Chapter 14, Linux Ess. Ch 12, Linux Final, Linux, 211 FINAL, DCOm 142 Linux Final Study

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You're writing a script that should accept two arguments, a username and a year, specified in that order on the command line. What variable would you use to access the year?

$2

You're writing a script that should accept two arguments, a username and a year, specified in that order on the command line. What variable would you use to access the year?

$2 being the second argument

The Bash logical-and operator is ____.

&&

The symbols which make up the Bash logical and operator is ____.

&&

Which of the following options to chown changes the ownership of all the subdirectories of any specified directories, rather than just the files or directories that are explicitly passed to it?

-R or --recursive

You can type su _________ command to issue a single command with root privileges.

-c

You can type Xorg ________, as root, to have X create a default configuration file that you can then modify.

-configure

You want to see only the names of all the subdirectories of the current directory whose names begin with the letter s. To do so, you can type ls ___ s*. (Include no options other than those required to do as the question specifies.)

-d

The user arnold is currently logged in. Despite this fact, you want to delete his account without first logging him off. You don't want to delete arnold's files. To accomplish this goal, you type userdel ___ arnold.

-f

The user arnold is currently logged in. Despite this fact, you want to delete his account without first logging him off. You don't want to delete arnold's files. To accomplish this goal, you type userdel ___ arnold.

-f or --force

Which options to find can you use to locate files owned by a particular user

-user, -uid

Which options to find can you use to locate files owned by a particular user?

-user, -uid

Which regular expression string matches any sequence of characters of any length?

.*

To refer to the file afile.txt in the directory one level above the current one, you would type ___afile.txt

../

Which of the following files defines Linux groups?

/etc/group

The file that associates usernames with UID numbers in Linux is ___________. (Provide the complete path to the file.)

/etc/passwd

In what file are you likely to find the following lines? domain pangaea.edu nameserver 192.168.1.2 nameserver 10.78.102.1

/etc/resolv.conf

What file would contain the following: nameserver 8.8.8.8

/etc/resolv.conf

The terminal emulator program that would eventually become the Linux kernel was created in

1991

Under which version of the GPL is the Linux kernel distributed?

2

To append a program's standard error to an existing file without deleting its contents, you should use the ____ redirection operator.

2>>

Ubuntu releases a new version of its OS every _____ months.

6

A file has a symbolic mode of -rw-r-----. The file's octal mode is ______

640

A file has a symbolic mode of -rw-r-----. The file's octal mode is _______.

640

The character that separates fields on each line of /etc/passwd is ___.

:

You're working in Vi and, after having saved your current file, you want to load a new one. You can do so by typing ____ newfile.txt from command mode.

:e

You're working in vi and, after having saved your current file, you want to load a new one. You can do so by typing ____ newfile.txt from command mode.

:e

When assigning a value to a variable in a Bash script, you separate the variable from its value with the ____ character.

=

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents?

>>

What symbol do you place after a command to run the program in the background?

A An ampersand (&), placed after a command typed in Bash, causes the command to run in the background, so option A is correct. The remaining options do not accomplish this task, although option C redirects standard output and option D creates a pipe to the following command on the same line. Option B is completely meaningless, as is option E in this context, although a hash mark (#) does serve as a comment character in Bash scripts.

Which of the following options to chown changes the ownership of all the subdirectories of any specified directories, rather than just the files or directories that are explicitly passed to it?

A The -R or --recursive option does as the question specifies, so option A is correct. The --tree, -all, and -t options are all fictitious, so options B, D, and E are all incorrect. Option C is almost correct, but the correct option includes two dashes, not one—that is, it's --recursive, not -recursive.

You want to run the command cat /etc/shadow as root, but your logged in as an ordinary user. Which of the following commands will do the job, assuming that the system is configured to give you root access via the appropriate command?

A The command sudo cat /etc/shadow will give the ordinary user access for the command to run as root.

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused?

A The free command produces the information specified, so option A is correct. Options B, C, and D are all fictitious program names, at least on Linux. The Linux df command (option E) produces a summary of disk space available and used, not memory, so it's incorrect.

What is the purpose of the system account with a UID of 0?

A The UID 0 is reserved for the root user.

Which of the following options to chown changes the ownership of all the subdirectories of any specified directories, rather than just the files or directories that are explicitly passed to it? A. -R B. --tree C. -recursive D. -all E. -t

A ( recursive also correct but needs 2 dashes)

Which of the following are risks you take when you browse the Web as an ordinary user on a properly configured Linux system? (Select all that apply.)

A web site with malicious dynamic content could steal your personal data files. Data transferred to or from a web site can be intercepted, possibly exposing sensitive data to theft.

Which of the following two office suites are most closely related to one another?

A, E LibreOffice is derived from OpenOffice.org, so options A and E are correct. GNOME Office and KOffice are independently-created office suites for Linux, while Microsoft Office is a commercial office suite for Windows and Mac OS X. Thus, options B, C, and D are all independent of each other and of LibreOffice and OpenOffice.org.

On which of the following CPU types does Linux run? (Select all that apply.)

All: a. x86 b. x86-64 c. Itanium d. PowerPC

What symbol do you place after a command to run the program in the background?

An ampersand (&), placed after a command typed in Bash, causes the command to run in the background,

Which Linux distribution are you most likely to find in use on a cell phone?

Android

A symbol found in the root shell prompt by default is __.

Answer: #

To obtain a color-coded file listing, if your distribution doesn't produce one by default, you would type ls _____.

Answer: --color

You want to copy a set of files but be prompted before cp overwrites any existing files. You would use the ___ option to cp to accomplish this goal.

Answer: --interactive or -i

The _________ option to tar causes it to back up only the specified low-level filesystem; if another filesystem is mounted within the directory you say to back up, those files will be ignored.

Answer: --one-file-system

You can type useradd ____ nemo as root to create the nemo account without creating a home directory for nemo.

Answer: -M

You can type Xorg ________, as root, to have X create a default configuration file that you can then modify.

Answer: -configure

The user arnold is currently logged in. Despite this fact, you want to delete his account without first logging him off. You don't want to delete arnold's files. To accomplish this goal, you type userdel ___ arnold.

Answer: -f or --force

What can you use to search man pages for key words? (Which option)

Answer: -k The -k is the option to search for keywords in man pages.

To refer to the file afile.txt in the directory one level above the current one, you would type ___afile.txt.

