Liinux Study

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following options to chown changes the ownership of all the subdirectories of any specified directories, rather than just the files or directories that are explicitly passed to it?

A The -R or --recursive option does as the question specifies, so option A is correct. The --tree, -all, and -t options are all fictitious, so options B, D, and E are all incorrect. Option C is almost correct, but the correct option includes two dashes, not one—that is, it's --recursive, not -recursive.

You want to run the command cat /etc/shadow as root, but your logged in as an ordinary user. Which of the following commands will do the job, assuming that the system is configured to give you root access via the appropriate command?

A The command sudo cat /etc/shadow will give the ordinary user access for the command to run as root.

To obtain a color-coded file listing, if your distribution doesn't produce one by default, you would type ls _____.

Answer: --color

You want to copy a set of files but be prompted before cp overwrites any existing files. You would use the ___ option to cp to accomplish this goal.

Answer: --interactive or -i

The _________ option to tar causes it to back up only the specified low-level filesystem; if another filesystem is mounted within the directory you say to back up, those files will be ignored.

Answer: --one-file-system

You can type Xorg ________, as root, to have X create a default configuration file that you can then modify.

Answer: -configure

The user arnold is currently logged in. Despite this fact, you want to delete his account without first logging him off. You don't want to delete arnold's files. To accomplish this goal, you type userdel ___ arnold.

Answer: -f or --force

What can you use to search man pages for key words? (Which option)

Answer: -k The -k is the option to search for keywords in man pages.

To refer to the file afile.txt in the directory one level above the current one, you would type ___afile.txt.

Answer: ../

The file that associates usernames with UID numbers in Linux is ___________. (Provide the complete path to the file.)

Answer: /etc/passwd

A file has a symbolic mode of -rw-r-----. The file's octal mode is _______.

Answer: 640

What type of information can netstat provide?

Answer: A, B, C netstat can provide information on network interfaces similar to what ifconfig provides (option A), routing table data similar to what route provides (option B), and a list of open ports (option C). It can not provide round-trip network packet travel time similar to what ping provides (option D) or the identities of broken routers similar to what traceroute provides (option E).

You want to copy the contents of the ~/important directory, including all its subdirectories, to /media/usb. What command can you type to accomplish this goal?

B To copy an entire directory tree, you must use a recursive copy parameter, such as --recursive, -R, or -r. (An archive copy, as in --archive or -a, will also work.) Of the options shown here, only B includes one of these parameters, so it is correct. Option A lacks any parameters to cp, so it won't work. Option C's -u option performs an update copy—it copies files only if the original file is newer than any file of the same name at the target location. Option D's -i performs an interactive copy, querying the user before overwriting existing files. Option E's -f option forces cp to overwrite existing files without prompting.

Which of the following programs are Linux file managers?

B, D, E Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME. Thus, options B, D, and E are all correct. Thunderbird is an e-mail client, and Apache is a Web server program, so options A and C are both incorrect.

Which of the following tools can you use to identify running processes? (Select all that apply.)

B, E The ps and top programs are text-mode commands to identify running programs, so options B and E are both correct. The df program summarizes disk usage, bg shifts a suspended program into background execution, and mem summarizes memory use, so options A, C, and D are all incorrect.

Where do most drivers exist on a Linux system?

C Drivers manage hardware, and as such, they're most commonly part of the Linux kernel, so option C is correct. Some drivers reside in libraries (option A) or in application programs (option D), but these locations are less common than the kernel, so options A and D are both incorrect. Firmware is software that's part of the hardware, and although firmware is important, it's distinct from drivers, so option B is incorrect. Configuration files can sometimes affect how drivers work, but they are not themselves drivers nor do they contain drivers, so option E is incorrect.

Which of the following programming languages is most often implemented as a compiled language?

D Of these languages, only C++ is commonly implemented as a compiled language, so option D is correct. The remaining options are all commonly implemented as interpreted languages.

Which of the following is an inappropriate choice for a filesystem to hold the majority of a Linux installation?

D The Hierarchical File System (HFS) was used by Mac OS prior to Mac OS X. It doesn't support features required by Linux in its main filesystem, so option D is the correct answer. JFS, ext4fs, ReiserFS, and XFS are all Linux-native filesystems (either developed explicitly for Linux or converted from other Unix-like OSes), so options A, B, C, and E are all incorrect.

