CIS 171 - Linux I Midterm
Which of the following directories is created by default when an ext2, ext3, or ext4 filesystem is created on a device that is used by the fsck utility?
/lost+found/
Jackson wants to automatically mount a secondary internal hard drive when his Linux workstation boots up. In which of the following files should he configure an entry for the partition on the drive that he wants to mount?
/etc/fstab
The iptables software on Linux is an example of what kind of software?
Firewall
Which of the following is required as a separate partition in order to use LVM?
/boot
In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?
journald
Which of the following permissions would show for a symbolic link when displayed with the ls -l command?
lrwxrwxrwx
What metacharacter indicates background command execution?
&
Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.
*
Which of the following options will change the ownership of files and directories recursively within a directory? (Choose all that apply.)
--recursive
Callie wants to make sure that a filesystem is checked every 20 days. Which of the following options, when used with the tune2fs command, would set a full filesystem check to run every 14 days?
-i 14d
Which of the following umask settings will result in new files receiving the default permissions -rw-------?
0177 Correct. If the x (1) for user, rwx (7) for group, and rwx (7) for others is masked off, the default permissions should be -rw-------.
If the physical extent of a volume group is set to 32MB, what is the maximum logical volume size?
2TB
What piece of software tells the operating system how to use a specific hardware device?
Device driver
What service provides a method for the efficient transfer of files over the Internet?
FTP
When using the vi text editor, which of the following keys, when in command mode, will move to the last line in the document?
G
The mutt software is an example of what type of mail service software on Linux?
Mail User Agent
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
Minor number
Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet?
NTP
What Linux distribution is the most commonly used distribution within organizations today?
Red Hat
Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
SaaS
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
Segmentation fault
After logging into a terminal, a user will receive an interface known as which option?
Shell
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
Tarball
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
Target ID
If a hard link is created to a file and then the original file is deleted, which of the following is true?
The original file will be removed while the hard link remains usable to access the contents of the file.
In Linux, the core component of the GUI is known as:
X Windows
Which of the following are true of the echo command? a. All of the other options are true. b. When used to display text, quotation marks are optional. c. It can be used to display shell variables by including a $ sign in front of the variable name. d. Including a semicolon at the end of the line will not affect the text being displayed.
a. All of the other options are true.
Which of the following types of encryption uses a pair of keys known as a public and private?
asymmetric
In order to move from the /home/joe/test/data to the /home/joe directory, what command should be issued?
cd ../..
In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename?
chmod 7777 filename
Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.
chroot
Which of the following commands will display messages that were displayed during the boot sequence by the kernel?
dmesg
Which of the following commands when run from the /, or root, directory will return a very long list of many pages of results?
du
After a shell is no longer needed, what command can be given to exit the shell?
exit
If the mkfs command is executed to create a filesystem and only the block device name is specified, which of the following filesystems will be created?
ext2
Which of the following commands can be used to recursively search a directory tree for files that meet a certain criterion without using a database or premade index of files?
find
Which of the following commands will display all files and directories within the /var/log directory or its subdirectories which are owned by the root user?
find /var/log -user root
Which of the following commands will not interpret regular expressions, which translates into faster results being returned? (Choose all that apply.)
grep -F
Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?
hypervisor
What file in the /proc directory contains a list of memory address ranges reserved for device use?
ioports
In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?
libvert
Nicholas wants to verify whether a file is a hard link to a file within the same directory. Which of the following commands could he use to see information that would be helpful to make this determination?
ls -i
Mike has changed directory into one subdirectory after the next and has lost track of where he's at in the directory tree. Which of the following commands can he use to tell him the full path to the current subdirectory he is in?
pwd
What command can be issued to confirm which directory you are in at a command line prompt?
pwd
Which of the following commands can be used to scan a filesystem for disk usage, create, check, and repair quota files?
quotacheck
Which of the following commands will delete a directory and all of the files contained within it? (Choose all that apply.)
rm -rf olddir
What command is most effective at identifying different types of files?
stat
Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?
sysfs
To display a text file in reverse order, what command should be used?
tac
What command can be used to display the last five lines of a text file?
tail -5
Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search. Which of the following files could Lynn modify so that the locate command no longer includes those results?
/etc/updatedb.conf
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
/proc/meminfo
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
/root
Under the root directory in Linux, which directory contains system commands and utilities?
/usr
What directory under / contains the log files and spools for a Linux system?