Answer: ../

The file that associates usernames with UID numbers in Linux is ___________. (Provide the complete path to the file.)

Answer: /etc/passwd

A file has a symbolic mode of -rw-r-----. The file's octal mode is _______.

Answer: 640

You've created a script, sensitive, and you want to be sure that no other ordinary user of the computer can read, write, or execute it, but you must be able to read, write, and execute it. To do so, you type chmod ______ sensitive. (Specify the octal mode.)

Answer: 700

The character that separates fields on each line of /etc/passwd is ___.

Answer: :

What type of information can netstat provide?

Answer: A, B, C netstat can provide information on network interfaces similar to what ifconfig provides (option A), routing table data similar to what route provides (option B), and a list of open ports (option C). It can not provide round-trip network packet travel time similar to what ping provides (option D) or the identities of broken routers similar to what traceroute provides (option E).

What term refers to the worldwide system of servers that translates between IP addresses and hostnames?

Answer: B The question describes the Domain Name System (DNS), so option B is correct. The Dynamic Host Configuration Protocol (DHCP) delivers network configuration information to computers when they boot, so option A is incorrect. The Transmission Control Protocol/Internet Protocol (TCP/IP) is the overarching standard used for most networking purposes, so option C is incorrect. IP version 6 (IPv6) is an addressing system that supports immensely more addresses than does the older IPv4, so option D is incorrect. The Secure Shell (SSH) is an encrypted remote login protocol, so option E is incorrect.

Which of the following programs enable root to set the ownership of files? (Select all that apply.)

Answer: B, D command updates a file's time stamps, but does not change its ownership, so option E is incorrect.touch command can change various account features, but not file ownership, so option C is incorrect. The usermod command enables changing the mode (permissions) of files, but not their ownership, so option A is incorrect. The chmod, it enables you to change the ownership of files, so option D is also correct. The root command is a text-mode tool for changing the ownership and group association of files, so option B is correct. Nautilus is a GUI file manager, and when it's run as chownThe

What program can you use to manually bring up a network interface in Linux?

Answer: D The ifconfig program does as the question specifies (among other things), so option D is correct. The iwlist command displays information on Wi-Fi networks but does not bring up a network interface, so option A is incorrect. The route command displays or modifies routing tables, but does not bring up a network interface, so option B is incorrect. The telnet command is a remote-access and network diagnostic tool, but it does not bring up a network interface, so option C is incorrect. The traceroute command produces network diagnostic information, but it does not bring up a network interface, so option E is incorrect.

You want to create a directory called ~/Documents/papers, but you're not sure that the ~/Documents directory exists. What command can you type to create the desired directory and its parent directory if it doesn't already exist?

Answer: E The -p option to mkdir creates parent directories if they don't already exist, so option E is correct. The -a, --recursive, -R, and -r options are all fictitious, so options A, B, C, and D are all incorrect.

The _____ filesystem is very old but is supported by almost every OS, making it a good choice for interoperability.

Answer: FAT

The _____ library provides drivers to control scanners. (Provide the acronym for the library's name.)

Answer: SANE

Postfix is a server that implements the ______ protocol. (Provide the protocol's acronym

Answer: SMTP

True or False: As a general rule, you should employ extra care when running programs as root.

Answer: True

The files afile.txt and AFile.TXT can both exist on a Linux filesystem because these filesystems are ____________.

Answer: case-sensitive

The command _______ :users somefile.txt changes the group affiliation of somefile.txt to users.

Answer: chown

The /proc/______ pseudo-file holds data on your CPU, such as its model name and clock speed.

Answer: cpuinfo

You want to delete the oldproj group, so you type ______ oldproj.

Answer: groupdel

The first process to be run by the Linux kernel is normally called _______

Answer: init

The character __ identifies a symbolic link in the 10-character symbolic permission string that's associated with a file.

Answer: l (Lower case L) Found on pg 142

A condition in which a program allocates more and more memory but doesn't use the memory it allocates is called a ______ ______ (two words).

Answer: memory leak

A(n) _________ environment means that a person cannot deny actions, and the sudo command helps establish this environment.

Answer: nonrepudiation

The process that launched a given process is known as the ________ process

Answer: parent

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as ____.

Answer: phishing

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a __________.

Answer: repository

UIDs below 500 or 1000 (depending on the distribution) are reserved for use by __________ accounts.

Answer: system

A _______ is a GUI program in which text-mode programs (including shells) run

Answer: terminal

To learn who is currently logged into the computer and what programs they're currently running, you can type _____.

Answer: w

You can use the ____ command to count the characters, words, and lines in a text file.

Answer: wc

You can type _____ to learn your current username and nothing more?

Answer: whoami

You use the ___ character to separate two strings, either of which should match, in an extended regular expression.

Answer: | (pipe)

What type of information will you find in /etc/passwd for ordinary user accounts? (Select all that apply)

Answers A, C, E ....

Which of the following are examples of embedded computing devices? (Select all that apply.)

Automobiles, televisions, dvrs

Which of the following is the most common type of interface for internal hard disks on desktop computers today?

C SATA The Serial Advanced Technology Attachment (SATA) interface is the dominant type of internal hard disk interface today, so option C is correct. The older Parallel ATA (PATA) interface was once common, but has long been surpassed in popularity by SATA, so option A is incorrect. The Small Computer Systems Interface (SCSI) interface once dominated on high-end installations and is still in use, but is not popular on desktop systems, so option B is incorrect. Enhanced Integrated Device Electronics (EIDE) is another name for PATA, so option D is incorrect. The Universal Serial Bus (USB) is a common interface for external devices, including hard disks and many other devices, but the question specifies an internal interface, so option E is incorrect.

Which of the following programming languages is most often implemented as a compiled language?

C++

What keystroke deletes a line of text when using nano?

Ctrl+K

Which of the following programming languages is most often implemented as a compiled language?

D Of these languages, only C++ is commonly implemented as a compiled language, so option D is correct. The remaining options are all commonly implemented as interpreted languages.

Which of the following is an inappropriate choice for a filesystem to hold the majority of a Linux installation?

D The Hierarchical File System (HFS) was used by Mac OS prior to Mac OS X. It doesn't support features required by Linux in its main filesystem, so option D is the correct answer. JFS, ext4fs, ReiserFS, and XFS are all Linux-native filesystems (either developed explicitly for Linux or converted from other Unix-like OSes), so options A, B, C, and E are all incorrect.

Which of the following is not a Linux command shell program?

