WGU C698 Practice Test C

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following symbols in the beginning of the first line in a shell script specifies the shell used to run the script?

#! The #! symbol specifies the shell used to run a script. It tells the Linux kernel that this file is a script. It is used as following: #! /bin/date

Which of the following passwd parameters is used to remove the password from an account?

-d The -d passwd parameter is used to remove the password from an account. The user needs to be logged in as root to remove the password.

Which of the following useradd parameters is used to set the number of days between password expiry and account disabling?

-f The -f parameter is used to set the number of days between password expiry and account disabling. The value '0' disables the account as soon as the password expires.

Which of the following parameters is used to specify the input file with the at command?

-f The -f parameter is used to specify the input file with the at command. This parameter is used when the task is to be read from a file rather than the standard input.

Which of the following logger options is used to record the process ID of the logger process?

-i The -i logger option is used to record the process ID of the logger process. This option logs the process ID in each line.

Which of the following chage parameters is used to display information about account aging?

-l The -l chage parameter is used to display information about account aging. It follows the syntax below: chage -l [user_name]

Which of the following userdel parameters, if passed, deletes files in the user home directory along with the user account?

-r The -r parameter deletes files in the user home directory along with the user account. This parameter also removes the user's home directory.

Which of the following ln parameters is used to create a symbolic link?

-s The -s parameter is used to create symbolic links. This parameter can be used to create a link to the /etc/localtime file. The following table describes some common ln parameters: Parameter

Which of the following directories contains the configuration files used to manage Common Unix Printing System (CUPS)?

/etc/cups The /etc/cups/ directory contains the configuration files used to manage Common Unix Printing System. The files in this directory and its subdirectories can be edited directly by users.

Which of the following configuration files is used to store shadow password information about groups?

/etc/gshadow The /etc/gshadow configuration file is used to store shadow password information about groups. This file is accessible only to users logged in as root.

Which of the following shell configuration files is launched only by a login process and affects all users of a shell upon modification?

/etc/profile The /etc/profile file is launched only by a login process and affects all users of a shell upon modification. This file is the default startup script for each user on the system.

Which of the following files is configured for mapping port numbers with names to link servers to correct ports?

/etc/services The /etc/services file is configured for mapping port numbers with names to link servers to correct ports. These names can then be used for server configurations.

Which of the following contains the default configuration files copied to every new user's home directory?

/etc/skel The /etc/skel directory contains the default configuration files copied to every new user's home directory. These files are copied after the user account is created.

Which of the following files is used to configure the OpenSSH server?

/etc/ssh/sshd_config The /etc/ssh/sshd.config file is used to configure the OpenSSH server. It can be used to set the protocol levels accessible to the OpenSSH server.

Which of the following files contains information about the location of users in text format?

/etc/timezone The /etc/timezone file contains information about the location of users in text format. For a user in the Eastern time zone, the contents of this file should be like: America/New_Jersey

Which of the following environment variables contains the details about the current directory the user is working in?

PWD The PWD environment variable contains the details about the current directory the user is working in. This is a system maintained environment variable.

Which of the following AccessX features causes the keyboard modifier keys to remain active when pressed once, even after releasing the key?

Sticky keys The sticky keys AccessX feature causes the keyboard modifier keys to remain active when pressed once. The key remains active even after it has been released and affects any and every regular key pressed thereafter.

Which of the following options, when enabled, allows remote users to run GUI programs via SSH?

X11Forwarding The X11Forwarding option, when enabled, allows remote users to run GUI programs via SSH. This option is used to activate or deactivate OpenSSH's X tunneling features.

Which of the following commands can be used to set the minimum or maximum number of days between password changes?

chage The chage command can be used to set the minimum or maximum number of days between password changes. The -m and -M parameters are used to set the minimum and maximum number of days, respectively.

The -f parameter is used to specify the input file with the at command. This parameter is used when the task is to be read from a file rather than the standard input.

crontab The crontab command can be used to schedule a task to run daily at a specific time. This program is used to manage tables that drive the cron daemon.

