UNIX Exam 1 REVIEW

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which option can be used with the shutdown command to safely power down the server:

-h

What is the highest level in the Unix file structure?

/

What is the name of the file that is used to control the hardware settings on the Pi and what directory is it located in?

/boot/config.txt

The best place to find the executable files on the system would be in:

/usr

Look for log files here:

/var

cd

Change to a directory

What does CLI & GUI stand for?

Command Line Interface & Graphic User Interface

mailx

Command line mail utility

adduser

Create a new user account

PS1="[\d \t \u@\h:\w ] $

Customizes the command prompt

gzip uses the same format in Unix/Linux as Windows-based zip files

False

rm -rf prompts you before deleting a file.

False

ssh is the preferred way to log in to a system to browse the web.

False

Which of the following is a command used to navigate around in the file system?

A. cd B. pwd C. ls

Which of the following is an example of a shell in the Unix operating system?

A. C shell. B. Bourne shell. C. Bash shell.

The configuring of hardware parameters and settings before POST (Power On Self Test) is done here:

BIOS

$ ls /usr/leo/documents/*.txt will do what:

List all files that match .txt in /documents

ps

List processes running

ls

List the contents of a directory

What does the Unix command line format consist of?

Prompt, command, options, arguments.

rm -i

Prompts the user before executing command

What is a RPM and what is it used for?

RPM stands for Redhat Package Manager, which is a program used for installing, uninstalling, and managing software packages in Unix/Linux.

What operating system does the Raspberry Pi commonly use?

Raspian/Debian OS

Which of the following is not part of the Raspberry Pi hardware:

Real-time Clock

RPM

Red Hat Package Manager

The method or process for a server used on a network to resolve client URLs to IP addresses is called ______.

Resolving

uname -a

Returns the system type

-rwsr-xr-x means that:

SUID is set

grep

Searches for and prints lines matching a pattern

What does the file permission of SGID mean in the Unix operating system?

Set Group ID, is used on executable files to allow the file to be run as if logged into the group.

What does the file permission of SUID mean in the Unix operating system?

Set User ID, is used on executable files to allow the file to be run as the file owner instead of the user logged in.

What does the command "sudo raspi-config" do?

Starts the Raspberry Pi Software Configuration Tool.

The up arrow on the keyboard can be used for:

Toggling through the command history.

$ tree /usr/steve/documents/ will do what:

Tree the directory /documents for user steve

A Unix shell is a command line interpreter for user commands.

True

A cron job can be setup to execute a file at a specific date and time.

True

A file with the permissions of 766 allows reading and writing by the user, group, and all other users.

True

A path in the Unix file system is a unique location to a file or directory.

True

A relative path is a file or directory location based on the user's current location within the file system.

True

A system administrator manages the computer systems in an organization. The responsibilities of a system administrator and network administrator often overlap; however, the system administrator is more geared to the computer hardware and less on the network

True

A zombie in Unix\Linux is a process trying to die.

True

APT, Yum, and OpenPKG are well-known RPMs.

True

Advanced Package Tool (APT) is a common RPM.

True

An absolute path is always a valid way to navigate in a Unix directory structure.

True

An absolute path is the best solution for direct file access in the Unix file system.

True

Dot dot (..) is used to navigate up a directory level.

True

Every directory in the Unix file system contains a dot (.) and dot dot (..) which are short-cuts that can be used by the user when navigating the file system.

True

If my system was having trouble and I wanted to troubleshoot it, I should init to level 1 or 2.

True

Initialization files that are in the user's home directory and executed at login can be used for setting variables, aliases and customized commands.

True

Initialization files vary by the shell you've chosen.

True

Linux has driven the adoption of Unix through opening up the x86/x64 marketspace.

True

Most Linux distributions are free.

True

Most PDAs and smartphones in the market today now run a Unix variant.

True

NOOBs is the Pis operating system installer.

True

Raspbian is the Pis official supported operating system.

True

Runlevel 0 is used to halt the system.

True

SUID if set, allows the execution of a file as the file owner rather than the actual user logged in.

True

Seven runlevelsare supported in the standardUnix kernel.

True

The Android OS on smartphones is a variant of Unix.

True

The RPM verifies authenticity, ownership, and validity of the software package being installed.

True

The Raspberry Pi basically has two types of interfaces by a user: command line and graphical (menus).

True

The Raspberry Pi can provide both command line and graphic user interfaces.

True

The Raspberry Pi uses an SD card to act as a mounted disk drive.

True

The Unix operating system has the ability to run multiple process through CPU time sharing making it highly efficient.

