Questions
QUESTION NO: 315 CORRECT TEXT Which program lists information about files opened by processes and produces output that can be parsed by other programs?
Answer: lsof
QUESTION NO: 5 The command echo $! will produce what output? A. the process id of last background command B. the exit status of the last command C. the exit status of the last background command D. the process id of the current shell E. the name of the command being executed
A. the process id of last background command
QUESTION NO: 146 CORRECT TEXT What argument to the name flag of find will match files or directories beginning with a '.' (period)?
Answer: .\*
QUESTION NO: 3 CORRECT TEXT Which command (without options) would you use to display how much space is available on all mounted partitions?
Answer: /BIN/DF
QUESTION NO: 294 CORRECT TEXT Which file contains configuration data for automount? Please enter the complete path.
Answer: /ETC/AUTO.MASTER
QUESTION NO: 307 CORRECT TEXT Which site-specific configuration file for the shadow login suite must be modified to log login failures? Please enter the complete path to that file.
Answer: /ETC/LOGIN.DEFS
QUESTION NO: 292 CORRECT TEXT A database application requires a maximum shared memory segment (shmmax) of 2GB (2147483648 Bytes). Which configuration permanently? Please enter the complete path to the file.
Answer: /ETC/SYSCTL.CONF
QUESTION NO: 85 CORRECT TEXT You are building a server that will be the file server for all users on your 100 user network. The server may have many hardware and operating system upgrades. Which directory should have its own mount point and/or hard drive?
Answer: /HOME
QUESTION NO: 34 CORRECT TEXT What command is used to display a file in octal format?
Answer: /USR/BIN/HEXDUMP
QUESTION NO: 16 CORRECT TEXT Which program finds only files that are in your Path?
Answer: /USR/BIN/WHICH
QUESTION NO: 83 CORRECT TEXT You have written a custom tool on your local system. Following the File Hierarchy Standard (FHS), where should you install the binaries to be available to all users on your system?
Answer: /USR/LOCAL/BIN
QUESTION NO: 194 CORRECT TEXT By default, which directories contents will be copied to a new user's home directory when the account is created, passing the m option to the useradd command?
Answer: /etc/skel /etc/skel/
QUESTION NO: 210 CORRECT TEXT Which file lists which users can execute commands using sudo? (Provide the full path and filename)
Answer: /etc/sudoers
QUESTION NO: 50 CORRECT TEXT To prevent users from being able to fill up the / partition, the directory should be on a separate partition if possible because it is world writeable.
Answer: /var
QUESTION NO: 100 Which command is used to dump files in octal format? A. od B. octdump C. dumpoct D. cat-o
Answer: A
QUESTION NO: 104 What command line redirection characters instruct the shell to read from the current input source until a specific word, on a separate line and without and trailing spaces, is reached? A. « B. <| C. !< D. &<
Answer: A
QUESTION NO: 117 Which file is used by Id.so to find libraries quickly without actually having to search the directories in its library path? A. /etc/Id.so.cache B. /etc/Id.so.conf C. /etc/Id.so D. /var/ld/cache E. /var/.cache
Answer: A
QUESTION NO: 12 Using vi, you want to save changes to the file my file with :w!, but vi complains it cannot write to the file. Therefore, you want to check the write permissions on the file. To do this without leaving vi, you type: A. :!ls-I myfile B. :\ls-l myfile C. esc :Is -I myfile D. :?ls-l myfile
Answer: A
QUESTION NO: 126 When reading man pages, a lot of extra characters are shown on screen. Which of the following commands can help to deal with this problem? A. col B. grep C. more D. pg E. row
Answer: A
QUESTION NO: 127 Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system. A. /dev/hdb3 B. /dev/hdlb3 C. /dev/hddb3 D. Zdev/hdcld2p3
Answer: A
QUESTION NO: 145 Which of the following find commands will print out a list of suid root files in /usr? A. find /usr uid 0 perm +4000 B. find user root +mode +s /usr C. find type suid username root d /usr D. find /usr ls \*s\* u root E. find /usr suid perm +4000
Answer: A
QUESTION NO: 172 Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services? A. tcpd B. inetd C. fingerd D. mountd E. xinetd
Answer: A
QUESTION NO: 18 Given the following output: prompt> myapp [1]+ Stopped myapp prompt> Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt? A. bg myapp B. continue myapp C. exec myapp D. fg myapp E. myapp &
Answer: A
QUESTION NO: 181 Which command will print the exit value of the previous command to the screen in bash? A. echo $? B. echo $# C. echo $exit D. echo $status E. echo $&
Answer: A
QUESTION NO: 183 What output will the following command sequence produce? echo'1 2 3 4 5 6' | while read a b c; do echoresult: $c $b $a; done A. result: 3 4 5 6 2 1 B. result: 1 2 3 4 5 6 C. result: 6 5 4 D. result: 6 5 4 3 2 1 E. result: 3 2 1
Answer: A
QUESTION NO: 195 What output will the following command produce? seq1 5 20 A. 1 6 11 16 B. 1 5 10 15 C. 1 2 3 4 D. 2 3 4 5 E. 5 10 15 20
Answer: A
QUESTION NO: 20 What command will print a list of usernames (first column) and their corresponding user id (uid, third column) from /etc/passwd? A. cut -d: -f 1,3 /etc/passwd B. chop -c 1,3 /etc/passwd C. tac 1-3/etc/passwd D. fmt -u /etc/passwd
Answer: A
QUESTION NO: 234 What should the permission settings be for /etc/passwd and /etc/shadow? A. /etc/passwd: rwrr /etc/shadow: r B. /etc/passwd: r /etc/shadow: rwrr C. /etc/passwd: rwrr /etc/shadow: rwrr D. /etc/passwd: r /etc/shadow: r
Answer: A
QUESTION NO: 236 You discovered a pending job for the at command. Which of the following do you have to use to remove it? A. atrm B. atq r C. at e D. rmat
Answer: A
QUESTION NO: 25 Which system administration command you can use to update Id.so.cache after the installation of new shared libraries? A. Idconfig B. Idd C. libpath D. newlibs
Answer: A
QUESTION NO: 27 Which Debian package system command will list all partially installed packages and suggest how to get them correctly installed? A. dpkg-G B. apt-get-u C. dpkg-Dh D. dpkg-l E. apt-get-y
Answer: A
QUESTION NO: 270 During which stage of the boot process would this message be seen? ide0: BM-DMA at 0xff00-0xff07, BIOS settings: hda:DMA, hdb:DMA A. Kernel loading. B. Hardware initialization and setup. C. Boot loader start and hand off to kernel. D. Daemon initialization and setup.
