Linux Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

1) Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.) a. ps b. proc c. top d. jobs

c.top a.ps

1) When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? a. mtr b. traceroute c. tracert d. tracepath

c.tracert d.tracepath a.mtr

1) Elijah is done working with an external USB hard drive and wants to properly disconnect it. Which of the following commands should he use before unplugging the USB cable? a. unmount b. disable c. umount d. mount --eject

c.umount

1) Which file should be configured so that quotas are enabled at boot time? a. /etc/edquota b. /etc/quotas c. /etc/fstab d. /etc/fsq

c.umount

1) Which of the following commands can be used to delete a user account? a. deluser b. rmuser c. userdel d. expireuser

c.userdel

1) Which of the following files contains the encrypted passwords for users on a modern Linux system by default? a. /etc/passwd b. /etc/pwenc c. /etc/shadow d. /etc/psh

/etc/shadow

What service provides a method for the efficient transfer of files over the Internet? a. FTP b. HTML c. SMTP d. Telnet

A.FTP

**Which of the following are valid permissions for a directory where the command chmod 1777 has been used to set the permissions on it? a. drwxrwxrwt b. Srwxrwxrwx c. trwxrwxrwx d. drwxrwxrw-

A.drwxrwxrwt

After a shell is no longer needed, what command can be given to exit the shell? a. exit b. stop c. reset d. quit

A.exit

Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do not charge for the software but also do not distribute the source code along with it? a. shareware b. freeware c. malware d. tryware

B.Freeware

1) In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? a. internal b. trusted c. DMZ d. public

C.DMZ

1) Which of the following can be used to mount a filesystem? (Choose all that apply.) a. A device path such as /dev/sdb2 b. A filesystem UUID c. A filesystem label d. A filesystem nickname configured in /etc/mtab

a. A device path such as /dev/sdb2 b. A filesystem UUID c. A filesystem label

1) Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? a. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. b. Configure /etc/fstab to mount the partition. c. Configure /etc/crypttab to mount the partition. d. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it.

a. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

1) Which of the following is not a valid compression file extension for the Linux operating system? a. .vz b. .xz c. .gz d. .bz2

a. .vz

1) Where are scheduled commands stored on Ubuntu Linux systems? a. /var/spool/cron/atjobs b. /etc/at/ c. /tmp/at d. /var/spool/at

a. /var/spool/cron/atjobs

1) Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.) a. deluser b. usermod -r c. userdel d. usermod -d

a. deluser c. userdel

1) Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? a. Kerberos b. TFTP c. Telnet d. Syslog

a. kerberos

1) After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem? a. make install b. make c. make image d. make clean

a. make install

1) Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.) a. rmgroup b. rmg c. groupdel d. delgroup Emily

a. rmgroup c. groupdel d. delgroup

1) Which of the following is a special group that provides its members with the ability to run the su and sudo commands? a. sudoers b. adm c. wheel

a. sudoers

1) cWhich of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system? a. -i b. -U c. -u d. -F

b. -U

At the vi command mode prompt, what key combination will force a quit from the vi editor without saving changes? a. :q b. :q! c. :exit d. :!

b. :q!

1) When working with Sendmail, what command can be used to test SMTP support? a. EHLO b. telnet c. HELO d. smtp

b. telnet

1) Which of the following files contain the path and filename where DNS servers should be configured? a. /etc/nsswitch.conf b. /etc/named.conf c. /etc/resolv.conf d. /etc/hosts

c. /etc/resolv.conf

1) In which directory would a system administrator store scripts that should be run monthly by the cron daemon? a. /var/cron/monthly b. /etc/crontab/monthly c. /var/crontab/monthly d. /etc/cron.monthly

d. /etc/cron.monthly

When using the vi text editor, which of the following keys, when in command mode, will change to insert mode and place the cursor at the end of the current line? a. i b. a c. I d. A

d. A

1) In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files? a. systemd b. messaged c. logd d. journald

d.journald

1) Nicholas wants to verify whether a file is a hard link to a file within the same directory. Which of the following commands could he use to see information that would be helpful to make this determination? a. ls -s b. ls -l c. ls -al d. ls -i

d.ls -i

1) To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory? a. /proc/mem b. /proc/cpuinfo c. /proc/meoryinfo d. /proc/meminfo

d.proc/meminfo

1) Which of these commands will set the following permissions on file1.txt? User = Read, Write, Execute Group = Read, Execute Others = Read a. chmod o=rwx,g=rx,u=r file1.txt b. chmod u=rwx, g=rx, u=r file1.txt c. chmod 754 file1.txt d. chmod file1.txt 754

