CompTIA CertMaster Linux+ LXO-103 ALL

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following filesystems CANNOT be created using the mke2fs utility? Second extended filesystem (ext2) XFS Third extended filesystem (ext3) Fourth extended filesystem (ext4)

XFS The mke2fs utility CANNOT create XFS filesystems. It can create ext2, ext3, and ext4 filesystems only.

Which of the following commands copies all files named with a .txt into the /tmp directory? cp .txt /tmp cp *.txt > /tmp cp *.txt /tmp cp *.txt | /tmp

cp *.txt /tmp cp *.txt /tmp is the correct command to copy all files named with a .txt into the /tmp directory. A user cannot use the > or | with the cp command. The cp .txt /tmp command only copies a file named .txt to the /tmp directory.

Which find option does an administrator use if they are looking for all files with permissions of 777? -perm -mod -iname -type

-perm The -perm option allows an administrator to search through files and locate which ones have a particular permission set. There is no -mod option. The -type option searches for a particular file type, such as block, character, and device. The -iname option matches by name, ignoring case.

When a user uses the xz command to compress an archive, which file name suffix does the xz command append to the archive? .Z .xz .tar.gz .gz

.xz The xz compression utility appends the .xz suffix to the archive file name. The .gz suffix is added by the gzip command. The .tar suffix is added by the user traditionally when using the tar command, and then passing the archive through gzip adds the .gz suffix. The .Z suffix is added by the compress command.

In which directory is the Yellowdog Updater, Modified (YUM) configuration file found? /opt /usr/local /var /etc

/etc (As with most system configuration files, the yum.conf file is found in the /etc directory.)

For system administrators who manage Linux systems that use second extended filesystem (ext2) or third extended filesystem (ext3), what does tune2fs add to those filesystems? A journal Reserved blocks Additional partitions A core dump file

A journal (The tune2fs utility adds a journal to ext2 and ext3 filesystems. A core dump file is a snapshot of memory when a program terminates abnormally. Reserved blocks can be removed or the number altered using tune2fs, but they are not added just by its use. The tune2fs utility does not and cannot add additional partitions.)

What is the output of the following command? ls | tee files.txt A list of files is displayed to standard output (stdout) and to standard error (stderr). A list of files is displayed on the screen and then an error appears warning that there is no such file or directory as files.txt. A list of files is displayed to standard output (stdout) and written to the files.txt file. A list of files is written to the files.txt file and to standard error (stderr).

A list of files is displayed to standard output (stdout) and written to the files.txt file. The tee command sends the output of the stream to the screen and to the specified file. There are no errors, so nothing is directed to stderr.

What is the default size of the boot sector program? 1 megabyte 1,024 bytes 4,096 bytes 512 bytes

512 bytes (The boot sector program has a fixed size of 512 bytes.)

What are the default permissions for newly created files? 775 666 664 774

664 Newly created files have the default permission of 664 (rw-rw-r--).

Which command line operator redirects output from a command to a file? & > ; |

> The command line operator that redirects output from a command to a file is the > operator. The & operator puts a command into the background for operation. The ; operator between commands directs the shell to execute one command and then the other in order from left to right. The | (pipe) operator takes the output of one command and provides it as input for another command.

Which information does The Master Partition Table contain? The hard disk's geometry A list of partitions on the hard disk A database of all files on the hard disk Metadata records for every file on the hard disk

A list of partitions on the hard disk The Master Partition Table contains the list of partitions on the disk. There are no separate disk structures that keep metadata, a database of all files, or the disk's geometry—other than the number of cylinders occupied by a partition, which is kept by the Master Partition Table.

Which of the following regular expressions, when used with egrep, will match all words or lines that begin with any letter from a to e and their capitalized alternatives? '^[a-e]&[A-E]' '^[a-e]|[A-E]' '^[a-e]|[A-E]$' '^[a-e][A-E]'

'^[a-e]|[A-E]' The '^[a-e]|[A-E]' regular expression matches all lines or words that begin with the letters a through e or A through E. Neither option '^[a-e][A-E]' nor '^[a-e]&[A-E]' works, because the correct operator is missing. The '^[a-e]|[A-E]$' option matches words that begin with a through e or words that end with A through E.

Which find command option does an administrator use to find all files accessed within the last 10 days in the /home directory? -mtime -name -type -atime

-atime The find command option to define last accessed time is -atime. The -mtime option is modification time, which is different from accessed time. A user can cat a file (accessed) without making modifications. The -name option is for searching for a particular file name or multiple file names using a wildcard. The -type option searches for files, directories, and other file types.

To be sure that a user does not overwrite or remove any important files when moving, copying, or removing files, which option should a user always use? -v -R -i -f

-i The -i option, which is interactive, should always be used. In fact, many users and almost all administrators set aliases for mv, cp, and rm. The -R option is only valid for cp and rm. The -f option is the force option, which should not be used in every case. The -v option only means to report in verbose mode, but is done so after the command has executed.

Which of the following is NOT a find command condition? -iname -perm -size -inode

-inode The -inode option is NOT a find command condition.

Which ps option allows a user to view the priority of a process? -l -u -f -e

-l The -l option allows a user to view the priority of processes. The -f option is for full format. The -e option displays every process running on a system. The -u option displays the processes for a user.

Which find option should an administrator use if they want to find a list of files that have been modified within the last 10 days? -perm -atime -mtime -type

-mtime The find command option that lists files by modification time is -mtime. This option tells the administrator which files have been modified or changed within the specified time period. The access time (-atime) option only tells the administrator if a user has looked at a file, but the file might not have been modified. The -perm option offers the administrator a list of files by permissions. The -type option filters a search by file type.

Which term is described by an instance of a running program that performs a data processing task? The kernel A process Standard input A file

A process A process is an instance of a running program that performs a data processing task. A file can be a program, but the file itself is not running or processing data. Standard input is data from the keyboard or redirected from a file. The kernel is the heart of the operating system and is responsible for managing processes.

Which of the following is uniquely assigned to each running process? A file system A dynamically-linked library A process ID (PID) An administrator

A process ID (PID) A PID is uniquely assigned to each process. A dynamically-linked library is not assigned nor required for a process. A file system is not assigned to a process; the process runs in memory.

Which pattern will the command, grep [0-9] file.txt, match? Any line with a number in it Any single-digit numbers between 0 and 9 Any string containing '0-9' in it Only numbers that have 0 or 9 in them

Any line with a number in it [0-9] will match any line that contains a number.

Which user may launch a program with a lower priority? Only the process owner Only the root user Any user The sys user

Any user Any user may lower the priority of a program.

What is the default Linux shell? Bourne-again shell (bash) C shell (csh) Almquist shell (ash) TENEX C shell (tcsh)

Bourne-again shell (bash) Bash is the default Linux shell. Other shells may be used either as a subshell in scripting or interactively, or the root user can reset a user's default shell to any available system shell.

How are runlevels tracked in systems that use Upstart init? By the virtual runlevel file system By the kernel process By an Upstart helper process By telinit or shutdown

By telinit or shutdown (Runlevels are tracked by the runlevel event generated by telinit or shutdown.)

Which types of files are found under the /etc directory? Configuration System commands Device Management utilities

Configuration The /etc directory contains the system's configuration files. This directory should always be backed up.

Which type of drive is becoming a legacy (outdated) technology in favor of larger media types such as Universal Serial Bus (USB) flash drives? Digital video disc (DVD) drive Hard drive Tape drive Floppy drive

Digital video disc (DVD) drive (DVD drives are becoming legacy devices and are rarely seen in Linux server hardware. The replacement technology is the portable and much greater capacity USB flash drive.)

What is the recommended size for a swap partition? 10 percent of the total disk size Equal to random-access memory (RAM) size Double the random-access memory (RAM) size 2 GB

Double the random-access memory (RAM) size (There has been much debate over the recommended size for a swap partition, but the standard is twice the amount of RAM. If your system contains 4 GB of RAM, then your swap partition should be 8 GB in size.)

What does the acronym "initramfs" stand for? InitRd File System Initial RAM File System Initial Repair And Maintenance File System Initial Run And Maintenance File System

Initial RAM File System (The Initial RAM File System (initramfs) is the successor to the initrd (Initial RAM disk).) -It's got RAM in it

The vi editor has four modes: command mode, visual mode, execute mode, and which other mode? Print Preview Navigate Insert

Insert Insert mode is the fourth vi mode.

When using the quotacheck utility, what does the -b option do? It creates a backup of the quota file before editing. It checks both user and group quotas. It checks user quotas that use the bash shell only. It checks service account quotas.

It creates a backup of the quota file before editing. The quotacheck -b option makes a backup before it enters edit mode so that the administrator can roll back if necessary.

What information is displayed with the command ldconfig -V?

It displays the version information for ldconfig. (The ldconfig -V command displays version information for the ldconfig utility. The ldconfig -v command displays current version number, the name of each directory as it is scanned, and any links that are created. The ldconfig -p command displays lists of directories and candidate libraries stored in the current cache. The ldconfig -? command displays usage information.)

How does a user place a command into the background? Enter the command with a trailing & Pipe the command to /dev/null Enter the command with a trailing - Redirect the command's output to a remote terminal

Enter the command with a trailing & To place any command into the background for processing, enter the command with a trailing &. For example, xclock &. The trailing - is not a valid option. Piping the command to /dev/null is not possible because output is redirected, not piped, to /dev/null. Redirecting output to a remote terminal does not place the command into the background.

In Linux, what is the command line? It is a CMD prompt. It is an xterm window. It is a text-based interface. It is a DOS window.

It is a text-based interface. The Linux command line is a text-based interface in which users can interactively work with the system through a series of commands and scripts. A DOS window and a CMD prompt are both Microsoft command line interfaces. An xterm window is a graphical command line shell used within the graphical user interface.

What is LD_LIBRARY_PATH? It is a variable that can only be set or changed by the kernel. It is the last known location for system libraries. It is an environment variable that supplies a search path for libraries. It is the label used for hard-coding shared library locations.

It is an environment variable that supplies a search path for libraries. (The LD_LIBRARY_PATH is an environment variable set in order to have the system search for libraries before standard directory paths are searched.)

Simple partitions work fine for desktop computers and in some limited-scope environments, but for which type of business application are simple partitions not appropriate? Enterprise-level business Standalone servers Small offices Online services

Enterprise-level business (Enterprise-level business. Using the Logical Volume Manager (LVM), an administrator has great control over disk management and can group disks or partitions together into manageable chunks that are more enterprise-capable than simple partitions.)

How many possibilities for job status are there? Six Three Four Five

Four There are four possible statuses for jobs: Running, Stopped, Terminated, and Done.

Where must the /boot partition be installed? In the swap partition In a logical volume of an extended partition In the first primary disk partition In an extended partition

In the first primary disk partition (The /boot partition must be installed in the disk's first primary partition.)

Processes may run where in memory? On a storage area network (SAN) or in memory On local or on remote file systems On remote file systems or in the background In the foreground or in the background

In the foreground or in the background Processes run either in the foreground or in the background. All processes run in memory only—not on file systems or storage of any kind.

What does the nouser mount option mean? It means that the root user can mount a device such that no one but the root user can access it. It implies read only (ro) and noexec options. It means that the device mounted is a type of removable media, such as a compact disc/digital video disc read-only memory (CD/DVD-ROM). It means that only the root user can mount the device or filesystem.

It means that only the root user can mount the device or filesystem. The nouser option means that only the root user can mount the filesystem or the device.

Which filesystem feature makes it resilient to system crashes and power failures? Swap space Large file support Journaling 64-bit structure

Journaling Journaling is the filesystem feature that makes it resilient to power failures and system crashes.

When using top, how does the root user filter the results to show only a single user's processes in the list? Press the 'p' key and then enter the user name Press the 'd' key and then enter the user name Press the 'u' key and then enter the user name Press the 'I' key and then enter the user's ID

Press the 'u' key and then enter the user name The root user presses the 'u' key and then enters the user name. The 'p' key has no effect. The 'I' key turns off Irix mode. The 'd' key changes the refresh delay from three seconds to a manually entered number.

Which filesystem shortcomings does b-tree filesystem (btrfs) address? Permanent file removal, transaction safe writes, safe partition resizing, and copy-on-write Pooling, snapshots, checksums, and multi-device spanning Encrypted file storage, snapshots, permanent file removal, and GNU Privacy Guard (GPG) file signatures Transaction safe partitioning and partition recovery

Pooling, snapshots, checksums, and multi-device spanning The btrfs filesystem was created to address shortcomings of Linux filesystems such as pooling, snapshots, checksums, and multi-device spanning.

Which of the following is NOT typically a cause of filesystem errors? Hardware failures Power failures Improper system shutdown Removing unnecessary files from /tmp

Removing unnecessary files from /tmp (Removing unnecessary files from /tmp is NOT a cause of filesystem errors.)

Which term describes the redefining of a processes' priority? Rebalance Prioritize Renice Shuffle

Renice The task of changing the priority of a process is to renice the priority.

The tune2fs utility can perform ALL but which of the following tasks? Resize partitions Specify the number of mounts between filesystem checks Change the Universally Unique Identifier (UUID) of a filesystem List Superblock contents

Resize partitions

Which user installs software via the yum command? sudo root sysadmin anonymous

Root (The root user is typically the only user on a system that has authority to run yum. Sysadmin and anonymous are not typical system accounts. Sudo is not a user account but a process whereby a user who has authorization can assume root user status to run commands on a system.)

Which two partitions are standard and automatically set up when installing Linux? /tmp and /var /usr and /boot Root (/) and /var Root (/) and swap

Root (/) and swap (The only two standard partitions set up during installation are the root (/) partition and the swap partition.)

Although most Linux systems no longer have them, which mass storage devices use a streaming media type? Tape drives Compact disc/digital video disc (CD/DVD) drives Universal Serial Bus (USB) drives Floppy drives

Tape drives (Tape drives use streaming tape to store and to retrieve data for the system. Tape drives were once installed in almost every system. Today, they're used only for archival backups, but are quickly becoming extinct like the once ubiquitous floppy drive.) -Floppy drive (pretty much extinct) -DVD (endangered) -tape drives (pretty rare) and streaming

Section 6

Section 6

Onto which of the following drives can a user NOT install Linux? Tape drive Hard drive Flash drive Digital video disc (DVD) drive

Tape drive (A user cannot install Linux onto a tape drive. Tape is not bootable in Linux and therefore cannot sustain an operating system. Tape drives are far too slow to support any kind of usable system.)