Answer: A
QUESTION NO: 278 One of the IDE hard drives in a server is transferring data very slowly. What command must be run to enable DMA on it? A. hdparm -d 1 /dev/hda B. hdparm -dma /dev/hda C. hdparm -d /dev/hda1 D. hdparm -d /dev/hda E. hdparm -dma /dev/hda1
Answer: A
QUESTION NO: 28 What information is displayed by the command cat/proc/dma? A. whether DMA is enabled B. which DMA channels are in use C. which DMA mode is in use D. general information about DMA on the machine
Answer: A
QUESTION NO: 308 When bash is invoked as an interactive login shell, which of the following sentences is true? A. It first reads and executes commands in /etc/bashrc and then does the same for /etc/profile. B. It ignores /etc/profile and only reads and executes commands in ~/.bashrc. C. It first reads and executes commands in /etc/profile and then does the same for ~/.bash_profile,~/.bash_login and ~/.profile. D. It first reads and executes commands in /etc/profile and then does same for ~/.bash_profile and~/.bashrc. E. It reads and executes commands in ~/.bashrc only if /etc/profile or another initialisation script calls it.
Answer: A
QUESTION NO: 35 Which of the following commands will find the string foo in the file filel M, regardless of foo being in upper or lower case letters? A. catfilel.txt| grep-ifoo B. cat file 1.txt > grep-n foo C. grep-i foo | file 1 .txt D. grep-nfilel.txt<foo E. grep-nfoofile1.txt
Answer: A
QUESTION NO: 38 After a minor security incident you are instructed by your lead sys-admin to verify the RPMs installed on a running system. Which command will create a complete report that you can analyze for changes that may be security-related? A. rpm -Va > report B. rpm-Qavy > report C. rpm -Vqt -nomd5 > report D. rpm-checkfiles > report E. rpm -VA.nofiles > report
Answer: A
QUESTION NO: 6 You are using quota on your system. How can you see disk quota details? A. repquota B. quotA.I C. quota D. quotacheck E. quotA.List
Answer: A
QUESTION NO: 60 You want the default permissions for your files to bE.rw-r-. How must you set umask? A. 037 B. 640 C. 038 D. 027
Answer: A
QUESTION NO: 7 What is the difference between thE.remove and thE.purge action with the dpkg command? A. -remove removes the program, -purge also removes the config files B. -remove only removes theprogram, -purge only removes the config files C. -remove removes a package, -purge also removes all packages dependent on it D. -remove removes only the package file itself, -purge removes all files related to the package
Answer: A
QUESTION NO: 84 You are experimenting with a binary in /tmp/foo.d that expects its configuration file at/etc/foo.conf. You don't want to save it there, but use a symbolic link to /tmp/foo.d/foo.conf instead. Which command would accomplish that? A In -s /tmp/foo.d/foo.conf/ etc/foo.conf A. In /tmp/foo.d/foo.conf/ etc/foo.conf B. In-s/etc/foo.conf /tmp/foo.d/foo.conf C. In /etc/foo.conf /tmp/foo.d/foo.conf
Answer: A
QUESTION NO: 90 You want to install a new software package, but it is only available in RPM format and you are running Debian Linux. Which of the following would help you to install it on your system? A. alien B. apt-conf C. dselect D. cpio
Answer: A
QUESTION NO: 171 Which commands can you use to change a user's password expiry information? (Choose THREE correct answers.) A. usermod B. passwd C. chattr D. chage E. chsh
Answer: A,B,D
QUESTION NO: 15 What does the Filesystem Hierarchy Standard enable? (Select TWO answers) A. software to predict the location of installed files and directories B. software to predict the ownership and access rights to files and directories C. users to predict the location of installed files and directories D. users to predict how the filesystem should be formatted according to need
Answer: A,C
QUESTION NO: 81 Which of the following programs is typically used to query installed debian packages? (Please select TWO that apply). A. dpkg B. apt-cache C. apt-conf D. dselect
Answer: A,D
QUESTION NO: 281 Consider the following excerpt from an RPM spec file: Summary: Complete Web authoring system for linux Name: nvu Version: 0.50 Release: 5 Source0:%{name}-%{version}.tar.bz2 PatchO: nvu-freetype2. patch. bz2 Patchl: nvu-mozilla-l.l- system-myspell-dicts.patch.bz2 Patch2: nvu-mozilla-1.7-spellcheck-full-lan License:MPL/LGPL/GPi-Group: Development/Other Url: http://www.nvu.com BuildRoot:%{_tmppath}/%{name}-buildroot BuildRequires: libjpeg-devel libpng-devel liblDL-devel BuildRequires: ziptcsh BuildRequires: gtk+2-devel >= 2.2.0 Which TWO of the following sentences are true about this package? A. Package gtk+2-devel version 2.2.0 or higher needs to be present in the system before this nvu package may be installed. B. The file nvu-freetype2.patch.bz2 must be present in the SOURCES/PATCHES directory. C. The macro %_tmppath must be defined in system-wide or in local configuration files. D. The nvu-0.50.tar.bz2 will be unpacked into %{_tmppath}/%{name}-buildroot. E. The nvu-0.50.tar.bz2 file contains pristine sources for nvu.