idk

1) Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.) a. Runlevel b. telinit -r c. init -r d. echo $RUNLEVEL

runlevel, echo $RUNLEVEL

When using the vi text editor, which of the following keys, when in command mode, will move to the last line in the document? a. G b. L c. P d. W

a.G

1) Which of the following commands will display all files and directories within the /var/log directory or its subdirectories which are owned by the root user? (Choose two.) a. find /var/log -user root b. find -uid root -print /var/log c. find -user root -print /var/log d. find -path /var/log -user root

a.find /var/log -user root

1) Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all existing MBR partitions on a disk? a. gdisk b. cfdisk c. gfdisk d. iconv

a.gdisk

1) Which of the following commands can be used to display general hardware information for the entire system? a. lshw b. lscpu c. hwdisp d. hware

a.lshw

Jim wants to rename a directory for a project that he has been working on. Which of the following commands can he use to perform that action? a. mv projectx projecty b. rename projectx projecty c. ren projectx projecty d. move projectx projecty

a.mv projectx projecty

1) Which of the following is a valid method of running a script named myscript.sh? (Choose two) a. source myscript.sh b. run myscript.sh c. exec ./myscript.sh d. ./myscript.sh

a.source myscript.sh d../myscript.sh

1) Which of the following commands will return one result of where the grep binary executable is located? (Choose two.) a. which grep b. locate grep c. type grep d. find grep

a.which grep c.type grep

1) If incompatible X Windows settings are configured, where will the errors that are generated be written to? a. ~/.xsession-errors b. ~/.xerror c. ~/.xwin-error d. /var/log/xwindows.error

a.~/.xsession-errors

1) Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server? a. 22/tcp open ssh b. 23/tcp open telnet c. 443/tcp open https d. 993/tcp open imaps

b

In order to move from the /home/joe/test/data to the /home/joe directory, what command should be issued? a. cd .. b. cd ../.. c. /home/joe d. cd ./..

b cd../..

1) Which of the following is the first field of the /etc/passwd file? a. UID b. Username c. GECOS d. GID

b username

1) Which of the following commands can you use to view events within the journald database? a. journald -list b. journalctl c. journal --display d. viewlogs --journald

b. journalctl

1) Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system? a. apt-get update b. apt-get upgrade c. apt-get upgrade all d. apt-get update-all

b.apt-get upgrade

1) Which of the following file extensions are used by the Debian Package Manager? a. .dpm b. .deb c. .dpkg d. .d

b.dev

1) Wayne is using the command line and is in his home directory. Which of the following will display a list of all files and their sizes from his home directory? (Choose two.) a. ls -ax b. ls -al ~ c. ls -ax ~ d. ls -al /home/wayne

b.ls -al ~ d.ls -al/home/wayne

Select the command that can be used to provide a long listing for each file in a directory: a. ls -T b. ls -L c. ls -F d. ls -I

b.ls -l

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist? a. mkdir -r ~/2019projects/project/projectplans b. mkdir -p ~/2019projects/project/projectplans c. mkdir --all ~/2019projects/project/projectplans d. mkdir -v ~/2019projects/project/projectplans

b.mkdir -p ~/2019projects/project/projectplans

Which Linux command can be utilized to display your current login name? a. who b. whoami c. id d. w

b.whoami

1) Which of the following ports would be used to resolve a domain name to an IP address? a. 443 b. 23 c. 53 d. 69

c. 53

1) Which of the following are examples of multifactor authentication? a. Password and PIN b. Thumbprint reader and facial recognition c. Password and fingerprint reader

c.Password and fingerprint reader

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization? a. file server b. DNS server c. proxy server d. DHCP server

c.Proxy Server

1) Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system? a. tar b. wget c. APT d. YUM

d. YUM

1) Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list? a. apt upgrade b. apt upgrade all c. apt update d. apt-upgrade

d. apt-upgrade

1) Which of the following commands will show the current user cron jobs that have been created for the currently logged in user? a. cronjobs --list b. cron --list c. cron -l d. crontab -l

d. crontab -l

Kate wants to compare two text files to identify what might have been changed from one version to another. Which of the following commands can she use to do this? a. match document1.txt document2.txt b. version --compare document1.txt document2.txt c. compare document1.txt document2.txt d. diff document1.txt document2.txt

d. diff document1.txt document2.txt

1) Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? a. finger b. ping c. transit d. ethstat

b. Ping

1) Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services? a. RADIUS b. TACACS+ c. SSH d. NTP