Which of the following is not a Linux command shell program?

D The login program handles text-mode logins, but it isn't a shell program, so option D is correct. The remaining options are all Linux shell programs, so options A, B, C, and E are all incorrect. (Option E, bash, is the default shell for most distributions.)

True or false: The /var/log/messages file always holds general-purpose log entries

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: You can delete any file on the computer by using rm as an ordinary user.

False Because of Linux's security features, you can only delete files in directories to which you have write access. As an ordinary user, you should not have write access to most of the system directories, so rm won't allow you to remove most system files.

True or false: Linux lacks support for USB printers, so you must use a parallel or Ethernet printer with Linux.

False Linux supports a wide variety of USB printers (although you should check on support for specific models before buying).

True or false: If you want to create a link to a directory, you must use a hard link.

False Most filesystems disallow hard links to directories, and mv won't let ordinary users create one even if the filesystem supports this feature. Soft (also known as symbolic) links, on the other hand, can point to directories, and ordinary users can create such links. Thus, the statement in the question is false; you must use a soft link, not a hard link, when linking to a directory.

True or false: The Secure Shell program is a command interpreter that keeps no history of its actions for others to discover, hence its name.

False The Secure Shell (SSH) is a remote-access protocol and associated client and server programs. It enables you to log into your computer remotely using encryption to enhance security compared to older unencrypted remote login tools.

True or false: The gzip program generally produces more compact compressed files than does the bzip2 program.

False The bzip2 program usually produces compression that's superior to gzip's. Both programs are surpassed by xz.

True or false: You can configure your power supply by accessing the /dev/power device file.

False The power supply can't be directly controlled through Linux device files; it either delivers power in a steady manner or it doesn't, without software control.

True or false: The /etc/group file supports linking each user to a maximum of one group.

False The question's limitation applies to the default group specified in /etc/passwd. In /etc/group, each line can link one group to an arbitrary number of users.

True or false: Typing ls *.* at a Bash prompt is guaranteed to show you all the files in the current directory.

False The specified command shows you all the files whose names include a dot (.), but there's no guarantee that all the files in the directory will include a dot in their names.

True or false: User ID numbers are linked to usernames in a way that ensures the mapping is identical on all computers.

False User ID numbers are assigned to usernames in an arbitrary way, so a given username may have different user ID numbers on different computers.

To run a GUI program in Linux, you must launch it from a desktop environment's menus.

False You can launch GUI programs in several ways, including using a desktop environment's menus or typing the program's filename in a terminal program

True or false: The /var/log/messages file always holds general-purpose log entries.

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: WEP provides the highest available level of Wi-Fi security

False: WEP is in fact the worst of the three common levels of Wi-Fi security. WPA2 is the best, with WPA in-between.

True or false: You can use grep to search for strings in binary files.

True Although grep is more commonly employed to search text files, it can search for strings in binary files.

True or false: By default, useradd copies a set of user configuration files from /etc/skel when creating a new user account.

True Default user configuration files give users a head start on configuring their accounts and enable system administrators to set user default options. They're copied from /etc/skel unless you specify another location with the --skel (-k) option to useradd.

True or false: Both RPM and Debian packages can specify that they require other packages. The package system will then refuse to install the package unless these dependencies are met or you provide an override option.

True Dependency information is critical for package management, and it works as the question specifies.

True or false: With most distributions, the contents of optical discs, USB flash drives, and other removable media appear in subdirectories of /media.

True Most distributions automatically mount removable media in their own subdirectories of /media. This practice is not universal, but it is very common, particularly when running desktop environments such as GNOME, KDE, or Xfce.

True or false: The lowest UID number used for user accounts on Linux systems varies from one installation to another.

True Most distributions today use a minimum UID number of 1000; however, some use 500, and administrators can change this value if they so desire.

True or false: You can modify graphics files from a text-mode login using Linux.

True The ImageMagick suite of graphics programs is text-based; you can use it to convert file formats, add frames to images, resize images, and so on, all from the command line.

True or false: KDE is built atop the Qt widget set.

True The K Desktop Environment (KDE) is built using the Qt GUI library (widget set), as the question specifies.

True or false: Pressing the M key in top causes the display to change to sort processes by memory use.

True The M key in top works as specified.

True or false: A carat (^) represents the start of a line in regular expressions.

True The carat (^) represents the start of a line, as the question specifies.