Answer: A,E
QUESTION NO: 257 CORRECT TEXT Please enter, separated with a space but without paths, the TWO archive programs needed in addition to gzip, to extract files from a .deb file without using the Debian package manager.
Answer: ARTAR
QUESTION NO: 103 The sticky bit is usually set on A. /var/log B. /tmp C. /home D. log files
Answer: B
QUESTION NO: 114 A Makefile typically contains which targets? A. CFLAGS, CPPFLAGS, LIBS, LDFLAGS B. clean, install, uninstall C. PATHS, DESTDIR, LIBS, LDFLAGS D. prefix, exec_prefix, bindir, mandir
Answer: B
QUESTION NO: 121 Which utility would you use to change how often a filesystem check was performed over an EXT2 filesystem (without losing any data stored on that filesystem)? A. mod2fs B. fsck C. tune2fs D. mke2fs 3 E. fixe2fs
Answer: B
QUESTION NO: 13 Which of these commands allows you to use shared libraries that are in /usr/local/lib? A. export LD_PRELOAD=/usr/local/lib B. export LD_UBRARY_PATH=/usr/local/lib C Idconfig/usr/local/lib D.ldd/usr/local/lib
Answer: B
QUESTION NO: 132 Which of the following commands will list the quota for a specific user, foobar? A. repquotafoobar B. quota foobar C. Isquota foobar D. printquota foobar
Answer: B
QUESTION NO: 14 You are looking for an executable file foo. Select the command that would search for foo within directories set in the shell variable, PATH. A. locate B. which C. find D. query E. whereis
Answer: B
QUESTION NO: 152 In the following command and its output, echo$$ 12942 whatis 12942? A. the process ID of the echo command B. the process ID of the current shell C. the process ID of the last command executed D. the process ID of the last backgrounded command
Answer: B
QUESTION NO: 184 What output will the following command seq 10 produce? A. A continuous stream of numbers increasing in increments of 10 until stopped. B. The numbers 1 through 10 with one number per line. C. The numbers 0 though 9 with one number per line. D. The number 10 to standard output.
Answer: B
QUESTION NO: 217 Which of the following is the best way to list all defined shell variables? A. env B. set C. env a D. echo $ENV
Answer: B
QUESTION NO: 218 Which command allows you to make a shell variable visible to subshells? A. export $VARIABLE B. export VARIABLE C. set $VARIABLE D. set VARIABLE E. env VARIABLE
Answer: B
QUESTION NO: 233 What benefit does an alias provide? A. It provides faster lookups for commands. B. It prevents having to type long commands C. It hides what command you are running from others. D. It creates a local copy of a file from another directory.
Answer: B
QUESTION NO: 239 Which of the following configuration files should be modified to set default shell variables for all users? A. /etc/bashrc B. /etc/profile C. ~default/.bash_profile D. /etc/skel/.bashrc E. /etc/skel/.bash_profile
Answer: B
QUESTION NO: 287 Which pseudo-file contains information on the status of software RAID devices? A. /proc/mdstatus B. /proc/mdstat C. /proc/raidstat D. /proc/raidstatus E. /proc/raid/status
Answer: B
QUESTION NO: 301 What command can be used on an existing (formatted) partition, to configure the interval between disk checks when mounting partitions? A. e2fsckconfig B. tune2fs C. mke2fs D. config2fs E. e2fsck
Answer: B
QUESTION NO: 306 Which command displays information about connected USB devices? A. cat /proc/usb/devices B. cat /proc/bus/usb/devices C. cat /proc/usbdevices D. cat /proc/usbbus/devices E. cat /proc/hotplug/usb
Answer: B
QUESTION NO: 313 Which command would you use to apply a diff file to an original? A. cat diff-file << kernel B. patch < diff-file C. cat diff-file >> kernel D. patch << diff-file E. patch > diff-file
Answer: B
QUESTION NO: 40 Select the line that best represents what permissions the /etc/passwd file should have. A. -rw------- 1 root root 531 Jun 5 22:45/etc/passwd B. -rw-r?r- 1 root root 531 Jun 5 22:45/etc/passwd C. -rw-r-r- 1 1 1 531 Jun 5 22:45/etc/passwd D. all answers listed are not correct E. all answers listed are correct
Answer: B
QUESTION NO: 42 Which command will print out the attributes of the file foobar? A. Is-attrfoobar B. Isattr foobar C. printattr foobar D. fileattr foobar
Answer: B
QUESTION NO: 51 Which of the following commands will print the inode usage on each mounted filesystem? A. du-i B. df-i C. Isfs-i D. printfs-i
Answer: B
QUESTION NO: 55 How can you turn off the group quota in /pub? A. quotaoff/pub B. quotaoff-gv/pub C. quotadown /pub D. rm/pub/quota.group
Answer: B
QUESTION NO: 59 Which command will create an ext3 filesystem on /dev/hda2? A. /sbin/mke2fs -d /dev/hda2 B. /sbin/mke2fs -j /dev/hda2 C. /sbin/mke2fs -m 3 /dev/hda2 D. /sbin/mke2fs -c ext3 /dev/hda2
Answer: B
QUESTION NO: 62 Which RPM command will output the name of the package which installed the file /etc/exports? A. rpm -F /etc/exports B. rpm -qf /etc/exports C. rpm -Kl /etc/exports D. rpm -qp /etc/exports E. rpm -qi /etc/exports
Answer: B