What happens to the files in the /opt directory if a system administrator mounts a filesystem on /opt? They automatically move to /opt1. They are hidden and inaccessible. They become the opt subdirectory of the /opt directory (/opt/opt). They are deleted.

They are hidden and inaccessible. The files and subdirectories that exist in /opt will be hidden and inaccessible if the administrator mounts another filesystem or device on /opt.

A user issues the command ls > files.txt, but sees no output on the screen. What happened to the output? The output was redirected to the files.txt file. The command did not function correctly and the shell offered no error dialog. There was no output to redirect to the files.txt file. The user used the wrong operator (>) for the command and nothing happened.

The output was redirected to the files.txt file. A simple redirect operation redirects the output to a file and not to the screen. The > operator is correct, and no errors were thrown because there were no errors to display.

While running top, a user presses the 'k' key on the keyboard. The entry pauses the dynamic update and it also prompts the user for information. For which information does top prompt the user? The process to send into the background The process ID (PID) to kill The user to log out of the system The process to restart

The process ID (PID) to kill The 'k' prompts the user for 'PID to kill'. There are no options for sending processes to the background, to log out a user, or to restart a process.

What does the following ls -l listing tell you about the directory shown? drwxr-xr-t 2 bsmith bsmith 4096 2015-05-03 19:34 files The Set User ID (SUID) has been set on the files folder. The Globally Unique Identifier (GUID) has been set on the files folder. The Set User ID (SUID) and Globally Unique Identifier (GUID) have been set on the files folder. The sticky bit has been set on the files folder.

The sticky bit has been set on the files folder. The sticky bit, t, has been set on the files folder. SUID = drwsr-xr-x. GUID = drwxr-sr-x. SUID and GUID = drwsr-sr-x.

Which utility opens an interactive shell allowing an administrator to examine and modify an extended filesystem? debugfs dumpe2fs tune2fs e2fsck

debugfs The debugfs utility allows an administrator to examine and modify an extended (extX) filesystem. The tune2fs utility tunes a filesystem. The e2fsck utility performs a filesystem integrity check on extended filesystems. The dumpe2fs utility dumps the status of an extended filesystem to standard output (stdout).

Which command deletes from the cursor position to the first occurrence of the letter 'b' in vi? dfb dw d$b db

dfb The dfb command deletes all characters from the current cursor position to the first occurrence of the letter b in a sentence. This command works for any letter (dfc, dfd, dfe, etc.). The d$b command deletes to the end of the line; the b is ignored. The db command deletes the previous word. The dw command deletes the current word.

Running quotacheck for the first time creates two files on the filesystem for which you want to set up quotas. What are the two files? aquota.group and aquota.user group.quota and user.quota groupquota and userquota q.group and q.user

aquota.group and aquota.user The two files created the first time quotacheck is run are aquota.group and aquota.user.

Which files does the following command match in file.txt? egrep '^(b|r)e' file.txt brethren break bake brake better rent broke rake

better rent better and rent. The expression '^(b|r)e' translates as words beginning either with b or r and the second letter is an e.

How does a user restart a stopped job? bg %# restart %# fg %# & bg %# &

bg %# To restart a stopped job, issue bg %#. There is no restart command. Using an & after the fg or bg command has no effect.

Which of the following words will the grep command, cat file.txt | grep b[aeiou]t, not match? bit bat button boot

boot The regular expression b[aeiou]t will match any word with the pattern: bat, bet, bit, bot, or but at the beginning of the word. The word boot is not matched.

Which log file is especially important to check during troubleshooting of boot problems? boot.log startup.log booterr.log lastlog

boot.log (The boot.log is a good place to start when searching for problems that occur during the boot process. There are no logs named startup.log or booterr.log. The lastlog checks who was logged in, usually to correlate a problem with the user who was logged in at the time.) -Log because it's a log file, and boot because it's during boot process, so it gives boot problems

Which of the following words matches the regular expression ^b[aeiou]t? obit best butcher robot

butcher The word butcher is matched. The word to match must begin with the letter b (^b); have one of the letters a, e, i, o, or u next; and then have a t in it. Any characters after those first three letters will also be a match.

Which of the following grep commands performs a case insensitive search for the string alpha? ls file.txt |grep -i alpha cat file.txt |grep -i alpha cat file.txt |grep -c alpha grep -v alpha file.txt

cat file.txt |grep -i alpha The cat file.txt |grep -i alpha command is the correct choice. The ls command does not expose file contents to grep. The grep -v option finds every string except alpha. The grep -c option will only return the number of times the string alpha occurs in the file.

A user wants to copy the contents of two files to a third file. Which command performs the task correctly? file one.txt two.txt >> three.txt cat one.txt two.txt > three.txt file one.txt two.txt three.txt cut one.txt two.txt ; paste three.txt

cat one.txt two.txt > three.txt The cat one.txt two.txt > three.txt command will perform the desired task correctly. The file command reports the type of file that follows it. The cut command gives an error because it expects input to operate on.

Using the echo command, how can a user find which shell is currently in use? echo $SHELL echo echo /etc/passwd echo bash

echo $SHELL To find the current shell, use the echo $SHELL command. $SHELL is the environment shell variable. By itself, the echo command echoes a blank line. The echo /etc/passwd command echoes /etc/passwd, and the echo bash command echoes bash on the command line, but neither shows the shell.

Which of the following is NOT an option available in the GRand Unified Bootloader (GRUB) Legacy /boot/grub/menu.lst file? root encrypt splashimage title

encrypt (The encrypt option is not available in the /boot/grub/menu.lst file.)

Based on current Linux system architecture limitations, the /boot partition must be placed on which filesystem type? btrfs vFAT ext4 XFS

ext4 (Both / and /boot partitions must be placed on ext2, ext3, or ext4 filesystems only. Other partitions may have any type of filesystem type.)

Which of the following utilities allows an administrator to alter the partition type from Linux to New Technology File System (NTFS)? VFAT mkfs.ntfs mkfs fdisk

fdisk The fdisk utility allows an administrator to alter the partition type from Linux to NTFS. The mkfs and the mkfs.ntfs utilities create filesystems, but cannot alter a partition type. VFAT is a filesystem type.

Which command brings a program to the foreground that has been placed into the background? kill free fg bg

fg The fg (foreground) command brings a program placed into the background into the foreground. The bg command can be used to place a program into the background. The kill command terminates a command whether in the foreground or in the background. The free command displays the amount of free memory in a system.

Which of the following is NOT a standard Linux directory? /media /data /etc /opt

/data The /data directory, while common, is not a standard Linux directory of a default filesystem layout. It is a directory created by an administrator after installation.

Where on the file system is Upstart's list of configuration files kept? /opt/run /etc/init /var/run /etc/init.d

/etc/init (The Upstart configuration files are kept in the /etc/init directory.) -Key word: configuration -/etc holds configuration files of all kinds

Which of the following is the correct configuration file and location for the LInux LOader (LILO) boot loader? /etc/lilo.conf /boot/lilo.conf /boot/boot.cfg /var/lilo.cfg

/etc/lilo.conf (The correct name and location for the LILO configuration file is /etc/lilo.conf.)

What is the name of the global bash configuration file? .bash_history /etc/profile .profile /etc/bash

/etc/profile The global bash configuration file that sets the PATH, configures the prompt, sets aliases, and sets environment variables is /etc/profile. There is no /etc/bash file. The .bash_history file keeps a running history of commands used in bash. The .profile file is each user's personal profile file where some default variables and settings can be placed.

Which partition's size will vary based on the number of users on a system? Root (/) /var /home /tmp

/home (The /home directory varies greatly in size based on the number of users on a system. The /var directory will vary based on the number of applications installed on the system. The /tmp directory is typically not a separate partition on modern systems. The root (/) directory varies based on the size of the disk and the desired layout.)

Onto which directory do administrators typically mount temporary and removable filesystems, such as compact disc/digital video disc read-only memory (CD/DVD-ROMs)? /media /usr /mnt /tmp

/media Administrators typically mount removable and temporary media such as CD/DVD-ROMs onto /media. The /mnt directory is often for temporarily mounting local or remote filesystems. The /tmp and /usr directories are never used for mounting media because they are system directories that need to be accessed or written to in the case of /tmp.

A user needs to execute the following command: /opt/mw/vcompare. The command is not in the user's path. What do they enter on the command line to execute this command? /opt/mw/vcompare ./vcompare vcompare pwd vcompare

/opt/mw/vcompare The user has to provide the full path to the command, /opt/mw/vcompare, to execute the command. The ./vcompare command will work if the user is in the /opt/mw directory, because that is how a user would execute a command in the current directory. Issuing vcompare will not work if /opt/mw is not in the path. The pwd vcompare command will not work, because pwd displays the working directory and ignores any arguments.

Which of the following is NOT a standard subdirectory of /usr? /usr/local /usr/lib /usr/etc /usr/lib64

/usr/etc The /usr/etc (etc) is NOT a standard subdirectory of /usr.

Which directory on a systemd init system holds the unit files? /usr/lib/systemd /var/systemd /etc/systemd /etc/init.d

/usr/lib/systemd (The system unit files are located in the /usr/lib/systemd directory.)

Which file system size must be altered to accommodate multiple applications running on an application server? /home /usr /var /tmp

/var (The /var file system must be enlarged from the default recommendation of 250 MB to accommodate the space required for an application server. The /home directory would need to be altered to accommodate the number of users on a system. The /tmp directory size generally does not need to be changed. The /usr directory may need to be enlarged depending on the types of applications and to accommodate space requirements if it is set up as a separate file system.)

What is the default nice value of all processes in Linux? 10 0 1 19

0 The default nice value of all processes in Linux is 0. The range of possible values is from -20 for the highest priority to 19 at the lowest priority.

What is the octal value of the sticky bit? 2 0 4 1

1

What is the init daemon's process ID (PID)? 10 It is randomly assigned on each boot 1 0

1 (The init process always has a PID of 1.) -Init daemon is one of the 1st things to start up, hence the 1

How many inodes are there associated with a file? 2 0 1 4

1 Every file has one inode.

What is the minimum recommended size for the root (/) partition? Four times the amount of random-access memory (RAM) 2 GB Twice the amount of random-access memory (RAM) 1 GB

1 GB (The recommended size is 1 GB.)

By default, how many commands does the HISTSIZE variable keep? 1,000 100 1,024 2,048

1,000 The default HISTSIZE is 1,000 commands.

Which of the following is the numeric definition of a tebibyte expressed in bytes? 1,024^4 1,024^3 1,024 1,024^2

1,024^4 The expression of a tebibyte in bytes is 1,024^4, or 1,099,511,627,776.

What is the octal value of the Globally Unique Identifier (GUID)? 6 1 4 2

2

Which of the following is Debian's package management tool? Advanced Package Tool (APT) Yet another Setup Tool (YaST) Yum RPM Package Manager (RPM)

Advanced Package Tool (APT) (Debian's package management tool is APT. Yum is the primary update and install command used with the Red Hat package management system. YaST is the package management tool for SUSE Linux. RPM is the package management system for Red Hat Linux.)

Which results will the following command display? egrep '^[a-e]' file.txt All lines that end with an a or an e All lines that end with an a, b, c, d, or e All lines that begin with a, b, c, d, and e All lines that contain an a or an e

All lines that begin with a, b, c, d, and e All lines that begin with a, b, c, d, and e. The [] can contain ranges, so [a-e] means all letters from a to e, and the ^ means at the beginning of the line or word. You use $ for the end of a line or word.

Bob Smith (bsmith) sets the Set User ID (SUID) for his renew.sh script, and its permissions are 755. What do these settings mean? Anyone can run renew.sh, and when they do, it runs as bsmith. Any user can run the renew.sh script, and it runs as the user who executes it. Any user who runs the script places the script in memory until the system is rebooted. The renew.sh script runs as the root user.

Anyone can run renew.sh, and when they do, it runs as bsmith. Any user can run renew.sh because of the permissions, 755, and when a user runs it, it runs as bsmith.

What does btrfs stand for? Binary tracking filesystem Binary transaction retrieval filesystem B-tree filesystem B-transaction reactive filesystem

B-tree filesystem The acronym btrfs stands for b-tree filesystem.

How does a user set a new shell variable, BLAH, to the value test? BLAH=test setvar BLAH:test set BLAH ; value test env BLAH=test

BLAH=test BLAH=test. It is simple to set a variable to a value using the form: VAR=value.

Which shell is the most commonly used in Linux? Bourne-again shell (bash) C shell (csh) Korn shell (ksh) Bourne shell (sh)

Bourne-again shell (bash) (Bash, the Bourne-again shell, is the most commonly used Linux shell. The csh, or C shell, is mainly used by programmers. The Korn shell (ksh) is a standard UNIX shell that is still available, but not commonly used on Linux systems. The Bourne shell (sh) is a common UNIX shell that was the basis for the creation of bash.)

An administrator installed an application that requires special permissions on a top-level directory and hundreds of files and subdirectories. How does the administrator change all of those file permissions without doing so on an individual basis? By using a wildcard, chmod * By changing the permissions on the top-level directory only By changing the permissions on each directory individually By using chmod -R at the top-level directory

By using chmod -R at the top-level directory The administrator uses chmod -R at the top-level directory. For example chmod -R 555 app1 changes the permissions on the top-level directory, app1, recursively (-R).

Predict the output of the tr command and the input that follows. tr a-z A-Z comptia test (input) (output) Comptia Test COMPTIA TEST test comptia tset aitpmoc

COMPTIA TEST The output is COMPTIA TEST because the tr, or translate, command takes a pattern and interprets the input according to that pattern. In the example, a-z A-Z translates the input, comptia test, into the uppercase result.

Which of the following is a coldplug device?

CPU

What are the two major features of the Logical Volume Manager (LVM)? Building logical workspaces and taking one-click backups Taking one-click backups and creating logical volume snapshots Creating logical volume snapshots and resizing logical volumes Creating in-memory databases and resizing logical volumes

Creating logical volume snapshots and resizing logical volumes (The two major features of LVM are creating logical volume snapshots and resizing logical volumes.)

On which type of file is the Globally Unique Identifier (GUID) usually used? Device Directory Plain text Binary data

Directory Administrators typically use GUID on directories or folders.

Which information is NOT stored in the inode? File timestamps File permissions File name File size

File name The file name is NOT stored in the inode. Files can be hard linked and have different names, but have the same inode. The inode stores file metadata.

