreSQL database settings?
RAID5
What RAID level is commonly referred to as disk striping with parity?
SCSI-3 Ultra2 Wide
What SCSI type supports speeds of up to 80 MB/second?
alert
What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?
g+r-w
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
parent process ID
What can be used on a Linux system to trace the lineage of each child process?
#!
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
#!
What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?
/dev/ttyS1
What character device file represents the second serial port on a system (COM2)?
colon
What character is used to delimit most Linux configuration files?
&
What character, when appended to a command, causes the command to be run in the background?
pvcreate
What command below can be used to create a new physical volume?
grub2-install
What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?
lilo -U
What command below can be used to uninstall the LILO bootloader from an active partition?
pstree
What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?
rm
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?
pwd
What command can be issued to confirm what directory you are in at a command line prompt?
ifconfig
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?
ulimit
What command can be used to change the maximum number of file handles that can be used by a program?
fsck
What command can be used to check different kinds of filesystems on Linux for errors?
grubby
What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?
cp
What command can be used to copy files?
zcat
What command can be used to display the contents of a file that was compressed with the compress utility?
pwd
What command can be used to display the last five lines of a text file?
tail -5
What command can be used to display the last five lines of a text file?
tr
What command can be used to replace characters in a file sent via Standard Input?
dpkg-query
What command can be used to search for DPM package information?
ntp_query
What command can be used to see what actual time servers are being used for synchronization?
traceroute
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
hwclock
What command can be used to view and modify the date and time within the BIOS?
ldd
What command can be used to view what shared libraries are required by a certain program?
stat
What command is most effective at identifying different types of files?
file
What command is most effective at identifying different types of files?
mdadm
What command is used to manage a software RAID configuration after installation?
make
What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?
DEC PDP-7
What computer system was the first to run the UNIX operating system?
login.defs
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?
for
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
/dev/nht0
What device file below indicates the first ATAPI IDE tape device (nonrewinding)?
DirectoryIndex index.html
What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?
/var
What directory under / contains the log files and spools for a Linux system?
It removes all extra ACL assignments on a given file.
What does the setfacl -b command do?
/etc/profile
What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?
ssh_host_dsa_key. pub
What file contains the DSA public key in the /etc/ssh directory?
/etc/systemd/system/default.target
What file controls the default runlevel when using Systemd?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use?
/proc/cpuinfo
What file in the /proc directory contains information about a computer's CPU?
udf
What file system below is used by software programs that write to a CD-RW or DVD-RW drive?
modules
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
mput filename
What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
82
What hex code is associated with a Linux swap type partition?
82
What hex code is associated with a Linux swap type partition?
DVD
What installation media source is the most common source for Linux packages?
256-bit
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
60%-70%
What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?
50
What is the default print job priority for all print jobs created by the lp command?
graphical.target
What is the default target on a system with a GUI installed?
15
What is the maximum number of characters that can be used in a NetBIOS name?
2
What is the minimum number of user accounts that must be created at install time?
two
What is the minimum number of user accounts that must be created at install time?
Hard DIsk
What is the most common hardware component to fail on a Linux system?
TCP/IP
What is the most commonly used LAN protocol?
200 MB
What is the recommended size for the /home directory (per user)?
255.255.0.0
What is the subnet mask for a Class B IP address?
255.255.255.0
What is the subnet mask for a Class C IP address?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
quiet
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
SIGHUP
What kill signal stops a process, then restarts it with the same PID?
DNS
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?
secure
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
;
What metacharacter can be used to issue tw term-31o commands to be run in consecutive order, without piping or redirecting output?
d ;
What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?
c. ~
What metacharacter can be used to refer to the current user's home directory?
~
What metacharacter can be used to refer to the current user's home directory?
&
What metacharacter indicates background command execution?
127
What number indicates the lowest kernel priority (PRI) of a process possible?
2
What number represents the stderr file descriptor?
0
What number represents the stdin file descriptor?
!