QUESTION NO: 66 Which command will print to standard out only the lines that do not begin with # (pound symbol) in the file foobar? A. /bin/grep ^#foobar B. /bin/grep-v ^# foobar C. /bin/grep #$ foobar D. /bin/grep -v #$ foobar
Answer: B
QUESTION NO: 67 What does the following command do? cat '$TEST' A. Displays a bash syntax error message. B. Displays the contents of the file named $TEST if it exists. C. Waits for the user to enter text and then echos the text back. D. Displays the contents of the file named inside the back quotes. E. Displays the contents of the file named by the environment variable TEST.
Answer: B
QUESTION NO: 69 What tool can you use to print shared library dependencies? A. Idconfig B. Idd C. libdep D. libpath E. Idev
Answer: B
QUESTION NO: 87 Pressing the Ctrl-C combination on the keyboard while a command is executing in the foreground sends which of following signal codes? A. 1 (SIG HUP) B. 2(SIGINT) C. 3(SIGQUIT) D. 9(SIGKILL) E. 15(SIGTERM)
Answer: B
QUESTION NO: 9 You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo? A. foo and bar would both be removed. B. foo would be removed while bar would remain accessible. C. foo would beremoved, bar would still exist but would be unusable. D. Both foo and bar would remain accessible. E. You would be asked whether bar should be removed.
Answer: B
QUESTION NO: 92 The command mkfs -t ext3 -T largefile /dev/hdb1 creates what size of inode? A. 4 kilobyte B. 1 megabyte C. 2 megabyte D. 4 megabyte
Answer: B
QUESTION NO: 314 The swap usage on a system needs to be checked. Which TWO commands can be used to display a swap usage summary? A. swapconfig B. cat /proc/swaps C. swapon -s D. swapshow E. cat /etc/fstab
Answer: B,C
QUESTION NO: 203 Which statements are true regarding the following syslog.conf configuration directive? *.err;kern.notice;auth.notice /dev/console (Select THREE correct answers) A. Severity crit messages from all facilities will be directed to /dev/console B. Severity notice messages from the auth facility will be directed to /dev/console C. Severity notice messages from the kern facility will be directed to /dev/console D. Severity err messages from the mail facility will be directed /dev/console E. Severity notice messages from all facilities will be directed to /dev/console
Answer: B,C,D
QUESTION NO: 131 George is planning a partition scheme for a new Linux installation. Which THREE directories should he consider for separate partitions? (Select three) A. /etc B. /home C. /var D. /lib E. /tmp
Answer: B,C,E
QUESTION NO: 258 Which TWO of the following options are valid, in the /etc/exports file? A. rootsquash B. rw C. norootsquash D. ro E. uid
Answer: B,D
QUESTION NO: 95 CORRECT TEXT What command can put suspended jobs into the background?
Answer: BG
QUESTION NO: 10 Which of the following commands will change all CR-LF pairs in an imported text file, userlist.txt, to Linux standard LF characters and store it as newlist.txt? A. tr '\r\n'" < userlist.txt > newlisttxt B. tr -c '\n\r'" < newlist.txt > userlist.txt C. tr -d V < userlist.txt > newlisttxt D. tr V V userlist.txt newlist.txt E. tr-s /AM' /AJ' userlist.txt newlist.txt
Answer: C
QUESTION NO: 102 Which of the following commands will display the last 30 lines of /var/log/bigd.log as well as new content as it is appended to the file by another process? A. cut-30-v/var/log/bigd.log B. heaD.30-e/var/log/bigd.log C. tail-f-n 30/Var/log/bigd.log D. taC.30/var/log/bigd.log E. cat-r-n 30/var/log/bigd.log
Answer: C
QUESTION NO: 107 To what environment variable will you assign or append a value if you need to tell the dynamic linker to look in a build directory for some of a program's shared libraries? A. LD_LOAD_PATH B. LD_UB_PATH C. LD_UBRARY_PATH D. LD_SHARE_PATH E. LD RUN PATH
Answer: C
QUESTION NO: 11 You wish to kill a process with a PID of 123. Select the command which exiting. A. kill-1 123 B. kill-9 123 C. kill-15 123 D. kill-17 123
Answer: C
QUESTION NO: 110 What single command (no options or arguments) can be used to fully extract a file called abc.tar.bz2? ) A. gzip B. gunzip C. tar D. bz2unzip
Answer: C
QUESTION NO: 113 Which chown command will change the ownership to foo and the group to bar on a file named biglist? A. chown foo/bar biglist B. chown-u foo-g bar biglist C. chown foo:bar biglist D. chown-user foo-group bar biglist
Answer: C
QUESTION NO: 119 How can you update a package only if an earlier version is currently installed on the system? A. rpm-update rpmname B. rpm-U rpmname C. rpm -F rpmname D. rpm-force rpmname E. rpm-u rpmname
Answer: C
QUESTION NO: 122 An installed package is broken. In order to go back to previous version of the same package which RPM option should be used? A. -replacefiles B. -replacepkgs C. -oldpackage D. -nodeps
Answer: C
QUESTION NO: 134 The files in the /etc/skel directory are used by the A. pwconv command. B. pwunconv command. C. useradd command. D. passwd command.