The du command displays which type of resource information? File sizes Memory usage Central processing unit (CPU) processes Uptime information

File sizes

Which of the following terms may be described as a structured form for data storage that maintains information, such as the date of creation, file size, file type, and file permissions? File system Sector Inode Partition

File system (A file system is a structured form for data storage that also maintains file information such as creation date, size, type, and permissions. An inode is a data structure that contains information about files and is stored on the file system. A partition is a logical separation structure for hard disks that limits the amount of space within it and may contain a single file system. A sector is a physical storage unit on a hard disk.)

The gdisk utility is used to manipulate disk partitions, and its name is short for which of the following? Generic fdisk General purpose disk GRUB disk GPT fdisk

GPT fdisk The gdisk utility's name is short for GPT fdisk.

What does the acronym GRUB stand for? GRand Unified Bootloader Go Run Unix Boot GRand Unix-like Bootloader GReat Unix Bootloader

GRand Unified Bootloader (The GRUB acronym stands for GRand Unified Bootloader.)

Where does the user select which kernel to boot? On the login screen The user cannot select a specific kernel to boot In the GRand Unified Bootloader (GRUB) menu In the Basic Input-Output System (BIOS)

In the GRand Unified Bootloader (GRUB) menu (The user may select any listed kernel from the GRUB menu on boot.)

What is the purpose of the -i option for the egrep command? It means iterative, or to count the number of instances. It means information, much like -v for most commands. It means interactive. It ignores case.

It ignores case. (The egrep -i option means to ignore case in the same way that grep -i does.)

What does the Debian package management apt-get upgrade command do? It upgrades all device drivers and the system's Basic Input-Output System (BIOS). It upgrades all software packages that have newer versions available. It upgrades the kernel only. It upgrades the major distribution version.

It upgrades all software packages that have newer versions available.

Which of the following hardware items is NOT removable from a system onto which a user wishes to install Linux? Motherboard Network interface card Keyboard Sound card

Motherboard

What are regular expression elements known as when used in a search string formed by wildcards, numbers, and characters? Notational elements Transitional elements Partitioned elements Annotated elements

Notational elements A regular expression with notational elements is a search string formed by combining wildcards, numbers, and characters.

What does the acronym RPM stand for? Red Hat Package Modifier Real-time Package Manager Red Hat Package Manager RPM Package Manager

RPM Package Manager (The acronym RPM stands for RPM Package Manager. It once stood for Red Hat Package Manager, but now is a recursive acronym.)

Which method should a system administrator use to secure the GRand Unified Bootloader (GRUB) installation? Enable two-factor authentication on GRUB Use the command-line interface (CLI) when editing GRUB options Set up and use a GRUB password Encrypt the GRUB installation

Set up and use a GRUB password (To secure a GRUB installation, the system administrator should set up a GRUB password.)

How long is the default grace period for a disk quota? Three business days Three days 24 hours Seven days

Seven days The default grace period for a disk quota is seven days.

What does the "so" in a shared library file name (for example, libproc-3.2.8.so) mean? Shared object Symbolic object Simple object Source object

Shared object (The "so" part of a shared library file stands for shared object.)

How many major field categories or headings are there in the /etc/fstab file? Five Four Eight Six

Six There are six categories or headings in the /etc/fstab file: file system, mount point, type, options, dump, and pass.

Which of the following is the correct term defined as a sequence of one or more lines of text that can be written to be read on a text-based display? Text pipe Text stream Text filter Text redirect

Text stream A text stream is a sequence of one or more lines of text that can be written to be read on a text-based display. A text filter uses a text stream, but is passed through a filter to isolate part of a text stream. A text pipe is output from a command that is used as input for another command. A text redirect is a text stream that is passed in its entirety to a file.

In contrast to shared libraries that have "so" in their file names, what naming characteristic identifies a library as static? The file names begin with "glib". The "st" in their file names. The identifier "_static" in their file names. The ".a" suffix.

The ".a" suffix. (Static libraries all share the common ".a" suffix.)

What is the name of the collaborative document that specifies a set of guidelines for the names of files and directories and their locations? The International Naming and Filesystem Standard (INF) The Hierarchical Filesystem Standard (HFS) The Unified Naming Convention Standard (UNCS) The Filesystem Hierarchy Standard (FHS)

The Filesystem Hierarchy Standard (FHS) The Filesystem Hierarchy Standard is the collaborative document that specifies a set of guidelines for the names of files and directories and their locations.

What can an administrator determine from looking at the system load average? The administrator can determine when the system requires a security update. The administrator can determine how full the storage is. The administrator can determine how busy a system is. The administrator can decide when it is safe to reboot the system.

The administrator can determine how busy a system is. The load average gives the administrator a snapshot of performance and how busy a system is. No other information can be inferred from the load average numbers.

What is another name for umask? The file creation mask Default permission parameter The system mask Read/write permissions mask

The file creation mask The umask is also known as the file creation mask.

What does the .gz file extension in a file name mean to a user? The files contained in the archive were processed with dd. The file has been compressed with gzip. The file has been prepared as a tar archive. The file has been extracted with gunzip.

The file has been compressed with gzip. The .gz extension means that the file has been compressed with gzip. Using tar copies files to a single file archive, but provides no extension. Files processed with dd have no particular extension. Files extracted with gunzip have the .gz extension removed from their names.

Other than the 2 terabyte (TB) disk size limitation, which other Master Boot Record (MBR) limitation does Globally Unique Identifier (GUID) Partition Table (GPT) overcome? The single operating system limitation The incompatibility with New Technology Filesystem (NTFS) limitation The four primary partition limitation The inability to be repaired limitation

The four primary partition limitation GPT overcomes the MBR limitation of four primary partitions. The other options are not MBR limitations.

If an administrator wants to set specific limits on the number of files or the amount of space users can consume on a filesystem, which parameter must the administrator set? The filesystem maximum limits The soft limit The filesystem permissions The hard limit

The hard limit The administrator must set the hard limit. The soft limit can be exceeded, but the hard limit cannot. There are no filesystem maximum limits, nor do filesystem permissions limit space or file storage.

What does a job status of Stopped mean? The job has completed. The job has been killed. The job has terminated itself abnormally. The job has been suspended.

The job has been suspended. A stopped job has been suspended by the user. A stopped job can be restarted. A completed job has a status of Done. A terminated or killed job has a Terminated status.

What happens if a user changes the name of a file that has a symbolic link pointing to it? file1.txt -> testfile.txt mv testfile.txt newfile.txt The link from file1.txt to testfile.txt is updated to newfile.txt The link from file1.txt to testfile.txt is broken. The newfile.txt file becomes a hard linked file for testfile.txt. The symbolic link, file1.txt, becomes a hard linked file.

The link from file1.txt to testfile.txt is broken. The symbolic link is broken because testfile.txt no longer exists and symbolic links do not update.

If a user launches a new shell within a shell, what is the relationship of the new shell to the original shell? The new shell is the child shell of the original or parent shell. The new shell is an independent twin of the original shell. The original shell will not allow a new shell to spawn. The original shell passes all its variables to the new shell.

The new shell is the child shell of the original or parent shell. The new shell is a child shell of the original or parent shell. The original shell does NOT pass its variables to the child shell.

What happens after the disk quota grace period expires? The user's account is disabled. All files beyond the soft limit are deleted. The soft limit becomes the hard limit. The user's account is restricted to 30 minutes per session.

The soft limit becomes the hard limit. After the grace period, the disk quota soft limit becomes the hard limit and the user cannot exceed this limit. No files are deleted and no account restrictions are incurred.

Which task should the system administrator perform prior to using the tune2fs utility on a filesystem? Convert the filesystem to third extended filesystem (ext3) Reboot the computer Unmount the filesystem Perform a filesystem check on the filesystem

Unmount the filesystem Before performing filesystem checks or tuning, the administrator should unmount the filesystem. There is no need to reboot the computer, fsck the filesystem, or convert it to ext3 prior to using tune2fs.

Which of the following regular expressions is equivalent to the \w metacharacter in its scope of pattern matches? [....] [a-zA-Z] [a-zA-Z0-9_] [*.*]

[a-zA-Z0-9_] The \w metacharacter is equivalent to [a-zA-Z0-9_] because of its range of matching all letters, both lower- and uppercase, 0 through 9 and the underscore character. The [a-zA-Z] is a subset of \w. The [*.*] matches everything. The [....] only matches lines with more than three characters.

How does a user navigate to the beginning of the current line in vi without entering insert mode? d ^ h p

^ The ^, or caret, moves the cursor to the beginning of the current line without entering insert mode. The d key deletes text using navigation keys. The h key moves the cursor left one character. The p key pastes the buffer below the current line.

Which regular expression metacharacter denotes the beginning of a line or word when applied to a bracketed value, but as an exclusion when applied inside the bracket? < |= ^ !

^ The caret (^) denotes a string at the beginning of a search pattern. For example, the first letter in a word or the first character of a line of code. The caret (^) when used inside the [] means that the user wishes to exclude that information from the match. For example, ^[^a] means do not match the letter a at the beginning of a word or a line.

Which message does the system return when there are no errors resulting from an fsck pass? optimized all clear clean CLEAR

clean

Which of the following commands provide a human readable output of disk space? df -h df ls -lR dir /s

df -h

Which command parses the dmesg file? err_reader dmesg msg_note last

dmesg (The dmesg command parses the dmesg file. The err_reader and msg_note commands do not exist. The last command parses the lastlog file.)

Which of the following utilities is NOT part of the RPM Package Manager (RPM) suite? rpm up2date dpkg yum

dpkg (The RPM suite has several associated utilities, but dpkg belongs to the Advanced Package Tool (APT) (Debian) package management suite.)

Which of the following utilities do administrators use to check the integrity of a filesystem? parted fsck mkfs gdisk

fsck The fsck, or filesystem check utility, is used to check filesystem integrity. The mkfs utility creates filesystems. Parted is the utility that sets up partitions. Gdisk is a special utility for setting up and working with Globally Unique Identifier (GUID) Partition Table (GPT) partitions.

The gdisk utility supports a single command line option. Which of the following is the correct gdisk command line option? gdisk -o /dev/sda gdisk -l /dev/sda gdisk -v /dev/sda gdisk -i /dev/sda

gdisk -l /dev/sda The gdisk utility supports only one command line option for list, which is the (-l) option.

The egrep command is equivalent to which other command? fgrep grep -R pgrep grep -E

grep -E The egrep command is extended grep, which is equivalent to grep -E. The fgrep command is equivalent to grep -F. The pgrep command is used to grep for process IDs (PIDs) from running processes. The grep -R command is a recursive grep.

Which GRand Unified Bootloader (GRUB) Legacy utility is equivalent to the GRUB 2 utility grub2-mkconfig? grubworm gconfig grub-mkconfig grub-configurator

grub-mkconfig (The GRUB Legacy utility grub-mkconfig is equivalent to the GRUB 2 grub2-mkconfig utility.)

What is the full name for an inode? integral node index node integrated node input node

index node The term inode means index node.

A system administrator installed a new program on a system. After installation, the program worked, but after a recent reboot, it did not. Which task did the system administrator forget to run to update the library cache? libvirtd libtool ldconfig ldd

ldconfig (The administrator forgot to run the ldconfig utility. The ldd command displays linked shared libraries for a command. The libvirtd program is a system daemon for the virtualization management system. The libtool utility is a generic library support script.)

Which of the following commands includes both a pipe and a filter? cat /etc/passwd > passfile.txt mail user@domain < /etc/passwd nl /etc/passwd > numberedpasswd.txt sort /etc/passwd |grep 50

sort /etc/passwd |grep 50 The sort /etc/passwd |grep 50 command first filters the command with sort and then pipes it using grep 50. The other three options are redirects. Cat and nl are filter commands.

Which command allows a system administrator to view running services, manage (enable/disable) services to run at boot or in the current session, determine the status of these services, and manage the system runlevel? systemctl systemd sysinit runlevel

systemctl (The systemctl command allows a system administrator to change runlevels, list installed unit files and their statuses, and manage services. Systemd is a replacement for SysVinit and Upstart in some Linux distributions. It allows for greater concurrency (starting programs at the same time for quicker boot) and reduces shell overhead. The runlevel command displays the current runlevel. Sysinit is a coding feature and not a command.)

Which of the following commands sets the default runlevel to multi-user mode with no graphical interface for a Linux distribution that uses systemd init? systemctl set-default multi-user.target systemctl set-runlevel multi-user.target systemctl set-mode multi-user.target systemctl multi-user.target default

systemctl set-default multi-user.target (The correct syntax to set the default runlevel to multi-user with no graphical interface is systemctl set-default multi-user.target.)

How does a user undo a mistyped entry in the vi editor? x u :w dd

u The lowercase u command is undo for the last action. The dd command removes a line of text. The :w command writes the current contents to the file. The x deletes a single character.

How does an administrator display the kernel version on a running system? uname -r kernel -v version whoami

uname -r The uname -r command displays the kernel version. There is no kernel or version command. The whoami command displays the username of the currently logged on user.

A user used the expand command on a file to convert tabs to spaces, but an administrator wants to reverse this action on the file. Which command provides this capability? uniq expand -reverse unexpand nl

unexpand The unexpand command reverses the action of the expand command. The expand command has no option for reversing its action. The uniq command filters repeated lines of text in a file. The nl command applies line numbers to lines of text in a file.

Which command does the administrator use to update the mlocate database for the locate command? locate -update ls -lR / updatedb mlocatedb

updatedb The administrator issues the updatedb command to update the mlocate database. This refreshes the files contained in the database.

Which Logical Volume Manager (LVM) command creates and names volume groups? vgcreate lvcreate pvcreate fdisk

vgcreate (The vgcreate command creates and names volume groups. The lvcreate command creates and names logical volumes. The pvcreate command prepares physical volumes to be used in logical volumes. The fdisk command prepares the disk for simple partitioning.)

Which utility allows an administrator to manage the parameters of an XFS filesystem? xfs_repair xfs_admin mkfs.xfs fsck xfs

xfs_admin (The correct answer is xfs_admin. The XFS filesystem has several utilities for its full management and manipulation. The xfs_repair utility is an XFS utility, but it is used for performing filesystem integrity checks. The mkfs.xfs utility creates the XFS filesystem. There is no fsck xfs command.)