True or false: The ps program enables you to view the process table.

True The ps program is one of the primary means of viewing the process table, which holds information on running processes.

True or False: As a general rule, you should employ extra care when running programs as root.

True The root account is very powerful and can be disastrous if something is done carelessly.

True or false: Pressing the up arrow key in Bash reveals commands you've recently typed.

True The up arrow key enters previous commands from Bash's history in your command line, which can be helpful when typing a series of similar commands.

True or false: Partitioning a disk can enable you to install multiple OSes on one computer

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions

True or false: Partitioning a disk can enable you to install multiple OSes on one computer.

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions.

Programs that can look up DNS information include host, nslookup, and _____.

dig

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused?

A The free command produces the information specified, so option A is correct. Options B, C, and D are all fictitious program names, at least on Linux. The Linux df command (option E) produces a summary of disk space available and used, not memory, so it's incorrect.

What is the purpose of the system account with a UID of 0?

A The UID 0 is reserved for the root user.

On which of the following CPU types does Linux run? (Select all that apply.)

All: a. x86 b. x86-64 c. Itanium d. PowerPC

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a __________.

Answer: repository

A _______ is a GUI program in which text-mode programs (including shells) run

Answer: terminal

To learn who is currently logged into the computer and what programs they're currently running, you can type _____.

Answer: w

True or false: GUI account management tools provide more options than their text-mode counterparts.

False Text-mode account management tools invariably provide as many or more options than do GUI account management tools.

True or false: All Linux Web browsers are GUI programs.

False The Lynx Web browser is text-mode; you can run it in a terminal window or from a text-mode login.

True or false: The -n option to traceroute causes it to display hostnames rather than IP addresses.

False The statement has it backwards; -n causes traceroute to display IP addresses rather than its default of hostnames.

True or False: whoami provides more information than id.

False The whoami command only responds with the current session user's name, id will give more details including numeric user and group ID and all the groups the user belongs to.

True or false: The host program has been deprecated.

False: The host program is actively maintained; it's nslookup that has been deprecated.

True or false: Symbolic links always have permissions of lrwxrwxrwx.

True The leading l identifies the file as a symbolic link. The remaining characters indicate that all users have full access to the link file, but the linked-to file's permissions are what control what users can actually do with the file.

True or false: You can use a recordable optical disc to transfer data from a Linux computer to a Windows computer.

True The most common optical disc formats (CD, DVD, and Blu-Ray) and filesystems (ISO-9660 and UDF) work equally well on both Linux and Windows. Thus, you can use an optical disc to transfer data from Linux to Windows, or vice-versa.

True or false: xinetd is a super server.

True The term super server refers to a server that listens for connection attempts on behalf of other servers and that launches those other servers only as needed. The two most common super servers on Linux are inetd and xinetd.

True or false: Linux supports two types of text-mode output to the screen, which you can send to separate files or display devices.

True The two types of output are standard output and standard error.

Your network's hardware interface is called eth0. You want to bring up this interface via DHCP, so you type dhclient _____ as root.

eth0

You want to test connectivity to tranquility.luna.edu by sending 11 packets to see how many return. To do this, you can type __________ tranquility.luna.edu.

ping -c 11

You can type ______ to acquire root privileges that persist across multiple commands.

su

To display the last few lines of a text file, you would type _____ afile.txt.

tail

Which of the following two office suites are most closely related to one another?

A, E LibreOffice is derived from OpenOffice.org, so options A and E are correct. GNOME Office and KOffice are independently-created office suites for Linux, while Microsoft Office is a commercial office suite for Windows and Mac OS X. Thus, options B, C, and D are all independent of each other and of LibreOffice and OpenOffice.org.

A symbol found in the root shell prompt by default is __.

Answer: #

You've created a script, sensitive, and you want to be sure that no other ordinary user of the computer can read, write, or execute it, but you must be able to read, write, and execute it. To do so, you type chmod ______ sensitive. (Specify the octal mode.)

Answer: 700

You use the ___ character to separate two strings, either of which should match, in an extended regular expression.

Answer: | (pipe)

You type the following command and see the resulting output: $ ls -l test -rwxr-xr-x 2 rod users 111 Apr 13 13:48 test What is the meaning of the digit 2 immediately prior to the username (rod)?