Answer: C
QUESTION NO: 139 Which bash option will prevent you from overwriting a file with a ">"? A. set o safe B. set o noglob C. set o noclobber D. set o append E. set o nooverwrite
Answer: C
QUESTION NO: 151 To test a shell script called myscript, the environment variable FOOBAR must be removed temporarily. How can this be done? A. unset v FOOBAR B. set a FOOBAR="" C. env u FOOBAR myscript D. env i FOOBAR myscript
Answer: C
QUESTION NO: 169 To prevent a specific user from scheduling tasks with at, what should the administrator do? A. Add the specific user to /etc/at.allow file. B. Add the specific user to [deny] section in the /etc/atd.conf file. C. Add the specific user to /etc/at.deny file. D. Add the specific user to nojobs group. E. Run the following: atd deny [user].
Answer: C
QUESTION NO: 17 To allow a regular user account to mount and unmount a filesystem (for instance, a cdrom or floppy), which option need to be added to the corresponding line in /etc/fstab? A. nouidchk B. alluser C. user D. auto
Answer: C
QUESTION NO: 178 Which configuration file does sudo read when determining if a user is permitted to run applications with root privileges? A. /etc/groups B. /etc/passwd C. /etc/sudoers D. /etc/sudo.conf
Answer: C
QUESTION NO: 21 You have run out of disk space on a partition. Which of the following would be an easy way to move data to a new partition without reconfiguring the path to the data in existing applications? A. Run ext2fs ACL. B. Use a hard link. C. Use a symbolic link. D. Use the loopback device. E. Create a block device offset.
Answer: C
QUESTION NO: 244 On a system using shadowed passwords, the correct permissions for /etc/passwd are and the correct permissions for /etc/shadow are . A. rwr, r B. rwrr, rrr C. rwrr, r D. rwrrw,rr E. rw, r
Answer: C
QUESTION NO: 246 Of the ways listed, which is the best way to temporarily suspend a user's ability to interactively login? A. Changing the user's UID. B. Changing the user's password. C. Changing the user's shell to /bin/false. D. Removing the user's entry in /etc/passwd.
Answer: C
QUESTION NO: 256 What command is used to force a file-system check, when rebooting? A. shutdown -c -r now B. fsck -r C. shutdown -F -r now D. shutdown -f now E. reboot -f
Answer: C
QUESTION NO: 31 In bash, inserting 1>&2 after a command redirects A. standard error to standard input. B. standard input to standard error. C. standard output to standard error. D. standard error to standard output. E. standard output to standard input.
Answer: C
QUESTION NO: 39 The command used to determine a file's type is A. type B. find C. file D. Is
Answer: C
QUESTION NO: 41 What command should be invoked to give the user sally read and write, but not execute, access to the file strategy.txt using Extended ACL entries? A. setfacl -setperm sally:rw strategy.txt B. setfacl -m user::sally+rw strategy.txt C. setfacl-m user: sally; rwstrategy.txt D. setfacl -setperm user:sally+rw strategy.txt
Answer: C
QUESTION NO: 53 While using the vi editor, you wish to move ahead one page. You should press the control key and: A. A B. D C. F D. U
Answer: C
QUESTION NO: 58 What RPM command would show you detailed information for a package called openssh- 3.6.i386.rpm? A. rpm-showinformation openssh-3.6.i386.rpm B. rpm-showdetails-package openssh-3.6.i386.rpm C. rpm-query-info-package openssh-3.6.i386.rpm D. rpm-verify openssh-3.6.i386.rpm
Answer: C
QUESTION NO: 61 Which command will print line numbers before each line in a file? A. In B. nl C. cat-n D. numline
Answer: C
QUESTION NO: 64 You logged in as user tuxl, but now you want to switch users to tux2 with tux2's environment. How would you do this? A. su tux2 B. su-etux2 C. su - tux2 D. su -m tux2 E. su-ftux2
Answer: C
QUESTION NO: 68 You are the system administrator for a consulting firm where several people use Linux as their desktop operating system. One of your users has installed a commercial publishing program that works under X on a variety of UNIX and Linux platforms. The user made a series of configuration changes regarding the initial window size, location and color. Now, he is having difficulty undoing these changes and is asking for your help. In which file would you think you would most likely find the configuration settings you are seeking to change? A. ~/.xinitrc B. ~/.xconfig C. ~/.Xdefaults D. ~/.XF86Config E. /etc/X11/XF86Config
Answer: C
QUESTION NO: 79 Which command line option would you use to restrict the GNU find command to searching a particular number of subdirectories? A. -max-dirs B. -dirmax C. -maxdepth D. -S E. -n
Answer: C
QUESTION NO: 124 CORRECT TEXT Which file the /proc filesystem lists parameters passed from the bootloaderto the kernel?