Which XFS utility extends the filesystem to fill the disk? xfs_info xfs_db xfs_repair xfs_grow

xfs_grow (The xfs_grow utility extends the XFS filesystem to fill the disk. The xfs_db utility is a debugger. The xfs_repair utility is a filesystem check utility. The xfs_info utility displays details about the filesystem. previous review correct answers )

Which command creates the XFS filesystem? mkfs.ext4 xfscreate createfs -xfs mkfs.xfs

mkfs.xfs The mkfs.xfs command creates XFS filesystems. The mkfs.ext4 command creates fourth extended (ext4) filesystems. The xfscreate and createfs commands do not exist.

Which of the following would NOT match the egrep command's search? egrep 'ton\b' file.txt mutton monotone button carton

monotone The egrep 'ton\b' file.txt will match all except monotone, because the 'ton\b' matches the string at the end of the word.

Which command allows an administrator to view the mounted filesystems and their modes (rw, ro)? mount mount -V mount auto mount -a

mount The mount command with no options reads the /etc/mtab file, which displays all mounted filesystems and their respective options and modes. The mount -a option mounts all filesystems listed in /etc/fstab. The mount -V command displays the mount version. The mount auto command would have no effect on the system, and it would return an error.

Which of the following commands renames the file one.txt to once.txt? cp one.txt once.txt REN one.txt once.txt mv one.txt once.txt rm one.txt once.txt

mv one.txt once.txt To rename a file, use the mv command: mv one.txt once.txt. The cp command copies the file. REN is the DOS/Windows rename command. The rm command removes (deletes) both files.

Which utility does a system administrator use to partition a 4 terabyte (TB) disk as a single partition for a database server's data storage? mkfs fdisk mkfs.ext4 parted

parted The parted utility can partition filesystems larger than 2 TB in size. The fdisk utility will partition them, but it has a 2 TB limitation. The mkfs utility creates filesystems, but does not partition disks.

What are the resulting permissions on a new file if a user enters umask 000 just prior to creating the file? r-- r-- r-- drw- rw- rw- rw- rw- rw- rwx rwx rwx

rw- rw- rw- A umask of 000 yields a new file with permissions of rw- rw- rw-, or 666.

If a user wants to quickly search for the process ID (PID) of a specific process, for example, mysqld, which command should they use? ps -ef | grep mysqld | grep -v grep | cut -c9-14 ps -ef | grep mysqld pgrep mysqld top

pgrep mysqld pgrep mysqld. The quickest method of isolating a PID for a process is to use pgrep and the process name. The other methods work, but they are not quick.

Which of the following commands performs a new quota scan and then saves the report to disk? repquota -a quotacheck -c setquota -u bsmith quota -uv bsmith

quotacheck -c The quotacheck -c command performs a new scan and then saves it to disk. The setquota -u bsmith command sets quotas for the specified user. The quota -uv bsmith command displays a verbose quota report for the specified user. The repquota -a command displays reports for all filesystems indicated as read/write in the /etc/mtab file.

Which command enables quotas for a filesystem? set quota on service quota start mkquota -all quotaon -a

quotaon -a The quotaon -a command enables quotas on all filesystems.

Which key does a user type in command mode to overwrite a single character in vi? R r d x

r The r key allows a user to type over a character after the command is issued. The R key allows a user to overwrite an unlimited number of characters. The x deletes one character. The d key deletes a line or a character after a navigation key has been pressed.

Which command on an Upstart init system allows the root user to start and stop system services? action runas rcp service

service (The service command is used to stop, start, and restart services. There is no Linux action command or script. The rcp command is remote copy. The runas [{/Link}]command is a Windows command used to elevate privileges.)

Which of the following commands successfully removes a directory, dir1, and all its contents? rm dir1 rm -rf dir1 RD dir1 rmdir dir1

rm -rf dir1 The command rm -rf dir1 recursively removes dir1 and all files contained in it. The -f option is to force without prompting. The rmdir dir1 command will not remove a directory that includes files. The rm dir1 command will not remove a directory, empty or not. RD dir1 is the DOS/Windows command for removing a directory.

How does a user correctly delete the file, file.txt from the user's home directory? cp file.txt /dev/null cat file.txt | rm DEL file.txt rm file.txt

rm file.txt The correct method of deleting a file is rm file.txt. DEL is the DOS/Windows delete command. Copying a file to /dev/null does not delete file.txt, but does send a copy of it to /dev/null. The rm command cannot accept a text stream.

Which of the following rpm commands reinstalls a package (package.rpm)? rpm -e package.rpm rpm -i package.rpm rpm -U package.rpm rpm -F package.rpm

rpm -F package.rpm (The rpm -F package.rpm command will reinstall the package.rpm package. The rpm -U command upgrades a package. The rpm -e command removes a package. The rpm -i command installs a package.)

Using the rpm command, how does a system administrator upgrade an RPM Package Manager (RPM) package (package.rpm)? rpm -i package.rpm yum -i package.rpm yum -U package.rpm rpm -U package.rpm

rpm -U package.rpm (The rpm -U package.rpm command upgrades the package.rpm package. The rpm -i command installs a package. Neither yum command will work, because yum doesn't have the same syntax as rpm and these switches are in rpm syntax.)

Which two commands would a user combine into a command to alphabetize a file's contents and then display its last 10 lines of content? cat and cut sort and tail sed and join uniq and head

sort and tail Sort and tail. Sort alphabetizes the contents of a file, and tail displays the last 10 lines of content. Uniq removes repeated lines, and head displays the first 10 lines. Sed replaces text in a file, and join combines two files that share a common field. Cat displays a file, and cut filters a column or field.

Which of the following is the correct name for a yum repository configuration file? repository.txt sources.repo sources.list sources.txt

sources.repo (The correct yum repository file is named with a .repo suffix and it is placed into the /etc/yum.repos.d directory.)

What is the correct syntax of the tune2fs utility? tune2fs | fsck {device name] tune2fs [options] {device name} fsck | tune2fs {device name} tune2fs {device name}

tune2fs [options] {device name} The correct syntax for the tune2fs utility is: tune2fs [options] {device name}.

What is the name of the Yellowdog Updater, Modified (YUM) configuration file? yum.info yum.config yum.cfg yum.conf

yum.conf (The yum.conf file is the YUM utility configuration file. It resides under /etc.)

How many file systems per partition may a Linux system have? Three Two Four One

One (A partition may have only one file system.)

Which user is allowed to launch a program with a higher priority? The sys user Only the root user Any user The user who owns the process

Only the root user Only the root user is allowed to launch a program with a higher priority.

Using the cat /proc/partitions command provides you with a quick look at which information? Partitions and sizes Partitions and free space File sizes and free space Number of free inodes

Partitions and sizes (Displaying the contents of /proc/partitions provides you with a quick look at partitions and their sizes.)

Which of the following commands is Debian's main package management program used to install and remove Debian packages? yum rpm dpkg apt

dpkg (The dpkg command is Debian's main package management command for installing and removing software packages. APT is the name of the Debian package management tool. RPM is the Red Hat package manager tool used for querying the software database. Yum is the primary RPM utility for installing and removing software on Red Hat Linux.)

Which command unmounts the /dev/sdb2 filesystem from /data? umount /data dismount /data unmount /data dismount /dev/sdb2

umount /data The umount command followed by the mounted filesystem or the mount point unmounts the filesystem: umount /data.

Which vi command allows a user to delete 10 lines of text in a file? 10dd 10x 10d 10A

10dd 10dd deletes 10 lines in vi. 10x deletes 10 characters. 10A moves the cursor to the end of a line of text in insert mode, but the 10 has no effect. 10d removes lines or characters in the direction of navigation entered after the command.

What is the advisable logical partitions limit per drive? 16 8 4 12

12 (There is no restriction on the number of logical partitions, but it is advisable to limit it to 12 logical partitions per drive.)

Identify the method of redirecting standard error (stderr) to standard output (stdout) using a single operator. 2> 2>&1 2>>1 2> stdout

2>&1 2>&1 redirects stderr to stdout. The reason a user or an administrator uses this combination operator is that it is an easier method of manually writing results to a file. This is used when the user or administrator wants all output saved to a file, even if the output is an error.

What is the octal value of the Set User ID (SUID)? 2 1 4 6

4 The octal value of the SUID is 4.

Explain why the command mv dir1 dir2 completes successfully, but the command cp dir1 dir2 fails. Because mv is recursive by default and cp is not Because only the root user can use the mv command The mv command is a directory-oriented command, which means it works better with directories than it does with standard files. The cp command is generally only used for individual files and not directories.

Because mv is recursive by default and cp is not The mv command is recursive by default and cp is not. The equivalent cp command requires the -R option. Any user can execute the mv command. Both mv and cp work well with directories and regular files.

Identify the type of the following command: sort /etc/passwd Redirect Pipe Append Filter

Filter The sort command is a filter for the /etc/passwd text stream.

In a display from ps -ef, what is the column header PPID? It is the process ID (PID) permission. It is the process ID (PID) owner's group ID (GID). It is the parent process ID (PID) for the process. It is the process ID (PID) priority.

It is the parent process ID (PID) for the process. PPID is the parent process ID of the process. The parent process is the process that spawned the process.

Which Linux feature allows programs to run in the background? Pseudoterminals Multitasking Symmetric multiprocessing Command line interface

Multitasking Linux's multitasking capability allows processes to run in the background. The command line interface is a standard feature, but is not responsible for running processes in background. Pseudoterminals are software devices that emulate physical terminals. Symmetric multiprocessing refers to the hardware and software design of central processing units (CPUs).

Which directory in the Red Hat Linux distribution contains the RPM Package Manager (RPM) packages? images RPM i386 Packages

Packages (The distribution packages are under the Packages directory on the digital video disc (DVD) image.)

Which filesystem is faster than either second extended filesystem (ext2) or third extended filesystem (ext3)? Virtual File Allocation Table (VFAT) File Allocation Table (FAT32) ReiserFS ISO9660

ReiserFS ReiserFS is faster than either ext2 or ext3. ISO9660 is a compact disc/digital video disc (CD/DVD) filesystem and is not fast. Both VFAT and FAT32 filesystems have roughly the same speed benchmarks as ext2.

Which situation makes ReiserFS more efficient than either second extended filesystem (ext2) or third extended filesystem (ext3)? Storing very large files (> 1 terabyte [TB]) Storing data files that are smaller than 1 kilobyte (KB) in size Storing binary files Storing files that require a lot of maintenance

Storing data files that are smaller than 1 kilobyte (KB) in size The ReiserFS is more efficient than ext2 or ext3 at storing small files (< 1 KB). ReiserFS is not more efficient at storing very large files. The type of file (binary, text) doesn't matter to the filesystem. No file requires more maintenance than any other.

What function does the following command have for the user Bob Smith? edquota -u bsmith The command sets up a new quota for the user. The command edits a quota for the user. The command removes the soft limit for the user. The command removes the quota for the user.

The command edits a quota for the user. The edquota -u bsmith command edits a quota for the user.

Vi is not an acronym, but it is a short form of which term? Variable Visor Visual Virtual

Visual Vi is known as the visual editor.

Bob Smith, username bsmith, asked the administrator to copy a file, list.txt, to his home directory; however, Bob can't open the file. Which command does the administrator need to run to fix the problem? chown root:root list.txt chown ugo-r list.txt chown bsmith:bsmith list.txt chgrp root list.txt

chown bsmith:bsmith list.txt The administrator runs chown bsmith:bsmith file1.txt. The administrator changes the user and group ownership over completely to Bob by specifying Bob's User ID and Group ID in the command. A change to root will not help. Removing read permission will make it impossible for Bob to use the file.

A user remembers that they created a file with a four-character name with the .txt suffix. How can they search for files named with only four characters plus the .txt suffix? find . -name "*.txt" -print find . -name "4.txt" -print find . -name "????.txt" -print find . -size 4.txt -print

find . -name "????.txt" -print The find command that lists only those files that have four-character names plus the .txt suffix is: find. -name "????.txt" -print. The wildcard *.txt command finds all files with the name pattern of .txt as the suffix. The command -size 4.txt gives an error for using an invalid size type. The search for "4.txt" yields files only named 4.txt.

How does a user locate and display all directories within their home directory? ls -lR |grep drwx ls -la find . -dir * -print find . -type d -print

find . -type d -print The find command that lists all directories within a user's home directory is: find . -type d -print. The find . -dir * -print command gives an error because there is no -dir option. The ls -la command shows all files at the current level, including hidden files and directories, but no subdirectories. The ls -lR |grep drwx command will show all non-hidden directories and subdirectories.

In which directory are the main system services start and stop scripts located? /etc/system /etc/init.d /var/init.d /etc/services

/etc/init.d (The /etc/init.d directory holds all system services start and stop scripts. The /etc/services file lists system services and their corresponding Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports. The /etc/system and /var/init.d directories do not exist.)

Which file does a system administrator edit to change the default runlevel of a system that uses the Upstart init system? /etc/runlevel.conf /etc/init/rc-sysinit.conf /etc/init/runlevel.cfg /etc/init/rc-runlevel.conf

/etc/init/rc-sysinit.conf (The system administrator edits the /etc/init/rc-sysinit.conf file to set the default system runlevel.)

Which file system directory contains resource information? /proc /etc /usr /mnt

/proc (The /proc directory or proc file system contains text files that hold resource information. The /etc directory holds system configuration information. The /usr directory holds files pertaining to and usable by system users. The /mnt directory is a temporary mount point for external resources.) -Doesn't exist until directory is typed in -Information about various processes running on your system, as well as system information -what's up proc? proc has resources!

Which directory holds all system log files? /opt/log /tmp/log /etc/log /var/log

/var/log (The /var/log directory holds all system log files and should be the first location that an administrator checks when troubleshooting problems that occur during boot.) -Make sure you study what the different directories mean!!

The systemd multi-user.target corresponds to three different SysVinit runlevels. Which three? 2, 3, and 4 1, 4, and 5 0, 2, and 6 1, 2, and 4

2, 3, and 4 (The systemd multi-user.target corresponds to runlevels 2, 3, and 4. Systemd makes the distinction among these three targets by prefacing the multi-user.target with a runlevel, such as runlevel3.multi-user.target.)