What operator below is known as the NOT operator?
-P
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-i
What option can be added to the netstat command in order to display network statistics?
-q
What option can be added to the rpm command in order to query packages?
-F
What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?
-r
What option can be added to the userdel command to remove the home directory of the target user?
-V
What option can be specified with the rpm command to identify any missing files in a package or package dependency?
SystemMaxUse
What option can be used in the journald configuration file to specify a file size limit to the event log?
-X
What option can be used with ssh to enable tunneling of X Windows information?
-e
What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?
-P
What option for the iptables command can be used to specify the default policy for a certain chain type?
-d
What option should be used in conjunction with the lp command in order to specify the destination printer name?
-e
What option, when added to the crontab command, opens the vi editor with a user's cron table?
-r
What option, when added to the rm command, is commonly referred to as the -resume option?
execute
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?
write
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?
write
What permission grants a user the ability to open, read, and edit the contents of a file?
read and execute
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
device driver
What piece of software tells the operating system how to use a specific hardware device?
UDP 123
What port is used by the Network Time Protocol (NTP) for communication?
panic
What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?
0-1023
What range of ports is considered to be "well-known"?
superblock
What section of a filesystem contains information about the filesystem in general?
Freeware
What software type is software that is distributed free of charge, but the source code is not available?
Stage1
What stage of the GRUB boot loader typically resides on the MBR / GPT?
GNU Public License
What stipulates that the source code of any software published under its license must be freely available.
virtual host
What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?
virtual host
What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?
Secure Shell (SSH)
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
iostat
What utility in the sysstat package measures the flow of information to and from disk devices?
25
What well-known TCP port is utilized by the SMTP service?
yum grouplist
What yum command below can display a list of package group names?
/var/named/named.local
What zone configuration file contains a PTR record used to identify the loopback adapter?
@
When issuing the ls -F command, what special character indicates a linked file?
%
When killing a background job with the kill command, the background job ID must be prefixed by what character below?
+
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?
-f
When used with the compress command, what option below can be used to compress symbolic links?
-c
When used with the uncompress command, what option displays the contents of the compress file to Standard Output?
systemctl
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?
Options
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
whoami
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
7
When using the chmod command, the mode rwx can be represented by which number?
.Z
When using the compress utility, each file specified for compression is renamed with what extension?
The process is high priority.
When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?
minor number
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
HELO
When working with Sendmail, what command can be used to test SMTP support?
/var/log/samba
Where are the log files for the Samba daemon located?
/var/www/html
Where is the default document root directory for the Apache web server?
/etc/skel
Where is the skeleton directory located on most Linux systems?
whoami
Which Linux command can be utilized to display your current login name?
{}
Which character(s) below represent extended regular expression metacharacter(s)?
curl
Which command below can be used at a BASH command prompt to obtain a web page?
service
Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?
df
Which command below provides the easiest method for monitoring free space on mounted filesystems?
wc
Which command can be used to count the number lines, words, and characters in a file?
nmap
Which command can be used to see what network services are running on your network?
lpadmin
Which command should be used to restrict access to printers?
/dev/hdb1
Which device file below represents the first primary partition on the second PATA hard disk drive?
SIGQUIT
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
device calls
Which of the following is not one of the three main types of Linux commands?
Hiring people to maintain the Linux system
Which of the following is the greatest expense for companies using Linux?
Ctrl+g
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
--loop
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?
-o loop
Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?
-q
Which sar command option is used to display statistics for the processor queue?
-F
Which switch below can be added to the ls command to show a list of files and their type?
Artistic
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Due to the fact that the * character can be used to match all characters in a filename, or all files in a directory, it is referred to as a ____________ metacharacter.
Wildcard
In Linux, the core component of the GUI is known as:
X Windows
The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen.
X client
The component of X Windows that draws graphics to windows on the terminal screen.
X server
Is vim the Linux equivalent of vi?
Yes
To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?
Yes
When using the less command, can you use the cursor keys on the keyboard to scroll up and down the contents of the file?