Answer: CMDLINE
QUESTION NO: 105 In order to append the output of Is to a file called bazz, which of the following command lines would you use? A. Is > bazz B. Is >&bazz C. Is &> bazz D. Is » bazz
Answer: D
QUESTION NO: 106 Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file 1 log? A. cat < myapp | cat > filel .log B. myapp 0>S1 | cat>filel.log C. myapp | cat > filel .log D. myapp | tee filel Jog E. tee myappfile1.log
Answer: D
QUESTION NO: 109 You want to preview where the package file, apachE.xml.i386.rpm, will install its files before installing it. What command do you issue? A. rpm-qp apachE.xml.i386.rpm B. rpm-qv apachE.xml.i386.rpm C. rpm-ql apachE.xml.i386.rpm D. rpm-qpl apachE.xml.I386.rpm
Answer: D
QUESTION NO: 116 You installed a beta rpm package, but are experiencing some problems with it. How can you remove this package? A. rpm-qe rpmname B. rpm-v-remove rpmname C. rpm-r rpmname D. rpm-d rpmname E. rpm-ev rpmname
Answer: D
QUESTION NO: 129 Where can lilo place boot information? A. The boot ROM B. The boot RAM C. The /boot partition D. The MBR on a hard drive
Answer: D
QUESTION NO: 140 The system utility that automatically creates new log files and moves old ones is called what? A. newlog B. mvlog C. rotatelog D. logrotate
Answer: D
QUESTION NO: 170 Which command is used to display user resource limits? A. uname B. limit a C. usrlmt D. ulimit
Answer: D
QUESTION NO: 23 Which of the following commands makes /bin/foo executable by everyone but writable only by its owner? A. chmod 557 /bin/foo B. chmod o+rwx.a+rx/bin/foo C. chown 557 /bin/foo D. chmod 755/bin/foo
Answer: D
QUESTION NO: 247 You have a user whose account you want to disable but not remove. What should you do? A. Edit /etc/gshadow and just remove his name. B. Edit /etc/passwd and change all numbers to 0. C. Edit /etc/shadow and remove the last field. D. Edit /etc/passwd and insert an * after thefirst : . E. Edit /etc/group file and put a # sign in front of his name.
Answer: D
QUESTION NO: 26 What is the output when the following shell script executes? cat<<foobar Hello foobar Foobar A. The contents of the file foobar. B. Hello C. No output but a file named foobar is created. D. Hello foobar E. Hello foobar foobar
Answer: D
QUESTION NO: 265 How can DMA be enabled for the device /dev/hda? A. echo "1" >/proc/ide/hda/dma B. sysctl -w dev.ide.dma=l C. dma add /dev/hda D. hdparm -d 1 /dev/hda E. insmod dma dev=/dev/had
Answer: D
QUESTION NO: 266 What command must be used to create an ext3 file-system? A. mkext3fs B. mkjfs C. mke3fs D. mke2fs E. mkext2fs
Answer: D
QUESTION NO: 268 During which stage of the boot process would this message be seen? ide_setup: hdc=ide-scsi A. Daemon initialization and setup. B. Boot loader start and hand off to kernel. C. Hardware initializiation and setup. D. Kernel loading.
Answer: D
QUESTION NO: 273 Which of the following commands can be used to access the content of a ramdisk file (/boot/initrd) used by the kernel at boot time? A. cp /boot/initrd /tmp/initrd.gz; gunzip initrd.gz; mount /tmp/initrd /mnt/ B. mkintird -d /boot/initrd; mount /boot/initrd /mnt/ -o loop C. cp /boot/initrd /tmp/initrd.gz; mount /tmp/initrd /mnt/ -o loop D. cp /boot/initrd /tmp/initrd.gz; gunzip initrd.gz; mount /tmp/initrd /mnt/ -o loop E. mount /boot/initrd /mnt/ -o loop; cat /mnt
Answer: D
QUESTION NO: 291 Where should the LILO code reside, on a system with only one installation of Linux and no other operating systems? A. In the boot sector. B. In the /boot directory. C. At the start of the kernel. D. In the master boot record.
Answer: D
QUESTION NO: 303 What information does the file modules.dep provide? A. A list of all modules compiled for this kernel. B. A list of modules the kernel needs to run. C. A list of all modules available to the kernel. D. A list of modules required by each module. E. A list of devices and their module name.
Answer: D
QUESTION NO: 43 You are preparing a new set of shared libraries in /usr/local/applib and you have written and compiled some code that uses these libraries. You have already performed an Idconfig, however the system still cannot find the shared libraries. What is most likely the cause of this? A. You used the wrong compil|er. B. You did not update your PATH variable. C. You compiled the code with wrong library. D. You forgot to put the library path in ld.so.conf.