What does the recovery mode option on the GRand Unified Bootloader (GRUB) menu provide to a system administrator? It loads the operating system, but bypasses all but the required drivers and offers no graphical interface. A Recovery Menu of options A root prompt without supplying the root password The option to boot to alternative media for recovery

A Recovery Menu of options (The recovery mode on the GRUB menu loads a Recovery Menu that displays multiple options for working with the system.) -Self explanatory

Which of the following is an example of a hotplug device? A server power supply A memory chip A Redundant Array of Independent Disks (RAID) card A Serial Advanced Technology Attachment (SATA) drive

A server power supply (Server systems have hotplug power supplies that can be removed and replaced with the system still powered on, because they also have redundant power supplies. As long as one power supply powers the system, another may be removed.)

When is the boot process complete? At the boot menu After the user logs in to the system and drops to a prompt At the login screen After all of the components have been loaded and displayed on the screen

After the user logs in to the system and drops to a prompt (The boot process is complete after the user logs in to the system and is dropped to a prompt. At this point, the boot process has completed and the system is ready for user input. The login screen is near the end, but the user's profile and start scripts still have yet to run. After the components have displayed on the screen, then the system starts the configured runlevel. The boot menu appears very early in the boot process, prior to choosing an operating system to boot into.) -Cuz it may not be graphical, but there has to be some user interaction

Which of the following is another term for a boot loader? Boot manager Boot menu Kernel Master boot record

Boot Manager (The boot loader is also sometimes referred to as the boot manager. The boot menu is the GRand Unified Bootloader (GRUB) menu. The kernel is the operating system core. The master boot record is where the boot loader is copied.)

If a system administrator edits the GRand Unified Bootloader (GRUB) menu boot options by entering a space and the number 1 after a standard GRUB entry, what does this entry instruct the boot loader to do? Boot to runlevel 1 Use only the first disk in the system After boot, open a single virtual console Boot to the graphical interface

Boot to runlevel 1 (Placing a space and a 1 after a standard GRUB menu entry boots the system to runlevel 1. There is no option for single disk booting. Booting to the graphical interface is runlevel 5. The number of virtual consoles cannot be manipulated at boot time.) -Grub relates to runlevels

The lsusb command's output is similar to which of the following? Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 001 Device 005: ID 0bda:0111 Realtek Semiconductor Corp. Card Reader Bus 002 Device 002: ID 0b38:0010 Gear Head 107-Key Keyboard Bus 002 Device 004: ID 147a:e00d Formosa Industrial Computing, Inc. Bus 002 Device 005: ID 093a:2510 Pixart Imaging, Inc. Optical Mouse Module Size Used by vboxpci 23237 0 vboxnetadp 25670 0 vboxnetflt 27829 0 vboxdrv 352853 3 vboxpci,vboxnetadp,vboxnetflt veth 13283 0 btrfs 653064 0 zlib_deflate 27139 1 btrfs 00:05.0 Audio device: NVIDIA Corporation MCP61 High Definition Audio (rev a2) 00:06.0 IDE interface: NVIDIA Corporation MCP61 IDE (rev a2) 00:08.0 IDE interface: NVIDIA Corporation MCP61 SATA Controller (rev a2) 00:08.1 IDE interface: NVIDIA Corporation MCP61 SATA Controller (rev a2) 00:09.0 PCI bridge: NVIDIA Corporation MCP61 PCI Express bridge (rev a2) Vendor ID: AuthenticAMD CPU family: 15 Model: 107 Stepping: 1 CPU MHz: 1000.000 BogoMIPS: 2008.89 Virtualization: AMD-V

Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 001 Device 005: ID 0bda:0111 Realtek Semiconductor Corp. Card Reader Bus 002 Device 002: ID 0b38:0010 Gear Head 107-Key Keyboard Bus 002 Device 004: ID 147a:e00d Formosa Industrial Computing, Inc. Bus 002 Device 005: ID 093a:2510 Pixart Imaging, Inc. Optical Mouse (The lsusb command displays information about the system's Universal Serial BUS(USB) buses and attached USB devices. The other choices show output from lsmod, output from lspci, and output from lscpu.) -Don't forget the B in USB means BUS!!!

A computer is set up to boot to Linux or to Windows with Windows set as the default selection. How does a user boot into Linux? By rebooting the computer until the computer boots into Linux By manually selecting Linux at the boot menu By entering the Basic Input-Output System (BIOS) and selecting Linux as the default choice By entering Windows and changing the default operating system to Linux in the boot options editor

By manually selecting Linux at the boot menu (The user would boot into Linux by manually selecting it from the boot menu. Rebooting multiple times will not change which system boots by default. There are no operating system choices in BIOS. The user could change the boot order in Windows, but doing so is unnecessary and risky.)

Which systemd feature provides better isolation for processes? Control Groups Parallelization Concurrency Quick boot

Control Groups (The systemd feature that provides better process isolation is Control Groups that track processes instead of process IDs (PIDs). Concurrency and parallelization are the same feature, meaning to start processes simultaneously or in parallel, rather than sequentially. Quick boot is the result of concurrency.) -You use CONTROL GROUPS in an experiment to isolate the variable and results

Prior to installing Linux on a system, a technician should check the system's hardware against the hardware compatibility list (HCL). If the technician finds that Linux does not support a particular integrated component or built-in feature, what action does the technician take to ensure a smooth installation? Disable the components or features in the Basic Input-Output System (BIOS) Upgrade the system's Basic Input-Output System (BIOS) Replace the old components Install a Linux distribution with an older kernel version

Disable the components or features in the Basic Input-Output System (BIOS) (The technician should disable the components or features in the BIOS. If the components are disabled, they will not show up in the system scan during installation and will not stop or complicate installation. Upgrading the system's BIOS will only help enable newer features, not support the existing ones. Replacing old components is usually not possible because the components are integrated into the motherboard. Installing an older Linux version makes the problem worse because drivers for newer hardware and features did not exist at the time the older version was released.)

Which of the following editors does the GRand Unified Bootloader (GRUB) menu most resemble in functionality? vi Emacs Pico nano

Emacs (On the GRUB menu screen, after entering edit mode, the instructions inform the user that "Minimum Emacs-like screen editing is supported." The vi editor is a standard *nix editor, but is not supported for GRUB editing. Pico is an editor supplied with Pine. The nano editor is an independent clone of the Pico editor—neither of which is supported for GRUB editing.) -E snacks on Grubs -Emacsgrubs

After editing GRand Unified Bootloader (GRUB) boot options, how does one accept the changes and continue booting the system? F10 Esc Ctrl+B Ctrl+Alt+Del

F10 (To resume the boot process after editing GRUB options, the administrator presses the F10 key. Esc would return to the menu, discarding any changes made. Ctrl+Alt+Del would reboot the system, discarding changes. Ctrl+B has no effect.) -Escape would not save changes -Not the same as the VI editor

Which type of drive usually connects to a computer system via a Universal Serial Bus (USB) port? Flash drive Tape drive CD-R(W) drive Floppy drive

Flash drive (Flash drives connect via USB ports. These drives are typically small in physical size, but may have large storage capacities, sometimes exceeding that of the system's internal hard drive.)

Which type of drive is typically NO LONGER FOUND in Linux systems? Floppy drive Compact disc/digital video disc (CD/DVD) drive Universal Serial Bus (USB) drive Hard drive

Floppy drive (Floppy drives are legacy technology and are no longer found in contemporary systems. They are too small to hold enough data to satisfy contemporary computers, plus they were very slow forms of storage.)

How many major divisions does the Linux boot process have? Four Seven Two Eleven

Four (The eleven-step boot process is a series of sequential steps that has been divided into four major sections: Basic Input-Output System (BIOS) initialization, boot loader, kernel and init initialization, and boot scripts.)

Which of the following is the latest version of the current Linux boot loader? GRand Unified Bootloader (GRUB) 2 GRand Unified Bootloader (GRUB) 3.0 LInux LOader 2 (LILO2) LInux LOader X (LILOX)

GRand Unified Bootloader (GRUB) 2

Which of the following is NOT one of the major boot process divisions or sections? Kernel and init initialization Boot scripts Boot loader Graphical interface initialization

Graphical Interface

Which feature of systemd allows systems to boot faster? Runlevel targets The ext4 file system Greater concurrency An improved initrd

Greater concurrency (Greater concurrency is the feature that enables the systemd init process to start multiple programs at the same time for faster boot. The ext4 file system is more efficient, but has little to do with faster boot times. Runlevel targets affect the system only after it has booted. The initrd would not improve boot times, but would be positively affected by improved boot times.) -Concurrency means happening at the same time -Multiple programs booting at the same time speeds up process

Most server systems have which type of hotplug devices? Hard disk drives Compact disc/digital video disc (CD/DVD) drives Memory chips Central processing units (CPUs)

Hard disk drives (Hotplug or hot swappable hard drives are very common in server systems.)

Where does a system administrator alter the boot device order? In the system's Basic Input-Output System (BIOS) In the GRand Unified Bootloader (GRUB) menu In the /proc file system In single user mode

In the system's Basic Input-Output System (BIOS) (The only location where the boot device order can be altered is in a system's BIOS.) -Because input and output means devices, and the question is asking for device order editing

Which of the following is NOT true of the init process? Init is responsible for maintaining security patches. Init is the parent of all processes. Init manages the runlevel of a system. Init is the system and session manager.

Init is responsible for maintaining security patches. (nit is NOT responsible for maintaining security patches for a system.) -security is just not init's thing -FALSE: Init is responsible for maintaining security patches. -All of the following are TRUE: Init is the parent of all processes. Init manages the runlevel of a system. Init is the system and session manager.

When using fsck to check and repair a filesystem for errors, what is the function of the -r option? Repair the filesystem without prompting Recursively repair the filesystem Interactively repair the filesystem Conservatively repair (don't repair binary files)

Interactively repair the filesystem (The -r option, fdisk -r /dev/sda1 for example, repairs a filesystem interactively.)

Where does the Linux installer place the boot loader? Into the master boot record (MBR) Into memory Into the Basic Input-Output System (BIOS) Into the disk's geometry

Into the master boot record (MBR) (The Linux installer places the boot loader—GRand Unified Bootloader (GRUB) 2—into the MBR.) -Can't have boot loader without the MBR, the boot loader is in MBR (probably false but I'm using it for the sake of memorization)

What part does the kernel play in the Linux operating system? It is the core of the operating system. It manages hardware for the system. It is the graphical interface. It is the Linux file system.

It is the core of the operating system. (The kernel is the core of the operating system. It contains system-level commands. It manages file system access, memory, processes, devices, and all resource allocation.)

What is the advantage of enabling all integrated peripherals compatible with Linux? It reduces the cost of purchasing and adding new components. It streamlines the installation procedure. It eliminates the need to install supporting drivers after installation is complete. It reduces the number of non-free software drivers and programs required to support the system.

It reduces the cost of purchasing and adding new components (The advantage of onboard, integrated peripherals is that it saves the user money by not requiring the purchase of new hardware. If the integrated peripherals are supported by Linux, there's no reason to purchase additional components. There is no advantage in installation in terms of speed or efficiency to use onboard, integrated peripherals or to use installed ones. Integrated peripherals might require non-free drivers to support them.)

During the boot process, what does the kernel do after mounting the root partition? It recompiles itself. It creates a rescue volume. It releases unused memory. It loads the graphical user interface.

It releases unused memory. (After the kernel mounts the root file system, it releases unused memory. It then executes the init program to initiate the appropriate user environment, which might or might not include the graphical user interface, depending on the runlevel. It does not create a rescue volume or recompile itself—recompiling is a manual task performed by the root user.) -After choosing a space [the partition] it leaves the rest available for other use

When troubleshooting boot problems, where should a system administrator look during the analysis phase of troubleshooting? Log files Backups The /tmp directory The root user's home directory

Log files (System administrators know to look at log files to search for clues to a problem. None of the other locations will help troubleshoot a boot problem.) -Log files keep track of issues -Check the log for clues -Especially with a boot problem

It is possible to install Linux without certain external peripherals attached. For example, installing Linux in "headless" mode means installing Linux without which peripheral connected? Monitor Keyboard Mouse Hard disk

Monitor (Headless means without a connected monitor. This is a standard method of installing Linux server systems. Linux systems require some sort of media for installation such as a hard disk, a Universal Serial Bus (USB) drive, or a digital video disc (DVD) drive.)

Which of the following is not an example of a Linux boot loader? NT Loader (NTLDR) GRand Unified Bootloader (GRUB) GRand Unified Bootloader (GRUB) 2 LInux LOader (LILO)

NT Loader (NTLDR) (The NTLDR is the legacy Windows NT boot loader for systems up to and including Windows XP and Windows Server 2003.) -Only one not having to do with Linux -Actually windows instead

Which two environment variables does the Upstart init daemon set? RUNLEVEL and PREVLEVEL RUNMODE and PREVLEVEL OPMODE and HALTMODE RUNLEVEL and RUNMODE

RUNLEVEL and PREVLEVEL (The two Upstart environment variables are RUNLEVEL and PREVLEVEL.) -The two levels, before [pre] and after [run]

Which task must a system administrator perform in order to replace a coldplug device? Shut down and power off the system Place the system into maintenance mode Disconnect all users from the system Disconnect the system from the network

Shut down and power off the system (To replace a coldplug device, the system must be shut down and powered off.)

Boot loaders interact with which part of the computer system in order to load the operating system? The Basic Input-Output System (BIOS) The init process The ext4 file system The disk controller

The Basic Input-Output System (BIOS) (Boot loaders interact with BIOS and utilize subroutines to load the operating system. This process occurs prior to the kernel addressing a file system or launching the init process. The boot loader does not interact with the disk controller.)

Where should a system administrator look to begin troubleshooting problems that appear to be hardware related? The Basic Input-Output System (BIOS) The first hard drive The compact disc/digital video disc (CD/DVD) drive The motherboard

The Basic Input-Output System (BIOS) (The first location a system administrator should look in when troubleshooting hardware problems is the system BIOS. In the BIOS, the administrator can selectively enable and disable on-board hardware, change the boot order, and perform a factory reset on all settings.) -Input and output relate to hardware and computer interaction; the mediator

During the boot process, the system displays a list of available operating systems to boot. If the user does not respond to the prompt, what happens? The default operating system loads. The system drops to a basic command prompt. The system proceeds with a file system check. The system halts until the user responds.

The default operating system loads. (If a user does nothing, the default operating system loads.)

If the runlevel is set to 5 in the inittab file, what happens? The graphical user interface launches. The system reboots. The system boots to a command line login prompt. The Recovery Menu launches.

