Linux Essentials
What are some of the recent changes seen in Linux? Choose all. A.Improvements in the kernel B.Improvements in support tools C.Creation of new support tools D.Creation of new distributions E.Payment is now required to install Linux.
A, B, C, D. In Linux world, constant improvements are being made to kernel and support tools and new support tools and distributions are being released, so options. Linux is still released under open source license, which doesn't prohibit charging a fee for Linux, but most Linux distributions are still available free of charge for installing in any environment
Which of the following are open source software licenses? Choose all. A.MIT B.GPL C.BSD D.Creative Commons E.Apache
A, B, C, E. MIT, GPL, BSD, Apache are all open source licenses or groups of licenses. Creative Commons is organization that offers a suite of licenses but not for software. It targets audio recordings, video recordings, textual works, and so on, not just software programs.
Which of following considered characters can be used for regular expression matching rules? Choose all. A.* B.[] C.> D.? E..
A, B, D, E. *, [], ?, . are all characters that activate regular expression matching rules. > character used for basic redirection, and not for regular expressions
What elements does Linux distro bundle that make it unique? Choose all. A.Kernel B.Applications C.User and group accounts D.GNU utilities E.Package management utility
A, B, D, E. Linux distro bundles Linux kernel, GNU utilities, applications, package management utility to make it unique. User and group accounts somewhat standard across Linux systems based on SW packages installed, not on distribution
Which of following is function of Linux kernel? Choose all. A.Allocating memory for use by programs B.Allocating CPU time for use by programs C.Creating menus in GUI programs D.Controlling access to hard disks E.Enabling programs to use the network
A, B, D, E. kernel manages memory, CPU, devices for programs running on computer system kernel not manage features of GUI desktop environment.
Which following commands allow to search man pages for keyword copy? Choose all A.apropos copy B.man -k copy C.whereis copyD.whatis copy E.locate copy
A, B, D. apropos, man -k, whatis commands can all be used to search man pages for keyword copy. whereis program searches for files in restricted set of locations instead of keywords within man pages Locate command also searches for files, but it uses database it does not search for keywords within man pages.
Which following are text editors you can use at command line on a text-based tty terminal? Choose all A.vi B.nano C.gedit D.Kate E.emacs
A, B, E. vi, nano, emacs editor all text editors use at command line on text-based terminal such as tty3. gedit and Kate editors GUI-only editors not be used on text-based terminal.
You type mkdir one/two/three and receive an error message that reads, in part, No such file or directory. What can you do to overcome this problem? Choose all A.Add the --parents parameter to the mkdir command. B.Issue three separate mkdir commands: mkdir one, then mkdir one/two, and then mkdir one/two/three. C.Type touch /bin/mkdir to be sure the mkdir program file exists. D.Type rmdir one to clear away the interfering base of the desired new directory tree. E.Type rm -r one to clear away the entire interfering directory tree.
A, B. If try to create directory inside a directory that not exist, mkdir responds with No such file or directory error. --parents parameter tells mkdir to create all necessary parent directories automatically in such situations You can also manually do by creating each parent directory separately Option C will have no useful effect; at most, it will change the time stamps on the mkdir program file, but if you type it as a normal user, it probably won't even do that. Options D and E are both based on premise that you must remove directories that already exist with the names that you want to use, but this isn't true,
What type of information will you find in /etc/passwd for ordinary user accounts? Choose all A.A user ID (UID) number B.A complete listing of every group to which the user belongs C.The path to the account's home directory D.The path to the account's default GUI desktop environment E.The path to the account's default text-mode shell
A, C, E. /etc/passwd file's fields specify the username, an encrypted password (or x to denote use of shadow passwords, which is more common), a UID number (option A), a single default GID number, a comment field that normally holds the user's full name, the path to the account's home directory (option C), and the path to the account's default text-mode shell (option E). Option B is incorrect because, although /etc/passwd includes the user's default group, the user may belong to additional groups that are defined elsewhere. Option D is incorrect because the user's default desktop environment is not defined in /etc/password.
What are the three common categories for Linux systems?A.Embedded B.Graphical C.Desktop D.Industrial E.Server
A, C, E. Linux systems commonly used in embedded systems, as desktop workstations, and in server environments Linux systems can use a graphical desktop in either a desktop or server environment, but graphical is not a category of Linux systems. Linux can be used as either a desktop, embedded system, or server in an industrial environment, but industrial is not a category.
Three keystrokes that can initiate a search-and-replace operation in nano are ___, ____, and ____. A.Esc+R B.F6 C.F14 D.Ctrl+F E.Ctrl+\
A, C, E. Of the choices shown, ESC+R and Ctrl+\ key combinations as well as pressing F4 key will start a search- and-replace activity in the nano text editor.
Which of the following are software suites that allow you to set up a private cloud using Linux? Choose all. A.Nextcloud B.Zoho C.ownCloud D.Castero E.Kdenlive
A, C. Nextcloud and ownCloud both software suites allow to set up private cloud using Linux Zoho is a cloud-based office productivity suite but does not allow you to set up a private cloud Castero is text-based podcast client that available on Linux, but it not provide ability to configure private cloud Kdenlive is useful Linux application (use it to perform video editing), but not involved with the cloud.
What are two most popular utilities used as first process that Linux kernel runs, aside from itself? (Choose two.) A.init B.bash C.systemd D.login E.grub
A, C. name of first process Linux kernel runs is set in boot loader configuration file. That program is normally systemd or init bash program creates interactive shell login program creates login prompt on terminal, allowing users to log into system grub boot loader program started by computer BIOS or UEFI system
If Linux server not have graphical desktop installed, what two tools use to configure network settings from command line? A.nmcli B.iwconfig C.ip D.netstat E.ping
A, C. nmcli and ip commands both allow to set and change network settings from command line iwconfig only sets wireless network information netstat command displays open ports not change any network settings ping sends ICMP packets to remote hosts for testing not set any network settings
Why might you want to partition a hard disk? Choose all A.To install more than one OS on the disk B.To use ext4fs rather than ReiserFS C.To turn a PATA disk into an SATA disk D.To separate filesystem data from swap space E.To separate the disk's cache from its main data
A, D. Disk partitioning allows to separate data of different types into different parts of disk. Examples of reasons to do include installing multiple OSs and separating filesystem data from swap space. ext4fs and ReiserFS both filesystem types, and don't have anything to do with partitioning disk attachment types PATA and SATA are types of hard drive interfaces and not partition types; you can't convert one to the other by changing the partition Partitioning hard disk doesn't separate hard disk cache; that's an internal feature of hard drive
What command(s) display(s) information about CPU that your Linux system is running on? Choose all A.uname -a B.lsusb C.lspci D.lscpu E.man cpu
A, D. uname command with -a option displays info about host system, including architecture kernel built for, which gives you clue as to CPU. lscpu provides detailed information about CPU. lsusb provides information about USB devices connected to system, not CPU. lspci provides info about PCI devices connected to system, not CPU man provides info about system and application commands, not about CPU hardware.
Which of following is example of embedded OS? A.Android B.CentOS C.Fedora D.Mint E.Red Hat
A. Android OS used on phones as embedded Linux system, CentOS, Fedora, Mint, Red Hat Linux are full Linux distributions intended for desktop and server environments, not used in embedded systems
After using a text editor to create a shell script, what step you take before trying to use script by typing its name? A.Set one or more executable bits using chmod. B.Copy the script to the /usr/bin/scripts directory. C.Compile the script by typing bash scriptname, where scriptname is the script's name. D.Run a virus checker on the script to be sure it contains no viruses. E.Run a spell checker on the script to ensure it contains no bugs.
A. Before run shell script directly from command line, need to allow execute permissions for at least yourself Not need to have shell script file located in any specific directory as long as you have access to directory Typing bash scriptname will run script, not compile it Viruses extremely rare in Linux, and because you just created the script, the only way in which it could contain a virus would be if your system was already infected or if you wrote it as a virus Most spell checkers intended for English or other human languages, so they lack the ability to check for valid Bash commands, such as esac. Even if every keyword is spelled correctly, script still contain logic bugs.
A computer power supply converts electricity from alternating current to . (two words) A.direct current B.three-phase current C.magnetic current D.static current E.solar electricity
A. Computer hardware requires direct current power electricity to operate, Three-phase electricity is commonly used for large motors, not computer hardware Magnetic electricity is generated by rotating magnets, which aren't used in computer power supplies Static current is created by rubbing two or more objects together creating friction, and is not used in computer power supplies Solar power is used by converting the energy produced by the sun into electricity, and is not commonly used to power computers
An organization devoted to promoting open source-like principles in fields such as video and audio recordings is the _________ . A.Creative Commons B.GNU C.FSF D.MIT E.OSI
A. Creative Commons helps to promote types of freedoms that also concern FSF and OSI, but in broader sense. Its licenses typically aimed at audio recordings, video recordings, textual works, as well as computer programs.