C The number in the specified position represents the number of filenames that point to the file—in other words, the number of hard links to the file. Thus, option C is correct. Options A, B, D, and E all present fictitious descriptions of that field's meaning. (The file's size appears later on the line—it's 111 in this example.)

Where do most drivers exist on a Linux system?

C In the Linux kernel Drivers manage hardware, and as such, they're most commonly part of the Linux kernel, so option C is correct. Some drivers reside in libraries (option A) or in application programs (option D), but these locations are less common than the kernel, so options A and D are both incorrect. Firmware is software that's part of the hardware, and although firmware is important, it's distinct from drivers, so option B is incorrect. Configuration files can sometimes affect how drivers work, but they are not themselves drivers nor do they contain drivers, so option E is incorrect.

Where does the kernel store its ring buffer logs?

E The kernel ring buffer is held in memory, as option E specifies. Options A, B, C, and D all specify disk directories, which aren't memory locations, and so are all incorrect. (Some distributions place a copy of the ring buffer from late in the boot process in /var/log, but this is just a "snapshot" of the ring buffer at that moment in time, not whatever's current at a later time.)

What symbol do you place after a command to run the program in the background?

A An ampersand (&), placed after a command typed in Bash, causes the command to run in the background, so option A is correct. The remaining options do not accomplish this task, although option C redirects standard output and option D creates a pipe to the following command on the same line. Option B is completely meaningless, as is option E in this context, although a hash mark (#) does serve as a comment character in Bash scripts.

Which option to zip can you use to encode symbolic links as such rather than including the linked-to file?

E --symlinks option is fictitious, so option D is incorrect.--links option enables creation of a multi-file archive, so option C is incorrect. The -s to translate Unix-style end-of-line characters into DOS/Windows-style end-of-line characters, so option B is incorrect. The zip option causes -l option tells zip to include only the specified files, so option A is incorrect. The -i option does as the question specifies, so option E is correct. The --symlinksThe

You can type useradd ____ nemo as root to create the nemo account without creating a home directory for nemo.

Answer: -M

The character that separates fields on each line of /etc/passwd is ___.

Answer: :

You want to create a directory called ~/Documents/papers, but you're not sure that the ~/Documents directory exists. What command can you type to create the desired directory and its parent directory if it doesn't already exist?

Answer: E The -p option to mkdir creates parent directories if they don't already exist, so option E is correct. The -a, --recursive, -R, and -r options are all fictitious, so options A, B, C, and D are all incorrect.

The files afile.txt and AFile.TXT can both exist on a Linux filesystem because these filesystems are ____________.

Answer: case-sensitive

The command _______ :users somefile.txt changes the group affiliation of somefile.txt to users.

Answer: chown

The /proc/______ pseudo-file holds data on your CPU, such as its model name and clock speed.

Answer: cpuinfo

You want to delete the oldproj group, so you type ______ oldproj.

Answer: groupdel

A(n) _________ environment means that a person cannot deny actions, and the sudo command helps establish this environment.

Answer: nonrepudiation

Which regular expression string matches any sequence of characters of any length?

C The .* sequence matches any string of any length, so option C is correct. Option A matches a dot (.), which otherwise has a special meaning and so can't be used directly. Square brackets, as in option B, can surround a set of characters, any one of which will satisfy a match. A dot, as in option D, matches any single character. An asterisk (*), as in option E, specifies an arbitrary number of repeats of the previous match. (Hence, .* matches any number of characters, but neither character alone does the job.)

Default permissions are determined by the _____.

umask

True or false: Users should be logged in when you change their UID numbers with usermod.

False If a user is logged in when you change the user's UID number, problems can ensue because the login session will continue to use the old UID number. Thus, users should be logged out before you attempt to change their UID numbers.

True or false: All user accounts are necessarily defined in /etc/passwd and /etc/shadow.

False Some computers use network account databases, which supplement local account configuration files with those stored on a remote network server.

True or False: Linux stores information on its groups in the /etc/groups file.

False The file it stores groups in is the /etc/group file not /etc/groups.

True or false: When operating on large files, the mv command works very quickly when the target directory is on the same low-level filesystem as the original file, but much more slowly when this isn't the case.

True The mv command moves or renames files, and it works by rewriting low-level filesystem data without touching the file's data when the target is on the same filesystem as the original. Thus, it can work quickly when this is the case. When moving a file across filesystems, though, mv must copy the data, which can take a while when the file is large.