D The login program handles text-mode logins, but it isn't a shell program, so option D is correct. The remaining options are all Linux shell programs, so options A, B, C, and E are all incorrect. (Option E, bash, is the default shell for most distributions.)

You type touch afile.txt in a directory that contains no files. What will be the effect?

D The touch command updates a file's time stamps or creates a new empty file if one doesn't already exist. Since the latter case is described by the question, a new file will be created, as described in option D. Since touch doesn't copy files, option A is incorrect. Option B would be correct if there were an explicit reference to your home directory in the file specification, but the command as stated works on a file in the current directory, so option B is incorrect. Because the command will create a new file, options C and E are both incorrect.

Mary finds that she can delete George's files in /tmp. What might this imply? A. This is normal; all users should be able to delete files from /tmp. B. The SUID bit is present on /tmp; it should be removed. C. World write permissions are set on /tmp; they should be removed. D. The sticky bit is missing from /tmp; it should be set. E. The /tmp partition is mounted read-only; it should be mounted read/write.

D - sticky bit missing

Which of the following is not a function of the Linux kernel?

Displaying common GUI elements such as dialog boxes

What term refers to the worldwide system of servers that translates between IP addresses and hostnames?

Domain Name System (DNS)

Which of the following pieces of information on user accounts is not normally stored in the /etc/passwd file on modern Linux distributions?

E Although /etc/passwd includes a field for the password, that field normally contains an x value, meaning that the encrypted password is stored in /etc/shadow. Thus, option E is correct. The accounts default shell, default GID number, UID number, and username all appear in /etc/passwd, so options A, B, C, and D are all incorrect.

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents?

E The >> operator appends standard output to a file, so option E is correct. The vertical bar (|) is the pipe character; it ties one program's standard output to another's standard input. The 2> operator redirects standard error, not standard output; and it overwrites the target file. The &> operator redirects both standard output and standard error, and it overwrites the target file. The > operator redirects standard output, but it overwrites the target file.

Which of the following commands provides a low-level way to install software on a Debian system?

E The dpkg program is the low-level interface to the Debian package system; you can use it to install, uninstall, and otherwise manage packages. Thus, option E is correct. Its equivalent on RPM-based systems is rpm, so option A is incorrect. Options B, C, and D are incorrect because they're all higher-level interfaces to RPM-based systems.

Where does the kernel store its ring buffer logs?

E The kernel ring buffer is held in memory, as option E specifies. Options A, B, C, and D all specify disk directories, which aren't memory locations, and so are all incorrect. (Some distributions place a copy of the ring buffer from late in the boot process in /var/log, but this is just a "snapshot" of the ring buffer at that moment in time, not whatever's current at a later time.)

Which of the following commands displays the name of the directory in which you're working?

E The pwd command does as the question specifies, so option E is correct. The wc command counts lines, words, and characters in a text file, so option A is incorrect. The cat command concatenates multiple files, or displays a file on the screen, so option B is incorrect. The echo command displays whatever text you give it, or the contents of a variable you give it, so option C is incorrect. The cd command changes the current working directory, but does not display its name, so option D is incorrect.

You want to copy the contents of the ~/important directory, including all its subdirectories, to /media/usb. What command can you type to accomplish this goal?

B To copy an entire directory tree, you must use a recursive copy parameter, such as --recursive, -R, or -r. (An archive copy, as in --archive or -a, will also work.) Of the options shown here, only B includes one of these parameters, so it is correct. Option A lacks any parameters to cp, so it won't work. Option C's -u option performs an update copy—it copies files only if the original file is newer than any file of the same name at the target location. Option D's -i performs an interactive copy, querying the user before overwriting existing files. Option E's -f option forces cp to overwrite existing files without prompting.

Which of the following programs enable root to set the ownership of files? (Select all that apply.) A. chmod B. chown C. usermod D. Nautilus E. touch

B and D

Which of the following programs are Linux file managers?

B, D, E Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME. Thus, options B, D, and E are all correct. Thunderbird is an e-mail client, and Apache is a Web server program, so options A and C are both incorrect.

Which of the following tools can you use to identify running processes? (Select all that apply.)

B, E The ps and top programs are text-mode commands to identify running programs, so options B and E are both correct. The df program summarizes disk usage, bg shifts a suspended program into background execution, and mem summarizes memory use, so options A, C, and D are all incorrect.

Which of the following is not a way companies can legally make money using GPLed software?

By incorporating GPLed software into a proprietary program that the company sells

What does the permission string -rwxrwx--- mean? A. The file's owner may read, write, and execute the file, but nobody else may access it. B. The file is a directory. The directory's owner and members of its group may read, write, and search it, but other users have no access to it. C. The file's owner and members of its group may both read, write, and execute the file, but other users have no access to it. D. All users of the computer may read, write, and execute the file. E. The file is a directory. All users of the computer may read, write, and search the directory.

C

Where do most drivers exist on a Linux system?

C Drivers manage hardware, and as such, they're most commonly part of the Linux kernel, so option C is correct. Some drivers reside in libraries (option A) or in application programs (option D), but these locations are less common than the kernel, so options A and D are both incorrect. Firmware is software that's part of the hardware, and although firmware is important, it's distinct from drivers, so option B is incorrect. Configuration files can sometimes affect how drivers work, but they are not themselves drivers nor do they contain drivers, so option E is incorrect.

What does the permission string -rwxrwx--- mean?

C Option C correctly summarizes the meaning of the specified permission string. The description in option A would be represented by -rwx------, which is not the string shown in the question. Option B would be correct if the string began with d, indicating a directory; but the leading - indicates a data file rather than a directory. Option D's description would require rwx in the last three characters of the permission string; but the --- indicates no world access. Option E combines the directory error of option B with the world-access error of option D, and so is incorrect.

Which regular expression string matches any sequence of characters of any length?

C The .* sequence matches any string of any length, so option C is correct. Option A matches a dot (.), which otherwise has a special meaning and so can't be used directly. Square brackets, as in option B, can surround a set of characters, any one of which will satisfy a match. A dot, as in option D, matches any single character. An asterisk (*), as in option E, specifies an arbitrary number of repeats of the previous match. (Hence, .* matches any number of characters, but neither character alone does the job.)

You type the following command and see the resulting output: $ ls -l test -rwxr-xr-x 2 rod users 111 Apr 13 13:48 test What is the meaning of the digit 2 immediately prior to the username (rod)?

