Linux final exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Linux directory defined by the FHS that contains the binary commands for use by all users.

/bin

directory contains the Linux kernel and boot files

/boot

Linux directory defined by the FHS that contains device files

/dev

Linux directory defined by the FHS that contains system-specific configuration files

/etc

file is used to mount devices at boot time and it is also consulted when users do not specify enough arguments with the mount command

/etc/fstab (filesystem table)

What is the name of the file that contains a listing of all users on the system and their home directories? a. /etc/passwd b. /etc/users c. /etc/shadow d. /etc/password

/etc/passwd

file contains the encrypted password and expiration information

/etc/shadow

directory is the default location for user home directories

/home

Linux directory defined by the FHS that contains process and kernel information

/proc

Linux directory defined by the FHS that contains most system commands and utilities

/usr

Linux directory defined by the FHS that contains log files and spools

/var

1. The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

After a partition on a hard disk drive is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False?

False

Along with a listing of user accounts, the /etc/passwd file also contains information on account expiry. True or False?

False

After typing the ls -F command, you notice that there is a file whose filename begins with an * (asterisk). What does this mean? a. It is a hidden file. b. It is a linked file. c. It is a special device file. d. It is an executable file.

It is an executable file

Linux was developed by __________ to resemble the _________ operating system. a. Linus Torvalds, MINIX b. Linux Torvalds, GNU c. Richard Stallman, GNU d. Richard Stallman, MINIX

Linus Torvalds, MINIX

a Linux system involves examining log files and running performance utilities periodically to identify problems and their causes

Monitoring

refers to all of the other users on the Linux system

Other (everyone else on the Linux System) permissions

command displays the current directory in the directory tree

PWD (Print Working Directory)

Who formed the Free Software Foundation to promote open development? a. Dennie Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson

Richard Stallman

set on a file, the user who executes the file temporarily becomes the owner of the file during execution. It has no functionality when it is set on a directory. It is only applicable to binary compiled programs. Any user can test network connectivity with the ping command

SUID (Set User ID)

Which of the following can be used on Linux to provide file and print services? a. Samba b. Apache c. Quid d. Pine

Samba

is a file descriptor that refers to any error messages generated by the command

Standard error (stderr)

is a file descriptor that refers to the information processed by the command during execution, and is often takes the form of user input typed on the keyboard

Standard input (stdin)

is a file descriptor that refers to the normal output of a command

Standard output (stdout)

1. Most source code is available on the Internet in tarball format. True or False?

True

The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

1. Which two implementations of X Windows are commonly used in Linux? (Choose two answers.) a. X.org b. XFce c. Xconfigurator d. XFree86

a. X.org d. XFree86

When applied to a directory, the SGID special permission____________________. a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them b. cannot be done as it is only applied to files c. allows users the ability to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory

a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them

1. On which part of the maintenance cycle do Linux administrators spend the most time? a. monitoring b. proactive maintenance c. reactive maintenance d. documentation

a. monitoring

daemon is a system daemon that executes tasks once at a future time.

at

filter command searches for patterns of text and perform some action on the text found

awk

1. Which utility can be used to configure the video card and monitor used by X Windows in Red Hat Fedora Core 2? a. X.config b. system-config-display c. xconfig d. xvidtune

b. system-config-display

As a result, each process has a _______________________, which identifies the process that started it.

parent process ID (PPID)

a physical division of a hard drive

partition

command merges data from one file to another

paste

command is used to paginate text. This is good for printing text because it is often desirable to separate the pages of the output with several lines of white space to provide a top and bottom margin for each page

pr

Every process has a unique ___________________ that allows the kernel to identify it uniquely

process ID (PID)

command simply displays a list of processes that are running in the current shell

ps

Which command would a user type on the command line to find out what directory in the directory tree he is currently located in? a. pd b. cd c. where d. pwd

pwd

command displays the current runlevel of the system and the previous runlevel

runlevel

The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rw-rw-rw- b. rw-rw-rw- and r--r--r-- c. rw-rw-rw- and rwxrwxrwx d. rwxrwxrwx and rw-rw-rw- e. rwxrw-rw- and rwx-rw-rw-

rwxrw-rw- and rwx-rw-rw-

filter command searches for a certain string of text and replaces that text string with another text string

sed

previously used on files in the past to lock them in memory. However, they are currently applicable to directories. This ensures that a user can only delete his/her own files in a directory

sticky bit

This command updates the Linux distribution

sudo apt-get dist-upgrade

This command installs the basic word processing program called gedit on the raspberry pi. It is a great program similar to NotePad

sudo apt-get install gedit

This command updates the repositories (libraries) on the raspberry pi

sudo apt-get update

This command updates the software on the raspberry pi

sudo apt-get upgrade

This commands shuts down the computer in 15 minutes?

sudo shutdown -h +15

This commands restarts the computer right now?

sudo shutdown -r now

link is where one file is simply a pointer or shortcut to another file

symbolic

command displays the last 10 lines by defaultcommand displays the last 10 lines by default

tail

utility is one of the oldest and most widely used backup utilities. It can create an archive in a file on a filesystem or directly on a device.

tape archive (tar)

command is a filter command that takes information from Standard Input and sends that information to a file, as well as to Standard Output

tee

State the two required partitions (at a minimum) for a Linux system

the root partition the swap partition for virtual memory

command displays an interactive screen listing processes organized by processor time. Processes that use the most processor time are listed at the top of the screen

top

command can be used to replace characters in a file sent via Standard Input

tr

As daemon processes are not associated with terminals, you must use the -e switch with the ps command to view them. True or False?