How would you remove two lines of text from a file when using vi? A.In command mode, position the cursor on the first line and type 2dd. B.In command mode, position the cursor on the last line and type 2yy. C.In insert mode, position the cursor at the start of the first line, hold down the Shift key while pressing the down arrow key twice, and press the Delete key on the keyboard. D.In insert mode, position the cursor at the start of the first line and press Ctrl+K twice. E.Select the text with the mouse, and then select File ➢ Delete from the menu.
A. In vi editor, dd is command-mode command that deletes lines. Preceding this command by a number deletes that number of lines. yy works similarly, it copies (yanks) text rather than deleting it Option D works in emacs and similar text editors (including nano) but not in vi. Option E, or something similar, works in many GUI text editors but not in vi, so it is incorrect.
What type of multitasking does Linux use? A.Preemptive B.Multiuser C.Cooperative D.Single-tasking E.Single-user
A. Linux's multitasking is preemptive kernel can give CPU time to any process as it sees fit, potentially interrupting (or preempting) other processes. Linux is a multiuser OS, but multiuser is not a type of multitasking In a cooperative multitasking OS, apps must voluntarily give up CPU time to each other. Linux programs can signal OS they not need CPU time, Linux not rely exclusively on this method Single-tasking OS can run just one process at a time Single-user OS can support just one user at a time. Such OSs can be either single tasking or multitasking, and in latter case, can use either cooperative or preemptive multitasking
Where do most log files reside on a Linux computer? A./var/log B./etc/logging C./usr/log D./home/logging E./log/usr
A. Most Linux distro follow FHS store log files in /var/log directory structure Using FHS, /etc directory is for storing application configuration files, not log files /usr directory is for storing noncritical apps /home directory is for storing user data FHS not specify /log directory, so most Linux not create one
What keystroke moves cursor to start of line when typing a command in Bash? A.Ctrl+A B.Left arrow C.Ctrl+T D.Up arrowE.Ctrl+E
A. Pressing Ctrl+A moves cursor to start of line when editing command in Bash left arrow key moves a single character to left, Ctrl+T transposes two characters, up arrow moves up one item in history, Ctrl+E moves to end of the line.
Linux distributions have no version number but instead release upgrades in ongoing manner are said to have a(n) _______ release. A.rolling B.staggered C.informal D.systematic E.hap-hazard
A. Rolling release provided as needed for Linux distribution, with no specific release dates or version numbers
#!/bin/bash terminal terminal terminal You've written a simple shell script that does nothing but launch programs. To ensure that the script works with most user shells, the first line should be . A.#!/bin/sh B./bin/sh C.# /bin/sh D.bash E.#!bash
A. Shell script contain shebang line to indicate shell required to run the script. shebang line contains the #! characters, followed by the shell path. it uses only the pound symbol, which makes the line a comment. it doesn't specify the full path to the shell.
What is the purpose of the system account with a UID of 0? A.It's the system administration account. B.It's the account for the first ordinary user. C.Nothing; UID 0 is left intentionally undefined. D.It varies from one distribution to another. E.It's a low-privilege account that's used as a default by some servers.
A. UID 0 is reserved for the system administrator's account, also known as root First ordinary user account is not a system account, and its UID is normally 500 or 1000, depending on the distribution Association of UID 0 for administrative tasks is very basic in Linux, so you won't find variation on this score Since the root account is not low-privilege, option E is also incorrect.
Which of the following devices is not commonly attached via USB? A.Video monitors B.Keyboards C.External hard disks D.Printers E.Scanners
A. Video monitors normally connect to video card using standard video interface such as VGA or HDMI, not using serial USB interface Keyboards, external hard disks, printers, and scanners can all connect to the motherboard using a USB interface
You're using Bash, and you type emacs to launch the emacs editor. In this case, emacs is Bash's ____ process. A.child B.parent C.server D.client E.parallel
A. When launch application from Bash shell it becomes a child process of shell, parent process is process that launches new program, not the new program itself terms client and server are used in an environment where one program retrieves information from another, not in the process environment Parallel processes are programs launched from the same parent process. Since emacs is launched from Bash shell, it is not a parallel process
Which wildcard character matches any character or set of characters? A.* B.? C.[] D._E.-
A. asterisk (*) wildcard character matches none, one, or a set of characters in filename globbing question mark (?) matches only one character in filename globbing, not set of characters square brackets ([]) match only one character within a set of characters, not entire set of characters underscore (_) and dash (-) characters not valid wildcard characters used in filename globbing
Bash scripting command is used to control the program flow based on a variable that can take many values (such as all letters of alphabet). A.case B.while C.if D.echo E.exit
A. case command can compare a variable against multiple values and execute different blocks of code based on the matching value while command performs loops, it doesn't compare a variable against multiple values if command tests a variable against a single condition, not multiple values echo command displays text to the script user; it doesn't compare multiple values exit command stops the script and returns to the shell, it doesn't compare a variable against multiple values
Which following commands will print lines from file world.txt that contain matches to changes and changed? A.grep change[ds] world.txt B.tar change[d-s] world.txt C.find "change'd|s'" world.txt D.cat world.txt changes changed E.find change[^ds] world.txt
A. grep utility finds matching text within file and prints lines. It accepts regular expressions, place in brackets two characters that differ in the words for which you're looking. tar utility creates or manipulates archive files find utility locates files based on filenames, file sizes, and other surface features. cat utility displays or concatenates files
Which of following commands you type to rename newfile.txt to afile.txt? A.mv newfile.txt afile.txt B.cp newfile.txt afile.txt C.ln newfile.txt afile.txt D.rn newfile.txt afile.txt E.touch newfile.txt afile.txt
A. mv moves or renames a file cp copies file so that the original is still in place ln creates link between two files touch creates new empty file or adjusts time stamps on existing file,
Wildcard character matches any one symbol in a filename. A.? B._ (underscore) C.* D.. (period) E.- (dash)
A. question mark (?) wildcard character matches none, one, or a set of characters in a filename asterisk (*) matches zero, one, or multiple characters, not just a single character underscore, period, and dash aren't used as wildcard characters in matching filenames What directory primarily contains system configuration files? A./bin B./etc C./usr D./var E./sbin @@@ B. Most Linux apps store configuration files in /etc directory structure. Usually files are only accessible by root or by user account the application is started with.
What variable can you use to view exit status of script after it completes? A.$? B.$0 C.$1 D.$PATH E.$exit
A. special $? variable contains exit status of last statement in shell script, or result of the exit statement if shell script ends with that $0 variable contains name of shell script, not exit status $1 variable contains first parameter specified on command line when shell script is launched, not exit status $PATH environment variable specifies list of directories Linux search to find executable files, not exit status of shell script $exit variable is user variable define either locally in script or globally in shell, but it has no special meaning in shell scripts
You want to run the command cat /etc/shadow as root, but you're logged in as an ordinary user. Which of the following commands will do the job, assuming that the system is configured to give you super user access via the appropriate command? A.sudo cat /etc/shadow B.root cat /etc/shadow C.passwd cat /etc/shadow D.su cat /etc/shadow E.admin cat /etc/shadow
A. sudo command is the usual way to execute a single command as root, and option A gives the correct syntax to use it as the question specifies. There is no standard root command passwd command changes passwords Although you can use su to execute a single command as root, you must use it with the -c option to do this, as in su -c "cat /etc/shadow"
Linux text-mode login prompt reads . A.login: B.welcome: C.Enter: D.userid: E.Enter your userid:
A. text-mode login prompt is single text word prompts for user account ID to access Linux system. login term is used to prompt for user to enter his or her userid,
Which command would you use to find the mail server for a domain? A.dig B.netstat C.ping6 D.host E.ss
A. The dig command can display individual host records for a domain, which you can use to find the MX mail host for the domain, so option A is correct. The host command only displays host IP address information—it can't determine the server type from the DNS records—so option D is incorrect. The netstat and ss commands display active network connections but not the remote host types, so options B and E are both incorrect. The ping6 command sends IPv6 ICMP packets to test remote hosts but can't tell if the remote host is a mail server, so option C is incorrect.