C The number in the specified position represents the number of filenames that point to the file—in other words, the number of hard links to the file. Thus, option C is correct. Options A, B, D, and E all present fictitious descriptions of that field's meaning. (The file's size appears later on the line—it's 111 in this example.)

Where do most drivers exist on a Linux system?

C In the Linux kernel Drivers manage hardware, and as such, they're most commonly part of the Linux kernel, so option C is correct. Some drivers reside in libraries (option A) or in application programs (option D), but these locations are less common than the kernel, so options A and D are both incorrect. Firmware is software that's part of the hardware, and although firmware is important, it's distinct from drivers, so option B is incorrect. Configuration files can sometimes affect how drivers work, but they are not themselves drivers nor do they contain drivers, so option E is incorrect.

When should you use the root account?

E The root account is extremely powerful, and therefore extremely dangerous. Thus, you should use it only when you need that power to perform administrative tasks, as option E specifies. You'll get little or no extra speed from the root account, so using it as option A specifies will gain you nothing but expose your system to added risk, making option A incorrect. Even if you're the sole user of the computer, using root unnecessarily can be dangerous; and if you're the system administrator, you'll have to use the root account even on a multi-user system. Thus, option B is incorrect. Although root power is sometimes necessary for diagnostics, this isn't always the case, so option C is incorrect. Running untrusted programs is always risky, and running them as root is doubly risky, so option D is incorrect.

What option can you pass to groupadd to have it create a group with a GID number of 1027?

E You can use the --gid (or -g) option to groupadd to specify the GID number for a new group, so option E is correct. Options A, B, C, and D all present fictitious options to groupadd.

Which option to zip can you use to encode symbolic links as such rather than including the linked-to file?

E --symlinks option is fictitious, so option D is incorrect.--links option enables creation of a multi-file archive, so option C is incorrect. The -s to translate Unix-style end-of-line characters into DOS/Windows-style end-of-line characters, so option B is incorrect. The zip option causes -l option tells zip to include only the specified files, so option A is incorrect. The -i option does as the question specifies, so option E is correct. The --symlinksThe

A user account's information is linked between the /etc/passwd and /etc/shadow files via the account's UID. (T or F)

F

ASCII is limited to 72 characters (T or F)

F

All Bash scripts must contain functions. (T or F)

F

Even after an account is deleted, its UID number cannot be re-used. (T or F)

F

GUI account management tools provide more options than their text-mode counterparts. (T or F)

F

It's impossible to run a Bash script if it hasn't had an executable bit set on its file. (T or F)

F

The -n option to traceroute causes it to display hostnames rather than IP addresses. (T or F)

F

The /etc/group file supports linking each user to a maximum of one group. (T or F)

F

The /var/log/messages file always holds general-purpose log entries. (T or F)

F

The gzip program generally produces more compact compressed files than does the bzip2 program. (T or F)

F

The host program has been deprecated. (T or F)

F

To save a text file in vi, you should press Ctrl+S. (T or F)

F

Using chmod, you can add world execute permission to a file without modifying any of the file's other permissions. (T or F)

F

WEP provides the highest available level of Wi-Fi security. (T or F)

F

You can record the output of a command in a variable by enclosing the command in backticks. (T or F)

F

dhcpd is a common DHCP client for Linux. (T or F)

F

The _____ filesystem is very old but is supported by almost every OS, making it a good choice for interoperability.

FAT

Which of the following organizations bases its philosophy on software licensing on a strong moral imperative that users should be able to modify their software?

FSF

True or False: Linux stores information on its groups in the /etc/groups file.

False

True or False: whoami provides more information than id.

False

True or false: All Linux Web browsers are GUI programs

False

True or false: All user accounts are necessarily defined in /etc/passwd and /etc/shadow.

False

True or false: Another term for the GPL is the MIT license.

False

True or false: If you want to create a link to a directory, you must use a hard link.

False

True or false: It's impossible to run a Bash script if it hasn't had an executable bit set on its file.

False

True or false: The -n option to traceroute causes it to display hostnames rather than IP addresses.

False

True or false: The /etc/group file supports linking each user to a maximum of one group.

False

True or false: The /var/log/messages file always holds general-purpose log entries.

False

True or false: The Creative Commons is a software industry group opposed to the goals of the FSF.

False

True or false: The Linux kernel was developed as part of the GNU's Not Unix (GNU) project.

False

True or false: The Secure Shell program is a command interpreter that keeps no history of its actions for others to discover, hence its name.

False

True or false: The gzip program generally produces more compact compressed files than does the bzip2 program.

False

True or false: The host program has been deprecated.

False

True or false: To run a GUI program in Linux, you must launch it from a desktop environment's menus.

False

True or false: To save a text file in Vi, you should press Ctrl+S.

False

True or false: Typing ls *.* at a Bash prompt is guaranteed to show you all the files in the current directory.

False

True or false: User ID numbers are linked to usernames in a way that ensures the mapping is identical on all computers.

False

True or false: You can configure your power supply by accessing the /dev/power device file.

False

True or false: dhcpd is a common DHCP client for Linux.

False

True or false: The /var/log/messages file always holds general-purpose log entries

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: You can delete any file on the computer by using rm as an ordinary user.

False Because of Linux's security features, you can only delete files in directories to which you have write access. As an ordinary user, you should not have write access to most of the system directories, so rm won't allow you to remove most system files.

True or false: Users should be logged in when you change their UID numbers with usermod.

False If a user is logged in when you change the user's UID number, problems can ensue because the login session will continue to use the old UID number. Thus, users should be logged out before you attempt to change their UID numbers.

True or false: Linux lacks support for USB printers, so you must use a parallel or Ethernet printer with Linux.

False Linux supports a wide variety of USB printers (although you should check on support for specific models before buying).

True or false: If you want to create a link to a directory, you must use a hard link.

False Most filesystems disallow hard links to directories, and mv won't let ordinary users create one even if the filesystem supports this feature. Soft (also known as symbolic) links, on the other hand, can point to directories, and ordinary users can create such links. Thus, the statement in the question is false; you must use a soft link, not a hard link, when linking to a directory.

True or false: All user accounts are necessarily defined in /etc/passwd and /etc/shadow.

False Some computers use network account databases, which supplement local account configuration files with those stored on a remote network server.

True or false: GUI account management tools provide more options than their text-mode counterparts.

False Text-mode account management tools invariably provide as many or more options than do GUI account management tools.