Which of the following commands is used to perform complex DNS lookups?

dig The dig command is used to perform complex DNS lookups. By default, this command queries the servers listed in /etc/resolv.conf. It can also be used to find the IP addresses for a single host.

Which of the following is prefixed with an account's hashed password to lock that account?

exclamation (!) The exclamation symbol is prefixed with an account's hashed password to lock that account. This action disables the password and suspends the user access to the account. This task is accomplished by adding the -l parameter to the passwd command.

Which of the following commands runs a script without creating a subshell and exits the current shell after execution by default?

exec The exec command runs a script without creating a subshell and exits the current shell after execution by default. This command is primarily used to run a program from within a script.

Which of the following commands is used to make an environment variable available to subshells?

export The export command is used to make an environment variable available to subshells. This command is used after an environment variable is set manually.

Which keyword can be used within a script to create a module that performs a specific subtask?

function The function keyword can be used within a script to create a module that performs a specific subtask. A function can be called by name from any part of the script as ordinary commands (internal or external).

Which of the following commands is used to determine the users currently accessing a specific network port?

fuser The fuser command is used to determine the users currently accessing a specific network port.

Which of the following commands can be used to retrieve records from databases configured in the NSS (Name Service Switch) file?

getent The getent command can be used to retrieve records from databases configured in the NSS file. This command can be used to retrieve specific records from their keys.

Which of the following commands is used to set the CMOS clock?

hwclock The hwclock command is used to set the CMOS clock (or the hardware clock). This command can also be used to display the current time.

Which of the following is used to change the encoding of files from one format to another?

iconv The iconv command is used to change the encoding of files from one format to another. The result is written to the standard output, unless specified otherwise.

Which of the following commands is not used to initiate a loop?

if The if command is not used to initiate a loop. The if-then-else-if statement is used to execute a set of commands or statements based on a condition.

Which of the following commands is used to view or assign an IP address to a network interface?

ifconfig The ifconfig command is used to view or assign an IP address to a network interface. This command can also be used to activate or shutdown a network.

Which of the following starts an XDMCP server?

init The init method starts an XDMCP server. This method launches the server via an entry in the /etc/inittab file.

Which of the following can be used to display the contents of an email queue?

mailq The mailq command can be used to display the contents of an email queue. This commands displays the following details/entries of the mail queue: Queue file ID Message size Arrival time Sender Recipients (those who still haven't received the email)

Which of the following commands is used to synchronize the time between all the NTP clients and the NTP server?

ntpdate The ntpdate command is used to synchronize the time between all the NTP clients and the NTP server. This command can be run both manually and through a script at the boot time.

Which of the following users in Linux has a UID of '0'?

root The root user has a UID of '0'. This user has all the administrative privileges and access to all commands and files.

Which of the following commands is used to print a list of numbers within a specified range?

seq The seq command is used to print a list of numbers within a specified range. It follows the below syntax: seq START_NUMBER INCREMENT_AMOUNT END_NUMBER

Which of the following commands is used to display all user-defined variables in a sorted list?

set The set command is used to display all user-defined variables. This command also displays environment variables. The output is sorted alphabetically.

Which of the following commands can be used to run a single command as root without logging in as the superuser?

sudo The sudo command can be used to run a single command as root without logging in as the superuser. sudo users can use their own passwords to perform superuser tasks, even when they don't have the root password.

Which of the following commands is used to compare values or evaluate expressions?

test The test command is used to compare values or evaluate expressions. Here are the descriptions of some test operators: Operator

Which of the following commands are used to determine the route to a specified IP address?

traceroute tracepath The traceroute and tracepath commands are used to determine the route to a specified IP address. The traceroute command sends three packets to each computer between the host and the target system. The tracepath command, an alternative for the traceroute command, yields one line of output per packet.

Which of the following commands can be used to set restrictions on the size of core dumps and files created by the shell?

ulimit The ulimit command is used to set restrictions on the size of core dumps and files created by the shell. This command is used to set a limit on system resources being used, such as CPU time and memory usage.