Which of the following is the most common type of interface for internal hard disks on desktop computers today?

C SATA The Serial Advanced Technology Attachment (SATA) interface is the dominant type of internal hard disk interface today, so option C is correct. The older Parallel ATA (PATA) interface was once common, but has long been surpassed in popularity by SATA, so option A is incorrect. The Small Computer Systems Interface (SCSI) interface once dominated on high-end installations and is still in use, but is not popular on desktop systems, so option B is incorrect. Enhanced Integrated Device Electronics (EIDE) is another name for PATA, so option D is incorrect. The Universal Serial Bus (USB) is a common interface for external devices, including hard disks and many other devices, but the question specifies an internal interface, so option E is incorrect.

What term refers to the worldwide system of servers that translates between IP addresses and hostnames?

Answer: B The question describes the Domain Name System (DNS), so option B is correct. The Dynamic Host Configuration Protocol (DHCP) delivers network configuration information to computers when they boot, so option A is incorrect. The Transmission Control Protocol/Internet Protocol (TCP/IP) is the overarching standard used for most networking purposes, so option C is incorrect. IP version 6 (IPv6) is an addressing system that supports immensely more addresses than does the older IPv4, so option D is incorrect. The Secure Shell (SSH) is an encrypted remote login protocol, so option E is incorrect.

Which of the following programs enable root to set the ownership of files? (Select all that apply.)

Answer: B, D command updates a file's time stamps, but does not change its ownership, so option E is incorrect.touch command can change various account features, but not file ownership, so option C is incorrect. The usermod command enables changing the mode (permissions) of files, but not their ownership, so option A is incorrect. The chmod, it enables you to change the ownership of files, so option D is also correct. The root command is a text-mode tool for changing the ownership and group association of files, so option B is correct. Nautilus is a GUI file manager, and when it's run as chownThe

What program can you use to manually bring up a network interface in Linux?

Answer: D The ifconfig program does as the question specifies (among other things), so option D is correct. The iwlist command displays information on Wi-Fi networks but does not bring up a network interface, so option A is incorrect. The route command displays or modifies routing tables, but does not bring up a network interface, so option B is incorrect. The telnet command is a remote-access and network diagnostic tool, but it does not bring up a network interface, so option C is incorrect. The traceroute command produces network diagnostic information, but it does not bring up a network interface, so option E is incorrect.

The _____ filesystem is very old but is supported by almost every OS, making it a good choice for interoperability.

Answer: FAT

The _____ library provides drivers to control scanners. (Provide the acronym for the library's name.)

Answer: SANE

Postfix is a server that implements the ______ protocol. (Provide the protocol's acronym

Answer: SMTP

The first process to be run by the Linux kernel is normally called _______

Answer: init

The character __ identifies a symbolic link in the 10-character symbolic permission string that's associated with a file.

Answer: l (Lower case L) Found on pg 142

A condition in which a program allocates more and more memory but doesn't use the memory it allocates is called a ______ ______ (two words).

Answer: memory leak

The process that launched a given process is known as the ________ process

Answer: parent

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as ____.

Answer: phishing

UIDs below 500 or 1000 (depending on the distribution) are reserved for use by __________ accounts.

Answer: system

You can use the ____ command to count the characters, words, and lines in a text file.

Answer: wc

You can type _____ to learn your current username and nothing more?

Answer: whoami

What type of information will you find in /etc/passwd for ordinary user accounts? (Select all that apply)

Answers A, C, E ....

What does the permission string -rwxrwx--- mean?

C Option C correctly summarizes the meaning of the specified permission string. The description in option A would be represented by -rwx------, which is not the string shown in the question. Option B would be correct if the string began with d, indicating a directory; but the leading - indicates a data file rather than a directory. Option D's description would require rwx in the last three characters of the permission string; but the --- indicates no world access. Option E combines the directory error of option B with the world-access error of option D, and so is incorrect.

You type touch afile.txt in a directory that contains no files. What will be the effect?

D The touch command updates a file's time stamps or creates a new empty file if one doesn't already exist. Since the latter case is described by the question, a new file will be created, as described in option D. Since touch doesn't copy files, option A is incorrect. Option B would be correct if there were an explicit reference to your home directory in the file specification, but the command as stated works on a file in the current directory, so option B is incorrect. Because the command will create a new file, options C and E are both incorrect.