True or false: All Linux Web browsers are GUI programs.

False The Lynx Web browser is text-mode; you can run it in a terminal window or from a text-mode login.

True or false: The Secure Shell program is a command interpreter that keeps no history of its actions for others to discover, hence its name.

False The Secure Shell (SSH) is a remote-access protocol and associated client and server programs. It enables you to log into your computer remotely using encryption to enhance security compared to older unencrypted remote login tools.

True or false: The gzip program generally produces more compact compressed files than does the bzip2 program.

False The bzip2 program usually produces compression that's superior to gzip's. Both programs are surpassed by xz.

True or False: Linux stores information on its groups in the /etc/groups file.

False The file it stores groups in is the /etc/group file not /etc/groups.

True or false: You can configure your power supply by accessing the /dev/power device file.

False The power supply can't be directly controlled through Linux device files; it either delivers power in a steady manner or it doesn't, without software control.

True or false: The /etc/group file supports linking each user to a maximum of one group.

False The question's limitation applies to the default group specified in /etc/passwd. In /etc/group, each line can link one group to an arbitrary number of users.

True or false: Typing ls *.* at a Bash prompt is guaranteed to show you all the files in the current directory.

False The specified command shows you all the files whose names include a dot (.), but there's no guarantee that all the files in the directory will include a dot in their names.

True or false: The -n option to traceroute causes it to display hostnames rather than IP addresses.

False The statement has it backwards; -n causes traceroute to display IP addresses rather than its default of hostnames.

True or False: whoami provides more information than id.

False The whoami command only responds with the current session user's name, id will give more details including numeric user and group ID and all the groups the user belongs to.

True or false: User ID numbers are linked to usernames in a way that ensures the mapping is identical on all computers.

False User ID numbers are assigned to usernames in an arbitrary way, so a given username may have different user ID numbers on different computers.

To run a GUI program in Linux, you must launch it from a desktop environment's menus.

False You can launch GUI programs in several ways, including using a desktop environment's menus or typing the program's filename in a terminal program

True or false: The /var/log/messages file always holds general-purpose log entries.

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: Users should be logged in when you change their UID numbers with usermod.

False users should be logged out before you attempt to change their UID numbers.

True or false: WEP provides the highest available level of Wi-Fi security

False: WEP is in fact the worst of the three common levels of Wi-Fi security. WPA2 is the best, with WPA in-between.

True or false: The host program has been deprecated.

False: The host program is actively maintained; it's nslookup that has been deprecated.

Core Unix tools include which of the following? (Select all that apply.)

GNU tool set X windows System

Where does the kernel store its ring buffer logs?

In memory

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Library

Which of the following two office suites are most closely related to one another?

LibreOffice is derived from OpenOffice.org

A program allocates more and more memory but doesn't use the memory it allocates (2 words).

Memory leak

Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system? (Select all that apply.)

Most Web sites are unencrypted, so data transferred from the site and your computer, or vice-versa, can be intercepted Some Web sites deliver mini-programs that run on your computer, and if such a site delivers a malicious program, it could do just about anything, including steal your personal data files

What type of information can netstat provide?

Network interface information, a list of open ports, routing table data

Which of the following makes a good password? Your username 'password' Telephone # None of these

None

What does the permission string -rwxrwx--- mean?

Only the group and owner can read, write, and execute

(two words) software, such as Linux, gives the user greater control than proprietary software, such as Windows, does.

Open Source

Which of the following distributions use RPMs for package management? (Select all that apply.)

OpenSUSE CentOS

The _____ library provides drivers to control scanners. (Provide the acronym for the library's name.

SANE

Postfix is a server that implements the ______ protocol. (Provide the protocol's acronym.)

SMTP

Which of the following is a common server program?

Samba

You want to create a link from your home directory on your hard disk to a directory on a CD-ROM drive. Which of the following types of links might you use?

Symbolic links can point across filesystems, so creating a symbolic link from one filesystem (in which your home directory resides) to another (on the CD-ROM) isn't a problem

A caret (^) represents the start of a line in regular expressions. (T or F)

T

A file with permissions of crw-rw-r-- is a character device file. (T or F)

T

A version of the vi text editor called "vi improved," or vim is used for most Linux distributions. (T or F)

T

Both RPM and Debian packages can specify that they require other packages. (T or F)

T

By default, useradd copies a set of user configuration files from /etc/skel when creating a new user account. (T or F)

T

Including the file type code, symbolic links always have permissions of lrwxrwxrwx. (T or F)

T

Linux supports two types of text-mode output to the screen, which you can send to separate files or display devices. (T or F)

T

Pressing the M key in top causes the display to change to sort processes by memory use. (T or F)

T

Setting the SUID bit on a program file that's owned by root causes it to execute with root privileges no matter who runs it. (T or F)

T

Setting the SUID bit on a program file that's owned by root causes it to execute with root. (T or F)

T

The lowest UID number used for user accounts on Linux systems is typically 500 or 1000 (depending upon the distribution). (T or F)

T

The lowest UID number used for user accounts on Linux systems is typically 500 or 1000. (T or F)

T

The ps program enables you to view the process table. (T or F)

T

The who command reveals the remote computer from which users have logged in, when they've logged in remotely. (T or F)

T

nano is an extended variant of pico. (T or F)

T

useradd copies a set of user config files from /etc/skel when creating a new user account. (T or F)

T

You want to create a new system account for a server program you're installing. What option can you pass to useradd when creating the account to ensure that it's created as a system account?

The --system (or -r) option to useradd creates a system account, which has no home directory and uses a low user ID number.

Which option to zip can you use to encode symbolic links as such rather than including the linked-to file?

The -i option does as the question specifies

You want to create a directory called ~/Documents/papers, but you're not sure that the ~/Documents directory exists. What command can you type to create the desired directory and its parent directory if it doesn't already exist?

The -p option to mkdir creates parent directories if they don't already exist

Which options to find can you use to locate files owned by a particular user? (Select all that apply.)

The -uid option to find locates files owned by a user with the specified user ID (UID) number, and the -user option locates files based on the user's username

Which of the following files defines Linux groups?

The /etc/group file defines groups on a Linux system

Which of the following is an inappropriate choice for a filesystem to hold the majority of a Linux installation?

The Hierarchical File System (HFS) was used by Mac OS prior to Mac OS X. It doesn't support features required by Linux in its main filesystem

What is the purpose of the system account with a UID of 0?