true

If these default permissions are too permissive, a special variable on the system named ________________ takes away permissions on new files and directories immediately after they are created. This command is meant to be used for newly created files and directories.

umask(user mask)

command is used to find duplicate lines from a sorted file. (sorted first then you need words)

uniq

refers to the owner of a file or directory

user (owner) permissions

a partition with its own filesystem

volume

command only searches for executable files in directories that are listed in a special variable called the PATH variable in the current BASH shell

which

command is used to display the contents of a compressed file using the gzip utility

zcat

While a process is waiting for its parent process to release the PID, the process is said to be in a ________________ state, because it has finished but retains a PID.

zombie

What are the three standard Linux permissions?

execute, read, write

command creates partitions after installation. The user needs to specify the hard disk partition as an argument

fdisk

command does not use a premade index of files, but instead searches the directory tree recursively starting from a certain directory for files that meet a certain criterion

find

command checks a filesystem for errors

fsck (filesystem check)

is the protocol most commonly used to transfer files on public networks

ftp

A __________________________ backup archives all of the data on the filesystem.

full

command is used to display lines in a text file that match a certain common regular expression

grep (global regular expression print)

refers to the users with the ability to change permissions on a file or directory

group owner permissions

uses the .gz filename extension by default and can control the level of compression via a numeric option (based on time needed to compress the file).

gzip utility

link is where two files share the same data

hard

command views the first ten lines of a file. (gives you the first ten lines)

head

files that are not normally displayed to the user and ls -a command displays all files them

hidden files

shuts down your raspberry pi

init 0

reboots your raspberry pi

init 6

command lists all background processes running in the current shell

jobs

command is the most common command used to terminate a process. It sends a kill signal to the process.

kill

command kills all instances of a process by the command name. It uses the process name instead of its PID

killall

command is the fastest method to search for files in the Linux directory tree

locate

command lists the files in a directory

ls

command is used to format a disk device with a filesystem

mkfs (make filesystem)

command displays the text files page-by-page. You can use the space bar to go to the next page or you can use the enter key to go to the next line

more

Each line of the /etc/shadow file has the following colon-delimited format:

name:password:lastchange:min:max:warn:disable1:disable2

command scans the ports on network computers

nmap (network mapper)

command prevents the background processes from being killed when parent shell is killed or exited

nohup

What is the most common open source Web server available for Linux? a. Samba b. Apache c. Quid d. Pine

Apache

1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH

BASH

1. After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.

User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

is a core component of the Linux GUI. It provides the ability to draw graphical images in windows that are displayed on the terminal screen

X Windows

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need to have support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules

a,c

1. Which filename extension indicates a tarball? a. .tar.gz b. .cpio c. .dump d. .tar

a. .tar.gz

1. You have created a full backup and four incremental backups. In which order must you restore these backups? a. 0, 1, 2, 3, 4 b. 0, 4, 3, 2, 1 c. 4, 3, 2, 1, 0 d. 1, 2, 3, 4, 0

a. 0, 1, 2, 3, 4

command is used to compress files using the Burrows-Wheeler Block Sorting Huffman Coding compression algorithm

bzip2

4. Which runlevel halts the system? a. 1 b. 6 c. 0 d. 5

c. 0

1. You want to see the filesystems that are presently in use on the system. What command could you use? a. cat /etc/fstab b. ls -l /etc/fstab c. cat /etc/mtab d. ls -l /etc/fstab

c. cat /etc/mtab

12. The first daemon loaded on a Linux system is ___________. a. initstate b. inittab c. init d. linux

c. init

Which process will always have a PID of 1 and a PPID of 0? a. the kernel itself b. ps c. init d. top

c. init

command displays the contents of a text file to the screen

cat

command is used to change the current directory in the directory tree

cd (change directory)

command changes the mode (permissions) of files or directories. (change permissions)

chmod (change mode)

daemon is a system daemon that executes tasks repetitively in the future

cron

The killall command terminates _________. a. all instances of a process with the same PPID b. all instances of a process with the same PID c. all instances of a process with the same priority d. all instances of a process with the same name

d. all instances of a process with the same name

A runaway process that is faulty and consuming mass amounts of system resources ________. a. is a zombie process b. is an orphaned process c. has a PPID of Z d. is a rogue process

d. is a rogue process

Which command entered without arguments is used to display a list of processes running in the current shell? a. ppid b. list c. pid d. ps

d. ps

is a system process that is not associated with a terminal

daemon process

command is used to detect the differences between files

diff

1. The tac command _________. a. is not a valid Linux command b. displays the contents of hidden files c. displays the contents of a file in reverse order last word on the line first and first word on the line last d. displays the contents of a file in reverse order last line first and first line last

displays the contents of a file in reverse order last line first and first line last


संबंधित स्टडी सेट्स

The Legal Environment of Business Exam #3

View Set

MKTG 409 (Integrated Marketing Communications)

View Set

Volleyball Review (7th and 8th Grade)

View Set

MSM 6610, 6633, 6635, 6645 Study Guide

View Set

Chapter 2 - Managing Public Issues and Stakeholder Relationships

View Set

Unit 6: Learning: 6.1 What is Learning?

View Set

IAAP CPACC Certification: Accessibility and Universal Design

View Set

Foreign Corrupt Practices Act (FCPA)

View Set