Which command displays the duplex settings for an Ethernet card? A.ethtool B.netstat C.iwconfig D.iwlist E.route
A. The ethtool command displays features and parameters for network cards, so option A is the correct answer. The netstat command displays network statistics and connections, so option B is incorrect. The iwconfig and iwlist commands are used to set wireless network parameters not Ethernet card settings, so options C and D are incorrect. The route command sets or displays routing information and not Ethernet card settings, so option E is incorrect.
Describe the effect of the following command, assuming that it completes successfully: # groupadd henry A.It creates a new group called henry. B.It adds the user henry to the current default group. C.It imports group information from the file called henry. D.It changes the user's default group to henry. E.It adds the group henry to the user's list of groups.
A. The groupadd command creates a new group, as described in option A, so that option is correct. To add a user to a group, as suggested by option B, you would use the usermod utility. No standard command imports group information from a file, as option C suggests, so this option is incorrect. (Some network user management tools do provide such functionality, though.) To change a user's default group or list of supplemental groups, you would use usermod, so options D and E are both incorrect.
Which ifconfig format correctly assigns an IP address and netmask to the eth0 interface? A. ifconfig eth0 up 192.168.1.50 netmask 255.255.255.0 B. ifconfig eth0 255.255.255.0 192.168.1.50 C. ifconfig up 192.168.1.50 netmask 255.255.255.0 D. ifconfig up E. ifconfig down
A. The ifconfig command must specify the network interface, the IP address, then the netmask option before the netmask address. You can use the up or down option to place the network card in an active or inactive state by default, but it's not required. Option A is the only option that uses the correct values in the correct order. Option C is close but fails to specify the network interface. Option B is not in the correct format, and options D and E fail to list the necessary configuration settings.
What command displays all the available wireless networks in your area? A.iwlist B.iwconfig C.ifconfig D.ip E.arp
A. The iwlist command displays the available wireless network access points detected by the wireless network card, so option A is correct. The iwconfig command configures the network card to connect to a specific access point but doesn't list all of the detected access points, making option B incorrect. Option C specifies the ifconfig command, which is used to assign an IP address to a wireless network card, but doesn't list the access points. The ip command specified in option D likewise can be used to set the IP address of the card but doesn't list the access points. Option E, the arp command, maps hardware addresses to IP addresses so that you can find duplicate IP addresses on your network, but it doesn't list the wireless access points.
You want to set the sticky bit on an existing directory, subdir, without otherwise altering its permissions. To do so, you would type chmod subdir. A.o+t B.o+w C.a+t D.g+t E.a+w
A. To add a sticky bit to a directory you use the t character and add it to the owner permission set (o), so option A is correct. You add the sticky bit permissions to the owner, not the group, or all users, so options C and D are incorrect. The w character is used to assign write permissions, not the sticky bit, so options B and E are incorrect.
The character that represents the start of a line in a regular expression is . A.^ B.$ C.| D.( E."
A. When not used inside brackets within a regular expression, caret (^) represents start of a text line. For example, ^172 matches 172 only if it is first in a line of characters.
Two currently popular X software packages in Linux are _______ and ______(Select two). A.xFree86 B.X.org C.Wayland D.GNOME E.KDE Plasma
B and C. X.org and Wayland X software package are currently used in Linux distributions xFree86 package was the original X software package for Linux, but is no longer in use GNOME and KDE Plasma packages are graphical desktop management packages and not X software packages
Which of the following are Linux desktop environments? Choose all. A.GTK+ B.GNOME C.KDE Plasma D.Evolution E.Xfce
B, C, E. GNOME, KDE Plasma, Xfce are all Linux desktop environments LXDE is also a desktop environment. GIMP Toolkit (GTK+) is GUI programming library. Although GNOME and Xfce are both built atop GTK+, not desktop environment Evolution is Linux email client
What graphical interfaces does Linux support? Choose all. A.macOS B.GNOME C.KDE Plasma D.Metro E.Cinnamon
B, C, E. Linux supports GNOME, KDE Plasma, Cinnamon graphical interfaces. Linux not support proprietary macOS or Metro env.
What commands you use to see if MySQL database server is currently running on your system? Choose all A.ls B.ps C.top D.free E.yum
B, C. Programs running on Linux system are called processes. ps allows to display snapshot of running processes, top produces real-time display of running processes ls displays files and directories, not running processes free displays memory usage yum is package management tool used for installing and removing software packages
Which commands can you use to change group a file is assigned to? Choose all. A.chmod B.chgrp C.chageD.chown E.groupadd
B, D. use either chgrp or chown command to assign new primary group to a file or directory chmod assigns permissions to a file, not group chage changes password options for user account, not group of a file groupadd adds new group to system and not change group assigned to a file
Which keystrokes invoke nano search function? Choose all A.F3 B.F6 C.Esc-S D.Ctrl+F E.Ctrl+W
B, E. F6 and Ctrl+W keystrokes both invoke search function, F3 key writes the current buffer to disk Esc+S keystroke is obscure one; it enables or disables smooth scrolling Ctrl+F moves forward one character
ASCII supports unique characters (not including control characters). A.64 B. 128 C. 512 D. 1024 E. 2048
B. ASCII is a 7-bit code, meaning that it supports a maximum of 128 characters. In practice, ASCII uses 8 bits, so an extra 128 characters are available, which encode various control characters.
Which of following is notable difference bw Linux and macOS? A.Linux can run common GNU programs, whereas macOS cannot. B.Linux's GUI is based on X Window System, whereas macOS is not. C.Linux cannot run on Apple Macintosh hardware, whereas macOS can run only on Apple hardware. D.Linux relies heavily on BSD software, whereas macOS uses no BSD software. E.Linux supports text-mode commands, whereas macOS is a GUI-only OS.
B. Linux's GUI based on X Window System. Although macOS provides X implementation, its primary GUI is Apple's proprietary product. Both Linux and macOS can run most GNU programs. Linux can run on both Apple Macintosh and Microsoft-compatible hardware. macOS includes many BSD utilities. Although most Linux distributions use GNU utilities, you can use BSD utilities in Linux if prefer. Both Linux and macOS support text-mode commands, although in macOS use GUI Terminal application.
If you want to enable one Linux computer to access files stored on another Linux computer's hard disk, which of the following network protocols is the best choice? A.SMTP B.NFS C.PHP D.DNSE.DHCP
B. Network File System (NFS) was designed for exactly task described in the question, Simple Mail Transfer Protocol (SMTP) enables one computer to send email messages to another computer, so it's poor choice for achieving stated goal PHP: Hypertext Processor (PHP) language is used to generate dynamic content for web pages Domain Name System (DNS) is protocol for delivering mappings bw hostnames and IP addresses to computers, so it not achieve stated goals Dynamic Host Configuration Protocol (DHCP) enables one computer to provide network configuration info to another one over a network link
A program written in a(n)/the _________ programming language is completely converted to binary form before being run. A.Python B.compiled C.Javascript D.interpreted E.Perl
B. Programmers must convert program written in compiled language from its original source code form into machine code form. Machine code is run later. Programs written in interpreted languages (such as Python, Javascript, Perl) converted on a line-by-line basis to machine code at time they're run, by a program interpreter.
Which is true of Linux distributions as a whole? A.They're covered by the GPL or the BSD license, depending on the distribution. B.Sometimes they may not be copied because of the non- open source software they may contain. C.They may be copied only after software using the MIT license is removed. D.They all completely conform to the principles of the open source movement. E.They all qualify as free software as the FSF uses the term.
B. Some distributions (particularly "Enterprise" versions sold for money) include SW that is neither open source nor even freely redistributable Distributions as a whole use many licenses, not just one, MIT license is one of several open source licenses; such software is not an impediment to copying a distribution Although some distro, such as Debian, aim to make main systems fully open source compliant, not all do this Likewise, not all distributions composed completely of free software as FSF uses the term.
To learn who is currently logged into the computer and what programs they're currently running, you can type . A.who B.w C.whoami D.who -q E.id
B. While the who and the who -q commands will display who is currently logged into the computer, only the w command will also display what programs they are currently running.
The command can extract specified data fields from a file's records. A.grep B.cut C.sort D.find E.cat
B. cut command can help; it extracts text from specified fields in a file record and displays them. However, no modifications are made to the file.