The graphical user interface launches. (Runlevel 5 is the runlevel for the graphical mode, and the user's chosen desktop manager launches. Runlevel 6 reboots the system. Runlevels 2 and 3 launch the command line interface.)

Which of the following statements about GRand Unified Bootloader (GRUB) 2 is FALSE? Running update-grub auto-generates menu list. The first partition number is 1. The grub.cfg file is directly editable. It supports loadable modules.

The grub.cfg file is directly editable. (The grub.cfg is NOT directly editable. The menu.lst in GRUB Legacy was directly editable.) -Most of the time you shouldn't directly edit critical files that contain the command name in it (but that's just a guess to help learn the answer)

The init process is also known as what? The parent of all processes The Linux kernel The GNOME display manager The remote shell daemon

The parent of all processes (Init is also known as the parent of all processes. The Linux kernel initializes prior to the init process. The GNOME display manager, or gdm, is a graphic interface. The remote shell daemon is a subprocess of init.) -Once the parent is ready, everyone else is ready -The second to last step for booting

Which part of the computer checks for the Basic Input-Output System (BIOS) program and then executes it? The processor The first bootable disk The master boot record (MBR) The memory subsystem

The processor (The processor checks for the BIOS program and then executes it. This is the first step in the boot process.)

Which user on a system has the privilege or permission to issue the reboot or the shutdown command? The root user only The system administrator All users The backup operator

The root user only (Only the root user has the permission or privilege to issue a reboot or a shutdown on a system.)

What happens if a system administrator presses the c key at the GRand Unified Bootloader (GRUB) menu? The system drops to a command prompt. The system continues to boot. The system halts and does not boot. The system enters maintenance mode.

The system drops to a command prompt. (If an administrator presses the 'c' key at the GRUB menu, the system will open or drop to a command prompt. The command prompt allows the administrator to enter commands prior to booting the system.)

What happens when the root user issues the halt -p command?

The system shuts down and powers off. (The halt -p command means that the system will shut down and power off immediately, without prompting any user.)

How many different main components does a boot loader use to systematically load the operating system in stages? Eleven Four Two Three

Three (There are three main components that work together to load the operating system in stages: The boot sector program, the second stage boot loader, and the boot loader installer.)

What is the purpose of the modprobe command? To add or to remove modules from a kernel To scan or probe for new devices on a system To test to see whether a module is loaded To search for modules on a system

To add or to remove modules from the kernel (The modprobe command adds or removes kernel modules on a system. It does not scan, test, or search for modules.) -only modifies

Which of the following is NOT a role of the master boot record (MBR)? To launch the user environment To hold the partition tables Enable the user to select an operating system to load Determine the currently active partition

To launch the user environment (The MBR does NOT launch the user environment. The user environment is launched by the init process.)

What is the main function of the boot sector program? To start the computer's Power-On Self Test (POST) sequence To load the second stage boot loader To boot to a live compact disc/digital video disc (CD/DVD) distribution To launch the kernel into memory

To load the second stage boot loader (The main function of the boot sector program is to load the second stage boot loader. The second stage boot loader contains the kernel loader. The POST occurs before the boot sector portion of the boot process. Booting a live CD/DVD distribution is a function of the second stage boot loader.) -The second time brings the kernel -Another one bites the dust

What is the primary purpose of so-called mass storage devices? To provide fast access to large amounts of data in a small, reliable package To archive important data for future use To provide a disposable means of storing and retrieving data To provide users with a green technology alternative to traditional storage devices

To provide fast access to large amounts of data in a small, reliable package (The primary purpose of mass storage devices is to provide fast access to large amounts of data in a small, reliable package. Mass storage is not disposable. Archiving is one purpose, but not the primary purpose. Some mass storage is green, but providing green technology is not the primary purpose.)

Which of the following is NOT determined by the command: cat /proc/cpuinfo? Total system memory Number of central processing units (CPUs) Central processing unit (CPU) cache size Vendor ID

Total system memory (The /proc/cpuinfo file contains information about the system's CPU(s). It does not contain information about the system's memory.)

Which Linux distribution currently uses the Upstart init daemon? Red Hat Enterprise Linux (RHEL) 7 Ubuntu CentOS Fedora

Ubuntu (The Ubuntu distribution uses the Upstart init daemon. All others listed use systemd.) -Up Ub great for dyslexia -UbuntuUpstart

The ELILO boot loader is a boot loader for which type of computer? Unified Extensible Firmware Interface (UEFI) Basic Input-Output System (BIOS) Extensible Firmware Interface (EFI) Compatibility Support Module (CSM)

Unified Extensible Firmware Interface (UEFI) (The ELILO boot loader is for computers that use UEFI, instead of CSM, EFI, or BIOS.) -Elilo uefi: sounds like another language

What is the primary difference between Upstart and the traditional SysVinit system? Upstart is event-based rather than runlevel-based. Upstart is a manual, rather than an automated, process. Upstart tracks runlevels better than the SysVinit system does. Upstart is dependency-based and jobs must start in a particular order.

Upstart is event-based rather than runlevel-based. (Upstart is event-based rather than runlevel-based. It is more of an automated system, does not track runlevels, and is not dependency-based.) -Ups only when an event is started -UpeventStart

As the final part of the boot process and after the user logs into the system, what happens?

User profile and login scripts run. (The user's profile and login scripts run to complete the boot process.)

Which command would a system administrator run to display the IRQs used on a system? cat /proc/interrupts cat /proc/irqs cat /proc/resources cat /proc/meminfo

cat /proc/interrupts (The cat /proc/interrupts command displays a system's interrupts (IRQs) and their associated resources. The /proc/meminfo file shows system memory information. /proc/resources and /proc/irqs do not exist.)

Which Linux system services auto-mount compact disc/digital video disc read-only memory (CD/DVD-ROM) disks and Universal Serial Bus (USB) hardware? dbus umount udev /dev

dbus (The Desktop Bus, or dbus, system is responsible auto-mounting CD/DVD-ROM disks and USB hardware. The umount command unmounts mounted devices. The udev device manager manages the automatic detection and configuration, but not the mounting, of devices. The /dev directory contains device drivers for hardware.) -The Desktop Bus, or dbus, is an interprocess communication (IPC) system designed to standardize service provided by Linux desktop environments. -standardize, set automatic, set auto -NOT AUTO DETECTION

Which log file collects information about the status of various hardware devices on the system during kernel initialization? user.log daemon.log dmesg messages

dmesg (The dmesg file collects information on the status of various hardware devices during kernel initialization. The messages file records non-critical system messages. The user.log file contains information about all user level logs. The daemon.log file records information about background daemons that run on the system.) -dmesg sounds like dstatus -daemon log pertains to daemons only

Which of the following options prints the bad blocks in an extended filesystem? dumpe2fs -x /dev/sdb1 dumpe2fs -b /dev/sdb1 dumpe2fs -f /dev/sdb1 dumpe2fs -i /dev/sdb1

dumpe2fs -b /dev/sdb1 (The -b option prints bad blocks in the filesystem. The -x option prints a detailed report about block numbers. The -f option forces the utility to display status. The -i option displays data from an image file created using the e2image utility.)

To provide commands to the GRand Unified Bootloader (GRUB) boot loader, which key does a system administrator press when presented with the GRUB boot menu? e b r i

e (The administrator presses the e key to edit. None of the other options has relevance at the GRUB menu.) -e for edit -GBUBe grube grubedit

Which of the following e2fsck commands is the equivalent of fsck -t ext4 /dev/sdb1? fdisk /dev/sdb1 -t ext4 mkfs.ext4 /dev/sdb1 parted /dev/sdb1 e2fsck /dev/sdb1

e2fsck /dev/sdb1 (Using e2fsck eliminates the requirement to specify the filesystem type, so the correct answer is e2fsck /dev/sdb1. The mkfs, parted, and fdisk commands do not check filesystem integrity.)

Which of the following is an option on the GRand Unified Bootloader (GRUB) Recovery Menu? format Format the System Disk fsck Check all file systems reboot Restart the system memtest Perform a System Memory Test

fsck Check all file systems (The fsck Check all file systems choice is the option available on the GRUB Recovery Menu.) -GRUB gives you the option to felton all file systems -the heck with all

One of the functions of the /etc/inittab file is to instruct the init process to start the user environment in the default runlevel of 3. Which entry below has the correct syntax to set the default runlevel in the /etc/inittab file? id:3:initdefault: initdefault:3:start set DEFAULT_RUNLEVEL=3 id.3.initdefault.onboot

id:3:initdefault: (The correct entry for the /etc/inittab default runlevel of 3 is id:3:initdefault:.)

The X display manager (xdm), GNOME display manager (gdm), and KDE display manager (kdm) all depend on which program for launching one of them? init initrd .login .bash_profile

init (The launch of one of the graphical display managers (xdm, gdm, or kdm) depends on the init program. Using initrd loads an initial root file system into memory. The .login file loads the user's environment information for the csh or the tcsh. The .bash_profile is the program containing user-specific settings for the bash.) -init is the graphical part of the startup process -the managers are all display managers, aka graphical, so they pertain to the init program

Which file does the init program search for during boot? initrd initctl inittab init-checkconf

inittab (The init program searches for the inittab file during boot. The initrd is the initial ramdisk for loading a temporary root file system into memory. The initctl is the init process control tool. The init-checkconf is a tool for checking upstart scripts for errors.) -keeping tab during boot -tab is during boot

If a process with a process ID (PID) of 6543 is hung and cannot be terminated normally, which command should a system administrator issue to kill the process? killall -9 6543 kill -15 6543 kill -9 6543 kill -SIGTERM 6543

kill -9 6543 (The correct method to kill this hung process is to issue the kill -9 6543 command or the kill -SIGKILL command. These commands do no save data. The kill -15 and kill -SIGTERM commands are both gentle termination commands and often will not work on a hung process. Using killall -9 6543 is not correct syntax for the killall command—killall requires the process name and not the PID.)

Which of the following is NOT a method for halting a system? telinit 0 shutdown -h now systemctl isolate poweroff.target killall -9

killall -9 (The killall -9 command will NOT shut down a system.)

Which command would a system administrator use to display information about a system's central processing unit (CPU)? lscpu lsmod lsdev lsusb

lscpu (The lscpu command displays a report of all CPUs and features. The lsmod command lists loaded modules. The lsdev command lists installed hardware components. The lsusb command lists all Universal Serial Bus (USB) devices. previous)

Which command produces output similar to the following?: Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 2 lscpu lspci lsmod lsusb

lscpu (The lscpu command produces output related to the system's central processing units (CPUs). The lspci command produces output related to the system's Peripheral Component Interconnect (PCI) devices. The lsmod command displays a list of loaded modules. The lsusb command displays a list of all Universal Serial Bus (USB) devices.)

Which command produces output similar to the following?: 0:00.0 RAM memory: NVIDIA Corporation MCP61 Memory Controller (rev a1) 00:01.0 ISA bridge: NVIDIA Corporation MCP61 LPC Bridge (rev a2) 00:01.1 SMBus: NVIDIA Corporation MCP61 SMBus (rev a2) 00:01.2 RAM memory: NVIDIA Corporation MCP61 Memory Controller (rev a2) 00:02.0 USB controller: NVIDIA Corporation MCP61 USB 1.1 Controller (rev a3) 00:02.1 USB controller: NVIDIA Corporation MCP61 USB 2.0 Controller (rev a3) 00:04.0 PCI bridge: NVIDIA Corporation MCP61 PCI bridge (rev a1) lspci lscpu lsmod lsusb

lspci (The lspci command produces output related to the system's Peripheral Component Interconnect (PCI) buses and the devices attached the PCI buses. The lscpu command produces output related to the system's central processing units (CPUs). The lsmod command displays a list of loaded modules. The lsusb command displays a list of all Universal Serial Bus (USB) devices.) -Random hardware stuff (or whatever Peripheral Component Interconnect means)

Which file in GRand Unified Bootloader (GRUB) Legacy corresponds to the grub.cfg file in GRUB 2? grub.conf menu.lst menu.cfg grub.cfg

menu.lst (The GRUB Legacy menu.lst file corresponds to the GRUB 2 grub.cfg file for boot menu entries.) -GRUB needs a menu with the LIST of menu choices

Which systemd target corresponds to the SysVinit runlevel 3? multi-user.target graphical.target rescue.target reboot.target

multi-user.target (Runlevel 3 corresponds to the multi-user.target systemd target, whereas graphical.target is runlevel 5, rescue.target is runlevel 1, and reboot.target is runlevel 6.) -Runlevels: 0 halt system 1 single user 2, 3, 4 multiuser 5 multiuser 6 reboot

The poweroff command is not a command at all, but is a link to which command? halt reboot stop shutdown

reboot (The poweroff command is a link to the reboot command. The halt command is also a link to the reboot command. The shutdown command will halt the system, but is not a link from poweroff. The stop command is a symbolic link to the initctl command.)

Which of the following systemd commands changes the current runlevel to use the graphical user interface? systemctl isolate gui.target systemctl start graphical.target systemctl isolate graphical.target systemctl enable gui.target

systemctl isolate graphical.target (The correct command syntax is systemctl isolate graphical.target to set the current runlevel to graphical user interface mode.)

Which init daemon replaced SysVinit for Red Hat-based distributions?

systemd (The systemd init daemon replaced the SysVinit init daemon for all Red Hat and Red Hat-based distributions. Upstart is the init daemon for Ubuntu systems. SysV-style init is the same as SysVinit. The telinit command changes the current runlevel for a system.)

Which command do system administrators use to dynamically change the runlevel, for example from runlevel 2 to runlevel 3? telnet kill runlevel telinit

telinit (The telinit command is used to change runlevels dynamically (without rebooting). The kill command stops processes, but cannot change a runlevel. The runlevel command displays the current runlevel. The telnet command is a deprecated method of connecting to remote systems.)

Which of the following utilities allows a system administrator to convert an existing filesystem to third extended filesystem (ext3)? e2fsck fdisk tune2fs mkfs.ext3

tune2fs (The tune2fs utility can be used to convert an existing filesystem to ext3. The fdisk utility alters partitions. The mkfs.ext3 utility will create an ext3 filesystem from an unformatted partition, but it cannot convert another filesystem to ext3 nondestructively. The e2fsck utility performs a filesystem check.)

