LINUX ESSENTIALS 010-150 BEST STUDY GUIDE 2019

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A Linux computer being used as a server generally does not require X. A True B False

A

A Linux server that handles the SMB/CIFS protocol normally runs the _______ software. A. Samba B. Mamba

A

A license created by the FSF and often used for libraries is the: A. Lesser GPL or Lesser General Public License. B. Greater GPL or Greater General Public License.

A

A script accepts two arguments, username and year, specified in that order. Which of the following will you use to access the year in the script? A. $2 B. $year C. $1 D. $0

A

A user types myscript laser.txt to run a script called myscript. Within myscript, the $0 variable holds the value laser.txt. A False B True

A

A(n) _________ environment means that a person cannot deny actions, and the sudo command helps establish this environment. A nonrepudiation B well-to-do

A

An alternative to the route command to display default routes on some Linux distributions is A ip route show B traceroute

A

An organization devoted to promoting open source-like principles in fields such as video and audio recordings is the A. Creative Commons B. pony express

A

As a general rule, you should employ extra care when running programs as root. A True B False

A

By default, the first process listed in top is currently consuming the most CPU time. A True B False

A

Copyright law governs the distribution of software in most countries. A. True B. False

A

Describe the effect of the following short script, cp1, if it's called as cp1 big.c big.cc: #!/bin/bash cp $2 $1 A It copies the contents of big.cc to big.c, eliminating the old big.c. B It converts the C program big.c into a C++ program called big.cc. C The script's first line is invalid, so it won't work. D It has the same effect as the cp command—copying the contents of big.c to big.cc. E It compiles the C program big.c and calls the result big.cc.

A

How can the current directory and its subdirectories be searched for the file name MyFile.xml? A. Find -name MyFile.xml B. Grep -r MyFile.xml C. Less MyFile.xml D. Search MyFile.xml ./ E. Grep MyFile.xml | find

A

If you have never used a text editor before, the nano text editor is usually the best one to learn first. A. True B. False

A

If you log in to a Linux system in graphical mode, you cannot use text-mode commands in that session. A. False B. True

A

In which year was the terminal emulator program that would eventually become the Linux kernel created? A. 1991 B. 1990 C. 1989 D. 1992

A

Linux distributions that have no version number but instead release upgrades in an ongoing manner are said to have a(n) _______ release cycle. A. rolling B. fully updatable C. synchronizable D. NULL

A

Linux stores information on its groups in the /etc/groups file. A False B True

A

Malicious outsiders can disrupt servers even if the computer that runs them is never broken into. A. True B. False

A

Only root may change a file's ownership with chown. A True B False

A

Only root may use the chmod command. A False B True

A

Prerelease software that's likely to contain bugs is known as ______ and ______ A. alpha; beta B. charlie; delta.

A

Python is generally implemented as an interpreted language. A. True B. False

A

The FSF's free software definition and the OSI's 10 principles of open source software both require that users have the ability to examine a program's workings—that is, its source code. A. True B. False

A

The ____ character represents the start of a line in a regular expression. A. ^ B. %

A

The _____ standard is a modern video interface that's commonly used on computer monitors. A. DVI B. HDMI

A

The _________ software package is an example of a web server written for the Linux server environment. A. Apache B. Injun C. RPM D. dpkg

A

The ________program serves as a multipurpose network tool; it can do many of the same things as ifconfig, route, and several others. A netstat B netID

A

The find command enables you to locate files based on their sizes. A True B False

A

The following script launches three simultaneous instances of the terminal program. #!/bin/bash terminal terminal terminal A False B True

A

The output of the program date should be saved in the variable actdat. What is the correct statement? A. Actdat='date' B. Date > $actdat C. Date | acdat D. Set actdat='date' E. Actdat=date

A

The regular expression Linu[^x].*lds matches the string Linus Torvalds. A. True B. False

A

Three keystrokes that can initiate a search-and-replace operation in nano are F14, ______ and _______ A. Ctrl+\ & esc+R B. Ctrl+/ & esc+R

A

To compress files archived with zip, you must use an external compression program such as gzip or bzip2 in a pipeline with zip. A False B True

A

To learn who is currently logged into the computer and what programs they're currently running, you can type A w B u

A

Type logout or ____ to end a text-mode terminal session. A. exit B. return

A

User accounts have higher UID numbers than do system accounts. A True B False

A

What are two character sequence is present at the beginning of an interpreted script? Please specify two characters only A. #! B. !# C. *> D. <*

A

What command can be used to change both the user and group ownership of a file? A. chown B. chgrp C. chmod D. chroot

A

What is a collection of software routines that can be used by other software called? A. Library B. Function C. Kernel D. Program

A

What is the usual absolute path of the personal directory for the user foo? A. /home/foo B. /HOME/foo C. HOME/foo D. home/foo

A

What type of information will you find in /etc/passwd for ordinary user accounts? 1 The path to the account's default GUI desktop environment 2 The path to the account's home directory 3 A complete listing of every group to which the user belongs 4 A user ID (UID) number 5 The path to the account's default text-mode shell A. 2,4, & 5 B. 1,2, 3

A

When using suitable commands, you can install a program and be sure that all of the software on which it depends will also be installed, provided you have an Internet connection. A True B False

A

Where do log files reside on a Linux computer? A /var/log B /etc/logging C /usr/log D /home/logging E /log/usr

A

Where do most drivers exist on a Linux system? A. Linux kernel B. Configuration files C. Libraries D. Firmware

A

Which command can be used to abnormally terminate a script with a specific status? A. Exit B. Stop C. End D. Term

A

Which command can be used to print its arguments on the terminal? A echo B cprint C sprint D print

A

Which command displays a short description of system commands for keywords and displays the result on the standard output? A apropos B tail C head D makewhatis

A

Which command is used to retrieve user input into a variable in a Bash script? A. read B. get C. input D. inline

A

Which command would you use to get comprehensive documentation about any command in Linux? A. Man command B. Echo command C. Get command D. Locate command E. Help command

A

Which commands change the group ownership of sample.txt to users? 1) chown :users sample.txt 2) chown users sample.txt 3) chown users: sample.txt 4) chown users:users sample.txt A. 1 & 4 B. 2 & 3 C. 1 & 3 D 3 & 4

A

Which criteria are useful when deciding which operating system to use? 1) License Costs 2) Linux can do everything, there is no need for further evaluation 3) Ideological preferences of the system administrator 4) Availability of mandatory applications and tools 5) Skills of the administrators and staff A. 1,4, and 5 B. 1, 2, and 3 C. 2, 3, and 4 D. 1, 2, and 4

A

Which is true of Linux distributions as a whole? A Sometimes they may not be copied because of the non-open source software they may contain. B They may be copied only after software using the MIT license is removed. C They all completely conform to the principles of the open source movement. D They all qualify as free software, as the FSF uses the term. E They're covered by the GPL or the BSD license, depending on the distribution.