A computer likely to run word processor and web browser.A.server B.desktop C.distributed D.client E.laptop
B. desktop Linux system usually utilizes graphical desktop interface env for running graphical programs such as word processors and web browsers Server computers typically not utilize graphical desktops Distributed computers typically servers, not utilize graphical desktops, Client computer may use graphical desktop, but not required, Laptop computer may also utilize graphical desktop, but be used as a text-only server
Linux uses a(n) __________ kernel design, as contrasted with microkernel design. A.exo B.monolithic C.hybrid D.distributed E.unified
B. monolithic kernel design incorporates all of kernel functions into single program, microkernel design splits kernel functions into separate smaller programs. exokernel design provide minimal HW support in kernel, relying on external programs for everything else hybrid kernel similar to microkernels, but rely on some external programs to operate terms distributed and unified not used to describe kernel types
Most Linux distributions maintain information on what packages are installed in the _________. A.kernel B.package database C.graphical desktop D./usr/lib directory E.Software updater
B. package database maintains a listing of all software packages installed by package manager program kernel interfaces with the system hardware, it doesn't manage installed software packages graphical desktop creates graphical environment to interact with Linux system, not maintain software packages /usr/lib directory contains library files used by programs, not manage software packages Software updater program is part of software management system, not maintain information on installed packages
First line of a shell script is #!/bin/bash. What does that mean? A.The script won't run on most Linux systems. B.The script requires the Bash shell to run. C.The script requires the C shell to run. D.The script will run on Unix systems. E.The script can be run without specifying the full pathname to the script file.
B. shebang command specifies shell that Linux system use to process the script. /bin/bash path indicates to use Bash shell Bash shell is default shell on most Linux, so this script run on most Linux systems. C shell is specified using either /bin/csh or /bin/tcsh, depending on which C shell Linux uses Most Unix systems not support Bash shell shebang specifies path to shell, not to script file
x86 CPU uses a _____ -bit architecture. A.8 B.32 C.64 D. 128 E. 256
B. x86 hardware architecture refers to 32-bit microprocessor register, 8-bit microprocessor was used in the early 8080 microprocessor chip, which doesn't support Linux 64- bit microprocessor is commonly referred to as amd64 in Linux, since AMD was first to come out with one, Currently Linux not support 128 or 256-bit microprocessors
You want to change the username of a user from carol to marvel without altering anything else about the account. To do so, you would type . A.useradd -l marvel carol B.usermod -l marvel carol C.useradd -l carol marvel D.usermod -l carol marvel E.useradd --login carol marvel
B. In order to modify a user account with the username of carol to a username of marvel, you must issue the usermod -l marvel carol command using super user privileges.
The option causes chown to change ownership on an entire directory tree. A.-L B.-R C.-H D.-P E.-f
B. The -R (or --recursive) option allows Linux to recursively change the ownership of a directory and all files and directories under it, so option B is correct. The -L option tells Linux to follow any symbolic links encountered in the directory, not recursively change the entire directory tree, so option A is incorrect. The -H option tells Linux to follow the symbolic link if it's listed as the command-line argument, not recursively change ownership in the entire directory; so option C is incorrect. The - P option tells Linux to not follow any symbolic links in the directory, not recursively change ownership in the directory tree, so option D is incorrect. The -f option tells Linux to suppress any error messages, not recursively change ownership on an entire directory tree, so option E is incorrect.
What is used to automatically assign an IP address to a client? A.Default router B.DHCP C.ARP table D.Netmask E.ifconfig
B. The Dynamic Host Configuration Protocol (DHCP) is used to assign dynamic IP addresses to client workstations on a network, so option B is correct. The default router can't assign addresses to devices, so option B is incorrect. The ARP table maps the hardware address of the network card to IP addresses but doesn't assign the IP addresses, so option C is incorrect. The netmask value determines the network address but not the IP address of the host, so option D is incorrect. The ifconfig command can set the static IP address of the host but doesn't automatically assign the IP address, so option E is incorrect.
Of the following, which is the best password? A.LinusTorvalds B. uB2op%4q++7K9_z5A++ C. 123456 D. password E. peanutbuttersandwich
B. The password in option B uses a combination of upper- and lowercase letters, numbers, and symbols, and it doesn't contain any obvious word. Furthermore, it's a long password. All of these characteristics make it unlikely to appear in an intruder's password dictionary and make it hard to guess. Thus, option B represents a good password, and the best of those shown. Option A is the name of a well-known celebrity (at least in the Linux world!); such a name is likely to appear in password- cracking dictionaries, and so makes a poor password choice. Option C is an extremely common password, which makes it a bad choice. Furthermore, it's short and it consists of just one symbol type (digits). Option D is another popular (and therefore very poor) password. It's a single common word in all lowercase and it contains no numbers or other nonalphabetic symbols. Although option E is fairly long, it consists entirely of lowercase letters, and its three related words, making it a poor password too.
How can you run a program in background when launching it from a shell? Choose all A.Launch program by typing start command, where command is command that you want to run. B.Launch the program by typing bg command, where command is command that you want to run. C.Append ampersand (&) to the end of command line. D.Launch program normally, press Ctrl+Z in the shell, and then type bg in the shell. E.Launch program normally, press Ctrl+Z in the shell, and then type fg in the shell.
C, D. Neither start nor bg is command that launches a program in the background. fg command returns program to foreground, meaning shell will go back to sleep, which isn't what question specified.
Typing ls -ld wonderjaye reveals a symbolic file mode of drwxr- xr-x. Which of the following are true? (Choose all that apply.) A.wonderjaye is a symbolic link. B.wonderjaye is an executable program. C.wonderjaye is a directory. D.wonderjaye may be read by all users of the system. E.wonderjaye may be written by any member of the file's group.
C, D. The d at the start of the symbolic file mode indicates that wonderjaye is a directory. The first set of permissions (rwx) indicate the directory owner has read, write, and execute permissions on the directory. The second and third sets of permissions (r-x and r-x) indicate that the directory's primary group and all others have read and execute permissions on the directory. Thus, options C and D are correct. A leading l character would indicate the file is a symbolic link, so option A is incorrect. A leading dash would indicate the object is a file, but since the leading character is a d option B is incorrect. For members of the group to have write permissions to the directory, the second set of permissions must include the w character, which it doesn't, so option E is incorrect.
1.Which two commands set the IP address, subnet mask, and default router information on an interface using the command line? (Choose two.) A.netstat B.ping C.nmtui D.ip E.route
C, D. The nmtui command provides an interactive text menu for selecting a network interface and setting the network parameters, and the ip command provides a command-line tool for setting network parameters, so both options C and D are correct. The netstat command displays information about network connections but doesn't set the network parameters, so option A is incorrect. The ping command can send ICMP packets to a remote host but doesn't set the local network parameters, so option B is incorrect. The route command sets the routing network parameters but not the IP address or subnet mask, so option E is incorrect.
Which of the following is a characteristic of all open source software? A.The software cannot be sold for profit; it must be distributed free of charge. B.It must be distributed with both the source code and binaries. C.Users are permitted to redistribute altered versions of the original software. D.The software was originally written at a college or university. E.The software must be written in an interpreted language that requires no compilation.
C. Open source definition includes 10 points users may modify original code and redistribute altered version. All open software is available at no charge, nothing in open source definition forbids selling it, and in practice, many orgs do sell open source software Open source definition requires distribution of source code but not require distribution of binaries Many open source projects began life in academic environment, not requirement for open source software Open source definition not specify that either interpreted or a compile language be used
When create new account with useradd utility, if not set password with option account will be locked. What command use with super user privileges to unlock it? A.usermod -u username B.password username C.passwd username D.useradd -p password username E.unlock username
C. passwd username allow you to set a password for passwd username account, effectively unlocking it. usermod -u modifies account's UID but not unlock it, password command not exist and is therefore incorrect. useradd -p password username create account (not recommended for security), then account not be locked. you cannot reissue useradd command for preexisting account There is no standard command called unlock
Complete the following command to redirect both standard output and standard error from the bigprog program to the file out.txt. $ bigprog ______ out.txt A.| B.2> C.&> D.> E.>>
C. &> symbol combination redirects both standard output and standard error from command or program, and into a designated file (or location).
General system messages are likely to be found in /var/log/messages or /var/log/, depending on your distribution. A.secure B.dmesg C.syslog D.mail E.wtmp
C. /var/log/secure file is common location for some Linux distro to place general system messages secure file is commonly used to track user login information, not general system messages dmesg program displays messages logged into kernel ring buffer by kernel; it's not a file that contains general system messages mail file commonly contains messages from email program on system, not general system messages wtmp file contains login and logout messages from system, not general system messages
Pre-release software that's likely to contain bugs is known as _____ and ____. A.First and second B.Primary and secondary C.Alpha and beta D.Development and production E.Development and test
C. Alpha software release is first test version of application or distribution, not fully tested in all environments and most likely contains bugs. Beta software release tested in some environments but not all, it may contain bugs for your particular environments.