Which of the following handles the automatic detection and configuration of hardware devices such as sound cards and Universal Serial Bus (USB) drives? udev dev sys dbus

udev (The device manager udev manages the automatic detection and configuration of hardware devices. The dev and sys elements are actually part of the Linux directory structure, where /dev contains hardware and software device drivers and /sys contains information about hotplug hardware devices. The Desktop Bus, or dbus, is an interprocess communication (IPC) system designed to standardize service provided by Linux desktop environments.)

Section 2

Section 2

In which file is the master system umask set? /etc/passwd /etc/umask /etc/defaults /etc/profile

/etc/profile The master system umask is defined in the /etc/profile file. The /etc/passwd file contains only user account information. There is no /etc/umask and no /etc/defaults file.

What is the octal value of the read permission? 6 1 4 2

4 The octal value of the read permission is 4.

Section 3

Section 3

In most Linux distributions, instead of the traditional vi editor, which editor are users actually editing files with when they type vi file.txt? vim emacs nano gedit

vim In Linux, the traditional vi editor has been replaced with vim (vi improved). Nano, gedit, and emacs are all alternatives to the vi(m) editor.

Which of the following is a keyboard shortcut for repeating the last command entered? !! && :: ??

!! The keyboard shortcut !! repeats the last command entered on the command line.

Which find command -name option wildcard pattern would a user use to locate all files with five-character names named with any suffix? "?????.*" "*****.?" "*5.*" "*****.*"

"?????.*" The correct option is: "?????.*". The ? is a search for any single character. The * searches for any string regardless of length. The "*5.*" option will find all files with the number 5 positioned before the dot (.) in the file name. The "*****.*" pattern will find every file, because * is a generic wildcard for any string and any length. The "*****.?" pattern will match any file that has a single character suffix.

Which GRand Unified Bootloader (GRUB) timeout value will cause the GRUB boot menu to remain on the screen indefinitely until an administrator manually selects an option? 0 -1 FALSE 99

-1 (To display the GRUB menu indefinitely until a manual entry is made via the keyboard, the timeout value must equal -1.)

Which numeric kill option is SIGKILL? -2 -HUP -9 -15

-9 The SIGKILL signal is -9. As an example, kill -9 6847. It is an immediate termination of a process. -15 is a gentle termination, or SIGTERM. -2 is the SIGINT, which is the same as using Ctrl+C. The -HUP signal means hangup, which is to say, stop and restart immediately.

To copy a directory and its contents to another directory, which option or switch must be used? -u -p -R -v

-R The -R option is the recursive option, which is required to copy one directory and its contents to another directory. The -p option preserves permissions. The -v option is for verbose output. The -u option is for update, to copy only when the source directory contents are newer than the target's.

A user issues the following command and receives expected results. ls -l -rw-rw-r-- 1 user user 323 Feb 2 20:18 file1.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file2.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file3.txt How do the displayed results change if the user pipes the command to xargs? -rw-rw-r-- 1 user user 323 Feb 2 20:18 file1.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file2.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file3.txt No output file1.txt file2.txt file3.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file1.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file2.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file3.txt

-rw-rw-r-- 1 user user 323 Feb 2 20:18 file1.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file2.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file3.txt Piping the output to the xargs command with no options results in the following output on a single line: -rw-rw-r-- 1 user user 323 Feb 2 20:18 file1.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file2.txt -rw-rw-r-- 1 user user 323 Feb 2 20:18 file3.txt

Using metacharacters, how would a user isolate text entries that have three random alphanumeric characters with the fourth character being a period (.) within a file from all other text entries? Examples: 123. bob. sally john day. ...\. ..... \W .*

...\. The metacharacter match for three random characters and the fourth being a period (.) is (...\.). The ..... metacharacter will capture all entries with more than five characters, with no special consideration for the period in the line. The \W metacharacter will match any line with non-alphanumeric characters in it. The .* metacharacter will match everything.

How does a user successfully run this script: file_list.sh, which is in the user's current directory? ./file_list.sh sudo -c file_list.sh runas root file_list.sh file_list.sh

./file_list.sh (Use ./file_list.sh. The script must be run with the leading ./ so that the user's path is overridden and the current directory is used. Simply running file_list.sh will fail with a command not found error because the current directory is not in the user's path. The runas command is a Windows command. Sudo -c would not work because the script is in the current directory. )

In which file is the user's command history stored? .bash_history .bashrc .profile .ssh/known_hosts

.bash_history The hidden file .bash_history stores a running list of previously used commands. The .bashrc file is a hidden file that sets shell variables for the user. The .profile file sets global profile variables for the user. The .ssh/known_hosts file maintains a list of previously used hosts that the user has connected to via ssh, along with the remote system's fingerprint.

When a user compresses an archive using the bzip2 command, which suffix does the bzip2 command give the compressed archive file? .gz .tar .zip .bz2

.bz2 The bzip2 command appends the archive file name with the .bz2 suffix (extension), indicating that it has been compressed using the bzip2 command. The .tar suffix is traditionally used for files archived using the tar command. The .gz suffix is appended to an archive by the gzip utility. The .zip suffix is appended to the file name by the WinZip utility for Windows computers.

Which of the following locations is an unusual location to find shared libraries? /bin/lib /lib /usr/lib /usr/local/lib

/bin/lib (It would be highly irregular to find shared libraries in /bin/lib, which ordinarily does not exist.)

Which partition's recommended size is 100 MB? /media /home /boot /tmp

/boot (The /boot partition's recommended size, if created as a separate partition, is 100 MB. There are no particular size recommendations for the other listed partitions, if created as separate partitions.)

The configuration file templates and the settings in the /etc/default/grub file are combined by the grub2-mkconfig utility to generate which file? /boot/grub2/config /boot/grub2/grub.conf /boot/grub2/boot.cfg /boot/grub2/grub.cfg

/boot/grub2/grub.cfg (The grub2-mkconfig utility combines the /etc/default/grub file and the contents of the /etc/grub.d templates to generate the /boot/grub2/grub.cfg file. None of the other options refer to valid files.)

Which of the following is the bootable partition? Device Boot Start End Blocks Id System /dev/sda1 * 63 960140789 480070363+ 83 Linux /dev/sda2 960140790 976768064 8313637+ 5 Extended /dev/sda5 960140853 976768064 8313606 82 Linux swap / Solaris The bootable partition cannot be determined from this display. /dev/sda2 /dev/sda5 /dev/sda1

/dev/sda1 (The /dev/sda1 partition is bootable. The boot flag (*) is set on the active partition.)

If a system administrator wants to add a new software repository to use with apt-get on a Debian system, to which file must the new repository information be added? /etc/apt.d/apt-get.conf /apt/repos.conf /etc/sources.list /etc/apt/sources.list

/etc/apt/sources.list (The correct file to edit on Debian systems to add a new software repository is /etc/apt/sources.list.)

In which file are the default GRand Unified Bootloader (GRUB) menu settings stored? /boot/grub/menu.lst /boot/grub2/grub.cfg /etc/default/grub /etc/grub.cfg

/etc/default/grub (The /etc/default/grub file contains the default GRUB menu configurations. It is the same file for GRUB Legacy and for GRUB 2. The /boot/grub2/grub.cfg is the actual menu file, as is /boot/grub/menu.lst, for GRUB 2 and GRUB Legacy, respectively. There is no /etc/grub.cfg file.)

When setting up quotas on a particular filesystem, /home for example, which file must the system administrator edit to add quota support for the /home filesystem? /etc/fstab /etc/limits /etc/quotas /etc/qtab

/etc/fstab The administrator enters quota setup information into the /etc/fstab file. None of the /etc/qtab, the /etc/quotas, or the /etc/limits files exist.

Into which file does the administrator enter persistent mount information? /etc/exports /etc/motd /etc/mtab /etc/fstab

/etc/fstab The administrator enters persistent mount information into the /etc/fstab file. The /etc/mtab file contains currently mounted filesystem information. The /etc/motd file is the message of the day file. The /etc/exports file contains a list of Network File System (NFS) exported filesystems.

Which file must be edited in order to set up a GRand Unified Bootloader (GRUB) password? /etc/passwd /etc/grub.d/40_custom /boot/grub2/grub.cfg /etc/grub.conf

/etc/grub.d/40_custom (The system administrator must manually edit the /etc/grub.d/40_custom file in order to set up a GRUB password.)

Which file does the system read when an administrator uses the mount command to see currently mounted filesystems? /etc/exports /etc/motd /etc/fstab /etc/mtab

/etc/mtab The mount command reads the /etc/mtab file. The /etc/fstab file contains a list of persistently mounted filesystem information. The /etc/motd file is the message of the day file. The /etc/exports file contains a list of Network File System (NFS) exported filesystems.

If an administrator mounts /dev/sdb2 onto /mnt, which file reflects that change? /etc/exports /etc/motd /etc/mtab /etc/fstab

/etc/mtab The mount is entered into the /etc/mtab file. The /etc/fstab file contains persistently mounted filesystem information and does not change for temporary mounts. The /etc/motd file is the message of the day file. The /etc/exports file contains a list of Network File System (NFS) exported filesystems.

If a system administrator wants to know which shell a user is configured to use, in which file would the administrator look? /etc/shadow /etc/group /etc/passwd /bin/bash

/etc/passwd The shell assigned to each user is set in /etc/passwd. The /etc/group file contains group information, but nothing about shells. The /etc/shadow file contains user names and encrypted passwords. The /bin/bash file is the user shell, bash.

In which directory are the yum repository files kept? /etc/repos /etc/yum.repos.d /etc/apt /var/yum

/etc/yum.repos.d (The yum repository files reside in the /etc/yum.repos.d directory. The /etc/apt directory is where the Debian software source.list file resides. The other two directories do not exist.)

Which of the following is NOT a standard Linux directory /swap /opt /mnt /boot

/swap (The /swap is not a standard Linux directory. The swap partition exists, but is not mounted as /swap.)

Which directory commonly has the sticky bit set? / /opt /tmp /var

/tmp The /tmp directory commonly has the sticky bit set, because many users use the /tmp directory for saving temporary files.

What is the default setting for the <pass> section of /etc/fstab for the root filesystem (/)? X 2 0 1

1 The default setting for the root filesystem (/) for the <pass> section of /etc/fstab is 1. 0 is for removable devices, and 2 is for other filesystems. There is no X entry in /etc/fstab for <pass>.

How many partitions can a Globally Unique Identifier (GUID) Partition Table (GPT) disk have? 64 16 128 4

128 GPT supports up to 128 partitions and makes no distinction as to primary or extended. Master Boot Record (MBR) has a four primary partition limitation.

Why does the command ls 2> files.txt display a list of files to the screen, but nothing to the files.txt file? 2> is standard error (stderr) and there were no errors, and standard output (stdout) was not redirected, so it displays on the screen. Because the error condition is the list of files generated by the ls command. There were no files to display to the screen or to standard error (stderr). The user didn't issue the command with options, such as ls -ltr.

2> is standard error (stderr) and there were no errors, and standard output (stdout) was not redirected, so it displays on the screen. The ls 2> files.txt command shows a list of files because the stdout was not redirected, and there is nothing in the files.txt file because no errors were redirected to it via 2>. There are no errors to display or to redirect. No options are required for the ls command.

How does a user move two lines of text from one location in a file to another location using vi? 2yy, navigate to the new location, y 2yy, navigate to the new location, p 2dd, navigate to the new location, u 2dd, navigate to the new location, p

2dd, navigate to the new location, p 2dd, navigate to the new location, p. Delete the two lines from the current location, navigate to the new location, and press p to paste the lines. Using y (yank) copies the files instead of moving them. The u key will undo the deletion of the two lines.

Which of the following octal permissions is read only for a file? 666 777 444 222

444 444 is r-- r-- r--, which is read permission only. 666 is rw- rw- rw-. 777 is rwx rwx rwx. 222 is -w- -w- -w-.

How does a user copy five lines of text and then undo before pasting in a new location? 5x,u 5dd,p 5r,u 5yy,u

5yy,u 5yy,u copies five lines with yy, then undoes the copy with u (undo). 5dd,p deletes five lines, and then pastes them. 5x,u deletes five characters and then undoes the deletion. 5r,u replaces five characters with u.

If a user enters the umask 002 command and then creates a new file, what are the permissions for the new file? 755 775 644 664

664 A umask of 002 yields a new file with permissions of 664.

From which starting octal permission does the umask subtract? 777 664 666 755

666 666 is the starting octal permission for files from which the umask is subtracted. Regular files do not have the execute permission by default.

What is the octal value of rwx rw- r--? 764 774 664 665

764 The octal value of rwx rw- r-- is 764.

Identify the number that will match the regular expression: '^[0-9]{5}' 360 76470 86 2016

76470 76470. The regular expression '^[0-9]{5}' matches all numbers with five or more digits.

What are the default permissions for newly created directories 777 664 665 775

775 The default permissions for newly created directories are 775.

What are the starting octal permissions on directories from which the umask is subtracted? 777 666 775 664

777 777 are the starting octal permissions for a directory because directories, by default, have execute permission.

Which of the following are the maximum permissions that a file or directory can have? 666 111 777 000

777 777 is rwx rwx rwx, which are the maximum permissions for a file.

How does a user access online help while using the vi editor? :help ?help !help /help

:help The :help command opens help above the current file in vi, but does not affect the current file.

If a user opens multiple files (file1.txt, file2.txt, file3.txt) for editing with vi, how does the user switch to the next file (file2.txt)? :n file2.txt :! file2.txt :o file2.txt :r file2.txt

:n file2.txt The :n file2.txt command switches to file2.txt in vi. The :! command is for executing an external command. The :r command reads in the contents of a file into the current file. The :o command has no functionality in vi.

How does a user quit without saving any changes in the vi editor? :wq :q! ZZ :w {file name}

:q! To quit vi without saving changes, use :q!.

If a user has opened multiple files in vi, how does the user quit all of them at the same time? :q! :e :qa :wq

:qa The command qa (quit all) quits all files that are in the buffer. The :q! command quits all files without saving data. The :wq command quits only the current file. The :e command requires an external file to edit.

Which command copies the contents of another file into the current one while in vi? :n file.txt :w file.txt :q file.txt :r file.txt

:r file.txt The :r file.txt command reads in the named file into the current file. The :w file.txt command writes (saves) to the file.txt file. The :q command will quit and ignore the file.txt info. The :n file.txt command opens file.txt for editing.

How does a user editing a file in vi periodically save work without exiting the file to do so? :q! :wq :w ZZ

:w Periodic saves can be done by entering command mode and typing :w. ZZ writes and then quits vi. The :q! command quits vi without saving. The :wq command writes and then quits vi.