Which of the following pieces of information on user accounts is not normally stored in the /etc/passwd file on modern Linux distributions?

E Although /etc/passwd includes a field for the password, that field normally contains an x value, meaning that the encrypted password is stored in /etc/shadow. Thus, option E is correct. The accounts default shell, default GID number, UID number, and username all appear in /etc/passwd, so options A, B, C, and D are all incorrect.

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents?

E The >> operator appends standard output to a file, so option E is correct. The vertical bar (|) is the pipe character; it ties one program's standard output to another's standard input. The 2> operator redirects standard error, not standard output; and it overwrites the target file. The &> operator redirects both standard output and standard error, and it overwrites the target file. The > operator redirects standard output, but it overwrites the target file.

Which of the following commands provides a low-level way to install software on a Debian system?

E The dpkg program is the low-level interface to the Debian package system; you can use it to install, uninstall, and otherwise manage packages. Thus, option E is correct. Its equivalent on RPM-based systems is rpm, so option A is incorrect. Options B, C, and D are incorrect because they're all higher-level interfaces to RPM-based systems.

Which of the following commands displays the name of the directory in which you're working?

E The pwd command does as the question specifies, so option E is correct. The wc command counts lines, words, and characters in a text file, so option A is incorrect. The cat command concatenates multiple files, or displays a file on the screen, so option B is incorrect. The echo command displays whatever text you give it, or the contents of a variable you give it, so option C is incorrect. The cd command changes the current working directory, but does not display its name, so option D is incorrect.

When should you use the root account?

E The root account is extremely powerful, and therefore extremely dangerous. Thus, you should use it only when you need that power to perform administrative tasks, as option E specifies. You'll get little or no extra speed from the root account, so using it as option A specifies will gain you nothing but expose your system to added risk, making option A incorrect. Even if you're the sole user of the computer, using root unnecessarily can be dangerous; and if you're the system administrator, you'll have to use the root account even on a multi-user system. Thus, option B is incorrect. Although root power is sometimes necessary for diagnostics, this isn't always the case, so option C is incorrect. Running untrusted programs is always risky, and running them as root is doubly risky, so option D is incorrect.

What option can you pass to groupadd to have it create a group with a GID number of 1027?

E You can use the --gid (or -g) option to groupadd to specify the GID number for a new group, so option E is correct. Options A, B, C, and D all present fictitious options to groupadd.

Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system? (Select all that apply.)

a. Data transferred to or from a Web site can be intercepted, possibly exposing sensitive data to theft. b. A Web site with malicious dynamic content could steal your personal data files. A, B Most Web sites are unencrypted, so data transferred from the site and your computer, or vice-versa, can be intercepted, as option A suggests. (Most sites that transfer sensitive data employ encryption, but this isn't universally true.) Some Web sites deliver mini-programs that run on your computer, and if such a site delivers a malicious program, it could do just about anything, including steal your personal data files, as option B suggests. If you run the Web browser as an ordinary user, though, such a malicious program could not create a new account, so option C is incorrect. Likewise, your Linux login password is safe, so option D is incorrect. A Windows virus won't run on Linux at all, much less harm your hardware, so option E is incorrect.

Which options to find can you use to locate files owned by a particular user? (Select all that apply.)

a. -uid d. -user The -uid option to find locates files owned by a user with the specified user ID (UID) number, and the -user option locates files based on the user's username. Thus, options A and D are both correct. The -name option locates files with a specified filename, so option B is incorrect. The -id and -u options are both fictitious, so options C and E are incorrect.

Which of the following programs are Linux file managers? (Select all that apply.)

b. Thunar d. Konqueror e. Nautilus Response Feedback: Answer: B, D, E Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME. Thus, options B, D, and E are all correct. Thunderbird is an e-mail client, and Apache is a Web server program, so options A and C are both incorrect.


Kaugnay na mga set ng pag-aaral

A&P Chapter 15 (Short Answer + MCQ)

View Set

The Call of the Wild Chapter 4 Vocabulary

View Set

National Practice Test 1 - Rights, Interest and Estates; Ownership

View Set

Group 1 - Chapter 04: Section 4.1-4.4 - Functional Anatomy of Prokaryotic and Eukaryotic Cells

View Set

Peds - ATI Practice B Online 2019 - 2023

View Set