CompTIA A+ Chapter 18
In Linux, where are the commands required for system administration stored?
[] /sbin
What is the value of X when execution ends in the following pseudocode? Set X As Integer For X = 100 to 0 Step -1 ' This is a comment Next X X = 100
[] 100 Correct. The value of X is decremented within the For...Next loop until X = -1. The last line of code resets the value of X equal to 100 and execution ends.
Which of the following best describes a variable when implemented in a script?
[] A container for storing data values that can be assigned, referenced, and manipulated. Correct. A variable is a container for storing data values that can be assigned, referenced, and manipulated.
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
[] End-of-life Correct. An end-of-life vendor limitation is the point in time when a vendor (also called manufacturer) no longer provides updates or support for an operating system.
A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?
[] First Aid Correct. First Aid is a disk management tool used to locate and repair problems with disks.
Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?
[] Gestures Correct. Gestures are finger actions that are used to perform actions on a computer.
You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment?
[] Line 3
A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?
[] Linux Correct. Linux is an open source operating system that can be modified as required.
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?
[] Live USB or CD Correct. Ubuntu is installed on a USB flash drive or on a CD called a Live USB or Live CD.
Which of the following are closed source, proprietary operating systems? (Select TWO.)
[] Mac OS X High Sierra [] Windows 10 Home
A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?
[] NetBoot Correct. A NetBoot image can be used to start an entire Mac operating system over the network. Simply using a NetBoot image does not replace the OS on the computer.
Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?
[] SSH is a secure, encrypted alternative to Telnet. Correct. SSH (Secure Shell) is a secure alternative to Telnet. Telnet does not use any encryption, but SSH encrypts all transmissions.
Which of the following are natively supported by the Windows, Mac, and Linux operating systems?
[] Support for reading and writing to FAT32 partitions Correct. The Windows, Mac, and Linux operating system natively support reading and writing to FAT32 partitions.
A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?
[] The command needs to be preceded by sudo. Correct. The sudo (substitute user) command is used to perform a command as superuser when logged in as a normal user.
A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?
[] Updates are found in the App Store. Correct. Updates for macOS are downloaded and installed through the App Store.
How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?
[] Use a third-party remote access app that uses a browser.
What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop
[] X = 1, the Do...Loop is endless. Correct. The Do...Loop is endless but can be stopped by user intervention or by the operating system. When execution ends, the value of X is still 1.
A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?
[] chown Correct. The chown command is used to change the owner of a file or directory.
Which of the following is the current Linux file system used to hold the operating system?
[] ext4 Correct. The current Linux file system is ext4 (fourth extended file system).
A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?
[] grep Correct. The grep command is used to search a text-based file line-by-line for a specific pattern.
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?
[] macOS Recovery Correct. Using the macOS Recovery tool, the technician can reinstall the macOS from the Internet or from a Time Machine backup. She can also erase the HDD before reinstalling the OS.
A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?
[] ps Correct. The ps command is used to display the process status of running processes. The process can be identified by its process ID (PID) or image name (IM).