A

Which keypress in the vi editor's command mode changes the case of the character on the cursor? A. ~ B. / C. u D. o

A

Which keystroke deletes a line of text when using nano? A. Ctrl+K B. Ctrl+Y C. Ctrl+C D. Ctrl+X

A

Which keystroke invokes the pico or nano search function? A F6 B Esc-S C Ctrl+F D F3

A

Which keyword is used to terminate a case statement? A. esac B. end C. fi D. done

A

Which looping statement executes as long as its condition is true? A. while B. until C. if D. for

A

Which of the following are text-mode commands, helpful in identifying CPU information? 1) cat /proc/cpuinfo 2) uname -a 3) lscpu 4) cfdisk A. 1,2, & 3 B. 1,2, & 4 C. 2, 3, & 4 D. 1, 3, & 4

A

Which of the following can be used to access the command line? A. Terminal B. XWindow C. BIOS D. Xargs E. Firefox

A

Which of the following commands can be used to view the last user logged in to a Linux computer? A last B ln C lsmod D ls -l

A

After deleting an account, files formerly owned by the deleted account may remain on the computer. A False B True Although the userdel command's -r option deletes the user's home directory and mail files, this command doesn't track down the user's files stored in more-exotic locations. You can use find to locate such files if you want to delete them or transfer ownership to another user.

B

Because their hardware designs are proprietary, hardware vendors cannot release open source drivers for their products. A. True B. False

B

CentOS is a Linux distribution with a long release cycle. A. False B. True

B

Command-line users should normally use usermod to change their passwords. A True B False

B

Complete the following command to redirect both standard output and a standard error from the bigprog program to the file out.txt. $ ____ bigprog out.txt. A. && B. &>

B

Each document in an info page is known as a(n) A. man B. node

B

For which type of file is nano least likely to be useful for examining or editing? A A text file encoded in ASCII B A LibreOffice word processing document C A Linux configuration file D A text file encoded in Unicode E A shell script file

B

GUI text editors for ASCII are superior to text-mode ASCII text editors because the GUI editors support underlining, italics, and multiple fonts. A True B False

B

General system messages are likely to be found in /var/log/messages or /var/log/_____ , depending on your distribution. A. sisterlog B. syslog

B

How can the normal output of a command be written to a file while discarding the error output? A. Command>2>discard-error>file B. Command> file2>/dev/null C. Command>2>file &1>/dev/null D. Command /dev/null E. Command> /dev/null 2&>1 output

B

How would you remove two lines of text from a file when using vi? A In command mode, position the cursor on the last line and type 2yy. B In command mode, position the cursor on the first line and type 2dd. C Select the text with the mouse, and then select File ➢ Delete from the menu. D In insert mode, position the cursor at the start of the first line and press Ctrl+K twice. E In insert mode, position the cursor at the start of the first line, hold down the Shift key while pressing the down-arrow key twice, and press the Delete key on the keyboard.

B

IPv4 addresses are 64 bits long. A True B False

B

Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system. A. /dev/hdc1d2p3 B. /dev/hdb3 C. /dev/hd1b3 D. Dev/hdc1a3 E. Dev/hdc1b3

B

In which of the following languages was most of the Linux kernel written? A Java B C C C++ D Perl E Bash shell script

B

Information on various groups, such as group name, GID, and group members is stored in the ______ file. (The answer should be an absolute file reference.) A /etc/file B /etc/group

B

Linux documentation in the /usr/share/doc directory tree is almost always in OpenDocument text format. A. True B. False

B

Linux uses a(n) _________ kernel design, as contrasted with a microkernel design. A. neolithic B. monolithic

B

Most Linux distributions maintain information on what packages are installed in the A. package storehouse B. package database

B

Pressing Alt+F2 in the GUI brings up a text-mode display that you can use to log in to Linux. A. True B. False

B

The /etc/resolv.conf file tells the computer whether to use DHCP for its network configuration. A True B False

B

The FSF's general principles are summarized by the term ___________, which refers to using copyright laws for purposes that are in some ways contrary to copyright's original intent. A. copyto B. copyleft

B

The Linux kernel includes drivers for various disk controllers, network adapters, and USB interfaces, among other things. A False B True

B

The Linux kernel is derived from the BSD kernel. A. True B. False

B

The _____ command can extract specified data fields from a file's records. A. extract B. cut

B

The _____ command searches a database of filenames, enabling you to identify files quickly whose names match a term that you specify. A. find B. locate

B

The command that you use to read messages generated during the boot process and stored in the kernel ring buffer is the ____ command. A. dmess B. dmesg

B

The dmesg command may produce different output after a computer has been running for weeks than when it first started. A False B True

B

The file that associates usernames with UID numbers in Linux is A /etc/users B /etc/passwd

B

Which of the following programs is most likely to be installed and regularly used on a desktop computer that runs Linux? A Android B Evolution C BIND D Apache E Postfix

B

Which of the following redirection operators is used to append a command's standard error to a file? A. < B. 2>> C. 2> D. <>

B

Which of the following results will be produced by specifying /bin/false to the shell for a user account in the /etc/passwd file? A The user will not be able to use the /bin folder. B The user will not be able to access the computer. C The user will have super user privileges on the computer. D The /bin folder will be deleted.

B

Which of the following software packages is an email server? A. GIMP B. Postfix C. Thunderbird D. MySQL E. Apache

B

Which of the following statements acts as a good replacement of the if-then-else-fi statement? A if-fi B case C switch D while

B

Which of the following statements may be used to access the second command line argument to a script? A. '$2' B. "$2" C. "ARG$2" D. $1 E. "$1"

B

Which of the following terms best characterizes the Linux kernel? A. Freeware B. Open source C. Commercial D. Shareware

B

Which one of the following does NOT use a Linux-based embedded operating system? A. Network appliance B. Desktop C. Android D. TiVo

B

Which one of the following statements concerning Linux passwords is true? A. Passwords may never start with a non-letter B. Passwords are only stored in encrypted form C. Users cannot change their password once it has been set D. Passwords may be at most six characters long E. All passwords can be decrypted using the system administrator's master password

B

Which option is used with the echo command to prevent the newline character from being appended to its output? A. -t B. -n C. -p D. -s

B

Which pager is used to view man pages, one page at a time? A. locate B. less C. whatis D. apropos

B

Which permissions should be given to a file that needs to be opened and edited by the file's owner and opened read-only by the file's group? A. 0751 B. 0640 C. 0540 D. 0444 E. 0466

B

Which symbol is appended with a command to run it in the background? A. | B. & C. # D. +

B

You can check the current status of your routing table by typing route at a shell prompt. A False B True

B

You want to copy a file (origfile.txt) to the backups directory, but if a file called origfile.txt exists in the backups directory, you want to go ahead with the copy only if the file in the source location is newer than the one in backups. The command to do this is cp origfile.txt backups/. A. cp -a origfile.txt B. cp -u origfile.txt

B

You want to run the command cat /etc/shadow as root, but you're logged in as an ordinary user. Which of the following commands will do the job, assuming that the system is configured to give you root access via the appropriate command? A root cat /etc/shadow B sudo cat /etc/shadow C admin cat /etc/shadow D su cat /etc/shadow E passwd cat /etc/shadow

B

You want to set the sticky bit on an existing directory, subdir, without otherwise altering its permissions. To do so, you would type chmod ________ subdir. A 0+t B o+t

B

You're using bash, and you type emacs to launch the emacs editor. In this case, emacs is bash's A. parent B. child

B

info pages are a web-based documentation format. A. True B. False

B

A Linux text-mode login prompt reads _____ (one word). A. Welcome B. Sam C. login: D. logon:

C

A program written in a(n) _________ programming language is completely converted to binary form before being run. A. snail mail B. PERL C. compiled D. triangulated

C

After using a text editor to create a shell script, what step should you take before trying to use the script by typing its name? A Run a virus checker on the script to be sure it contains no viruses. B Run a spell checker on the script to ensure it contains no bugs. C Set one or more executable bits using chmod D Copy the script to the /usr/bin/scripts directory. E Compile the script by typing bash scriptname, where scriptname is the script's name.