b. TACACS+

1) Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? a. dpm.log b. dpkg.log c. dpackage.log d. packages.log

b. dpkg.log

1) You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal? a. Disp b. Fg c. Front d. jobs -f

b. fg

1) If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? a. chkdisk b. fsck c. chkfs d. blocks

b. fsck

1) You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this? a. dhcpaddr eth0 b. ifconfig eth0 c. ethconfig 0 d. netconfig eth0

b. ifconfig eth0

1) Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer? a. lp -d printer1 b. lpoptions -d printer1 c. lpd -d printer1 d. lpq --set-default printer1

b. lpoptions -d printer1

1) Which of the following commands can you use to send a print job to printer1? (Choose all that apply.)

b. lpr -d printer1 mydocument.txt c. lpr -P printer1 mydocument.txt

1) Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? a. psfiles b. lsof c. pstatus d. pids

b. lsof

1) What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename? a. upload filename b. mput filename c. put filename d. get filename

b. mput filename

1) Which of the following utilities can be used by a system administrator to determine which services are responding to network requests? a. portscan b. nmap c. netscan d. pmap

b. nmap

1) What command is used to display the lineage of a process by tracing its PPIDs until the init daemon? a. psbranch b. pstree c. psparent d. pshead

b. pstree

1) Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? a. su b. sudo c. sudoer d. doas

b. sudo

1) Which of the following commands will shut down a Linux system? (Choose all that apply.) a. runlevel 0 b. telinit 0 c. shutdown -h now d. poweroff

b. telinit 0 c. shutdown -h now d. poweroff

1) Which of the following commands can be used to trace an IPv6 route? (Choose two.) a. trace6 b. traceroute6 c. tracert6 d. tracepath6

b. traceroute6 d. tracepath6

1) Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password? a. sudoer b. user c. su d. switchuser

b. user

1) Which of the following options will change the ownership of files and directories recursively within a directory? (Choose all that apply.) a. -r b. -R c. --recursive d. --follow

b.-R c.--recursive

1) Which of the following is required as a separate partition in order to use LVM? a. /var b. /boot c. /tmp d. /home

b./boot

1) What file in the /proc directory contains information about a computer's CPU? a. /proc/proc_info b. /proc/cpuinfo c. /proc/meminfo d. /proc/cpu_info

b./proc/cpuinfo/

1) Where is the default document root directory for the Apache Web server? a. /usr/local/html b. /var/www/html c. /usr/share/local/html d. /var/html

b./var/www/html

1) **Which of the following is a valid APIPA address? a. 127.0.0.1 b. 169.254.38.101 c. 10.11.12.13 d. 192.168.1.17

b.169.254.38.101

1) Jan needs to set permissions on a file so that the owner has read, write, and execute permissions. The group should have read permissions only, and everyone else should have no access. Which of the following parameters, when used with the chmod command, would set the permissions described? a. 047 b. 740 c. 026 d. 620

b.740

Which of the following types of encryption uses a pair of keys known as a public and private? a. symmetric b. asymmetric c. SHA1 hashing d. message digest

b.Asymetric

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be: a. Arguments b. Options c. Keywords d. Metacharacters

b.Options

What would be the result of running the command chown :root file1.txt a. This would set the owner of file1.txt to root. b. This would set the group ownership of file1 to root. c. This would set the owner and group ownership of file1 to root. d. This would keep the current ownership of the file, and add root as a second owner of the file.

b.This would set the group ownership of file1 to root.

1) Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running? a. Kickstart b. Upstart c. GRUB d. POST

b.Upstart

1) Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file? a. create showauth='tail -f /var/log/auth.log' b. alias showauth='tail -f /var/log/auth.log' c. new showauth as 'cat -f /var/log/auth.log' d. ln showauth='tail -f /var/log/auth.log'

b.alias showauth='tail -f /var/log/auth.log'

Mike has changed directory into one subdirectory after the next and has lost track of where he's at in the directory tree. Which of the following commands can he use to tell him the full path to the current subdirectory he is in? a. cd - b. pwd c. cwd d. ls -dir

b.pwd

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Alt b. Tab c. Ctrl d. Esc

b.tab

1) Each SCSI device attached to a system must be assigned an ID number. What is this ID number called? a. Device ID b. Target ID c. SCSI number d. SCSI controller

b.target ID

John has been using the cdrom on his computer that is running the Linux operating system. He pushes the eject button on the front of the drive, but it doesn't eject the disk. Which of the following commands should he run? (Choose all that apply.)

