Linux+ Certification Exam Study Guide
Which of the following commands is the same as the "whatis" command in Linux?
man -f
Which of the following commands is the same as the "apropos" command?
man -k
Which of the following specifies the maximum permissions that anyone besides the user owner and "others" have on the file?
mask value
Which of the following shell commands is used to create a new directory?
mkdir
Every Linux user is a member of at least one group, and the first group is called the user's (_____) group.
primary
Which of the following is a software tool that can be used to keep track of all commands executed by users?
psacct
To see if there are any errors in the /etc/passwd file, execute the (_____) command while logged in as the root user.
pwck
The goal in terms of (_____) is to make systems, services, and data available to the correct entities while denying access to these resources by unauthorized entities.
security
To execute a sequence of shell commands, separate each command with a (_____) and press the Enter key after the last command has been entered.
semicolon ;
Which of the following commands is used to create an ACL on a file or directory?
setfacl
To find text in the vi editor, which character do you type before the search text to search forward in the document?
/ (forward slash)
If one line in the /etc/passwd file appears as root:x:0:0:root:/root:/bin/bash, which field in this example represents the user's login shell?
/bin/bash
Which of the following filesystems contains files such as the kernel, bootloader, and initramfs files?
/boot
Which of the following files stores information about each group, including the group name, group ID (GID), and secondary user membership?
/etc/group
Which of the following files stores additional information for a group, such as group administrators and the group password?
/etc/gshadow
Which of the following files contains user account information, including the primary group membership for each user?
/etc/passwd
Which of the following files stores the primary account data for local users of a Linux system?
/etc/passwd
Which of the following files stores user passwords and password-related data for local users of a Linux system?
/etc/shadow
While in insert mode, which key do you press to return to the default mode of operation for the vi editor?
Escape
Which of the following, also known as a wildcard, refers to any character provided on the command line that represents a portion of a filename?
File glob
When removable media, such as a CD-ROM or DVD, is automatically mounted, it is typically made available under which of the following directories?
/media
You can find additional user documentation in which of the following directories?
/usr/share/doc
In the standard vi editor, you can undo how many actions?
1
Which of the following is not a command used to change the contents of the /etc/group file?
groupins
Which command checks the /etc/group file for errors while logged as root.
grpck
Which of the following commands can be used to move forward five words in the vi editor?
5w
Which of the following directories is the top of the virtual filesystem structure?
/ (Root)
To remove a user and keep the user's home directory and mail spool, use the (_____) command without any additional arguments.
userdel
As an administrator, you can modify user accounts using the (_____) command.
usermod
Which of the following options for the useradd command displays the default values?
-D
Which option for the chattr command is used to recursively apply changes to an entire directory structure?
-R
Which option for the "cp" shell command copies an entire directory structure?
-r
To create a restricted shell account for guest users, the first step is to use the (_____) option with the useradd command and provide an argument of /bin/rbash.
-s
Which of the following options for the useradd command specifies the user's UID?
-u
Default group accounts in a typical Linux system often have GID values under (_____).
1000
The wall command used to broadcast urgent real-time messages on a system is limited to how many lines of text?
20
At any given time, there are about (_____) active Linux distributions.
250
If one line in the /etc/shadow file appears as bob:*:16484:3:90:5:30:16584:, which field in this example represents the minimum password age?
3
A system with at least (_____) of RAM should be able to support at least one VM.
8GB
Which command do you use in the vi editor if you want to close a document without saving all recent changes?
:q!
Which of the following commands is used to save and quit a document in the vi editor?
:wq
What might want to place in the /etc/motd file?
A friendly welcome message
Which of the following is the best solution for allowing the owner of a file to give permissions for specific users and groups?
Access Control Lists (ACLs)
When system logs are used to determine if someone is trying to gain unauthorized access to a system, this is an example of which of the following?
Account Security
Which of the following is a component of the Linux operating system?
All of the above User utilities Server software File systems
The Python scripting language is often used for which of the following applications?
All of these Network-based applications Scientific applications System tools
When securing user accounts, which of the following components must be considered?
All of these Physical security of the system or network Ensuring accounts are not susceptible to attack Education of users
Which of the following provides additional information for a shell command, such as a filename or user account name, to determine which specific action to take?
Argument
Which type of Linux distribution, which includes Red Hat Enterprise Linux, is designed to be used in a business setting?
Commercial
Which button do you click in the Johnny utility to see what john command was executed?
Console log
Which of the following methods can be used to help determine the likely cause of a problem with a Linux system?