C

Describe the effect of the following command, assuming that it completes successfully: # groupadd henry A It imports group information from the file called henry. B It adds the user henry to the current default group. C It creates a new group called henry. D It adds the group henry to the user's list of groups. E It changes the user's default group to henry.

C

How can you run a program in the background when launching it from a shell? A Launch the program normally, type Ctrl+Z in the shell, and then type bg in the shell. B Append an ampersand (&) to the end of the command line. C. Both A & B

C

How is it possible to determine if an executable file is a shell script which is ready by Bash? A. /bin/bash has to be run in debug mode B. The r bit is set C. The file line starts with #!/bin/bash D. The file must end with .sh E. Scripts are never executable files

C

Of the following, which is the best password? A password B 123456 C uB2op%4q+++++++++++++++ D LinusTorvalds E peanutbuttersandwich

C

Users can motivate programmers to work on open source projects by offering a(n) ________ to whomever completes the project first. A. policy B. money C. bounty D. project

C

What does LAMP mean? A. Short for lightweight access management protocol with synchronizes permission in a network. B. The bus ID of an attached USB device that emits light. C. The combination of Linux Apache MySQL and PHP and other programming languages. D. Short for Lamport clock which is important in distributed network computing. E. The Linux advanced mode programming interface which gives Advanced capabilities to application Developers.

C

What is globbing in Linux? A. Using absolute file references B. Using relative file references C. Use of wildcards in filename specifications D. Referring to files using symbolic links

C

What is the exit value for the successful execution of a script? A 255 B 1 C 0 D -1

C

What is the octal code of a file with symbolic mode of -rw-r-----? A. 664 B. 660 C. 640 D. 750

C

What keyword is missing from the following segment of the shell script?for i in*;----cat $idone A. Run B. then C. do D. fi E. endo

C

What type of multitasking does Linux use? A Cooperative B Multiuser C Preemptive D Single-user E Single-tasking

C

When executing the passwd ucertify command as the root user, what information will the passwd command prompt for? A. None of these B. The root user's current password and the new password, twice C. The new password for the ucertify user, two times D. ucertify user's current password and the new password, two times

C

When should programs be configured SUID root? A Never; this permission is a severe security risk. B Whenever the program must be able to access an account's user ID (UID) number. C Only when they require root privileges to do their job. D Whenever a program should be able to access a device file. E At all times; this permission is required for executabl programs.

C

Where did the Linux kernel originate? A. American Telephone and Telegraph B. The University of California C. The University of Helsinki D. The Massachusetts Institute of Technology

C

Which Linux command is used to display system boot time messages? A. $DISPLAY B. lspci C. dmesg D. top

C

Which Linux distribution is most likely to be found in use on a cell phone? A. Fedora B. CentOS C. Android D. Debian

C

Which Linux distribution is used as a basis for the creation of Ubuntu Linux? A. SUSE Linux B. Red Hat Linux C. Debian Linux D. Arch Linux E. Gentoo

C

Which archive format is NOT supported by tar? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. gzip B. xz C. zip D. bzip2

C

Which character represents the start of a line in a regular expression? A % B & C ^ D |

C

Which command displays the list of groups to which a user belongs? A. Isgroup B. Whoami C. Id D. Who

C

Which command is used to retrieve user input into a variable in a Bash script? A. input B. get C. read D. inline

C

Which file defines groups on a Linux system? A. /var/local/group B. /etc/grp C. /etc/group D. /etc/groups

C

Which function does a shell program serve? A. It provides a graphical environment B. It is responsible for logging a user into the system C. It receives user commands and executes them D. It is responsible for establishing a connection to another computer

C

Which keystrokes invoke the pico or nano search function? A. F6 B. CRTL+W C. Both A & B

C

Which of the following Linux distributions use RPMs for package management? A. Debian / Ubuntu B. Gentoo C. CentOS / openSUSE

C

Which of the following UIDs denotes the root user? A 500 B 1 C 0 D 499

C

Which of the following commands can be used to extract the contents of an archive? A. tar -cf B. tar -z C. tar -xvf D. tar -uv

C

Which of the following commands can list all the TCP ports on which the Linux server is listening? A. ifdown B. route C. netstat D. ifup

C

Which of the following commands describes all mountable filesystems and their properties? A /etc/inittab B /etc/init.d/* C /etc/fstab D /etc/hosts

C

Which of the following commands displays only the current user's username? A. who B. w C. whoami D. who am i

C

Which of the following commands is used to check connectivity within computers on a network? A ip B ifconfig C ping D route

C

Which of the following commands lists a dynamic view of running processes? A init B ps C top D dmesg

C

Which of the following commands will bring up the Ethernet interface via DHCP? A. route B. ifconfig eth0 up C. dhclient eth0 D. ifup eth0

C

Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home? A. Tar /home backup.tar B. Tar -cf /home backup.tar C. Tar -cf backup.tar /home D. Tar -xf backup.tar /home E. Tar -xf /home backup.tar

C

Which of the following commands will set the variable text to olaf is home? A. Test=='olaf is home' B. $test='olaf is home' C. Text=="olaf is home" D. Text=$olaf is home

C

Which of the following directories contains system configuration files on a Linux system? A. /root B. /home C. /etc D. /tmp

C

Which of the following directories stores package database information? A /tmp/lib B /etc/lib C /var/lib D /usr/lib

C

Which of the following entries is maintained at the first line of the script? A !#/bin/sh B #! C #!/bin/sh D !#/bin/bash

C

Which of the following file systems is most commonly used for Linux distributions? A. HFS+ B. NTFS C. Ext4 D. FAT32

C

Which of the following files contains information about the user accounts in a Linux computer? A. /etc/users B. /etc/hosts C. /etc/passwd D. /etc/resolv.conf

C

Which of the following filetype codes identifies a normal data file such as graphics? A. b B. d C. - D. c

C

Which of the following formatting commands can be used to replace a string in a file? A tail B cat C sed D head

C

Which of the following groupadd options are used to create a new group with a specific group ID? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. -f B. -r C. -g or --gid D. NULL

C

Which of the following information are NOT present in the /etc/group file? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. The group's password B. Name of the group C. UIDs of the users who are members of the group D. GIDs of the group

C

Which of the following information can NOT be displayed using the netstat command? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. Routing table B. List of open ports C. Round-trip network travel time D. Network interface information

C

Which of the following is a characteristic of all open source software? A The software must be written in an interpreted language that requires no compilation. B The software was originally written at a college or university. C Users are permitted to redistribute altered versions of the original software. D It must be distributed with both the source code and binaries. E The software cannot be sold for a profit; it must be distributed free of charge.

C

Which of the following is a key part of the FSF's philosophy? A. Developers should write software only for free operating systems such as GNU/Linux. B. Users should engage in civil disobedience by copying proprietary software. C. Users must have the right to use software as they see fit. D. Developers should use the latest version of the FSF's GPL. E. Users should have the right to modify free software and distribute it under a commercial license.

C

Which of the following is a requirement of the GPL license but not the BSD license? A. The GPL license requires that any legal disputes be settled with the modification of free software Foundation. B. The GPL license forbids the removal of the copyright and license notices from the source code files that are distributed. C. Users who modify Andre and distribute the software under GPL license must make the modifications they made available to the recipients under the same license. D. The GPL license contains a disclaimer of warranty requiring users not to hold the software author's liable to any damage.