b.umount /media/cdrom c.eject /media/cdrom

1) Jean installs a distribution of Linux on a workstation and attempts to run the locate command to find a certain file. Instead of returning the results she expected, an error message is displayed that it cannot find the mlocate.db file in its default location. Which of the following commands should Jean run in an attempt to resolve this problem? a. apt upgrade mlocate b. updatedb c. locate --update d. mlocate --update

b.updatedb

1) Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? a. ADSL b. VPN c. NTP d. VLAN

b.vpn

1) Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute? a. Run b. watch c. Do d. while

b.watch

1) Which of the following commands will count the number of lines in a file named data.csv? a. lc data.csv b. wc -l data.csv c. lines data.csv d. count -l data.csv

b.wc -l data.csv

1) Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.) a. GET b. wget c. curl d. wwwretr

b.wget c. curl

Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her Windows workstation. Which of the following file formats is Sandra likely to find available for download from Fedora's website in order to allow her to use the file as the source for booting and installing Linux as a VM? a. .zip b. .tar.gz c. .iso d. .tgz

c. .iso

1) **Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed? a. /23 b. /24 c. /27 d. /28

c. /27

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output? a. \ b. & c. ; d. |

c. ;

1) Which of the following types of DNS records need to be configured to facilitate email delivery? a. CNAME b. PTR c. MX d. IMAP

c. MX

1) Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence? a. Bounce Keys b. Repeat Keys c. Sticky Keys d. Slow Keys

c. Sticky Keys

1) Which of the following is a valid Linux initialization process? a. Systemd b. GRUB c. SysV d. GRUB2

c. SysV a. Systemd

1) Which of the following does a Linux kernel use to store the value of epoch time? a. The number of days since January 1, 1900 b. The number of minutes since January 1, 1900 c. The number of seconds since January 1, 1970 d. The number of milliseconds since January 1, 1980

c. The number of seconds since January 1, 1970

1) A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home? a. exec b. run c. at d. atq

c. at

1) Which command can be used at a BASH command prompt to obtain a Web page? a. apachect1 b. ab c. curl d. webpage

c. curl

1) Which of the following commands should you use to specify that you want to use Git for version tracking on them? a. git version b. git track c. git add d. git new

c. git add

1) Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file? a. cat /etc/passwd | grep root | merge ~/root.txt b. cat /etc/passwd | grep root >> ~/root.txt c. grep root /etc/passwd | tee ~/root.txt d. grep root /etc/passwd | split ~/root.txt

c. grep root /etc/passwd | tee ~/root.txt

1) Which of the following commands will display the print jobs in the print queue for printer1 only? a. lpstat -o printer1 b. lpq -d printer1 c. lpq -p printer1 d. lp -j printer1

c. lpq -p printer1

1) Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file? a. numbers /etc/passwd b. wc -l /etc/passwd c. nl /etc/passwd d. ln /etc/passwd

c. nl /etc/passwd

1) Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? a. ping -4 server1 b. ping server1 c. ping -c 4 server1 d. ping -n 4 server1

c. ping -c 4 server1

1) Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process? a. n b. p c. r d. d

c. r

1) Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation? a. rpm -iah packagename.rpm b. rpm -iap packagename.rpm c. rpm -ivh packagename.rpm d. rpm -ivp packagename.rpm

c. rpm -ivh packagename.rpm

1) Which of the following states describe a process that is waiting for a parent process to release its PID? a. wait b. suspended c. zombie d. dead

c. zombie

What metacharacter indicates background command execution? a. @ b. ^ c. & d. !

c.&

1) Which of the following would be the device file for the third partition on the second SATA drive on a Linux system? a. /dev/hdb3 b. /dev/hdc2 c. /dev/sdb3 d. /dev/sdc2

c./dev/sdb3

1) Which of the following directories is created by default when an ext2, ext3, or ext4 filesystem is created on a device that is used by the fsck utility? a. /var/crash/ b. /var/tmp/ c. /lost+found/ d. /proc/tmp/

c./lost+found/

1) The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? a. 8 b. 32 c. 48 d. 128

c.48

1) What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? a. DHCP b. NTP c. DNS d. NIS

c.DNS

Which of the following is the greatest expense for companies using Linux? a. Additional software b. Operating system cost c. Hiring people to maintain the Linux system d. Software upgrades

c.Hiring people to maintain the linux system

1) What is the most commonly used LAN protocol? a. UDP/IP b. IPX/SPX c. TCP/IP d. DLC

c.TCP/IP

In Linux, the core component of the GUI is known as: a. GNOME b. KDE c. X Windows d. Red Hat

c.X windows

1) cWhich of the following is the common escape sequence to display a horizontal tab using the echo command? a. \tab b. ?tab c. \t d. %tab

c.\t

1) Which of the following commands will display the exit status of the last command used in the BASH shell? a. echo $status b. echo $exit c. echo $? d. echo $!

c.echo $?