You want to copy a directory, MyFiles, to a USB flash drive uses FAT filesystem. Contents of MyFiles are as follows: $ ls MyFiles/ contract.odt outline.pdf Outline.PDF USB flash drive is mounted at /media/usb, and so you type cp -a MyFiles/ /media/usb. What problem will occur when you attempt to copy these files? A.The command will fail because it tries to create links. B.The MyFiles directory will be copied, but none of its files will be copied. C.One file will be missing on the USB flash drive. D.One file's name will be changed during the copy. E.Everything will be fine; the command will work correctly.
C. Because two files (outline.pdf and Outline.pdf) have names that differ only in case, FAT is a case-insensitive filesystem, one of those files will be missing on the copy. Both files will be copied, but second one copied will overwrite first. Specified cp not create links Because specified cp included -a option, which performs a recursive copy, all of the files in MyFiles will be copied, along with the directory itself In order to copy all of files, you will have to change one file's name manually; however, cp won't do this auto
A environment means that a person cannot deny actions, and the sudo command helps establish this environment. A.secure B.standard C.nonrepudiation D.repudiation E.locked-down
C. Company policy that demands the sudo command is used to acquire root privileges sets a desirable nonrepudiation environment in which actions cannot be legally denied.
What is purpose of conditional expressions in shell scripts? A.They prevent scripts from executing if license conditions aren't met. B.They display information about the script's computer environment. C.They enable the script to take different actions in response to variable data. D.They enable scripts to learn in a manner reminiscent of Pavlovian conditioning. E.They cause scripts to run only at specified times of day.
C. Conditional expressions return a true or false response, enabling script to execute one set of instructions or another or to continue or terminate a loop Conditional expressions have nothing to do with licensing conditions they have anything to do with displaying environment information Conditional expressions also don't implement Pavlovian conditioning by themselves (you can create a script to implement that, but the conditional expressions by themselves don't), conditional expressions also don't cause the script to run only at a specified time of day—you need to use the at or cron facility on the Linux system to do
Each document in info page is known as a . A.pager B.site C.node D.link E.level
C. Each info page document is known as node, info page system as a whole is an interrelated set of nodes. nodes are organized on levels.
Thunderbird is a(n) _________ program. (Specify general category of software.) A.web browser B.file manager C.email client D.office tool E.multimedia application
C. Email client programs enable to read and write email messages, and can either access mailbox on your own computer or, using email network protocols, send and receive email over a network. Thunderbird is one common Linux email client. Others include Evolution, KMail, and Mutt.
Which of following typically holds user account passwords on modern Linux distribution?A./etc/passwd B./bin/bash C./etc/shadow D./etc/group E./sbin/nologin
C. On modern Linux distro, /etc/shadow file typically holds user account passwords many years ago /etc/passwd file held user account passwords, it not due to file permissions /bin/bash is shell program, not account file, and is typically default shell assigned to regular user accounts. /etc/group file contains group info as well as which user accounts belong to various groups /sbin/nologin is program (not account file) helps to prevent system accounts from logging into system.
In order for software to be certified as open source, which of the following is not required? A.The license must not discriminate against people or groups of people. B.The license must not require that the software be distributed as part of a specific product. C.The license must require that changes be distributed under the same license. D.The program must come with source code, or the author must make it readily available on the Internet. E.The license must automatically apply to anybody who acquires the software.
C. Open source definition specifies users be able to distribute changes, Not specify that license require distribution under the terms of the same license.
FSF's general principles are summarized by term __________ , which refers to using copyright laws for purposes that are in some ways contrary to copyright's original intent. A.patentB.copyright C.copyleft D.free E.tradmark
C. Term copyleft came about via play on word copyright, reflecting fact copyright provisions used to ensure freedoms that are, in some respects, exact opposite of what copyright was created to do, to guarantee freedom of users to copy software, rather than to restrict that right. Copyleft is typically used to reflect FSF philosophy and licenses it inspires.
To save a file and exit the vi text editor in command mode, type _______ . A.~ B.? C.ZZ D.cw E./
C. While you are in command mode, ZZ key combination will save any file modifications and then leave vi editor.
Describe effect of the following short script, cp1, if it's called as cp1 big.c big.cc: #!/bin/bash cp $2 $1 A.It has the same effect as the cp command—copying contents of big.c to big.cc. B.It compiles the C program big.c and calls the result big.cc. C.It copies the contents of big.cc to big.c, eliminating the old big.c. D.It converts the C program big.c into a C++ program called big.cc. E.The script's first line is invalid, so it won't work.
C. cp command is only one called in script, and that command copies files. Because script passes arguments ($1 and $2) to cp command in reverse order, their effect is reversed; whereas cp copies its first argument to the second name, cp1 script copies the second argument to first name. cp command has nothing to do with compiling C or C++ programs, first line in script is a valid shebang line, indicating the shell to use to run the script, so option E is incorrect.
What command-line command displays overall memory usage on Linux system? A.ps B.topC.free D.ls E.yum
C. free program displays current memory usage on Linux, including memory in-use, free memory, swap space ps and top display info about processes running on system, display info about process memory usage but not overall memory usage on Linux ls displays file and directory info yum is package management tool allows to install and remove software packages
In which of the following languages was most of the Linux kernel written? A.Bash shell script B.Java C.C D.C++ E.Perl
C. main language for Linux kernel is C Bash shell scripts control much of Linux startup process, these scripts are not part of kernel Java often used for web-based applications, not used in Linux kernel C++ is derivative of C adds object-oriented features to the language, but Linux kernel uses regular C, not C++, Perl popular interpreted language, for tasks involve processing text, but not language of Linux kernel,
What tool allows you to send ICMP messages to a remote host to test network connectivity? A.netstat B.ifconfig C.ping D.iwconfig E.ss
C. ping sends ICMP packets to specified remote host and waits for a response netstat displays statistics about the network interface ifconfig displays or sets network information but not send ICMP packets iwconfig displays or sets wireless network information but not handle ICMP packets ss displays info about open connections and ports on system
The three-character symbolic string represents read and execute permission but no write permission. A.-wx B.--x C.r-x D.rw- E.rwx
C. Symbolic permissions are indicated by the three-character string rwx. If a permission is not present, the character is replaced by a dash, so to remove write permissions you would use the character set r-x, making option C correct. The -wx symbol indicates write and execute permissions, so option A is incorrect. The --x symbol indicates no read and write permissions, only execute permissions, so option B is incorrect. The rw- symbol indicates read and write permissions but no execute permission, making option D incorrect. The rwx symbol indicates read, write, and execute permissions, so option E is incorrect.
Information on various groups, such as group name, GID, and group members, is stored in the file. A./etc/passwd B./etc/shadow C./etc/group D./etc/groups E./etc/GID
C. The /etc/group file contains group data such as the group's name, associated GID, and a list of group members.
remove the nemo account and its home directory? A.userdel nemo B.userdel -f nemo C.userdel -r nemo D.rm /home/nemo E.rm -r /home/nemo
C. The userdel command deletes an account, and the -r switch to userdel causes it to delete the user's home directory and mail spool, thus satisfying the terms of the question. Option A deletes the account but leaves the user's home directory intact. Option B does the same; the -f option forces account deletion and file removal under some circumstances, but it's only meaningful when -r is also used. Option D's command will probably have no effect, since rm works on directories only in conjunction with -r, and /home/nemo is probably the user's home directory. Option E's rm command deletes the user's home directory (assuming it's located in the conventional place, given the username) but doesn't delete the user's account.