C

Which of the following is used by FSF to refer to software licensed under terms that satisfy its philosophy concerning software licensing? A. Open-source software B. Freeware C. Free software D. Free and open-source software

C

Which of the following keystrokes inserts a blank line below the current line in vi's command mode? A. i B. :wq C. o D. ZZ

C

Which of the following legal areas governs general ideas, independent of their specific implementation? A. Trade secret B. Copyright C. Patent D. Trademark

C

Which of the following makes a good password? A. Name of a character from the user's favorite book B. The user's username C. None of these D. User's telephone number

C

Which of the following man sections contains information about file formats? A. 1 B. 3 C. 5 D. 9

C

Which of the following operators is used to connect two or more than two commands on the Linux operating system? A > B + C | D >>

C

Which of the following programming languages is implemented as a compiled language? A. Bash shell B. Python C. C++ D. Perl

C

Which of the following regular expressions will be used to find out one or more occurrences of the word Title in a sentence? A. $Title^ B. ^[Title]$ C. Title+ D. ^T*e$

C

Which of the following statements concerning the General Public License (GPL) is true? A. GPL software may not be used to run nuclear reactors or air traffic control systems B. The GPL is identical to the BSD license C. The GPL is designed to ensure that the source code of a software remains freely available D. If you changed a program you received under the GPL, you must send your changes to the original author for approval E. GPL software may never be sold for money

C

Which of the following statements is included in a case statement to denote its end? A easc B eol C esac D end

C

Which of the following stores the exit status of the most recently executed command? A. $0 B. $2 C. $? D. $1

C

Which of the following switches is used with the usermod command to add a comment to an existing user account? A -u B -d C -c D -e

C

Which of the following symbols can be used to write multi-line commands on the Linux terminal? A. & B. | C. \ D. ;

C

Which of the following tools is best suited for installing a software package and all its dependencies on a Debian computer? A dmesg B rpm C apt-get D yum E zypper

C

Which of the following types of information is returned by typing ifconfig eth0? A The gateway with which eth0 communicates B The names of programs using eth0 C The IP address assigned to eth0 D The hostname associated with eth0

C

Which of the following wc options displays the number of characters in a file? A. -w B. -c C. -m D. -l

C

Which one of the following statements are NOT true of the /etc/shadow file on a Linux system? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. It contains an account's expiration information. B. It does not contain the UIDs of the users on the system. C. All the users on the system have read access to this file. D. It contains the password for accounts in hashed format.

C

Which open source software includes various packages such as word processor, spreadsheet, graphics, editor, database, and math formula bar? A GStreamer B Evolution C LibreOffice D Thunderbird

C

Which regular expression string is used to match any sequence of characters of any length? A. \. B. [ ] C. .* D. *

C

Which statement about users and user groups is correct? A. There can be only one user group on a system B. A group can only have one main user C. Every user belongs at least to one user group D. Users do not have to belong to a user group

C

Which symbol is used in command mode to change the case of a word in vi editor? A c B o C ~ D /

C

You execute the following command as the root user: rm a* After successful execution of the command, there was still a file named Async.txt that was not deleted. Why was the file not removed from the system? A. The file must have been a system file. B. The -f option was not used with the rm command. C. Linux filenames are case-sensitive. D. The filename's extension was not mentioned in the command.

C

You need to create a script that should calculate the student GPA for 1000 students. Which of the following option is best suited to create modular scripts? A. Comment B. Structure C. Functions D. Variable

C

You type mkdir one/two/three and receive an error message that reads, in part, No such file or directory. What can you do to overcome this problem? A. Issue three separate mkdir commands: mkdir one, then mkdir one/two, and then mkdir one/two/three. B. Add the--parents parameter to the mkdir command. C. Both A & B

C

You're unable to execute a script named myscript.sh using the ./myscript.sh command in the terminal. Which of the following is the most probable cause of this issue? A. The bash command is missing before ./myscript.sh. B. Scripts can't be executed in the terminal. C. The execute permissions are not set on the script. D. Script files ending with .sh extension can only be executed in the sh shell.

C

ow many bits does an IPv4 address have? A 64 B 16 C 32 D 8

C

After installing a new package, in which directory are you most likely find its configuration file? A. /lib B. /conf C. /usr D. /etc E. /opt

D

Consider the following command and its output: # userdel -f ucertify userdel: user ucertify is currently logged in Which of the following statements is correct for the given shell entry? A. The output is invalid, the userdel command will not execute without root privileges. B. The ucertify user is currently logged in and hence its account is not deleted. C. Since, the user is logged in, only the user's files are deleted, but not the account. D. The account is deleted, even though it was in use.

D

Consider the following text file: When writing a scrt in Linux, the first line of the scrt must specify the shell to be used to execute the scrt. The first line on the scrt generally starts with the #! characters. Using the vi editor, which of the following commands replaces all occurrences of the word scrt to script? A. :s/scrt/script B. :s/script/scrt/g C. :s/script/scrt D. :%s/scrt/script/g

D

If you want to enable one Linux computer to access files stored on another Linux computer's hard disk, which of the following network protocols is the best choice? A DHCP B DNS C PHP D NFS E SMTP

D

In which of the following ways can companies NOT legally make money using GPLed software? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. By selling technical support services associated with GPLed software B. By selling a mix of GPLed software and proprietary software C. By offering to add features to GPLed software for a price D. By incorporating GPLed software into a proprietary program that a company sells

D

The sample.txt file does not exist in the current working directory. What happens when the nano sample.txt command is executed? A. The editor starts but displays an error message in the status bar. B. The editor does not start and displays an error message on the terminal. C. The editor starts and displays the message "Warning: no write permission" in the status bar. D. The editor starts and displays the message "New File" in the status bar.

D

What command would you type (as root) to change the ownership of somefile.txt from ralph to tony? A chmod somefile.txt tony B chown ralph:tony somefile.txt C chmod tony somefile.txt D chown tony somefile.txt E chown somefile.txt tony

D

What is meant by the permission string -rwxrwx---? A. The permission string represents that the file is a directory. B. All users can read, write, and execute the file. C. Only the file's owner may read, write, and execute the file. D. Only the file's owner and group member may read, write, and execute the file.

D

What is the correct order in which permissions are represented in the permission string? A. Group, owner, world B. World, group, owner C. Group, world, owner D. Owner, group, world

D

What is the output of the following command?for token in a b c; doecho -n $({token};done A. {a}{b}{c} B. $token$token$token C. A b c D. Abc E. Anbncn

D

What is the purpose of the system account with a UID of 0? A Nothing; UID 0 is left intentionally undefined. B It varies from one distribution to another. C It's a low-privilege account that's used as a default by some servers. D It's the system administration account. E It's the account for the first ordinary user.