True

The ability to run multiple processes using CPU time sharing is the power and efficiency behind the Unix\Linux operating systems.

True

The basic command line parameters include the system prompt, command name, option flag, options, and filename or path.

True

The command to change a user password in the Unix/Linux operating system is $ passwd <user>.

True

The first Linux was developed in the early 1990s

True

The grep command is used search a text file and locate matching string patterns to that specified by the user.

True

The nano editor is another default editor delivered with the Unix/Linux operating system, but is limited in functionality compared to other editors.

True

The set user ID bit is used on executable files to allow the executable to be run as the file owner rather than as the user logged in.

True

The shell script is designed to be run by the Unix shell to perform operations such as file manipulation, program execution, capture user input, and/or output data.

True

The standard Unix Kernel support seven different runlevels.

True

The sticky bit is used to allow only the owner or root to delete or rename a file in a shared public directory such as /tmp.

True

The switch user (su) command allows the current user to temporarily become another user in order to execute a file.

True

The top, uptime, and ps commands are used for system performance monitoring in the Unix operating system.

True

The vi editor has two modes: insert mode and command mode

True

The vi editor is one of the default file editors that comes with the Unix/Linux operating system.

True

There is no security without physical security

True

To increase storage on the Pi, a larger SD card can be installed.

True

Unix can run both single user and multiuser modes.

True

Unix/Linux supports both CLI and GUI.

True

Vi and nano are common Unix/Linux file editors.

True

he sudo command allows a user to run a program with the privileges of another user, usually root.

True

Do you have your Raspberry Pi already and ready to start the Unix adventure?

Yes

One of your users, much to your frustration, created a file accidently with a special character in it and you wanted to remove the file. What other special character will you have to use in your remove command to get rid of

\

What is a cron job?

a service that allows for specific tasks to be accomplished automatically at a given date and time.

If I wanted to change to another user's directory and that username was user3, which command would be the best for me to use to change to their directory?

cd ~user3

Which command is used to change file or directory permissions:

chmod

If I wanted to create a cron table entry to do a specific task, I would do:

crontab -e

To switch between modes in vi, you use the ________ key.

escape

You would most definitely find the SGID bit set on directories that contain:

executable files

The SUID bit:

is shown as 's' in the file permissions and allows the file to be executed as the file owner.

The best way to terminate a misbehaving process running on your system:

kill

Which of the following commands is not generally used in file operations:

mkdir

What is the default user and password on the Raspberry Pi?

pi/raspberry

You would most definitely find the sticky bit set on files in a directory that contain:

public or log files

All of the following commands can be used to manipulate text strings except:

replace

Very bad things can happen when you:

rm -rf * cat a binary file leave yourself logged in

Which command would list all RPM packages installed:

rpm -qa

A directory with permissions of -rwxrwxrwt would indicate:

sticky bit is set for public or log files

Which command will delete a new user on the server:

sudo deluser username

Which command will create a new user on the server:

sudo useradd username

The ________ key can be used as a shortcut to find files or directories when used in conjunction with a command.

tab

The ________ command shows time for system command usage where as the _________ command gives the current date and time information.

time, date

ssh is directly used for all of the following except:

to offload local processing

Runlevel 3 is normal server operations with multiuser and networking capabilities.

true

The __________ key can be used as a shortcut to see previous commands typed in by the user.

up arrow

All of the following are text editors in Unix except:

word

What other special character is used to chain commands and redirect the output of one command into another:

|

The root level directory (/) is the lowest level in the directory tree.

False

The shutdown -h command is used to reboot the server.

False

The sticky bit on a file allows everyone to delete the file.

False

The switch user (su) command defaults to the current user therefore is safe to use for executing program files.

False

There are five process states used in the execution of commands within the Unix operating system.

False

To prevent a service from running on the Pi, it can be added to the red-listing file.

False

Which option to chmod would give 'rwx' to owner, 'r' to group, and 'r' to everyone else:

744

To get to the start of the file in vi, you would type:

:0

The Raspberry Pi can be used with:

A keyboard An mouse. A monitor.

Which of the following definitions best describes a system administrator and their responsibilities in the IT field?

A person that works in the information technology field and supports the infrastructure of a company. The responsibilities of a system administrator includes maintaining server and network hardware, application software such as web and email servers, system performance monitoring, user account management and access control, and cyber security related items.

bash

A variant of a shell used for interactive processing

Which of the following companies use the Unix/Linux operating system?

A. Google. B. Pizza Hut. C. Toyota.

Which of the following are parts of the Raspberry Pi hardware?