/var
Chase is trying to extract records for employees 423 through 428 out of a comma separated values file and store them in another one. Which of the following commands would accomplish this? (Choose all that apply.) a. cat employees.csv | grep "42[3-8]" > employees-newhires.csv b. grep "42[3-8]" < employees.csv > employees-newhires.csv c. cat employees.csv | grep 423,424,425,426,427,428 > employees.csv d. grep "42[3-8]" employees.csv > employees-newhires.csv
a. cat employees.csv | grep "42[3-8]" > employees-newhires.csv b. grep "42[3-8]" < employees.csv > employees-newhires.csv d. grep "42[3-8]" employees.csv > employees-newhires.csv Correct. This command will use the cat command to send the contents of the employees.csv file to the grep command to filter the results. The -E option isn't required as the square brackets are part of common regular expressions, not extended regular expressions.Correct. The grep command doesn't require the -E option as the square brackets are part of common regular expressions, not extended regular expressions.Correct. The less than sign isn't required to have grep use it as input, but it is a valid syntax.
Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out to the terminal. Which of the following commands could Garrett use to perform this search? a. grep -E "(John|Bob)" salesemployees.csv b. grep -E (John|Bob) salesemployees.csv c. grep (John|Bob) salesemployees.csv d. egrep (John|Bob) salesemployees.csv
a. grep -E "(John|Bob)" salesemployees.csv Correct. The grep command has a -E option that specifies that it should use extended regular expressions. When used inside parentheses and the pipe symbol, you can search for lines that contain either John or Bob. The pipe symbol is commonly used as an OR operator.
Jo has received a text file which contains multiple instances of his name spelled correctly as well as multiple instances spelled as Joe. Which of the following commands would search a text file for any occurrences of either spelling and display them out to the terminal? (Choose three.) a. grep -E "Joe?" document1.txt b. grep -E "Joe*" document1.txt c. grep "Joe?" document1.txt d. grep "Joe*" document1.txt
a. grep -E "Joe?" document1.txt b. grep -E "Joe*" document1.txt d. grep "Joe*" document1.txt Correct. The grep command must have the -E specified in order to use a question mark, which is considered part of an extended regular expression. Correct. The grep command can use an asterisk to match zero or more instances of the previous character. As the asterisk is used for common regular expressions, the -E is not necessary, although it will also work with a -E. Correct. Although the -E is not necessary, the asterisk will return all instances where the string contains Jo as well as zero or more of the letter e.
Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the new partition information must be manually reloaded. Which of the following should she do next? (Choose two. Either answer is independently correct.) a. Run the cfdisk program b. Run the partprobe command c. Run the parted command d. Reboot the system
b. Run the partprobe command d. Reboot the system
Which of the following commands will return one result of where the grep binary executable is located? (Choose two.) a. locate grep b. type grep c. find grep d. which grep
b. type grep d. which grep
Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux system?
blkid
What command can be used to check different kinds of filesystems on Linux for errors?
fsck
What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?
g+r-w
Jamie has created a hard link to another file within the same directory. Which of the following commands can he use to verify that the hard link was created correctly? (Choose all that apply.)
ls -il
Which of the following commands can be used to display general hardware information for the entire system?
lshw
The apropos list command produces the same results as which command below?
man -k list
Dustin runs a command at the command line trying to find out what kernel version the system is running. However, it doesn't give him the information he needs. He knows there is an option that can be used to display the kernel version. How can he find out which option to use?
man uname
What command is used to manage a software RAID configuration after installation?
mdadm
Select the utility below that will start and perform a thorough check of RAM for hardware errors when run.
memtest86
Which of the following commands cannot be used to create an exFAT filesystem on a USB thumb drive that is recognized as /dev/sdb?
mkfs exfat /dev/sdb1
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
modules
Jim wants to rename a directory for a project that he has been working on. Which of the following commands can he use to perform that action?
mv projectx projecty
Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?
nodememstats
Clint has run the command parted /dev/sdb and wants to display a list of the existing partitions that exist on that drive. Which of the following commands can he use to display the existing partitions?
Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?
proxy server
Which of the following commands can be used to create and activate a swap partition on a Linux system? (Each answer represents part of the whole.)
swapon /dev/sda6
Which Linux command can be utilized to display your current login name?
whoami
Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will compact or otherwise improve the layout of the contiguous blocks of file data for an XFS filesystem?
xfs_fsr