Yes
/var/log/boot.log
You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?
Select the test statement that can be used to determine if A is numerically greater than B.
[ A -gt B ]
The test statement ____ would be used to determine if A is numerically greater than B.
[ A -gt B ]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
[1-4]
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
[1234]
The ____ escape sequence represents a form feed.
\f
The ____ regular expression metacharacter matches 0 or more occurrences of the previous character. a. * c. + b. ? d. ^
a. *
The ____ symbol indicates a linked file. a. @ c. & b. * d. =
a. @
7. After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1. What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.
a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.
17. When applied to a directory, the SGID special permission____________________. a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them b. cannot be done as it is only applied to files c. allows users the ability to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory
a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them
The ____ metacharacter can also be used to refer to the current user's home directory. a. ~ c. & b. @ d. #
a. ~
Hard Linked files
are direct copies of one another, as they share the same inode and inode number.
added to a ch or ls command for attributes?
attr
The ____ command can be used to extract, manipulate, and format text using pattern-action statements.
awk
The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?
awk
10. The command chmod 317 file1 would produce which of the following lines in the ls command? a. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1 b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1 c. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1 d. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1
b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1
If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information. a. Alt c. Ctrl b. Tab d. Esc
b. Tab
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4? a. 1-4 c. [1234] b. [1-4] d. [1,2,3,4]
b. [1-4]
To move from the /home/joe/test/data to the /home/joe directory, use the ____ command. a. cd .. c. /home/joe b. cd ../.. d. cd ./..
b. cd ../..
18. Which command do you use to rename files and directories? a. cp b. mv c. rn d. rename
b. mv
The ____ command will confirm the system directory that you are currently in. a. dir c. whereami b. pwd d. ld
b. pwd
12. What does the /var directory contain? a. various additional programs b. spools and log files c. temporary files d. files that are architecture independent e. local variance devices
b. spools and log files
20. Given the following output from the ls command, how many files are linked with file1? drwxr-xr-x 3 root root 4096 Apr 8 07:12 Desktop -rw-r--r-- 3 root root 282 Apr 29 22:06 file1 -rw-r--r-- 1 root root 282 Apr 29 22:06 file2 -rw-r--r-- 4 root root 282 Apr 29 22:06 file3 -rw-r--r-- 2 root root 282 Apr 29 22:06 file4 -rw-r--r-- 1 root root 282 Apr 29 22:06 file5 -rw-r--r-- 1 user1 sys 282 Apr 29 22:06 file6 a. one b. two c. three d. four
b. two
The TCP/IP communication destined for all computers on a network.
broadcast
A command used to decompress files compressed by the bzip2 command
bunzip2
8. After typing the command umask 731, the permissions on all subsequently created files and directories will be effected. In this case, what will the permissions on all new files be? a. rw-rw-rw- b. rwxrw-r-- b. rwxrw-r-- d. ----wx--x
c. ---r--rw-
To view a list of files and their type, use the ____ switch to the ls command. a. -T c. -F b. -L d. -l
c. -F
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. $ c. Ctrl+g b. x d. P
c. Ctrl+g
The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor. a. Kedit editor c. Emacs editor b. Mcedit editor d. Nedit editor
c. Emacs editor
2. What was created to define a standard directory structure and common file location for Linux? a. FSH b. X.500 c. FHS d. root directory
c. FHS
6. A user utilizes the chgrp command to give ownership of a file to another user. What must the user do to regain ownership of the file? a. Run chgrp again listing himself as the new owner. b. Nothing as this is a one-way, one-time action. c. Have the new owner run chgrp and list the original owner as the new owner. d. Run chown and list himself as the new owner.
c. Have the new owner run chgrp and list the original owner as the new owner.
13. What does the mv command do? (Choose all that apply.) a. It makes a volume. b. It makes a directory. c. It moves a directory. d. It moves a file.
c. It moves a directory. d. It moves a file.