Contacting another system administrator and asking for advice Reading documentation,such as man and info pages Researching your problem on Linux forum sites All of these
Which of the following refers to a specific implementation of a Linux operating system?
Distribution
Which of the following is the most commonly overlooked step in the process of troubleshooting a problem with a Linux system?
Document the actions you plan to perform to solve the problem before taking any action.
Which of the following Linux components refers to a well-defined structure that stores file and directories?
File system
Which of the following is rarely installed on Linux server systems because it requires additional hard drive space, CPU cycles, and RAM usage, and also could pose a security risk?
GUI software
Which of the following is specifically designed to be used as the filesystem on CD-ROM discs?
ISO9660
A(n) (_____) file is completely unchangeable; it cannot be deleted or modified by anyone, including the root user.
Immutable
When a system is compromised, which of the following should include who is notified, what actions should be taken, and so on?
Incident Response Plan (IRP)
Which of the following login servers can provide both user and group account data and is commonly used for network-based accounts on Linux distributions?
LDAP
Where are traditional partition tables stored?
MBR
Which of the following actions can be performed to prevent a user from changing an account password?
Make the min field of the /etc/shadow file a higher value than the max field.
Which term refers to a software package that often costs nothing?
Open source
Which of the following are used to separate a hard disk into smaller components, so that each component can then be treated as a different storage device?
Partitions
(_____) filesystems are structures used to organize data on a device, such as a partition, logical volume, or RAID.
Physical
In relation to the steps for troubleshooting a problem with a Linux system, what does POA stand for?
Plan of attack
PAM, a powerful tool that allows an administrator to provide many restrictions to user accounts, stands for which of the following?
Pluggable Authentication Module
Which of the following is not one of the categories of Kali Linux tools?
Pre-Exploitation
Which of the following permissions can be used to execute a command that has access to files and directories using the group ownership of the command?
SGID
Which of the following refers to creating small programs based on the Linux commands that you want to routinely (or occasionally) execute?
Scripting
In reference to special permission sets, SUID is short for which of the following?
Set User ID
Which of the following is a technique for gathering system information from users by using nontechnical methods?
Social Engineering
Which of the following permissions changes the behavior of the write permission when applied to a directory?
Sticky bit
Which of the following commands can be used to determine if SELinux is available (and actively being used) on a system?
getenforce
Man pages have been around since the early days of (_____) in the early 1970s.
UNIX
The vi (short for visual) text editor was introduced to (_____) in the mid-1970s.
UNIX
Which of the following is not a Red Hat-based distro?
Ubuntu
When you encourage users to report any suspicious activity immediately, you are implementing which of the following?
User Education
If one line in the /etc/group file appears as adm:x:4:syslog,bo, which field in this example represents the group name?
adm
Which of the following refers to a shell feature that allows a collection of commands to be executed by issuing a single command?
alias
Which of the following default user accounts is used by the software that provides DNS (Domain Name System) functions?
bind
Which of the following is a GUI-based text editor that includes tools and features like syntax highlighting, insertion of code by clicking a button, and automatic formatting?
bluefish
Which of the following shell commands is used to move the shell's current directory to another directory?
cd
After a Linux user creates a new file, the user can change the group ownership of the file to another group by using which of the following commands?
chgrp
Which of the following commands is used to delete the current line in the vi editor?
dd
Which of the following commands displays usage of partitions and logical devices?
df
A Linux distribution is also called a Linux (_____).
distro
Which of the following commands can you use to create an MBR partition?
fdisk
Which of the following commands is used to view the permissions of a file or directory?
ls -l
To discover additional information about a Linux command or configuration file, you can use the (_____) page.
man
When a user starts a new shell after initially logging in to the system, it is referred to as a .
non-login shell
Which of the following special group accounts is reserved for the system administrator?
root
Which of the following compression commands is used to merge multiple files into a single file?
tar
Linux offers (_____) of command-line utilities, each of which is designed to perform a specific task.
thousands
Which of the following shell commands is useful for updating the timestamps of critical files for inclusion in automated system backups?
touch
Which of the following commands is used to specify which default permissions to exclude when creating a new file or directory?
umask
To edit a new file with the vi editor, you can just type the command with no arguments or type (_____).
vi filename
An improved version of the vi editor, available on some Linux distributions, is called (_____).
vim
While in the command mode of the vi editor, which key do you press to move to the beginning of the next word or punctuation mark?
w
If one line in the /etc/group file appears as adm:x:4:syslog,bo, which field in this example represents the password placeholder?
x
Which of the following commands is used to copy the current line to the end of the document in the vi editor?
yG