Answer: D
QUESTION NO: 52 In GRUB'S configuration file you find the line root (hd1,4) What is corresponding device name on a Linux system? A. /dev/hda4 B. /dev/hda5 C. /dev/hdb4 D. /dev/hdb5
Answer: D
QUESTION NO: 54 You have created a really long letter and after you are done you notice that you used the name "Bob" many times but you forgot to capitalize it in many instances. Which command would replace "bob" with "Bob" in all instances and generate a new letter for printing? A. sed '/bob/Bob' letter >newletter B. sed s/bob/Bob/letter < newletter C. sed 's/bob/Bob' letter > newletter D. sed 's/bob/Bob/g' letter > newletter E. sed 's/bob. Bob/' letter > newletter
Answer: D
QUESTION NO: 71 You enter the command date +%M. What does the output show you? A. the current year B. the current month C. the current hour D. the current minute E. the current second
Answer: D
QUESTION NO: 77 Which of the following sed commands will replace all instances of the string foo with the string foobar changing the file file1.txt in place? A. sed 's/foo/foobar/g' filel M B. sed 's/foo/foobar/g' filel M > filel M C. sed 's/foo/foobar/g' filel M | filel M D. seD -i's/foo/foobar/g'file1.txt E. seD-i 's/foo/foobar/g' filel M > filel M
Answer: D
QUESTION NO: 78 Which file should be edited to select the network locations from which Debian installation package files are loaded? A. /etc/dp kg/dp kg. cfg B. /etc/apt/apt.conf C. /etc/apt/apt.conf.d D. /etc/apt/sources.IIst E. /etc/d p kg/d s e I e ct. cfg
Answer: D
QUESTION NO: 80 You have not run apt-get on a system for some time, but it has been run on the system before. What apt-get command would you run to download the latest list of packages, but not the packages themselves? A. apt-getbuilD.dep B. apt-get mirror-select C. apt-get update D. apt-get upgrade E. apt-get dist-upgrade
Answer: D
QUESTION NO: 93 The user john is no longer working for a company. To disable his account but not delete his information, what needs to be done? A. userdeljohn B. userdisablejohn C. Remove user john from /etc/shadow. D. Replace his password with * in passwd E. Replace his password with a space in passwd.
Answer: D
QUESTION NO: 94 What does the command mount -a do? A. It mounts the floppy disk for all users. B. It shows all mounted file systems. C. It opens /etc/fstab to edit. D. It mounts all file systems listed in /etc/fstab.
Answer: D
QUESTION NO: 96 Which of the following commands is run last during boot on a system with quotas enabled? A. fsck B. mount C. quotacheck D. quotaon
Answer: D
QUESTION NO: 98 According to the File System Hierarchy Standard, the lost+found directory is used for: A. files with unknown owners. B. missing device files found by/proc. C. unknown binary files found by find. D. unlinked files found by fsck.
Answer: D
QUESTION NO: 123 What command will uninstall a package but leave its configuration files in case a package is rE.installed? A. none, no command will do this B. dpkg-s pkgname C. dpkg-L pkgname D. dpkg-P pkgname E. dpkg-r pkgname
Answer: E
QUESTION NO: 272 When Human Interface Devices (HID) is being used, which of the following represents a USB mouse connected to the PC? A. /dev/psaux B. /dev/ttyUSB0 C. /dev/usb/mouse0 D. /dev/ttyS0 E. /dev/psaux F. /dev/input/mice
Answer: E
QUESTION NO: 275 A Linux server is running in single user mode, but the problem that existed before is now fixed. What command is most appropriate to restore the server to service? A. telinit 2 B. shutdown -r now C. reboot D. shutdown -h now E. telinit 3
Answer: E
QUESTION NO: 276 Which of the following must be included in the syslogd configuration file, so that ONLY kernel related messages with the priority crit are reported? A. kern.=crit B. kern.krit C. kern.-crit D. kern.*=crit E. kern.crit
Answer: E
QUESTION NO: 156 CORRECT TEXT What command can be used to generate log entries of any facility and priority? (supply just the command name without a path)
Answer: logger
QUESTION NO: 316 Which of the following best describes the format of the /etc/fstab file? A. device name; mount point; mount options; filesystem type; dump filesystem; fsck order" B. device name; filesystem type; mount point; mount options; dump filesystem; fsck order C. mount point; filesystem type; device name; mount options; dump filesystem; fsck order D. mount point; device name; filesystem type; mount options; dump filesystem; fsck order E. device name; mount point; filesystem type; mount options; dump filesystem; fsck order
Answer: E
QUESTION NO: 33 Which shell built-in command can be used to create a shortcut or pseudonym for a longer command? Assume a modern bournE.like shell, such as bash. A. shortcut B. In C. sudo D. link E. alias
Answer: E
QUESTION NO: 45 Which command will list all the files installed from the RPM package file named, vorbis-tools-1.1 .i386.rpm? A. rpm-qfvorbis-tools-1.1 .i386.rpm B. rpm -F vorbis-tools-1.1 .i386.rpm C. rpm -pf vorbis-tools-1.1 .i386.rpm D. rpm -ql vorbis-tools-1.1.1386.rpm E. rpm-qlp vorbis-tools-1.1.1386.rpm
Answer: E
QUESTION NO: 63 How do you get a list of files that have been installed from a dpkg package? A. dpkg-I pkgname B. dpkg-C pkgname C. dpkg-s pkgname D. dpkg-S pkgname E. dpkg-L pkgname
Answer: E
QUESTION NO: 73 What would the following line accomplish if run as root? chown-R bert /home/bert/* A. Nothing, this command is invalid. B. It would revoke belt's ownership from his home directory to root. C. It would change user ownership of all files in /home/bert to bert. D. It would set the group ownership of the directory/home/bert tobert. E. It would set ownership of all files and subdirectories in /home/bert to bert.