Which is current version of original ext filesystem? A.extfs B.ext2fs C.ext3fs D.ext4fs E.btrfs
D. ext filesystem is currently at version 4, which is called ext4fs, so option D is correct. original extfs filesystem is no longer supported ext2fs and ext3fs filesystems are still supported and can be used if needed, but not recommended btrfs filesystem is not part of extfs family but instead new type of filesystem
Which of the following commands provides the most information about your motherboard's features? A.lscpu B.Xorg -configure C.fdisk -l /dev/sda D.lspci E.http://localhost:631
D. lspci displays info about PCI devices. Since many motherboard features appear to Linux as PCI devices, lscpu provides information about CPU but nothing else on motherboard Xorg program provides information about the display environment but not the motherboard fdisk command displays information about hard drive on system but not motherboard Connecting to web address localhost:631 connects to CUPS admin web page, helps manage printers on Linux
You've received tar archive called data79.tar from colleague, but want to check names of files it contains before extracting them. Which following commands would you use to do this? A.tar uvf data79.tar B.tar cvf data79.tar C.tar xvf data79.tar D.tar tvf data79.tar E.tar Avf data79.tar
D. --list (t) used to read archive and display its contents. --verbose (v) creates verbose file listing --file (f) specifies filename
You've typed rmdir junk to delete the junk directory, but this command has failed because junk contains word processing files. A command that will work is . A.rmdir -r junk B.rmdir -P junk C.rmdir -v junk D.rm -r junk E.rm -f junk
D. -r, -R, and --recursive of the rm will recursively remove files from directories rmdir only remove directories, it can't remove files inside the directories -f of the only ignores nonexistent files and doesn't prompt before removing the files, it doesn't recursively remove files from directories
You want to copy file (origfile.txt) to backups directory, but if file called origfile.txt exists in backups directory, you want to go ahead with copy only if file in source location is newer than one in backups. command to do this is cp origfile.txt backups/. A.-f B.-r C.-s D.-u E.-v
D. -u and --update options of cp tell Linux to update existing file with specified file, -f forces a copy if destination cannot be opened, but doesn't check the file dates -r copies directories recursively, it doesn't check file dates -s creates symbolic link instead of copying files -v displays more verbose output, it doesn't check the file dates
The file that associates usernames with UID numbers in Linux is ______ . A./etc/shadow B./etc/group C./etc/UID D./etc/passwd E./etc/usernames
D. /etc/passwd file contains not only user account information such as the username, primary group ID, and default shell, but it also contains the UID associated with each username.
Type logout or to end a text-mode terminal session. A.endB.bye C.whoami D.exit E.man
D. Both logout and exit commands will end a text-mode terminal session.
Which following programs is most likely to be installed and regularly used on desktop computer runs Linux? A.Apache B.Postfix C.Android D.Evolution E.BIND
D. Evolution is email reader program. Such programs commonly used in desktop environments Apache is web server, Postfix is email server, BIND is Domain Name System (DNS) server, all unlikely to be run in desktop computer environment, Android is name of Linux distribution for smartphones and tablets, not a program
The standard is a modern digital video interface that's commonly used on computer monitors. A.VGA B.LED C.SVGA D.HDMI E.SDI
D. HDMI standard is modern standard for sending digital video signals to monitors VGA, SVGA, SDI standards are old standards for sending analog signals to monitors, LED standard defines how images are displayed on a monitor, not the video interface
A license created by the FSF and often used for libraries is the _______ . A.BSD B.Apache C.GPL D.LGPL E.MIT
D. Lesser GPL (LGPL) is variant of Free Software Foundation's GPL. Developers often use LGPL with libraries (collections of code be used by other programs).
For which type of file is nano least likely to be useful for examining or editing? A.A text file encoded in Unicode B.A shell script file C.A text file encoded in ASCII D.A LibreOffice word processing document E.A Linux configuration file
D. LibreOffice, like most word processors, uses binary format not be properly parsed using ASCII or Unicode text editor. nano won't be useful in examining such a document nano text editor can handle ASCII or Unicode format
What type of files are typically stored in the /usr folder? A.User data files B.Configuration files C.Critical system files D.Noncritical system program and data files E.Program library files
D. Linux installs noncritical apps, such as word processors and browsers, in /usr directory User data files are normally stored in each user's home directory, located in /home directory structure Most Linux apps store their configuration files in /etc directory Linux installs critical apps in either /bin directory for user utilities or /sbin directory for administrator programs, so option C is incorrect. In Linux, program library files are stored within /lib directory structure.
Common security problem with Windows that's essentially nonexistent on Linux is . A.Commercial software B.Network firewalls C.Network routers D.Viruses E.Software management packages
D. Most attackers who write viruses focus energy on Windows platform they can find most victims, so there are very few viruses targeted toward Linux. Commercial software purchased from reputable vendors not normally considered security risk Linux systems installed on networks still utilize network routers and FW to protect from outside attacks Software management packages such as Microsoft Store considered security feature and not problem
A(n) account is one that most common users have as their account type. A.home B.system C.administrative D.standard E.root
D. Most common users have account type of standard, There is no account type of home system account is one that is used by daemons, but not common users administrative account not for common users, nor is root account, because they use super user privileges to perform duties such as installing software or changing other accounts' passwords
A type of software that's distributed for free but that requires payment on the honor system if a person uses it is called _________ . A.open source B.commercial C.freeware D.shareware E.virus
D. Shareware allows program author to release binary executable program to public without payment but ask for payment if program is used. Open source software not require payment Commercial software requires up-front payment Freeware not require any payments at all Viruses not typically distributed as software packages
You can install and manage various Linux software applications via a(n) _______ management system. A.office B.file C.email D.package E.program
D. Software programs are bundled into a prebuilt package on Linux, which simplifies their installation and management. Packages are then managed on Linux using a package management system (PMS).
While in vi's command mode, you can type to undo a change. A.~ B.:wq C.ZZ D.u E./
D. Typing u in the vi editor's command mode will undo the last change you made to the text, which is handy.
Bash scripting command is used to display prompts for a user in a shell script. A.case B.while C.if D.echo E.exit
D. echo command used to display text to the shell user, case command compares a value to multiple answers, not display text, while command performs a loop on a block of code, and doesn't display text if command tests a condition and if true, executes a block of code, it doesn't display text, exit command stops the running script and returns to the shell, passing a numeric exit value, not a text value to display
Which of following commands is improved version of more? A.grep B.html C.cat D.less E.man
D. less program, like more, displays text file page at a time. less utility also includes ability to page backward in text file, search its contents, do other things that more nnot do. grep searches file for specified string, so not do task similar to more HTML is file format, often indicated with filename extension .html, commonly used on web. As such, it's not better version of more, cat command can concatenate two or more files, or display single file on screen. In former capacity, cat not do task of more, and in latter capacity, cat is less capable than more. man command displays Linux manual pages. Although man uses less by default, man not itself improved version of more,
What command would you type (as root) to change the ownership of somefile.txt from ralph to tony? A.chown ralph:tony somefile.txt B.chmod somefile.txt tony C.chown somefile.txt tony D.chown tony somefile.txt E.chmod tony somefile.txt
D. The chown command changes the owner assigned to a file. You list the new file owner first, then the filename, making option D correct. You can't change file ownership using the chmod command, making options B and E incorrect. The new file owner must be listed first by itself, making options A and C incorrect.
You want to create an account for a new user, using the username thor and giving the user a UID of 2019. The command to do this is useradd . A.-uid 2019 thor B.-g 2019 thor C. +uid 2019 thor D. -u 2019 thor E. 2019 -u thor
D. The useradd command with -u 2019 thor will create a new user account, with the username thor and give it a UID of 2019.
Where did Linux kernel come from? A.It was derived from Microsoft Windows. B.It was derived from Apple macOS. C.It was derived from AT&T Unix. D.It was derived from BSD Unix. E.It was created by Linus Torvalds.
E. Linux OS created by Linus Torvalds. Although based on current Linux OSs, it not derived from any of them Linux OS not derived from either macOS or Windows
Which following redirection operators appends program's standard output to existing file without overwriting that file's original contents? A.| B.2> C.&> D.> E.>>
E. >> operator appends standard output to file, vertical bar (|) is pipe character; it ties one program's standard output to another's standard input 2> operator redirects standard error, not standard output, and it overwrites the target file. &> operator redirects both standard output and standard error, and it overwrites target file > operator redirects standard output, but it overwrites the target file
What command would you use to make file myfile.txt a hidden file? A.chmod 755 myfile.txt B.mv myfile.txt ~myfile.txt C.cp myfile.txt ./myfile.txt D.mv .myfile.txt myfile.txt E.mv myfile.txt .myfile.txt
E. Linux uses leading period in filenames to indicate hidden files. To change name of file, use mv chmod and cp not change name of file mv lists original filename first and new filename second Since Linux uses a period to indicate hidden files
The gzip, bzip2, and xz programs all perform _______ compression, in which compressed data will exactly match the original data, when uncompressed. A.zip B.tar C.high D.lossy E.lossless
E. Lossless compression is just like it sounds—no data is lost, compressed data will exactly match the original uncompressed data, after a decompression process.