19. What are the three standard Linux permissions? a. full control, read-execute, write b. read, write, modify c. execute, read, write d. read, write, examine
c. execute, read, write
Most files on a Linux system that contain configuration information are ____ files. a. system c. text b. directory d. program
c. text
The chown command
can be used to change both the file owner and the group owner of a file or directory at the same time.
The rm -R command
can be used to remove a directory along with the files inside of the directory.
To display the contents of a file called data, use the command _____.
cat data
To display the contents of a text file called data, what command should be used?
cat data
In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. /home/joe c. cd ./.. d. cd ../..
cd ../..
To move from the /home/joe/test/data to the /home/joe directory, use the _____ command.
cd ../..
The chgrp (change group) command
changes the group owner of a file or directory.
The chmod (change mode) command
changes the mode (permissions) of files or directories.
The chown (change owner) command
changes the ownership of a file or directory.
A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character
character
A calculated value that is unique to a file's size and contents.
checksum
The command used to change the GECOS for a user.
chfn
On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?
chkconfig
In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?
chmod 7777 filenam
In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename?
chmod 7777 filename
In what mode does the vi editor open by default?
command
The cp (copy)
command copies files. It requires two arguments at a minimum: the source file/directory (may specify multiple sources) and the target file/directory. The target file/directory is always listed last. The original file is still in tact. .
The mkdir (make directory)
command creates directories or folders using the arguments specifying the absolute or relative pathname of these directories. mkdir proj_files
In what mode does the vi editor open by default? a. command mode b. overview mode c. insert mode d. append mode
command mode
The mv (move)
command moves files from one directory to another. It requires two arguments at a minimum: the source file/directory (may specify multiple sources) and the target file/directory. The target file and/or directory is always listed last. mv project* proj_files
The rm (remove)
command removes files in a directory and requires a list of arguments specifying the absolute or relative pathnames of the files.
What command can be used to copy files?
cp
The ln (link) command
creates a hard link between two files. The two required arguments are the existing file to hard-link and the target file to create as a link to the existing file.
In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?
ctrl + K
9. When you change the data in a file that is hard-linked to three others, __________. a. Only the data in the file you modified is affected. b. Only the data in the file you modified and any hard linked files in the same directory are affected. c. The data in the file you modified and the data in all hard linked files are modified as they have different inodes. c. The data in the file you modified and the data in all hard linked files are modified as they have different inodes.
d. The data in the file you modified as well as the data in all hard linked files are modified as they share the same data and all have the same inode and file size.
To display the contents of a file called data, use the command ____. a. disp data c. ls -l data b. ls data d. cat data
d. cat data
14. A file has the following permissions r----x-w-. The command chmod 143 would have the same effect as the command _________. a. chmod u+x-r,g+r-x,o+w file1 b. chmod u=w,g=rw,o=rx file1 c. chmod u-r-w,g+r-w,o+r-x file1 d. chmod u=x,g=r,o=wx file1 e. chmod u+w,g+r-w,o+r-x file1 f. chmod u=rw,g=r,o=r file1
d. chmod u=x,g=r,o=wx file1
The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors. a. XEmacs c. Emacs b. vi d. gedit
d. gedit
The ____ command can be used to provide a long listing for each file in a certain directory. a. ls -T c. ls -F b. ls -L d. ls -l
d. ls -l
4. The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rw-rw-rw- b. rw-rw-rw- and r--r--r-- c. rw-rw-rw- and rwxrwxrwx d. rwxrwxrwx and rw-rw-rw- e. rwxrw-rw- and rwx-rw-rw-
d. rwxrwxrwx and rw-rw-rw-
15. The which command _________________? a. can only be used to search for executables b. searches for a file in all directories starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable
d. searches for a file only in directories that are in the PATH variable
The ____ command displays the last five lines of a text file. a. end -5 c. stop -5 b. head -5 d. tail -5
d. tail -5
Which is an extended regular expression metacharacter? a. . c. ^ b. [...] d. {}
d. {}
A system process that is not associated with a terminal.