1) What argument can be used with the chmod command to add read permission and remove write permission for a group on a file? a. u+r+w b. g-r+w c. g+r-w d. o+r-w

c.g+r-w

1) Which of the following commands can a user run to display the groups that they are a member of? a. groupmod --list b. groups -list c. Groups d. Groupls

c.groups

Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information? a. modstatus bluetooth b. lsmod bluetooth c. modinfo bluetooth d. modstat bluetooth

c.modinfo bluetooth

Which of the following commands will delete a directory and all of the files contained within it? (Choose all that apply.) a. rm olddir b. rmdir olddir c. rm -rf olddir d. rmdir -rf olddir

c.rm -rf olddir

1) If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred? a. Page fault b. IRQ fault c. Segmentation fault d. RAM failure

c.segmentation fault

1) Which of the following SQL statements can be used to delete a table from a database? a. DELETE TABLE table_name; b. DROP FROM database TABLE table_name; c. ALTER DATABASE database DROP TABLE table_name; d. DROP TABLE table_name;

d. drop table table_name

1) Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use? a. zones b. timezones c. zoneselect d. tzselect

d. tzselect

1) Which of the following can be used to graphically remotely administer a Linux machine? a. RDP b. Telnet c. FTP d. VNC

d. vnc

1) The Filesystem Hierarchy Standard specifies what directory as the root user's home directory? a. /bin b. /home/root c. /boot d. /root

d./root

Under the root directory in Linux, which directory contains system commands and utilities? a. /opt b. /var c. /boot d. /usr

d./usr

1) Which of the following will take output from a command and append it to the end of a file? a. < b. << c. > d. >>

d.>>

Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet? a. SFTP b. IMAP c. SMTP d. NTP

d.NTP

1) Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the new partition information must be manually reloaded. Which of the following should she do next? (Choose two. Either answer is independently correct.) a. Run the parted command b. Run the partprobe command c. Run the cfdisk program d. Reboot the system

d.Reboot the system b.Run the partprobe command

What Linux distribution is the most commonly used distribution within organizations today? a. Mandrake b. SuSE c. Debian d. Red Hat

d.Red hat

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a: a. Router b. Package manager c. DBMS d. Tarball

d.Tarball

If a hard link is created to a file and then the original file is deleted, which of the following is true? a. Both the original file and the hard link are removed. b. An error message will be displayed preventing the deletion of the original file. c. The original file will be removed while the hard link remains, though the content will not be accessible. d. The original file will be removed while the hard link remains usable to access the contents of the file.

d.The original file will be removed while the hard link remains usable to access the contents of the file.

Which of the following commands will display messages that were displayed during the boot sequence by the kernel? a. kdis b. kernlog c. messages d. dmesg

d.dmesg

1) What command can be used to check different kinds of filesystems on Linux for errors? a. chkdsk b. fs_check c. errorchk d. fsck

d.fsck

1) Which of the following is a type of software that allows a piece of hardware to host multiple operating systems? a. guest operating system b. thick client c. thin client d. hypervisor

d.hypervisor

1) Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order? a. cat --sort /etc/passwd b. cat -s /etc/passwd c. sed /etc/passwd d. sort /etc/passwd

d.sort /etc/passwd

What command can be used to display the last five lines of a text file? a. end -5 b. head -5 c. stop -5 d. tail -5

d.tail -5

1) An alias has previously been created named showauth. Which of the following commands can be used to get rid of that alias? a. alias -d showauth b. ualias shoauth c. noalias showauth d. unalias showauth

d.unalias showauth

1) How many times will the following loop execute as part of a script: #!/bin/bash COUNTER=0 while [ $COUNTER -lt 7 ] do echo "hello world" done a. 0 b. 1 c. 7 d. until ctrl-c is used to terminate it

d.until ctrl-c is used to terminate it


Conjuntos de estudio relacionados

ATI Communicator 2.0: Video Interaction: Role as Interprofessional Team Member

View Set

Elections and Political Participation Vocabulary

View Set

The Colonization and Independence of India

View Set

Chapter 46: Caring for Clients with Disorders of the Lower

View Set

Chapter 1: Introduction to Nursing (Part 2 )

View Set