A Linux server handles SMB/CIFS protocol normally runs software. A.ProFTPD B.telnetd C.named D.Dovecot E.Samba
E. Microsoft uses SMB/CIFS protocol for file and printer sharing. On Linux, Samba software implements this protocol.
Which of the following is a key part of the FSF's philosophy? A.Developers should use the latest version of the FSF's GPL. B.Users should have the right to modify free software and distribute it under a commercial license. C.Developers should write software only for free operating systems such as GNU/Linux. D.Users should engage in civil disobedience by copying proprietary software. E.Users must have the right to use software as they see fit.
E. Paraphrases one of four key points in the FSF's philosophy FSF's philosophy not mandate use of the GPL, much less its most recent version, although GPL is FSF's preferred license. free software should remain free; FSF advocates free software and free OSs FSF wants to see world dominated by free software, not advocate software piracy
UIDs above 0 and below 500 or 1,000 (depending on the distribution) are reserved for use by account(s). A.administrator B.standard user C.unprivileged D.root E.system
E. System accounts have UIDs above 0, but below 500 or even 1,000, depending on the distribution's configuration. The root account typically has a UID of 0.
Which following tools is best suited to installing software package and all its dependencies on a Debian computer? A.yum B.zypper C.dmesg D.rpm E.apt-get
E. apt-get used to install software packages on Debian-based Linux yum and rpm package management commands but used on Red Hat-based Linux zypper is package management application but used on openSUSE Linux dmesg used to view contents of kernel ring buffer
Users can motivate programmers to work on open source projects by offering a(n) to whomever completes project first. A.donation B.salary C.present D.kudos E.bounty
E. bounty is crowdfunding method help bring together users, each of whom individually not be able to offer enough money to motivate development, to entice programmers to write desired code. With bounties, programmer who completes project first allowed to collect the project's accumulated funds.
The command use to read messages generated during boot process and stored in kernel ring buffer is command. A.ls B.pwd C.chmod D.cat E.dmesg
E. dmesg command displays messages stored in kernel ring buffer, ls command displays directory listings, not kernel messages pwd command displays the current working directory, not kernel messages chmod command changes file and directory permissions, it doesn't display kernel messages cat command displays text files, but since the kernel ring buffer is not a text file you cannot use cat to display it
Bash scripting command controls the return value generated by a script, independent of the other commands used in the script. A.case B.while C.if D.echo E.exit
E. exit command stops the script and returns a specified value back to the shell case command compares a variable against multiple values, it doesn't control the script return value while command performs a loop on a code block, but doesn't control the script return value if statement allows you to test a variable against a value, but not control the script return value echo statement displays text for the script user, but doesn't control the script return value
Which tar option used to compress archive into a tarball using xz compression? A.-X B.-j C.-z D.-v E.-J
E. tar option to compress archive into a tarball using xz compression is -J -X option has name of a file passed to it as argument. That file contains filenames to be excluded from archive -j option is for using bzip2 compression -z option is for using gzip compression -v option instructs the tar command to produce verbose output (show what files archived)
To create a system group, you must pass the option to groupadd. A.-system B.-s C.--sys D.--r E.-r
E. The -r option used with the groupadd command will allow you to create a system group (as long as you have super user privileges).
What device setting defines a host that maps a host name to an IP address? A.Default router B.Netmask C.Host name D.IP address E.DNS server
E. The DNS server maps the host name to an IP address, so you must have a DNS server defined in your network configuration to be able to use host names in your applications. Thus, option E is correct. The default router only defines how to send packets to remote hosts—it doesn't map the host name to the IP address— so option A is incorrect. The netmask value defines the local network, not how to map host names to IP addresses, so option B is incorrect. The host name and IP address define features of the local host, so options C and D are incorrect.
The chmod symbolic representation allows all users execute access to a file without affecting other permissions. A.u+x B.u-x C.g+x D.a-x E.a+x
E. The chmod command uses the character a to represent permissions assigned to all users. To add a permission, you use the plus sign (+), and to represent execute permissions you use the x character. Thus, option E is correct. The u+x symbol assigns execute permissions to only the user, not all users, so option A is incorrect. The u-x symbol removes execute permissions from the user and doesn't change the permissions for everyone else, so option B is incorrect. The g+x symbol adds execute permissions to the group but not for all users, so option C is incorrect. The a-x symbol removes execute permission for all users—it does not add it—so option D is incorrect.
Which of the following commands can you use to change a file's group? A.groupadd B.groupmod C.chmod D.ls E.chown
E. The chown command allows you to change both the file's owner and group, so option E is correct. The groupadd command allows you to add a new group to the system, not change the group assigned to a file, so option A is incorrect. The groupmod command allows you to modify details of a group definition, not change the group assigned to a file, so option B is incorrect. The chmod command allows you to change the permissions assigned to a file, not the file's primary group, so option C is incorrect. The ls command allows you to display the file owner, group, and permissions using the -l option, but it doesn't allow you to change the file's group, so option D is incorrect.
What command can you use to both display and set the IP address, netmask, and default router values? A.ifconfig B.iwconfig C.router D.ifup E.ip
E. The ip command allows you to both display and set the IP address, netmask, and default router values for a network interface, so option E is correct. The ifconfig command can set the IP address and netmask values, but not the default router. The iwconfig command is used to set the wireless access point settings, and the router command is used to set the default router but not the IP address or netmask values. The ifup command only activates the network interface—it can't set the address values.
Which command displays what processes are using which ports on a Linux systems? A.iwconfig B.ip C.ping D.nmtui E.ss
E. The ss command displays a list of the open ports on a Linux system, along with the processes associated with each port, so option E is correct. The iwconfig command sets wireless network information, not open ports, so option A is incorrect. The ip command displays or sets network information on a network interface but doesn't display open ports, so option B is incorrect. The ping command sends ICMP messages to a remote host but doesn't display any open ports, so option C is incorrect. The nmtui command allows you to configure network parameters for a network interface but doesn't display the open ports on the system, so option D is incorrect.
True or false: User types myscript laser.txt to run a script called myscript. Within myscript, the $0 variable holds the value laser.txt.
False. $0 variable contains the name of the script, which would be myscript in this example. first parameter (laser.txt) would be held in the $1 positional variable.
True or false: Info pages are a web-based documentation format.
False. Although info pages, like web pages, use hyperlinks to tie related documents together, two systems use different formats and protocols. Info pages also reside on computer's hard disk; they require no Internet access to read. For these reasons, info pages are not web-based.
True or false: Free Software Foundation (FSF) advocates free software, which means they believe you should not have to pay money for software.
False. FSF does advocate free software, but it defines it in terms of freedom to do things you want to do with software, not the price of the software.
True or false: Because their hardware designs are proprietary, hardware vendors cannot release open source drivers for their products.
False. Hardware vendors often do release open source drivers for their products. One caveat is that release of open source drivers necessarily renders some programming interfaces for HW open, which some hardware vendors are reluctant to do.
True or false: Linux documentation in /usr/share/doc directory tree is almost always in OpenDocument text format.
False. Individual program authors decide on documentation file format based on own specific needs and preferences. Although some documents are in OpenDocument text format, many documents not.
True or false: OpenOffice.org forked from Calligra.
False. LibreOffice forked from pre-Apache version of OpenOffice.org. Calligra split from the KOffice office suite, which is no longer maintained.
True or false: You can easily damage your Linux installation by mistyping rm when log into your regular account.
False. Linux's security features prevent accidental damage when you work as an ordinary user. You must be more careful when you acquire root privileges to perform system maintenance, though.
True or false: If you log into Linux system in graphical mode, you cannot use text-mode commands in that session.
False. Programs known as terminals enable entry of text-mode commands after you've logged into Linux in GUI mode. You can also switch bw multiple virtual terminals by using keystrokes such as Ctrl+Alt+F2.
True or false: GUI text editors for ASCII are superior to text- mode ASCII text editors because the GUI editors support underlining, italics, and multiple fonts.
False. Support for underlining, italics, multiple fonts, and similar advanced formatting features is present in word processors, not plain-text editors—even GUI text editors lack such support.
True or false: The following script launches three simultaneous instances of the terminal program.
False. Terminal commands don't have the ampersand (&) sign after them to indicate that they should run in background mode, so they will run serially, only one at a time.QuestionID:
True or false: Linux stores information on its groups in the /etc/groups file.
False. The name for the group data file in Linux is /etc/group, not /etc/groups.
True or false: Unicode is useful for encoding most European languages but not languages in Asia.
False. Unicode provides support for most alphabets around the world.
True or false: UDF is a good filesystem to use for a Linux installation on a hard disk.