daemon process
In vi, using command mode, what series of key presses will cause the line on which the cursor is on to be deleted?
dd
In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted? a. yw b. dd c. d d. X
dd
Filesystem Hierarchy Standard (FHS)
defines a standard set of directories for all Linux and UNIX systems, as well as the file and subdirectory contents of each directory. It gives Linux software developers the ability to locate files on a Linux system regardless of the distribution, allowing them to create software that is not distribution-specific
Each inode
describes one file or directory on the filesystem and contains a unique number for identification. It also stores information such as file size, data block locations, last date modified, permissions and ownership.
Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd
df
The umask command
displays the umask of a file.
The find command
does not use a premade index of files, but instead searches the directory tree recursively starting from a certain directory for files that meet a certain criterion
Select the command below that shows the size of a directory and its contents in kilobytes: - du - sizeof - df - dir
du
The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?
echo $PS1
The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota
edquota
The _____ displays lines of text that match extended regular expressions.
egrep command
In an if construct, what statements are optional?
else and elif
A list of all exported environment and user-defined variables in a shell can be viewed with what command below?
env
To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.
env
What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?
excecute
After a shell is no longer needed, what command can be given to exit the shell?
exit
Which command allows user-defined variables to be accessed by subshells?
export
Which two filesystems below do not perform journaling?
ext2, VFAT
It is acceptable to use shell metacharacters when naming files.
f
Pressing the Esc key at the prompt while using the more command displays a help screen.
f
The command strings /bin/echo displays the raw binary characters inside the /bin/echo binary executable program.
f
The area of the system from which information is gathered when logging system events.
facility
It is acceptable to use shell metacharacters when naming files. (true/false)
false
Pressing the Esc key at the prompt while using the more command displays a help screen. (true/false)
false
The command "strings /bin/echo" displays the binary characters inside the /bin/echo binary executable program. (true/false)
false
Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format
fdisk
Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks
filesystem corruption
The act of creating a new BASH shell child process from a parent BASH shell process.
forking
What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck
fsck
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
g+r-w
What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit
gdisk, parted
The _____ editor is functionally analogous to the Windows Wordpad and Notepad editors.
gedit
What is the default target on a system with a GUI installed?
graphical.target
What yum command below can display a list of package group names?
grouplist
The command used to modify the name or GID of a group on the system.
groupmod
After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?
grub-mkconfig
A command used to decompress files compressed by the gzip command.
gunzip
The first line in a shell script, which specifies the pathname to the shell that interprets the contents of the shell script, is ____.
hashpling
The _____ displays the first ten lines of a text file.
head command
Filenames that start with a period, such as .file, are referred to as ______ files.
hidden
The file .file.dat is an example of a _____ file.
hidden
When a user logs into their Linux system, he is placed in the _____ directory.
home
In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?
image=
A link count
indicates how many files share the inode number.
/dev
is a Linux directory defined by the FHS that contains device files.
/var
is a Linux directory defined by the FHS that contains log files and spools.
/usr
is a Linux directory defined by the FHS that contains most system commands and utilities.
/proc
is a Linux directory defined by the FHS that contains process and kernel information.
/lib
is a Linux directory defined by the FHS that contains shared program libraries (used by the commands in /bin and /sbin) as well as kernel modules.
/sbin
is a Linux directory defined by the FHS that contains system binary commands (used for administration).
/etc
is a Linux directory defined by the FHS that contains system-specific configuration files.
/boot
is a Linux directory defined by the FHS that contains the Linux kernel and files used by the boot loader.
/bin
is a Linux directory defined by the FHS that contains the binary commands for use by all users.
/tmp
is a Linux directory defined by the FHS that holds temporary files created by programs.
/home
is a Linux directory defined by the FHS that is the default location for user home directories.