The UID 0 is reserved for the root user.

Which pieces of information on user accounts is not normally stored in the /etc/passwd file on modern Linux distributions?

The accounts password

You want to run the command cat /etc/shadow as root, but your logged in as an ordinary user. Which of the following commands will do the job, assuming that the system is configured to give you root access via the appropriate command?

The command sudo cat /etc/shadow will give the ordinary user access for the command to run as root.

Which of the following text editors runs as a text-mode program when launched in text mode but also provides a GUI version for use in a GUI environment?

The emacs editor

What does the permission string -rwxrwx--- mean?

The file's owner and members of its group may both read, write, and execute the file, but other users have no access to it.

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused?

The free command produces the information specified

Which character begins a comment in many common configuration files, such as /etc/fstab?

The hash mark (#) identifies comments in many (but not all) configuration files

What program can you use to manually bring up a network interface in Linux?

The ifconfig program

Where does the kernel store its ring buffer logs?

The kernel ring buffer is held in memory

What keystroke deletes a line of text when using nano?

The keystroke for deleting a line of text in nano is Ctrl+K,

The file stuff.txt does not exist. You type nano stuff.txt and press Enter. What happens next?

The nano text editor starts, and displays the message, New File, in the status bar.

You're logged in as root and you type passwd auser to change auser's password. What information will passwd ask you to enter?

The new password and then to retype the new password

Which of the following tools can you use to identify running processes?

The ps and top programs are text-mode commands to identify running programs

Mary finds that she can delete George's files in /tmp. What might this imply?

The sticky bit is missing from /tmp; it should be set

Mary finds that she can delete George's files in /tmp. What might this imply?

The sticky bit is missing from /tmp; it should be set.

Which methods or commands provide access to superuser privileges for authorized users? (Select all that apply.)

The su command Logging into the root account The sudo command

You type touch afile.txt in a directory that contains no files. What will be the effect?

The touch command updates a file's time stamps or creates a new empty file if one doesn't already exist. Since the latter case is described by the question, a new file will be created,

Which of the following programs are Linux file managers? (Select all that apply.)

Thunar Dolphin Thunderbird Nautilus

Which of the following programs are Linux file managers? (Select all that apply.)

Thunar, Nautilus, Konqueror

You want to copy the contents of the ~/important directory, including all its subdirectories, to /media/usb. What command can you type to accomplish this goal?

To copy an entire directory tree, you must use a recursive copy parameter, such as --recursive, -R, or -r. (An archive copy, as in --archive or -a, will also work.)

True or false: A carat (^) represents the start of a line in regular expressions.

True

True or false: A file with permissions of crw-rw-r-- is a character device file.

True

True or false: As a general rule, open source license terms broaden your rights as a software consumer, compared to the rights granted by copyright law.

True

True or false: Because of Cocoa, GUI applications developed for OS X typically cannot be run directly on Linux.

True

True or false: Both RPM and Debian packages can specify that they require other packages. The package system will then refuse to install the package unless these dependencies are met or you provide an override option.

True

True or false: By default, useradd copies a set of user configuration files from /etc/skel when creating a new user account.

True

True or false: HTML is an example of a formatted text file format.

True

True or false: Including the file type code, symbolic links always have permissions of lrwxrwxrwx.

True

True or false: It's possible for an end user to make good use of Linux without directly interacting with a text-mode shell.

True

True or false: KDE is built atop the Qt widget set.

True

True or false: Linux supports two types of text-mode output to the screen, which you can send to separate files or display devices.

True

True or false: Partitioning a disk can enable you to install multiple OSes on one computer.

True

True or false: Pressing the M key in top causes the display to change to sort processes by memory use.

True

True or false: Setting the SUID bit on a program file that's owned by root causes it to execute with root privileges no matter who runs it.

True

True or false: Symbolic links always have permissions of lrwxrwxrwx.

True

True or false: The ls command displays the names of files in a directory.

True

True or false: The ps program enables you to view the process table.

True

True or false: The term copyleft is a slang term that refers to liberal licensing terms, such as those used by free software.

True

True or false: Using chmod, you can add world execute permission to a file without modifying any of the file's other permissions.

True

True or false: With most distributions, the contents of optical discs, USB flash drives, and other removable media appear in subdirectories of /media

True

True or false: You can modify graphics files from the command line using Linux.

True

True or false: You can use a recordable optical disc to transfer data from a Linux computer to a Windows computer.

True

True or false: You can use common external commands, such as find and sed, in your Bash scripts.

True

True or false: xinetd is a super server.

True

true or false: You can use grep to search for strings in binary files.

True

True or false: You can use grep to search for strings in binary files.

True Although grep is more commonly employed to search text files, it can search for strings in binary files.

True or false: By default, useradd copies a set of user configuration files from /etc/skel when creating a new user account.

True Default user configuration files give users a head start on configuring their accounts and enable system administrators to set user default options. They're copied from /etc/skel unless you specify another location with the --skel (-k) option to useradd.

True or false: Both RPM and Debian packages can specify that they require other packages. The package system will then refuse to install the package unless these dependencies are met or you provide an override option.

True Dependency information is critical for package management, and it works as the question specifies.

True or false: With most distributions, the contents of optical discs, USB flash drives, and other removable media appear in subdirectories of /media.

True Most distributions automatically mount removable media in their own subdirectories of /media. This practice is not universal, but it is very common, particularly when running desktop environments such as GNOME, KDE, or Xfce.

True or false: The lowest UID number used for user accounts on Linux systems varies from one installation to another.

True Most distributions today use a minimum UID number of 1000; however, some use 500, and administrators can change this value if they so desire.

True or false: You can modify graphics files from a text-mode login using Linux.

True The ImageMagick suite of graphics programs is text-based; you can use it to convert file formats, add frames to images, resize images, and so on, all from the command line.

True or false: KDE is built atop the Qt widget set.

True The K Desktop Environment (KDE) is built using the Qt GUI library (widget set), as the question specifies.

True or false: Pressing the M key in top causes the display to change to sort processes by memory use.

True The M key in top works as specified.

True or false: A carat (^) represents the start of a line in regular expressions.

True The carat (^) represents the start of a line, as the question specifies.

True or false: Symbolic links always have permissions of lrwxrwxrwx.

True The leading l identifies the file as a symbolic link. The remaining characters indicate that all users have full access to the link file, but the linked-to file's permissions are what control what users can actually do with the file.