A. HDMI monitor port. B. USB ports. C. Ethernet port.

Why is Unix/Linux a popular operating system?

A. Provides multiuser, multitasking, and multiprocessing. B. Uses direct inter-processor communication of devices (hardware seen as files) making it very efficient and easy to integrate. C. Provides portability, stability, reliable, and better security.

Unix/Linux server can be used as a?

A. Web application server. B. Database server. C. Mail server.

Which of the following companies use Unix\Linux servers:

A. Texas A&M University. B. Google. C. Amazon.

How is the file system structured on the Unix server?

As a hierarchal tree with directories that branch downward, with the root level at the top.

he following shell script does what: echo "Enter your name: " read NAME echo "Enter your favorite food: " read FOOD echo "$NAME likes to eat $FOOD"

Asks for name and food then displays it on the screen.

Which is NOT to be considered a benefit of "open source":

Dedicated support structure

userdel

Delete user account

df -kl

Display free disk space

more

Displays information one page at a time.

cat

Displays the contents of text file to the screen

pwd

Displays the current directory the system prompt is in

The permission setting of 111 allows for everyone to have access to the file or directory.

False

crontab -e

Edits the cron table.

tar -x

Extracts files in an archive

A RPM is used to secure the user account in the Unix operating system.

False

A user cannot change the command line prompt in the Unix operating system.

False

Being an integral part of the operating system used for command line interpretation, Unix shells cannot be customized or programmed.

False

Common user commands such as setdir, lockdir, and ulock for setting and viewing permission bits on directories and files.

False

Executing the command cd ~ will take you to the system root directory.

False

File permissions cannot be set for a specific group to have access

False

File permissions of 777 allows for root only access.

False

If set, the sticky bit restricts deletion or renaming of files not owned in shared directories and appears as "P" in the other execute field on the permission settings.

False

Network configuration parameters are contained in the /etc/hosts file.

False

RPM allows for the installing of a software package without authenticity, ownership, and validity of the software package.

False

RPMs only work on Red Hat Linux.

False

Runlevel 4 is used for single-user mode.

False

Runlevel 7 is full multiuser mode.

False

SUID and SGID are seen as a 't' in the file permissions.

False

Security settings can only be done on files within the user's home directory.

False

Specifying a location of a file based on the root level directory in the file system hierarchy is considered a relative path.

False

The "adduser" command is used to remove an user's account from the operating system.

False

The "sudo" command allows a user to temporarily change to another user in the system.

False

The Raspberry Pi was developed in Germany.

False

The Unix file system does not support external file systems due to the structure within the operating system not being able to handle foreign file formats.

False

The command apt install lists all the software packages that have been installed.

False

The cron service is the system process which will automatically perform tasks for you according to a set schedule and is configured in the clktab file.

False

The default Unix/Linux file permission setting is 777

False

The default user that comes already established on the Raspberry pi is called "raspberry" with a password of "root".

False

The krypton (ksh) shell is different from all other shells and allows for a user to have sudo privileges automatically when used.

False

The nano editor is much harder to use for file editing than the vi editor.

False

When was the Unix operating system developed and who developed it?

In 1969 by AT&T (Bell Labs).

When was the Linux operating system developed, who developed it, and why was it developed?

In 1991 by Linus Torvalds as an alternative to expensive and proprietary versions of Unix.

What is the name of the preinstalled software tool that is used to load the operating system on the Raspberry Pi?

NOOBS (New Out Of Box Software)

________ is an easy operating system installer which contains Raspbian.

NOOBs

Raspbian

Official supported operating system

What is the differences between open source and closed source operating systems?

Open source software is developed by a community of users and can be modified easily and closed source software is developed by a private company and is unmodifiable for the most platforms.

How can I tell if the SGID had been set:

The group execute bit is 's'

What is a sticky bit and how is it used in the Unix operating system?

The sticky bit restricts deletion or renaming of files not owned and is commonly used with shared directories such as /var/tmp and /tmp.

sudo apt-get update:

Updates the RPM package libraries.

mv

Used to rename or change the location of a file

man

Used to understand and display commands and their syntax


Kaugnay na mga set ng pag-aaral

anatomy extra credit regional anatomy

View Set

Chapter 3 Review (Multiple Choice)

View Set

Chapter 11 The Economics of the Public Sector

View Set

Organizational Behavior Chapter 13 Quiz

View Set

Political Science 1 Final Exam Section 3: Essay

View Set

La Guerra Civil, El Alcazar, Guernica

View Set

Chapter 8: Underwriting and Financing Residential Properties

View Set