D

Where are the ring buffer logs stored in Linux? A. /tmp B. /usr/log C. /var/spool D. Memory

D

Which Linux command makes an environment variable available to subshells? A. env B. sed C. echo D. export

D

Which command can be used to display the path names of the files executed in the current environment? A Path B dmesg C w D which

D

Which command shows if /usr/bin is in the current shell search path? A. Echo %PATH B. Cat PATH C. Cat $PATH D. Echo $PATH E. Echo %PATH%

D

Which command will archive /home and its content to /mnt/backp? A. Sync -r /home /mnt/backp B. Copy -r /home /mnt/backp C. Mv /home /mnt/backp D. Tar -cf /mnt/backup/archive.tar /home & Cp -ar /home /mnt/backp

D

Which command will display running process information in realtime? A. Show current B. Process C. Ps current D. Top

D

Which command will display the last line of the file foo.txt? A. Head -n foo.txt B. Last -n 1 foo.txt C. Tail foo.txt D. Tail -n 1 foo.txt

D

Which is a suitable command to find the next appearance of the word hidden in a man page being viewed from the command line? A. CTRL -F hidden B. /? hidden C. Find hidden D. /hidden

D

Which keystroke is used to paste copied text in nano? A. Ctrl+N B. Ctrl+G C. Ctrl+K D. Ctrl+U

D

Which of the following IS NOT an MP3 player in Linux? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. Audacious B. Banshee C. Amarok D. Blender

D

Which of the following actions can be performed using the su command? A Setting uid to a user B Showing users C Saving a user D Switching to another user

D

Which of the following characters in a file's permission string identifies it as a symbolic link? A. @ B. w C. r D. l

D

Which of the following commands can be used to create a file? A. Build B. Create C. Mkfile D. Touch E. Nico

D

Which of the following commands can be used to display the configuration of the first Ethernet device? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. ifconfig eth1 B. NULL C. ifconfig ethernet D. ifconfig or ifconfig eth0

D

Which of the following commands can be used to extract files from an archive? A. Tar -vf B. Tar -e C. Tar -evf D. Tar -xvf E. Tar -v

D

Which of the following commands displays the memory usage by a system? A. du B. df C. ps D. free

D

Which of the following commands executes very slowly and displays the full path of a file instead of just a filename? A ls B grep C locate D find

D

Which of the following commands is used to check the DNS connectivity? A netstat B ifconfig C dug D dig

D

Which of the following commands is used to configure an IP address to a Linux computer? A ip B ipadd C ipconfig D ifconfig

D

Which of the following commands is used to create a new user on the Linux system? A userconfig B chmod C passwd D useradd

D

Which of the following commands only writes the stdout of a command but not the stderr to a file? Note: Assume the name of the command to be cmd, and the output file to be file.txt. A. command | file.txt B. command >2> file.txt /dev/null C. command 2> file.txt D. command > file.txt 2> /dev/null

D

Which of the following commands performs the same task as the apropos command? A. grep B. find C. whatis D. man -k

D

Which of the following commands searches through man pages and displays a short description of the matching keyword? A. less B. whereis C. locate D. whatis

D

Which of the following commands stores the output of the date command in a variable? A. date > myvar B. date | myvar C. myvar=date D. myvar=`date`

D

Which of the following commands supports both gzip and bzip2 compression? A archive B zip C zcat D tar

D

Which of the following commands would you type to rename newfile.txt to afile.txt? A ln newfile.txt afile.txt B rn newfile.txt afile.txt C touch newfile.txt afile.txt D mv newfile.txt afile.txt E cp newfile.txt afile.txt

D

Which of the following consists of supporting files for an application installed on a Linux computer? A. Library B. Shell C. Program D. Package

D

Which of the following directories contains dynamically changing files, distributed across different directories? A /usr B /proc C /sys D /var

D

Which of the following directories stores various executable not needed for booting or repairing the Linux system? A /usr/share/doc B /usr/sbin C /usr/local D /usr/bin

D

Which of the following files holds the definition of the local user accounts? A. /etc/id B. /etc/users C. /etc/secret D. /etc/passwd E. /etc/home

D

Which of the following is a Linux based operating system for use on mobile devices? A. Debian B. IOS C. CentOS D. Android

D

Which of the following is a common server program? A. GIMP B. GNOME C. LibreOffice D. Samba

D

Which of the following is a key part of the FSF's philosophy? A Developers should write software only for free operating systems such as GNU/Linux. B Users should have the right to modify free software and distribute it under a commercial license. C Developers should use the latest version of the FSF's GPL. D Users must have the right to use software as they see fit. E Users should engage in civil disobedience by copying proprietary software.

D

Which of the following is a notable difference between Linux and Mac OS X? A. Linux supports text-mode commands, but OS X is a GUI-only OS. B. Linux relies heavily on BSD software, whereas OS X uses no BSD software. C. Linux cannot run on Apple Macintosh hardware, whereas OS X can run only on Apple hardware. D. Linux's GUI is based on the X Window System, whereas OS X's is not. E. Linux can run common GNU programs, whereas OS X cannot.

D

Which of the following is a physical arrangement in a computer that contains the computer's basic circuitry and components? A Hard drive B CPU C BIOS D Motherboard

D

Which of the following is an example of the monolithic kernel? A GNU HURD B Minix C Windows D Linux

D

Which of the following is the core part of an operating system? A. Threads B. Shell C. Libraries D. Kernel

D

Which of the following is true about open source software? A. The freedom to redistribute copies must include binary or executable forms of the software but not the source code. B. Open source software is not for sale. C. Open source software cannot be copied for free. D. Open source software is available for commercial use.

D

Which of the following licenses grants an organization the right to make certain number of copies of a proprietary program? A. GPL B. BSD C. Apache D. Site

D

Which of the following options is used with the test command to check if the specified file exists and has a non-zero size? A. -f B. -r C. -L D. -s

D

Which of the following options of the groupmod command helps you change the gid of a group? A. -n B. -h C. -o D. -g

D

Which of the following organizations bases its philosophy on software licensing on a strong moral imperative that users should be able to modify their software? A. OSI B. BSD C. FOSS D. FSF

D

Which of the following package formats does Slackware use? A. ebuild B. Debian C. RPM D. Tarballs

D

Which of the following permissions protects a file from being deleted by other users? A SUID B Execute C SGID D Sticky bit

D

Which of the following programs is not a graphical web browser? A. Chrome B. Konqueror C. Opera D. Links E. Firefox

D

Which of the following provide a text-based environment to run commands? A. Context menus B. Desktop menus C. Panels D. Terminals

D

Which of the following redirection operators appends a command's standard output to an existing file, without overwriting the file's original contents? A. &> B. 2> C. | D. >>

D

Which of the following su commands executes a single command with root privileges? A. su command B. command | su C. su - command D. su -c command

D

Which of the following symbols separates fields on each line of the /etc/passwd file? A. x B. | C. ; D. :

D

Which of the following syntaxes will you use to extract a file using the tar command? A tar -zvf {.tgz-file} B tar -zwvf {.tgz-file} C tar -cvf {.tgz-file} D tar -zxvf {.tgz-file}

D

Which of the following utilities is used to install packages on a Debian system? A. zypper B. rpm C. yum D. dpkg

D

Which one of the following is NOT a Linux native filesystem that holds the majority of a Linux installation? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. ReiserFS B. ext4fs C. JFS D. HFS

D

Which option will cause the echo command NOT to output a trailing newline? A. -e B. -s C. -p D. -n

D

Which top command is used to change a process's priority? A. k B. M C. P D. r

D

Which usermod options are used to move a user's home directory (files included) to a new location? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. -u B. -l C. NULL D. -d or -m

D

You execute the following commands: mkdir newdir cd newdir touch newfile.txt What will be the effect of the touch command? A. It will generate a "File not found" error. B. Nothing, the command will return without performing any task. C. It will update the timestamps of the newfile.txt file in the root directory. D. A new file named newfile.txt will be created in the current directory.