True or false: You can use a recordable optical disc to transfer data from a Linux computer to a Windows computer.

True The most common optical disc formats (CD, DVD, and Blu-Ray) and filesystems (ISO-9660 and UDF) work equally well on both Linux and Windows. Thus, you can use an optical disc to transfer data from Linux to Windows, or vice-versa.

True or false: When operating on large files, the mv command works very quickly when the target directory is on the same low-level filesystem as the original file, but much more slowly when this isn't the case.

True The mv command moves or renames files, and it works by rewriting low-level filesystem data without touching the file's data when the target is on the same filesystem as the original. Thus, it can work quickly when this is the case. When moving a file across filesystems, though, mv must copy the data, which can take a while when the file is large.

True or false: The ps program enables you to view the process table.

True The ps program is one of the primary means of viewing the process table, which holds information on running processes.

True or False: As a general rule, you should employ extra care when running programs as root.

True The root account is very powerful and can be disastrous if something is done carelessly.

True or false: xinetd is a super server.

True The term super server refers to a server that listens for connection attempts on behalf of other servers and that launches those other servers only as needed. The two most common super servers on Linux are inetd and xinetd.

True or false: Linux supports two types of text-mode output to the screen, which you can send to separate files or display devices.

True The two types of output are standard output and standard error.

True or false: Pressing the up arrow key in Bash reveals commands you've recently typed.

True The up arrow key enters previous commands from Bash's history in your command line, which can be helpful when typing a series of similar commands.

True or false: Partitioning a disk can enable you to install multiple OSes on one computer

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions

True or false: Partitioning a disk can enable you to install multiple OSes on one computer.

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions.

What keystroke creates a new blank line immediately below the current one, when typed in Vi's command mode?

Typing "o" in command mode causes a new line to be created

In pico or nano, you can paste text that you've cut or copied earlier by pressing Ctrl+____.

U

A text encoding method that can use single- or multiple-byte encodings to store text using most human alphabets is known as _________.

Unicode

A text encoding method that can use single- or multiple-byte encodings to store text.

Unicode

Where did the Linux kernel originate?

University of Helsinki

What option can you pass to groupadd to have it create a group with a GID number of 1027?

You can use the --gid (or -g) option to groupadd to specify the GID number for a new group

What types of information does the id command provide? (Select all that apply.)

Your UID number Your current group All your group memberships Your username

What types of information does the id command provide?

Your UID number, Your current group

What types of information does the id command provide?

Your UID, username, current group, all group member

The programming language that provides a direct one-to-one correspondence between human-understandable words and machine-understandable numbers is ________ language

assembly

Which of the following programs are Linux file managers? (Select all that apply.)

b. Thunar d. Konqueror e. Nautilus Response Feedback: Answer: B, D, E Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME. Thus, options B, D, and E are all correct. Thunderbird is an e-mail client, and Apache is a Web server program, so options A and C are both incorrect.

A crowd-funding open source business model, called _______, is where users offer money as a reward for new software or new features in existing software.

bounties

The files afile.txt and AFile.TXT can both exist on a Linux filesystem because these filesystems are ____________.

case-sensitive

Which of the following programs enable root to set the ownership of files? (Select all that apply.)

chmod chown

The command _____ :users somefile.txt changes the group affiliation of somefile.txt to users.

chown

The command _______ :users somefile.txt changes the group affiliation of somefile.txt to users.

chown

Which program enable s root to set the ownership of files?

chown

The /proc/______ pseudo-file holds data on your CPU, such as its model name and clock speed.

cpuinfo

A ______ or workstation computer is typically used by one or a small number of people to perform everyday productivity tasks, such as computing values with a spreadsheet or browsing the Web.

desktop

Programs that can look up DNS information include host, nslookup, and _____.

dig

Programs that can look up DNS information include host, nslookup, and ________

dig

Which of the following commands provides a low-level way to install software on a Debian system?

dpkg

Specialized computing devices, such as DVRs, cell phones, and network appliances, use _________ OSs

embedded

What Bash scripting keyword terminates a case statement?

esac

Your network's hardware interface is called eth0. You want to bring up this interface via DHCP, so you type dhclient _____ as root.

eth0

Your network's hardware interface is called eth0. You want to bring up this interface via DHCP, so you type dhclient ________ as root

eth0

You're writing a script that will be called by other scripts. You want to signal abnormal termination of your script by passing a value of 8 to the external script under some circumstances. What command can you use in your own script to do this

exit -8 The exit command terminates a script, and you can pass it a value that you want to set as your script's terminating value

You're writing a script that will be called by other scripts. You want to signal abnormal termination of your script by passing a value of 8 to the external script under some circumstances. What command can you use in your own script to do this?

exit 8

: No important new Linux distributions have been created since 1993.

false

True or false: A user account's information is linked between the /etc/passwd and /etc/shadow files via the account's UID.

false

True or false: All Linux web browsers are GUI programs.

false

True or false: Open source software is by definition available free of charge.

false

True or false: The /etc/group file supports linking each user to a maximum of one group.

false

A computer's full hostname is franklin.example.org. The machine name portion of this hostname is _________.

franklin

A computer's full hostname is franklin.example.org. What is the machine name portion?

franklin

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused?

free

The FSF uses the term (two words) to refer to software that's licensed under terms that satisfy its philosophy concerning software licensing.

free software

The term _________refers to the use of wildcards in filename specifications.

globbing

You want to delete the oldproj group, so you type _____ oldproj.

groupdel

You want to delete the oldproj group, so you type ______ oldproj.

groupdel

You want to delete the oldproj group, so you type ________ oldproj.

groupdel

What program can you use to manually bring up a network interface in Linux?

ifconfig

The first process to be run by the Linux kernel is normally called _______.

init

The first process to be run by the Linux kernel is normally called ________

init

The character __ identifies a symbolic link in the 10-character symbolic permission string that's associated with a file.

l

A condition in which a program allocates more and more memory but doesn't use the memory it allocates is called a ______ ______ (two words).

memory leak

What type of information can netstat provide? (Select all that apply.)

network interfaces routing table data list of open ports

A(n) _________ environment means that a person cannot deny actions, and the sudo command helps establish this environment.

nonrepudiation

What keystroke creates a new blank line immediately below the current one, when typed in vi's command mode?

o

hich of the following programming languages is most often implemented as a compiled language?

only C++ is commonly implemented as a compiled language

When should you use the root account?