Which of the following commands is used to remove a user's details from the /etc/passwd file?

userdel The userdel command is used to remove a user's details from the /etc/passwd file. This command is used to delete the existing user as well as all the related files.

Which of the following commands is used to change the user login name?

usermod The usermod command is used to change the user login name. The -l parameter changes the user's login name to the specified value.

Which of the following files is the X.org-X11 server's configuration file?

xorg.conf The xorg.conf file is the X.org-X11 server's configuration file. This file is usually present in the /etc/X11/ directory.

Which of the following files can be edited to redirect all of a user's mail to another mail address?

~/.forward The ~/.forward file can be edited to redirect all of a user's mail to another mail address. Using this file, mails can also be forwarded to another user on the same computer.

Which of the following is an on-screen keyboard utility in Linux?

GOK GOK, developed by the GNOME desktop development team, provides an on-screeen keyboard utility in Linux. It has now been replaced with Caribou.

Which of the following protocols is used by network devices to send only error messages whenever a requested service is not available?

ICMP The ICMP (Internet Control Message Protocol) is used by network devices to send error messages whenever a requested service is not available. These messages are typically used for diagnostic purposes.

Which of the following AccessX features enables the cursor keypad to be emulated as a pointing device?

Mouse keys The mouse keys AccessX feature enables the cursor keypad to be emulated as a pointing device. This feature comes in handy when the hardware mouse malfunctions.

Which of the following protocols synchronizes clock between computers on a network?

NTP The NTP (Network Time Protocol) synchronizes clock between computers on a network. ntpd is an NTP daemon that monitors and manages the process of clock synchronization.

Which of the following variables overrides other LC_* variables when set?

The LC_ALL variable overrides all other LC_* variables. This variable is set when the scripts are to run in locale independent ways.

Which of the following commands adds a password to a group to allow users, not a member of the group, to join the group temporarily?

The gpasswd command adds a password to a group to allow users to join the group temporarily. This command followed by a group name returns a prompt to change the password of the group.

Which of the following commands is used to assign new names to regular commands?

alias The alias command is used to assign new names to regular commands. The unalias command is used to remove an alias.

Which of the following options tells xinetd to listen on specified network interface?

bind The bind option tells xinetd to listen on specified network interface. This option is highly useful in routers.

Which of the following commands can be used to retrieve all login and logout data of currently as well as previously logged users?

last The last command can be used to retrieve all login and logout data of currently as well as previously logged users. This command displays data stored in the /var/log/wtmp file.

Which of the following commands is used to rename, compress, and delete system log files?

logrotate The logrotate command is used to rename, compress, and delete system log files. This command is executed to keep the manage log files, so that they do not use too much disk space.

Which of the following commands is used to display information about all the queued print jobs?

lpq The lpq command is used to display information about all the queued print jobs. This command can also be used to print the status of a printer or to check print jobs owned by a particular user.

Which of the following syslog facility parameters specifies that a printing program is logging the message?

lpr The lpr syslog facility parameter specifies that a printing program is logging the message. The facility parameters help in handling messages from each facility in a different way.

Which of the following CUPS utilities can be used to send a file to the print queue for printing?

lpr The lpr utility can be used to send a file to the print queue for printing. Here are the descriptions of some common lpr parameters: Option Description -P Print to a specified printer -# Specify the number of copies -m Send an email after job completion -q Hold a printing job

Which of the following commands is used to list all the open files and the user accessing those files?

lsof The lsof command is used to list all the open files and the user accessing those files. It can also be used to list all the processes associated with a specific connection.


Conjuntos de estudio relacionados

The Phantom Tollbooth, The Phantom Tollbooth

View Set

Ergonomic Principles, Body Mechanics, Ambulation, Transferring and Range of Motion (ATI Chapter 14,40)

View Set

Attention-Deficit/Hyperactivity Disorder (ADHD)

View Set

NIHD Week 4: Motor Systems & Movement Control: (Frank), Upper vs. Lower Motor Neurons; Localization of Weakness & Sensory Syndromes (First Aid 469, 470, 495)

View Set