D

You have a program called /user/bin/foo. You wish to create a symbolic link, /home/user/bin/foo, that points to it. Which command will do this task? A. Ln --symlink /home/user/foo /user/bin/foo B. Ln /user/bin/foo /home/user/foo C. Ln /home/user/foo /user/bin/foo D. Ln -s /user/bin/foo /home/user/foo E. Ln -sys /home/user/foo /user/bin/foo

D

You've created a new file, but you are unable to find that file using the locate command. Which option best explains this behavior? A. The locate command only searches for files that were on the system at the time of boot. B. The locate command only searches for system files, not user files. C. The locate command does not search for regular files. D. The database hasn't been updated yet.

D

You've received a tar archive called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this? A tar cvf data79.tar B tar uvf data79.tar C tar Avf data79.tar D tar tvf data79.tar E tar xvf data79.tar

D

Given the following directory permissions:drwxrwxrwt 14 root 36864 2012-03-02 11:17 tmpWhat is the letter t at the end of drwxrwxrwt indicate? A. It is the sticky bit that causes all commands in this directory to be launched as a root B. It makes the directory accessible for everybody C. Option 6 D. It is a temporary bit that prevents launching commands in a directory E. It means that even though the directory is global writable only the owner can delete their own files F. It indicates that this directory contains only temporary files that may be deleted

E

How could one search for the file foo.txt under the directory /home? A. Find /home foo.txt B. Search /home -file foo.txt C. Find /home -file foo.txt D. Search /home foo.txt E. Find /home -name foo.txt

E

How could one search for the file foo.txt under the directory /home? A. Search /home foo.txt B. Find /home -file foo.txt C. Find /home foo.txt D. Search /home -file foo.txt E. Find /home -name foo.txt

E

The following file is found in which system file?root:x:0:0::/root:/bin/bash A. /usr/bin/shadow B. /etc/password C. /etc/user.cong D. /etc/shadow E. /etc/passwd

E

What is the preferred source for the installation of new applications? A. A CD-ROM disk B. The vendor's website C. A retail store D. The vendor's version management system E. The distribution's package repository

E

What is the usual name of the first process that the Linux kernel runs, aside from itself? A grub B login C cron D bash E init

E

What keystroke moves the cursor to the start of the line when typing a command in Bash? A Ctrl+E B Up arrow C Ctrl+T D Left arrow E Ctrl+A

E

Which command is used to make a shell variable known to subsequently executed programs? A. Announce B. Transfer C. Mv D. Env E. Export

E

Which command lists all files in the current directory that starts with a capital letter? A. Ls -uppercase-files B. Ls A-Z* C. Ls A-Z D. Ls --upercasefiles E. Ls [A-Z]*

E

Which of the following commands can be used to view a file and do search operations within it while viewing the contents? A. Grep B. See C. Find D. Report E. Less

E

Which of the following commands is an improved version of more? A cat B html C grep D man E less

E

Which of the following commands moves the directory ~/summer-vacation and it content to ~/vacation/2011? A. Move -R ~/summer-vacation ~/vacation/2011 B. Mv -R ~/summer-vacation ~/vacation/2011 C. Mv /home/summer-vacation /home/vacation/2011 D. Mv ~/vacation/2011 ~/summer-vacation E. Mv ~/summer-vacation ~/vacation/2011

E

Which of the following commands will print lines from the file world.txt that contain matches to changes and changed? A find change[^ds] world.txt B cat world.txt changes changed C find "change'd|s'" world.txt D tar change[d-s] world.txt E grep change[ds] world.txt

E

Which of the following commands will print lines from the file world.txt that contain matches to changes and changed? A tar change[d-s] world.txt B find "change'd|s'" world.txt C cat world.txt changes changed D find change[&c.circ;ds] world.txt E grep change[ds] world.txt

E

Which of the following devices is not commonly attached via USB? A Keyboards B External hard disks C Printers D Scanners E Video monitors

E

Which of the following hardware devices links a number of computers together to form an Ethernet LAN? A. Server B. Terminal C. Access point D. Connector E. Switch

E

Which of the following is not a function of the Linux kernel? A. Controlling access to the hard drive B. Enabling programs to use a network C. Allocating memory for use by programs D. Allocating CPU time for use by programs E. Creating menus in GUI programs

E

While deleting all files beginning with the letter a there was still the file Access.txt left. Assuming that it had the correct ownership, why was it not deleted? A. Files with extensions need a different treatment B. Rm had to be called with the option -R to delete all files C. The file Access.txt was hidden D. The file Access.txt was probably opened by another application E. Linux file names are case sensitive

E

You want to set up a computer on a local network via a static TCP/IP configuration, but you lack a gateway address. Which of the following is true? A The computer won't be able to tell which other computers are local and which are remote. B You'll be able to use the computer as a network server system but not as a network client. C Because the gateway address is necessary, no TCP/IP networking functions will work. D TCP/IP networking will function, but you'll be unable to convert hostnames to IP addresses, and vice versa. E You'll be able to communicate with machines on you local network segment but not with other systems.

E

Which philosophy was founded by Richard Stallman in 1985? A FSF B OSI C Creative commons D Trademark

A

While in vi's command mode, you can type ____ to undo a change. A. u B. Ctrl+Z

A

Why is the file data.txt empty after executing sort data.txt > data.txt? A. Because the file gets truncated before the sort is executed. B. Because sort detects that both files are the same. C. Because sort cannot sort text files only binary files. D. Because if data.txt is empty now it must have been empty before.

A

Will the newdir directory be deleted after executing the following commands? mkdir newdir touch newdir/newfile rmdir newdir A. No B. Yes

A

You can create a symbolic link from one low-level filesystem to another. A. True B. False

A

You can easily damage your Linux installation by mistyping an rm command when you log into your regular account. A. True B. False

A

You can force man to display a man page in a specific section of the manual by preceding the search name with the section number, as in man 5 passwd. A. True B. False

A

You can set a directory's time stamps with the touch command. A. True B. False

A

You want to change the username of a user from e1211 to emilyn, without altering anything else about the account. To do so, you would type A usermod -l emilyn e1211 B groupmod -l emilyn e1211

A

You want to copy a directory, MyFiles, to a USB flash drive that uses the FAT filesystem. The contents of MyFiles are as follows: $ ls -l MyFiles/ total 276 -rw-r- r- 1 jen users 129840 Nov 8 15:13 contract.odt -rw-r- r- 1 rod users 42667 Nov 8 15:12 outline.pdf -rw-r- r- 1 sam users 105979 Nov 8 15:12 Outline.PDF The USB flash drive is mounted at /media/usb, and so you type cp -a MyFiles/ /media/usb. What problem will occur when you attempt to copy these files? A One file will be missing on the USB flash drive. B One file's name will be changed during the copy. C Everything will be fine; the command will work correctly. D The command will fail because it tries to create links. E The MyFiles directory will be copied, but none of its files will be copied.

A

You want to create an account for a new user, using the username theo and giving the user a UID of 1926. The command to do this is useradd A -u 1926 theo B -a 1926 theo

A

Your shell script contains five functions. All of the five functions can run directly without calling them from the main script. A. False B. True

A

whoami provides more information than id. A False B True

A

A Linux computer has no access to the Internet. Which command displays information about the network gateway for the system? A. Ifconfig B. Traceroute C. Route D. Gateway E. Ipconfig

B

A ______ is used by a shell script to perform the same task repeatedly until a particular condition no longer met? A. Data structure B. Loop C. Comments D. Variable

B

A file with permissions of 755 can be read by any user on the computer, assuming that all users can read the directory in which it resides. A False B True HINT: The octal permission of 755 corresponds to a symbolic representation of -rwxr-xr-x, which includes world read permissions (in the final three bits of r-x). Thus anybody can read the file.