The SGID (Set Group ID)
is applicable to both files and directories. If it is set on a file, the user who executes the file becomes a member of the group that is attached to that file during execution. If it is set on a directory, the user's name becomes the owner of the file and the directory's group becomes the group owner of the file.
If SUID (Set User ID)
is set on a file, the user who executes the file temporarily becomes the owner of the file during execution. It has no functionality when it is set on a directory. It is only applicable to binary compiled programs. Any user can test network connectivity with the ping command.
The locate command
is the fastest method to search for files in the Linux directory tree.
The superblock
is the section of the filesystem that contains information about the filesystem in general such as the number of inodes and data blocks, as well as how much data a data block stores in Kilobytes.
The mode
is the section of the inode that stores permissions for a file.
The ln -s option
is used to create a symbolic link between two files.
The touch command
is used to create an empty file.
An interactive mode
is used to prompt the user before overwriting files. In some distributions, typing mv or cp is the same as mv -i and cp -i. This is the default for the BASH shell in Fedora Core Linux.
A Symbolic Link (Symlink)
is where one file is simply a pointer or shortcut to another file.
A Hard Link
is where two files share the same data.
Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v
l, p
The PATH variable
lists the directories on the system where the executable files are located. It allows executable files to be run without specifying the absolute or relative path of the file.
Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?
live media image
In order to create a hard link, what command must be used?
ln
Select the command below that utilizes a premade database that contains a list of all the files on a system:
locate
What command utilizes a premade database that contains a list of all the files on a system:
locate command
The locate command
looks in a premade indexed database that contains a list of all of the files on the system. This database is updated each day automatically or the user can type the updatedb command at the command prompt.
Which command should be used to restrict access to printers?
lpadmin
The _____ command can be used to provide a long listing for each file in a certain directory.
ls -l
What command can be used to provide a long listing for each file in a directory
ls -l
Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend
lvextend, vgextend
The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.
make
____ is a command that can be used to copy files to the appropriate location on the filesystem.
make install
The apropos list command produces the same results as which command below?
man -k list
Select the command that can be used to check an ext2, ext3, or ext4 filesystem: a. mke2fs b. ext2fsck c. fdisk d. e2fsck
mke2fs
Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. swapon d. mkfs.swap
mkswap, swapon
The section of an inode that stores permissions is referred to as what?
mode
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a
mount -a
To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?
newgrp
The which command
only searches for executable files in directories that are listed in a special variable called the PATH variable in the current BASH shell.
In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's _______.
permissions
In a file listing, the 9 characters following the file type (ie. -rwxr-xr-x) refer to the file's _____.
permissions
When a user creates a file or directory, that user's name and ______ becomes the owner and group owner of the file, respectively.
primary group
When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.
primary group
What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv
pvcreate
The _____ command will confirm the system directory that you are currently in.
pwd
What command can be issued to confirm what directory you are in at a command line prompt?
pwd
What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?
quiet
What permissions are required to execute a shell script in a manner similar to any other executable program on the system?
read and execute
To copy a directory full of files in Linux, you must tell the cp command that the copy will be _____(involve files and subdirectories too) by using the -r option
recursive
To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option
recursive
Other
refers to all of the other users on the Linux system.
The User
refers to the owner of a file or directory.
The Group Owner
refers to the users with the ability to change permissions on a file or directory.
Text wildcards used to ease the searching of specific text information are called _____.
regular expressions
Text wildcards used to ease the searching of specific text information are called _______.
regular expressions
What does the setfacl -b command do?
removes all extra ACL assignments
A command used to extract archives created with the dump command.
restore
What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?
rm
What command takes a list of arguments specifying the absolute or relative pathnames of files to remove?
rm
In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt
root
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
secure
The environment variables that are set by default and their current values can be viewed with what command?
set
To see a list of the environment variables and their current values on a system, you can use the ____ command.
set
After logging into a terminal, a user will receive an interface known as which option below?
shell
Any error messages generated by a command is ____.
stderr
The information that is processed by the command during execution is ____.
stdin
____ is the normal output of a command.
stdout
The data blocks
store the data that makes up the contents of the file as well as the filename.