only when you need that power to perform administrative tasks,

Which of the following terms best characterizes the Linux kernel?

open source

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as ____.

phishing

An attempt to acquire sensitive data directly from victims by posing as a trusted web site or authority is known as _______.

phishing

You want to test connectivity to tranquility.luna.edu by sending 11 packets to see how many return. To do this, you can type __________ tranquility.luna.edu.

ping -c 11

You want to test connectivity to tranquility.luna.edu by sending 11 packets to see how many return. To do this, you can type ___________ tranquility.luna.edu

ping -c 11

Which of the following tools can you use to identify running processes?

ps, top

What command can you use to retrieve user input into a variable in a Bash script?

read

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a __________.

repository

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a ___________

repository

You type the following command and see the resulting output: $ ls -l test -rwxr-xr-x 2 rod users 111 Apr 13 13:48 test What is the meaning of the digit 2 immediately prior to the username (rod)?

represents the number of filenames that point to the file—in other words, the number of hard links to the file

A _______ computer runs network-accessible software that responds to incoming requests from other computers.

server

A (two words) grants an organization the right to install software on more than one computer.

site license

Which methods or commands provide access to superuser privileges for authorized users? (Select all that apply)

su

You can type ______ to acquire root privileges that persist across multiple commands.

su

Distributions may not allow the root account to be directly logged into and instead demand the use of the _____ command to obtain superuser privileges and maintain a nonrepudiation environment.

sudo

UIDs below 500 or 1000 (depending on the distribution) are reserved for use by __________ accounts.

system

To display the last few lines of a text file, you would type _____ afile.txt.

tail

Slackware is unusual because it uses ________ as its package file format.

tarballs

A _______ is a GUI program in which text-mode programs (including shells) run.

terminal

A _______ is a GUI program in which text-mode programs can be run.

terminal

Where do most drivers exist on a Linux system?

the Linux kernel,

Which of the following pieces of information on user accounts is not normally stored in the /etc/passwd file on modern Linux distributions?

the account's password

Which of the following pieces of information on user accounts is not normally stored in the /etc/passwd file on modern Linux distributions?

the encrypted password is stored in /etc/shadow

Which of the following is not a Linux command shell program?

the login program handles text-mode logins, but it isn't a shell program,

True or false: A file with permissions of crw-rw-r-- is a character device file.

true

True or false: A laptop computer running Linux and a server computer running Linux are likely to share some common programs.

true

True or false: Early in Linux's history, it grew in large part because of the availability of the GNU project.

true

True or false: The lowest UID number used for user accounts on Linux systems is typically 500 or 1000 (depending upon the distribution).

true

True or false: The who command reveals the remote computer from which users have logged in, when they've logged in remotely.

true

True or false: Using chmod, you can add world execute permission to a file without modifying any of the file's other permissions.

true

Default permissions are determined by the _____

umask

Default permissions are determined by the _____.

umask

Default permissions are determined by the _______

umask

An OS developed in 1969, and on which Linux is largely modeled, is

unix

To change a current user account's home directory location, you might type _______ -m -d /home/newhome user.

usermod

To learn who is currently logged into the computer and what programs they're currently running, you can type _____.

w

You can use the ____ command to count the characters, words, and lines in a text file.

wc

A _____ loop executes for as long as its condition is true.

while

Spaces and tabs are examples of ________, which separate elements in many configuration files.

whitespace

You can type _____ command, with no arguments, to learn your current username and nothing more?

whoami

You can type _____ to learn your current username and nothing more?

whoami

You can type the _____ command, with no arguments, to learn your current username and nothing more?

whoami

You can type the ______ command, with no arguments, to learn your current username and nothing more?

whoami

Which command would create a zip file containing the files, holiday.tif and desc.txt, and compress it as much as possible?

zip -9 trip.zip holiday.tif desc.txt

You use the ___ character to separate two strings, either of which should match, in an extended regular expression.

|

You use the ___ character to separate two strings, either of which should match, in an extended regular expression.

| (pipe)

A symbol found in the root shell prompt by default is __.

#

The string _______, located at the start of the file, identifies a script as a Bash script.

#!/bin/bash

You can type useradd ____ nemo as root to create the nemo account without creating a home directory for nemo.

-M

The string _______, located at the start of the file, identifies a script as a Bash script.

!#/bin/bash

To obtain a color-coded file listing, if your distribution doesn't produce one by default, you would type ls _____.

--color

What option can you pass to groupadd to have it create a group with a GID number of 1027?

--gid 1027

You want to copy a set of files but be prompted before cp overwrites any existing files. You would use the ___ option to cp to accomplish this goal.

--interactive or -i

The _________ option to tar causes it to back up only the specified low-level filesystem; if another filesystem is mounted within the directory you say to back up, those files will be ignored.

--one-file-system

You want to create a new system account for a server program you're installing. What option can you pass to useradd when creating the account to ensure that it's created as a system account?

--system

The ________ qualifier to tar causes it to use xz compression when creating an archive.

--xz

Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system? (Select all that apply.)

a. Data transferred to or from a Web site can be intercepted, possibly exposing sensitive data to theft. b. A Web site with malicious dynamic content could steal your personal data files. A, B Most Web sites are unencrypted, so data transferred from the site and your computer, or vice-versa, can be intercepted, as option A suggests. (Most sites that transfer sensitive data employ encryption, but this isn't universally true.) Some Web sites deliver mini-programs that run on your computer, and if such a site delivers a malicious program, it could do just about anything, including steal your personal data files, as option B suggests. If you run the Web browser as an ordinary user, though, such a malicious program could not create a new account, so option C is incorrect. Likewise, your Linux login password is safe, so option D is incorrect. A Windows virus won't run on Linux at all, much less harm your hardware, so option E is incorrect.

Which options to find can you use to locate files owned by a particular user? (Select all that apply.)

a. -uid d. -user The -uid option to find locates files owned by a user with the specified user ID (UID) number, and the -user option locates files based on the user's username. Thus, options A and D are both correct. The -name option locates files with a specified filename, so option B is incorrect. The -id and -u options are both fictitious, so options C and E are incorrect.

The programming language that provides a direct one-to-one correspondence between human-understandable symbols and machine-understandable numbers is ________ language.

assembly


Kaugnay na mga set ng pag-aaral

Texas Real Estate Law - SAE Champions School Of Real Estate

View Set

Practice and learn: Ischemic stroke

View Set

Appleton and Lange Review Questions

View Set