False. Universal Disk Format (UDF) is filesystem used primarily on optical discs, not hard disks. Using it for a Linux installation on hard disk be awkward if not impossible. Linux-specific filesystems such as ext4s, ReiserFS, or btrfs are only practical choices for Linux installations on HDD.
True or false: VMS was common OS on x86 PCs at the time Linux was created.
False. VMS was OS for minicomputers and mainframes when Linux created. On x86 computers, DOS was dominant OS in 1991.
True or false: Pressing Alt+F3 in GUI brings up a text-mode display that you can use to log into Linux.
False. When in GUI, Ctrl must be added to VT-switching keystroke, so correct keystroke in this case is Ctrl+Alt+F3.
True or false: whoami provides more information than id.
False. whoami command displays your username only. The id command displays your username, your UID number, your primary group name, your primary GID number, and the group names and GID numbers of all your groups.
True or false: To compress files archived with zip, you must use an external compression program such as gzip or bzip2 in a pipeline with zip.
False. zip utility creates or manipulates zip archive files. This file type supports compression directly, as does the zip program. no need to involve another compression program to compress files archived with zip.
True or false: Only root can use the chmod command.
False. The chmod command allows users to change the permissions assigned to a file or directory. Any user can change the permissions of files and directories that the user owns; therefore, any user can use the chmod command.
True or false: Command-line users should normally use usermod to change their passwords.
False. The usual command-line command for changing passwords is passwd.
True or false: CentOS is a Linux distribution with a long release cycle.
True. CentOS distribution release cycle is approximately every two years, which is long by standards of other Linux distributions, some of which have release cycles of just six months.
True or false: Copyright law governs the distribution of software in most countries.
True. Courts and laws explicitly recognize computer software as being creative works governed by copyright law. In some countries, patent laws apply to software, not globally true.
True or false: Some DVRs run Linux.
True. Digital video recorders (DVRs) specialized computers for recording TV shows. Some commercial DVRs such as TiVos, run Linux natively. DVR software for standard PCs, such as MythTV, runs under Linux, also exists.
True or false: Malicious outsiders can disrupt servers even if computer that runs them is never broken into.
True. DoS attack can disrupt server's operation by directing overwhelming quantity of bogus data at server program, or even just computer on which it runs. True even if server is impeccably managed
True or false: If you have never used a text editor before, the nano text editor is usually the best one to learn first.
True. Due to its ease of use, nano is typically the best editor to learn first.
True or false: Linux kernel includes drivers for various disk controllers, network adapters, and USB interfaces, among other things.
True. In Linux, most drivers, including those specified, provided as part of the kernel. Some other drivers, such as those for specialty video cards, printers, scanners, exist outside kernel, although they may also rely on kernel drivers to do their work.
True or false: As a general rule, you should employ extra care when running programs as root.
True. It's possible to do more damage to a computer as root than as an ordinary user. Thus, you should be extra cautious when using root—run only trusted programs, double-check your commands for errors, and so on.
True or false: EM64T CPU is capable of running a Linux distribution identified as being for the AMD64 CPU.
True. Most CPU families have multiple names. EM64T is one name that Intel has used for its implementation of the x86-64 architecture, AMD64 is one of AMD's names for the same architecture. Two names identify the same architecture, and an AMD64 Linux distribution will run on an EM64T CPU.
True or false: Linux computer used as server generally not require X.
True. Most server programs not require X Window System (X) GUI, so server computer administrators often disable X or even remove it entirely to save disk space and memory and to minimize risk of security problems.
True or false: When using suitable commands, you can normally install a program and be sure that all the software on which it depends will also be installed, provided you have an Internet connection.
True. Network-enabled package management programs provide method for ensuring any dependencies required by application are already installed on system before installing application. If not, PMS either installs them automatically or prompts you to install them first.
True or false: Python is generally implemented as an interpreted language.
True. Python, like JavaScript, Perl, PHP, and shell languages, is interpreted. This contrasts with C and C++, two common compiled languages, and with Java, which is somewhere in-between.
True or false: You can create a symbolic link from one low-level filesystem to another.
True. Symbolic links work by storing name of the linked-to file in the symbolic link file. Linux reads this filename and transparently substitutes the linked-to file. This process works both on a single filesystem and across filesystems, so statement is true. Hard links, by contrast, work by providing multiple directory entries that point to a single file. This method of creating a link does not work across low-level filesystems.
True or false: FSF's free software definition and OSI's 10 principles of open source software both require that users have the ability to examine a program's workings—that is, its source code.
True. This principle is at heart of both free software and open source software definitions.
True or false: When working in terminal, shell prompt often ends in either dollar sign or greater-than symbol for ordinary users.
True. Typically, when working in terminal, for regular users (users who not logged into root account) default shell prompt ends in either in a dollar sign ($) or greater-than symbol (>).
True or false: When a user account is created, it is automatically assigned a primary group.
True. When a user account is created, it is automatically assigned a primary group typically has same name as the account's username.
True or false: You can force man to display a man page in a specific section of manual by preceding search name with section number, as in man 5 passwd.
True. When want to override man's search order, specify desired manual section bw man and command name, filename, or other name on which you're searching.
True or false: Valid looping statements in Bash include for, while, and until.
True. You can use for statement to execute a loop a fixed number of times, while and until execute until a test condition is no longer met or is met, respectively.
True or false: find command enables you to locate files based on their sizes.
True. You can use the -size n option in the find command to locate files based on their sizes.
True or false: The dmesg command may produce different output after a computer has been running for weeks than when it first started.
True. dmesg command displays contents of kernel ring buffer. kernel ring buffer stores kernel log messages in a limited space. When that space fills up, older log messages are removed to make room for newer messages. contents of kernel ring buffer (and therefore dmesg output) change as new events occur in Linux kernel.
True or false: dpkg and rpm package management utilities are both low-level tools.
True. dpkg and rpm package management utilities are both low-level tools, they are limited in what functions they can perform for maintaining software packages. typically better to use higher-level utility, such as yum or apt-get, depending on your Linux distribution.
True or false: regular expression Linu[^x].*lds matches the string Linus Torvalds.
True. special characters [^x] match any single character except x, and .* matches any sequence of any characters. string Linus Torvalds is just one of many strings to match specified regular expression.
True or false: By default, the first process listed in top is currently consuming the most CPU time.
True. top program allows to sort process data based on any data field, but by default it displays data sorted by CPU usage.
True or false: You can set a directory's time stamps with touch.
True. touch updates file's time stamps, and for this purpose, directory counts as a file, so this statement is true.
True or false: After deleting an account, files formerly owned by the deleted account may remain on the computer.
True. Although the userdel command's -r option deletes the user's home directory and mail files, this command doesn't track down the user's files stored in more exotic locations. You can use find to locate such files if you want to delete them or transfer ownership to another user.
True or false: Only root can change a file's ownership with chown.
True. An ordinary user can use chown to change a file's group to another group the user belongs to, but ordinary users can't change the ownership of a file—only the root user can do that.
True or false: User accounts have higher UID numbers than do system accounts.
True. System accounts have UID values between 0 and some number (normally 499 or 999), whereas user accounts have UID values above that number (starting at 500 or 1,000, typically).
True or false: A file with permissions of 755 can be read by any user on the computer, assuming all users can read the directory in which it resides.
True. The octal mode permission 755 represents the symbolic mode -rwxr-xr-x. The third set of permission characters indicates the permissions for all users on the system, so all users have read permission on the file.
What network setting defines the network device that routes packets intended for hosts on remote networks? A.Default router B.Netmask C.Host name D.IP address E.DNS server
.A. The default router is used to send packets from the local network to remote networks, so to communicate with a remote host you need to define the default router address, making option A correct. The netmask only defines the local network—it doesn't define what to do with packets for remote hosts—so option B is incorrect. The host name and IP address only define features of the local host, so options C and D are incorrect, whereas the DNS server defines how to retrieve the IP address of a host based on its domain name, so option E is incorrect.
Software package is example of web server written for Linux server environment. A.MySQL B.LibreOffice C.Firefox D.GIMP E.Apache
Apache. Apache software package is web server program written specifically for Linux server env, taking advantage of how Linux handles processes and memory for multiple applications. MySQL program is DB server commonly used in Linux, not web server LibreOffice package is word processing program, not web server program Firefox package is web browser program, not web server program GIMP package is graphics processing program, not a web server program
command searches database of filenames, enabling to identify files quickly whose names match a term that you specify. A.find B.whereis C.grep D.rpm E.locate
E. locate command searches database of filenames that is typically updated every 24 hours. locate is much quicker than find command in producing results of files whose names match a specified term.