B

A text file keeps records in the following format: field1 | field2 | field3 | field4 Which of the following commands will you use to display only the information in the second field for all the records in the file? Note: Assume the name of the file to be rec.txt. A. cut -f 2 rec.txt B. cut -f 2 -d "|" rec.txt C. echo rec.txt | cut -f 2 D. cut -c 2 rec.txt

B

A type of software that's distributed for free but that requires payment on the honor system if a person uses it is called A. Freeware B. Shareware

B

A(n) ______ is a program or system configuration that blocks or enables network access to, from, or through a computer based on the criteria that you specify. A router B firewall

B

A(n) ________ computer is likely to run a word processor and web browser. A. Android phone B. desktop

B

ASCII supports _____ unique characters (not including control characters). A. 132 B. 128

B

Which network interface always exists in a Linux system? A. Wlan0 B. Lo C. Vlan0 D. Sit0 E. Eth0

B

Which of the following Linux distributions use the dpkg package management system? A. Mandriva & Red Hat B. Debian/Ubuntu C. Suse D. NULL

B

Which of the following Ubuntu releases is considered most stable and fit to use for business purposes? A. Xubuntu Server B. LTS C. Kubuntu D. Xubuntu E. Ubuntu Vanilla

B

Which of the following are core Unix tools? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. Linux kernel B. GNU tool set & X Window system C. Startup scripts D. NULL

B

Which of the following commands DO NOT display information about CPU? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. lscpu B. cpuinfo C. cat /proc/cpuinfo D. uname -a

B

Which of the following commands can be used to bring up a network interface? A. route B. ifconfig C. traceroute D. iwlist

B

Which of the following commands can be used to determine the time of the last login of a given user? A. History B. Last C. Showlog D. Recent E. Login

B

Which of the following commands can be used to remove a group from a Linux computer? A groupmod B groupdel C chgrp D groupremove

B

Which of the following commands can be used to rename a file? A. cp B. mv C. rm D. ln

B

Which of the following commands creates the subdir directory's parent directory if it doesn't already exist? A. mkdir -a ~/parent/subdir B. mkdir -p ~/parent/subdir C. mkdir -R ~/parent/subdir D. mkdir --recursive ~/parent/subdir

B

Which of the following commands displays only the names of the subdirectories, of the current directory, having names starting with k? A. ls -l k* B. ls -d k* C. ls -ald k* D. ls -ld k*

B

Which of the following commands is used to examine the kernel ring buffer? A top B dmesg C less D free

B

Which of the following commands is used to extract a compressed file? A gzip B gunzip C bzip2 D ext

B

Which of the following commands is used to partition a hard disk? A df B fdisk C pdisk D mdisk

B

Which of the following commands outputs the total time the computer's been running? A klogd B uptime C mknod D mkfifo

B

Which of the following commands searches a database for the specified keyword? A. No file searching command searches any such database B. locate C. find D. man

B

Which of the following commands should be used to compress more than two files? A bzip2 B tar C gzip D gunzip

B

Which of the following commands will you use to change the ownership of a file? A chgrp B chown C chmod D chtrfs

B

Which of the following directories stores the process id of a process? A /tmp B /proc C /etc D /var

B

Which of the following is a Linux desktop environment? A OS X B GNOME C GTK+ D Evolution

B

Which of the following is an example of an embedded computer? A Laptop B Mobile phone C Server D Desktop

B

Which of the following is not required in order for software to be certified as open source? A The program must come with source code, or the author must make it readily available on the Internet. B The license must require that changes be distributed under the same license. C The license must not require that the software be distributed as part of a specific product. D The license must not discriminate against people or groups of people. E The license must automatically apply to anybody who acquires the software.

B

Which of the following is the first process run by the Linux kernel? A. login B. init C. None of these, kernel does not run any process D. /bin/bash

B

Which of the following is the machine name portion of the pete.ucertify.com hostname? A. ucertify B. pete C. None of these, machine name is not a part of hostname D. com

B

Which of the following is true of a file with the SUID bit set? A. The file runs with the permission set on the group members of a file, instead of the executor of the file. B. The file runs with the permission set on the owner of a file, instead of the executor of the file. C. Files can be modified only by the owner of the file. D. Files cannot be deleted by other users.

B

Which of the following is used to uniquely identify a device over a network? A MAC address B IP address C Host name D User name

B

Which of the following office suites are most closely related to one another? A. GNOME Office & Calligra B. LibreOffice & Apache OpenOffice C. Microsoft Office & PowerPoint

B

Which of the following options are used with the chown command to change the ownership of all the subdirectories of a specified directory? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. -dir--subdir B. -R & --recursive C. --subdir D. NULL

B

Which of the following options cause cp to prompt before overwriting an existing file? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. -p B. -i or --interactive C. NULL D. -f

B

Which of the following options provides an interface between a hardware device and application software? A Graphical User Interface B Device driver C Operating system D BIOS

B

Which of the following commands can you use to change a file's group? A chown B ls C chmod D groupmod E groupadd HINT: Although the chgrp command is the usual one for changing a file's group, you can also use chown to do the job, so option A is correct. Option E's groupadd command adds a new group to the system, so this option is incorrect. The groupmod command can modify details of a group definition, but it doesn't change the group associated with a file, so option D is incorrect. The chmod command changes a file's mode (that is, its permissions), but not its group association, so option C is incorrect. You can use ls to learn a file's current group (among other things), but not to change it, so option B is incorrect.

A

Which of the following commands increases the number of elements in a directory A. Touch newfile OR Mkdir newdirectory B. Create newfile OR Ls newfile C. Rmdir newdirectory D. NULL

A

Which of the following commands is used to discover the sizes of several dot files in a directory? A ls -la B ls -p C ls -R D ls -d E ls -ld

A

Which of the following commands is used to lookup the current IP address of a system? A. Ifconfig B. Showip C. Sysinfo | grep ipaddress D. Ipconfig E. Less/proc/net/ipconfig

A

Which of the following commands provides the most information about your motherboard's features? A lspci B http://localhost:631 C lscpu D Xorg -configure E fdisk -l /dev/sda

A

Which of the following commands will change a specified file's permissions to rw-rw-rw-? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. chmod a+rw OR chmod a=rw B. NULL C. chmod a-rw D. chmod a+x

A

Which of the following commands will display a list of all files in the current directory, including those that may be hidden? A. Ls -a B. Ls --a C. Ls --hidden D. Ls -h

A

Which of the following commands will you use to determine the routing table for a network? A route B path C show route D show routing table

A

Which of the following commands will you use to find a pattern in a file? A grep B sed C find D locate

A

Which of the following directories is often used to store log files? A. /var B. /temp C. /dev D. /usr E. /home

A

Which of the following directories serves as a mount point for short-term mounting of additional storage media? A /mnt B /media C /home D /srv

A

Which of the following directory references refers to the current directory's parent directory? A. ../ B. / C. ~/ D. /parent/

A

Which of the following extensions is used at the end of the script name? A .sh B .sc C .sr D .st

A

Which of the following files in the /var/log directory summarizes services started via SysV startup scripts? A. boot.log B. secure C. cron

A

Which of the following is a collection of programming functions that can be used by a variety of programs? A. Libraries B. GUIs C. Shells D. Utilities

A

Which of the following is not required for software to be certified as open source? A The license must require that changes be distributed under the same license. B The program must come with source code, or the author must make it readily available on the Internet. C The license must automatically apply to anybody who acquires software. D The license must not discriminate against people or groups of people. E The license must not require that software be distributed as part of a specific product.