Answer: E
QUESTION NO: 86 CORRECT TEXT You are formatting a single hard disk for a Linux install. What is the maximum number of primary partitions you can create?
Answer: FOUR
QUESTION NO: 283 CORRECT TEXT Which program can be used to adjust the DMA settings of an IDE hard drive? Please enter it without path, parameters or arguments
Answer: HDPARM
QUESTION NO: 49 CORRECT TEXT Which environment variable you have to set up to use shared libraries that are not in the standard search path?
Answer: LD LIBRARY PATH
QUESTION NO: 277 CORRECT TEXT You have configured a workstation to boot in runlevel 4, but you now find that the X server will not start correctly and the machine will not allow local access. What would be the most effective command to run at the LILO prompt to regain local access to the machine, when the last known working kernel image was linux?
Answer: LINUX3
QUESTION NO: 282 CORRECT TEXT What is the correct parameter to pass to the kernel at boot time to force it to use only one of the available processors?
Answer: MAXCPUS=0
QUESTION NO: 285 CORRECT TEXT What command is used to create a file-system to be burned to a CD? (Please enter the command without the path or any options or parameters)
Answer: MKISOFS
QUESTION NO: 112 CORRECT TEXT You want to display all currently mounted file systems. Which command would you see? (Please enter only the command without arguments or options)
Answer: MOUNT
QUESTION NO: 289 CORRECT TEXT Which e2fsck option is used to automatically repair an ext2 filesystem?
Answer: P
QUESTION NO: 65 CORRECT TEXT The --- partition is used for virtual memory.
Answer: SWAP
QUESTION NO: 312 CORRECT TEXT After a lot of write operations, the changes should be written to the disk. Please enter the appropriate command, without the path or any options or parameters, that would achieve this.
Answer: SYNC
QUESTION NO: 279 CORRECT TEXT The administrator notices that a 10GB ext2 file-system used only for data storage has approximately 540MB reserved for root. Which command can be used to change the file-system parameters to make all of the partition available to users, WITHOUT losing data? Please enter only the command without path, options or parameters.
Answer: TUNE2FS
QUESTION NO: 284 CORRECT TEXT With which command can the reserved blocks count for a file-system be seen? (Please enter only the command without the path or any parameters or options)
Answer: TUNE2FS
QUESTION NO: 296 CORRECT TEXT Which command, with options, could be used to change an ext2 file system on /dev/hda1 to an ext3 file system?
Answer: TUNE2FS-J/DEV/HDA1
QUESTION NO: 269 CORRECT TEXT With which command can the reserved blocks on /dev/hda1 be displayed? (Enter the command with all parameters and/or options)
Answer: TUNE2FS-L/DEV/HDA1
QUESTION NO: 130 CORRECT TEXT Consider the following output: prompt> myapp [1]+ Stopped myapp This output was the result of the user pressing the keyboard combination of the Ctrl key and what letter key? Enter only the single (1) letter as your answer.
Answer: Z
QUESTION NO: 147 CORRECT TEXT What command is used to view pending jobs for the at command? (Do NOT specify path).
Answer: atq at -l
QUESTION NO: 227 CORRECT TEXT The --- command is used to modify or set the password expiration for a user.
Answer: chage
QUESTION NO: 211 CORRECT TEXT An administrator has added the following line to /etc/inittab in order to disable the ability to reboot a Debian system by pressing the Control + Alt + Delete keys simultaneously: ca:12345: :/bin/echo "Rebooting disabled"
Answer: ctrlaltdel
QUESTION NO: 138 CORRECT TEXT The --- command is used to print out the current date and time on the system.
Answer: date /bin/date
QUESTION NO: 182 CORRECT TEXT What word will complete an if statement in bash such as the following: if[ x "$file" ]; then echo$file (Please provide missing word only)
Answer: fi
QUESTION NO: 225 CORRECT TEXT The----- command is used to add a group to the system.
Answer: groupadd
QUESTION NO: 232 CORRECT TEXT You are logged in as root. What command do you run to find out what groups user bruno belongs to?
Answer: groups
QUESTION NO: 309 CORRECT TEXT Consider the following/etc/fstab file: /dev/hdal swap swap defaults 0 0 /dev/hda2 / ext2 defaults 11 /dev/hda3 /home ext2 defaults 12 none/proc proc defaults 0 0 /dev/fdO /media/floppy vfat user,noauto 0 0 What command can an ordinary (non-root) user use to mount a floppy disk in this system? (Please enter the command with all parameters and/or options)
Answer: mount /media/floppy
QUESTION NO: 240 CORRECT TEXT You want to temporarily prevent users from logging in. Please complete the following command: touch /etc/
Answer: nologin
QUESTION NO: 143 CORRECT TEXT To exclude all log messages of a given logging facility, you should use a logging priority of --------------
Answer: none
QUESTION NO: 1 You have just added a CD.ROM drive (/dev/hdd) to your system and have added it to yourfstab. Typically you can use which of the following commands to mount media in that drive to /mnt/cdrom? A. mount /dev/cdrom /mnt/cdrom B. mount/dev/cdrom C. mount -t cdrom /dev/cdrom /mnt/cdrom D. mount /mnt/cdrom E. automount /mnt/hdd /mnt/cdrom
D. mount /mnt/cdrom