____ is a command that can be used to ensure that a file was received in its entirety after you download it.
sum
What section of a filesystem contains information about the filesystem in general?
superblock
In the event that you wish to disable a swap partition, what command must be used? a. umount b. swapoff c. swapdrop d. delete_swap
swapoff
To create a(n) _____ link, you use the -s option to the ln command.
symbolic
To create a(n) ____________________ link, you use the -s option to the ln command.
symbolic
In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?
system-config-keyboard
Linux uses a logical directory tree to organize files into different folders.
t
The more command should not be used on binary files.
t
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?
tab
To display a text file in reverse order, what command should be used?
tac
To display a text file in reverse order, what command should be used? a. tee b. tac c. cat d. sed
tac
The _____ displays a file in reverse order.
tac command
The _____ command displays the last five lines of a text file.
tail -5
What command can be used to display the last five lines of a text file?
tail -5
What command can be used to display the last five lines of a text file?
tail-5
____ is a filter command that takes information from standard input and sends that information to a file, as well as to standard output.
tee
Most files on a Linux system that contain configuration information are _____ files.
text
The section of an inode that stores permissions is referred to as what?
the mode of the file
The amount of time a process is given on a CPU in a multiprocessing operating system.
time slice
In order to quickly create an empty file, what command can be used?
touch command
The ____ command can be used to replace characters in a file sent via Standard Input.
tr
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
traceroute
Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders
tracks
The process of ignoring a kill signal.
trapping
The more command should not be used on binary files. (true/false)
true
The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.
true
What is the minimum number of user accounts that must be created at install time?
two
What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2
udf
A special variable used to alter permissions by taking away select defaults?
unmask command
What mode corresponds to setting r-x:
user
What two commands can be used to show information about physical volumes and logical volumes respectively? (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay
vgdisplay, lvdisplay
The Linux kernel exists as a file named:
vmlinuz
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d
w
The Sticky bit
was previously used on files in the past to lock them in memory. However, they are currently applicable to directories. This ensures that a user can only delete his/her own files in a directory.
The ____ command counts the number of lines, words, and characters in a file.
wc
FTP
what service provides a method for the efficient transfer of files over the Internet?
The _____ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.
which
The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.
which command
Which Linux command can be utilized to display your current login name?
whoami
Due to the fact that the * character can be used to match all characters in a filename, or all files in a directory, it is referred to as a_______ metacharacter.
wildcard
What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?
write
What permission grants a user the ability to open, read, and edit the contents of a file?
write
Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?
xvidtune
The ____ command can be used to display the contents of a compressed file.
zcat
A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion
zmore
Which character(s) below represent extended regular expression metacharacter(s)?
{}
Which character(s) represent extended regular expression metacharacter(s)?
{}
Which is an extended regular expression metacharacter?
{}
Select the metacharacter that can be used to send the standard output of one command to another command as standard input:
|
You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.
|
The _____ metacharacter can also be used to refer to the current user's home directory.
~
What metacharacter can be used to refer to the current user's home directory?
~
What are two local environment files that you can modify for use with aliases, functions, exporting of user-defined variables?
~/.bash_profile ~/.bashrc
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Artistic
:q!
At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes?
The GNU General Public License (GPL) was developed by which organization?
Free Software Foundation (FSF)
Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?
Hardware Compatibility List (HCL)
w
In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?
The channel that allows a certain user to log in and communicate with the kernel via a user interface
Terminal
pvcreate
What command below can be used to create a new physical volume?
for
What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?
!
What operator below is known as the NOT operator?
A variable that is altered by loop constructs to ensure that commands are not executed indefinitely.
counter variable
The numeric labels used to define command input and command output.
file descriptors
The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file.
hashpling
The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user.
primary group
What two commands below will halt a Linux system immediately?
shutdown -H now, halt
When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts
systemctl