A

Which of the following package management tools belong to the Red Hat family of the PMS tools? A. rpm or yum B. NULL C. dpkg D. apt-get

A

Which of the following programs are Linux file managers? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. Nautilus & Dolphin B. Apache C. NULL D. Thunderbird

A

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents? A >> B > C &> D 2> E |

A

Which of the following servers is a web server? A Apache B SSH C BIND D Sendmail

A

Which of the following statements is true of the /etc/skel directory? A. The files in this directory are automatically copied to a new user's home directory when the user is created. B. This directory contains the default configuration settings for the root user. C. The contents of this directory are copied to each user's home directory at system start. D. This directory contains configuration files that define how users log into the system.

A

Which of the following text editors can be run both in the text-mode and GUI interfaces? A. emacs B. nano C. vi D. gedit

A

Which of the following types of information are returned by typing ifconfig eth0? (Select all that apply.) 1 The hardware address of eth0 2 The hostname associated with eth0 3 The gateway with which eth0 communicates 4 The names of programs that are using eth0 5 The IP address assigned to eth0 A 1 & 5 B 1, 2, 3

A

Which of the following users can change the ownership of any file? A Root users B System users C Guest users D Other users

A

Which of the following vi commands is used to open a new file for editing? A. :e B. :! C. :r D. :w

A

Which of the following will change the group that is associated with a file? A. Chown B. Chmod C. Ls -g D. Chmod -w

A

Which option is used with the touch command to update a file's timestamps only and not create the file if it doesn't exist already? A. -c B. -m C. -a D. -d

A

Which option is used with the useradd command to create a user account without creating the user's home directory? A. -M B. -N C. -m D. -s

A

The ping utility responds normally when you use it with an IP address but not when you use it with a hostname that you're positive corresponds to this IP address. What might cause this problem? (Select all that apply.) 1 Your computer's hostname may be set incorrectly. 2 Your computer's DNS configuration may be broken. 3 The route between your computer and its DNS server may be incorrect. 4 The target computer may be configured to ignore packets from ping. 5 The DNS configuration on the target system may be broken. A 1 & 5 B 2 & 3

B

The traditional name for the first Ethernet interface in Linux (but not in recent versions of Fedora) is A wlan0 B eth0

B

To create a system group, you must pass the _____option to groupadd. A -u B -r

B

To save a file and exit the vi text editor in command mode, type A. AA B. ZZ

B

Typing ls -ld wonderjaye reveals a symbolic file mode of drwxr-xr-x. Which of the following are true? (Select all that apply.) 1 All users of the system may read wonderjaye. 2 Any member of the file's group may write wonderjaye. 3 wonderjaye is a symbolic link. 4 wonderjaye is an executable program. 5 wonderjaye is a directory. A 1, 2, & 4 B 1, 5

B

UDF is a good filesystem to use for a Linux installation on a hard disk. A. True B. False

B

UIDs below 500 or 1,000 (depending on the distribution) are reserved for use by __________ accounts. A) user B) system

B

Under which version of GPL is the Linux kernel distributed? A. 3 B. 2 C. 1 D. 0

B

Unicode is useful for encoding most European languages but not Asian languages. A. True B. False

B

VMS was a common OS on x86 PCs at the time Linux was created. A. True B. False

B

Valid looping statements in Bash include for, while, and until. A False B True

B

What are the three sets of permission for a file? A. Administrator, standard user, others B. User, group, others C. User, standard user, others D. Administrator, group, others

B

What is the command that will show system boot time messages? A. Display system boot B. Dmesg C. messages D. Echo E. lspci

B

What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested? A. \ (backslash) B. . (dot) C. - (minus) D. _ (underscore)

B

What is the number called that is used to identify a process? A. Proc Num B. PID C. PIN D. Process Entry

B

What is the output of the following command?tail -n 20 test.txt A. The last 20 lines of test.txt with line numbers B. The last 20 lines of test.txt including the black lines C. The first 20 lines of test.txt D. The last 20 lines of test.txt omitting the black lines

B

What is the purpose of conditional expressions in shell scripts? A They display information about the script's computer environment. B They enable the script to take different actions in response to variable data. C They enable scripts to learn in a manner reminiscent of Pavlovian conditioning. D They cause scripts to run only at specified times of day. E They prevent scripts from executing if license conditions aren't met.

B

What permissions are set on a file with the command chmod 654 file.txt? A. --wxr-x--x B. -rw-r-xr-- C. -rwxrw--x D. Drw-r-xr-- E. D--wxr-x--

B

What three-character symbolic string represents read and execute permission but no write permission? A. r+x B. r-x C. rw-r D. rwx

B

What will be the outcome of the cat /etc/passwd | tail 4 command? A First four columns of the /etc/passwd file B Last four lines of the /etc/passwd file C First four lines of the /etc/passwd file D Last four columns of the /etc/passwd file

B

What will be the output of the cat /etc/passwd command? A List of users and groups existing on a Linux computer B List of users created on a Linux computer C List of passwords for users D List of files and associated passwords

B

What would a Linux system administrator type to remove the nemo account and its home directory? A userdel -f nemo B userdel -r nemo C rm /home/nemo D rm -r /home/nemo E userdel nemo

B

Which command displays the location of a command? A info B whereis C whatis D locate

B

Which command line can be used to search help files that mention the word "copy"? A. Man copy B. Man -k copy C. Whatis copy D. Copy -help E. Copy help

B

Which command lists permissions set on the files available in the current directory? A ls -p B ls -la C ls -ld D ls -a

B

Which file contains the following entry? search ucertify.com nameserver 10.1.1.1 nameserver 20.1.1.1 A /etc/sysconfig B /etc/resolv.conf C /etc/dns D /etc/hosts

B

Which file on a Linux system contains lines similar to the following? domain google.com nameserver 192.168.1.1 A. /etc/hosts B. /etc/resolv.conf C. /etc/fstab D. /etc/services

B

Which find command options can be used to locate files owned by a specific user? (This is normally a multi-select question however I modified it so that you can only choose one answer) A. -u B. -uid or -user C. NULL D. -name

B

Which function does a shell program serve? A. It is responsible for logging a user into the system B. It receives user commands and executes them C. It is responsible for establishing a connection to another computer D. It provides a graphical environment

B

Which hardware device forms an Ethernet LAN by linking different computers? A. Server B. Switch C. Terminal D. HDMI

B

Which interface can be used to transmit digital audio/video data? A. DVD B. HDMI C. VGA D. DVI

B


संबंधित स्टडी सेट्स

MANA 4322 ORG STRATEGY EXAM ONE - 1,2,3

View Set

InQuizitive: Chapter 15 "What is freedom?": Reconstruction, 1865-1877

View Set

BANA 2372 - Hollander - Final Exam - Chapters 1-9 - All Practice Questions, Final Exam Part 3

View Set

Advanced Accounting Exam 1 - Consolidation

View Set