If a user opens vi by typing vi <ENTER> at the command line and enters text into the buffer, what must the user do to save the current file? :w <file name> :wq :q! :w

:w <file name> The user must supply a file name when saving for the first time, :w <file name>. After the first save to the file, then the user can issue :w to periodically save the file. The :wq command will write and quit. The :q! command quits without saving.

What is the difference between a copy and a hard link? A copy changes with the original, and a hard linked file is an independent version. A copy shares the inode with the original file, and a hard link has its own inode. A copy and a hard linked file are exactly the same. A copy has its own inode, and a hard linked file shares the inode with the original.

A copy has its own inode, and a hard linked file shares the inode with the original. A copy is an independent file with its own inode. A hard linked file shares an inode with the original. A copy and a hard link are not the same.

A user opens a trouble ticket and reports the following error for a directory they attempted to remove that they own in their home directory: rm: cannot remove `dir1': Is a directory. What is the problem? A directory cannot be removed using the rm command alone and needs the -r option. The user does not have sufficient permissions to remove the directory. The user should have used the -i option with the rm command. The directory can only be removed with the -f (force) option.

A directory cannot be removed using the rm command. A directory cannot be removed using the rm command, even if the user has sufficient permissions to do so. The -i option specifies interactive and will not affect the outcome. Using the -f option will not remove the directory.

What does the top command display for a user? A dynamic list of the top resource-consuming processes The amount of free memory on a system A list of the largest programs running in memory A list, by user account, of the current background jobs running on a system

A dynamic list of the top resource-consuming processes The top command displays a dynamic process table and some system statistics. The top resource-consuming processes are shown at the top of the list. The amount of free memory on a system is found with the free command. The top command does not provide the list of the largest programs running in memory. The jobs command displays job information, and only for the user who executes it.

What does the env command display to a user? A list of the user's environment variables and their values The user's command history A list of the user's available aliases A list of all available languages, fonts, and aliases on the system

A list of the user's environment variables and their values The env command displays a list of the user's environment variables and their values. A user's command history is shown using the history command. A list of the user's aliases is displayed with the alias command. No single command will list all available languages, fonts, and aliases on the system.

Which term is described by: A collection of classes, functions, or procedures that can be imported as a unit? An application A package A repository A file system

A package (A package is a collection of classes, functions, or procedures that can be imported as a unit. An application is a computer program designed to perform a task or function, often in response to user input or manipulation. A file system is a structural unit or collection of units that allows for the organization and storage of directories and files. A repository is a collection of software packages specific to a particular Linux distribution.)

What is the primary difference between a pipe and a redirect? A pipe takes an argument and sends it to a file, and a redirect only sends data to the screen (stdout). A pipe converts a data stream into a static file, and a redirect converts a static file into a data stream to be used as input for other commands. A pipe takes output and sends it in both directions as input, and redirection is one direction only. A pipe takes a data stream of output from one command that is input to the next command, and a redirect is a stream of output that is usually directed to a file and not to another command.

A pipe takes a data stream of output from one command that is input to the next command, and a redirect is a stream of output that is usually directed to a file and not to another command. A pipe takes the output from one command and uses it as input to the next command, and a redirect is a stream of output that is usually directed into a file and not to another command. Pipes are unidirectional, as are redirects. A pipe converts output to input and does not redirect any stream to a file.

Bracket expressions are handy for identifying characters to match, but what else can a user place inside brackets to extend and strengthen string matches? A range of options A series of letters A single character A number

A range of options A user can extend matches by placing ranges inside brackets, such as [0-9] or [a-z], which captures all numbers from 0 to 9 and all letters from a to z. The other options do not extend matches and are standard narrow match options.

When a user works at the command line, what is the user actually working in? A shell A graphical user interface A DOS window A third-party program external to Linux

A shell When a user works at a command line, the user is actually working inside a shell, which is a user environment for executing commands and working with the operating system. The command line is not the graphical user interface. A DOS window is a Microsoft command line. The shell is an integral part of Linux and not external to it.

A child shell is also known as which type of shell? A subshell A twin shell A super shell An analog shell

A subshell A child shell is also known as a subshell. Subshells are typically invoked by running a script.

Why is a tebibyte significantly larger than a terabyte? The tebibyte is a deprecated miscalculation of one trillion bytes. A tebibyte is a different order of magnitude, such as comparing a gigabyte and a terabyte. A terabyte is the decimal version, based on 10, of the binary tebibyte, which is based on 2. The tebibyte is a theoretical upper limit and not an actual calculation.

A terabyte is the decimal version, based on 10, of the binary tebibyte, which is based on 2. The terabyte is based on 10 or decimal, which means that it is one trillion bytes, whereas the tebibyte is one kilobyte (1,024 bytes) multiplied by 1,024 bytes by 1,024 bytes by 1,024 bytes (or 1,099,511,627,776 bytes).

Which of the following is the simplest type of regular expression? An alphabetic string A range expression Multiple possible strings A bracketed expression

An alphabetic string The alphabetic string is a regular expression that is as simple as a word or sample of text. For example, searching for the word, Linux, or the alphabetic text pattern, process.

What is the primary difference between apt-get and aptitude? Aptitude is a menu-driven apt-get. Aptitude is view only. It is equivalent to apt-get, but on Red Hat Linux and its derivatives. Aptitude can only be used inside a graphical user interface, such as GNOME.

Aptitude is a menu-driven apt-get. (Aptitude is equivalent to the apt-get command, but it is menu driven. It is a command line tool and does not require a graphical desktop. It is used on Debian and its derivative distributions. It has the same functionality as apt-get and therefore is not view only.)

Which of the following is NOT an advantage of placing a program into the background? The background process continues its task. It allows the user to switch between running tasks. Background tasks use less memory than foreground ones do. It returns the user to the command prompt in order to allow the user to continue working.

Background tasks use less memory than foreground ones do. Tasks that have been placed into the background use the same memory as they would if run in the foreground.

Why is the locate utility so much faster than the equivalent find command? Because locate can only be used by regular users, which limits the files to search through Because locate performs only a Boolean search Because locate can only be used by the root user Because locate searches only its own database for files

Because locate searches only its own database for files The locate utility is much faster than find because it searches through its own database only. Locate can be used by any user, including the root user. Locate does not perform a Boolean search exclusively.

Why do scripts spawn subshells when a user executes them? Because the first line in the script spawns the new shell Any command executed on the command line runs in a new shell. Scripts spawn new shells when executing commands as the root user. Because the script's commands must run in the C shell

Because the first line in the script spawns the new shell (Scripts spawn new shells because typically the first line of a script identifies the shell in which the script will run. For example, #!/bin/bash tells the script to run the script's commands in the bash shell. If no designation is made, the script runs in the user's default shell. Commands run interactively on the command line do not run inside a new shell. The new shell is not a function of which user runs the commands. Scripts can run in any shell.)

Why are the vi editor and vim preferred by many Linux administrators? Because they are efficient and customizable Because they are non-graphical (command-line interface [CLI]) editors Because they are available on all Linux systems Because they are both free and open-source editors

Because they are efficient and customizable The vi editor and vim are efficient and customizable. The other options are also true, but the editors are preferred because of their efficiency and the capability to be extensively customized.

Which type of file is a shared library? Binary Encrypted Link Device

Binary (A shared library is a binary (compiled) file. Some shared libraries have links, but they are not themselves the libraries. Shared libraries are not normally encrypted, but they are compiled. Libraries are not device files.)

Which of the following is a match for egrep -i '1{3}' file.txt? Bob (212) 555-1111 Linda (212) 555-3112 John (212) 555-1122 Sally (212) 555-1333

Bob (212) 555-1111 The egrep -i '1{3}' file.txt command searches for lines containing three consecutive 1s in them.

Which of the following would NOT match the regular expression '^[0-9]{3}'? Bob 111 2995 111 75054

Bob 111 Bob 111. The regular expression '^[0-9]{3}' matches at least three digits at the beginning of the line.

Which of the following is NOT a shell function? Booting the system Processing commands Providing an interactive user environment Verifying the correctness of command syntax

Booting the system The option that is NOT the function of a shell is booting the system. The bootloader's job is to boot the system. No shell is available in the boot process.

If a user edits a file that is hard linked to another file, what happens to its linked file? Both files are changed. The link is broken. The linked file changes to a symbolic link. Only the original file is edited.

Both files are changed. If a user edits a file that is hard linked to another file, both files are edited because they both point to the same inode.

What is the requirement for combining two files using the join command? Both files must be the same size. Both files must have a common field. One of the files must have a numeric field. Both files must be less than 1 megabyte in size.

Both files must have a common field. The requirement for joining two files is that they share a common field on which to join. The common field is usually numeric, and both must share the same numbers for a proper join. There are no size restrictions.

How does a system administrator resize logical volumes? By adding new disks or removing old ones By using available free space to shrink volumes By absorbing or ejecting physical volumes By deleting, reformatting, and re-creating physical volumes

By absorbing or ejecting physical volumes (An administrator resizes logical volumes by absorbing physical volumes to enlarge or by ejecting physical volumes to shrink. Using available free space works only in enlarging a volume. Neither of the other two options is a software solution for logical volume management.)

How is the Yellowdog Updater, Modified (YUM) utility used? By the system administrator at the command line. As a service, regularly scheduled, without user intervention. As part of an automated Cron process, which requires no user intervention. As part of a "push" package service from Red Hat that keeps systems updated.

By the system administrator at the command line. (Typically, YUM is used by a system administrator at the command line. While you can automate the use of YUM, it isn't recommended that you do so because you might want to forego some updates, rather than install all of them. YUM is a user-based program that is used at will and not designed as a service. Red Hat does not push packages to customer systems.)

The export command confuses a new Linux user. How can the user find immediate help for the export command? By using the Linux man pages By typing google export at the command line By entering export /? at the command line By issuing the export command with no options or arguments

By using the Linux man pages Users can always find help through the system's help system, known as man (manual) pages. The user will receive errors when typing google export or export /? at the command line. The export /? is the DOS/Windows method of obtaining system help with a command. If the user enters export with no options or arguments, the command displays a list of currently exported names.

If a user does not want to cd (change directory) to, for example, the /etc directory, how does the user display a list of files from that directory? By using a series of aliases for directories on the file system By asking the root user to create the list and redirect it into a file By assigning directory names to variables By using the absolute path in the command

By using the absolute path in the command All of the options will work, but the most correct, and the most often used, is to supply the absolute path to the remote directory that the user wants to work with in a command.

If a user wants to execute a command that is not included in their path, how do they execute the command? By using the full path to the command By using the full command name with options By making the command's location the current working directory By exporting a variable for the command

By using the full path to the command A user who wants to execute a command that is not in their path must use the full path to the command when executing the command.

How can a user instruct a command to accept a command's output as its input that does not accept another command's output as its input? For example, how can a user instruct the echo command to accept output from ls as input? By using the tee command By directing ls output to echo using the > operator By using xargs By piping ls to echo

By using xargs A user has to use xargs, which essentially adds arguments to the command and then executes it. Echo does not accept piped input or redirected input. The tee command does not work, because echo does not accept redirected output as input.

Other than specifying a size for a partition, which other task can an administrator perform on a partition using the fdisk utility? Edit the partition's geometry Extend a logical volume Change the partition's type Create a logical volume

Change the partition's type (An administrator can use the fdisk utility to change a partition's type from NTFS to Linux, for example. Partitions do not have geometry, but hard drives do. An administrator cannot perform any logical-volume-related task using fdisk because it is only capable of working with simple volumes.)

What are bracket ([]) expressions? Characters inside the brackets match any one character. Characters inside the brackets denote a range of characters to match. Characters inside the brackets match characters at the beginning of a string. Characters inside the brackets match characters at the end of a string.

Characters inside the brackets match any one character. Bracket expressions are characters enclosed in square brackets that match any one character inside the brackets. For example, h[a o u]g can match hag, hog, or hug.

Which of the following is NOT a stage in the Debian archive package installation process? Check file system permissions Check for dependency Configure Unpack

Check file system permissions (Check file system permissions is NOT a stage in the Debian archive package installation process.)

An administrator needs to set quotas for more than one user for a particular resource. What is the most efficient method of setting the quota for the list of users? Create a group and then edit the quota for the group. Edit the quota for individual users as the need arises. Edit the quota for a generic user and have all users access the resource using that single account. Edit the quota for each individual user, one after the other.

Create a group and then edit the quota for the group. The most efficient method of setting up a quota for several users is to edit the quota for a group. Editing the quota for individual users is time consuming and unnecessary. A generic account should never be used for any resource—it is a serious security violation.

Which keyboard key combination does a user press to suspend a running job? Ctrl+F1 Ctrl+Z Ctrl+C Ctrl+D

Ctrl+Z Ctrl+Z suspends or stops a job. Ctrl+C kills a job. There are no other key combinations that work with processes for job scheduling.

Which term has the definition: Packages that a target package requires for its functionality? Manual (man) files Script packages Shared libraries Dependencies

Dependencies (Dependencies are the packages that a target package requires for its own functionality. Man, or manual, files are additional files that are often included in packages, but are not required for functionality. Any scripts required are included in the package itself. Shared libraries might be part of the primary or the dependency packages, but are not themselves always separate packages.)

What does the df command's name stand for or mean? Disk feature Disk free Disk full Directory feature

Disk free The df command stands for disk free and displays the amount of disk space free and used by each filesystem.

A process may include all but which of the following attributes? Disk location ID Time limits Shared memory Child processes

Disk location ID A process runs in memory and therefore has no disk location ID. It has a process ID (PID).

The df and du commands are which type of commands? Nondestructive testing Disk space tracking Special file removal Debugging

Disk space tracking The df and du commands are disk space tracking commands.

A shared library is also known as what kind of library? Dynamically linked Partially linked Patched Pseudo-linked

Dynamically linked (Shared libraries are dynamically linked to programs that use them. Conversely, statically linked libraries are actually part of the program that uses them.)

Which key switches from insert mode to command mode in vi? v A i ESC

ESC The ESC key is used to switch from insert mode to command mode. The i key switches to insert mode. The v key switches to visual mode, enabling selection of one character at a time. The A key switches to insert mode at the end of the line.

How often is the boot process repeated? Each time the computer is started Each time a user launches an application Every 12 hours At midnight when the system logs rotate

Each time the computer is started (The boot process occurs every time the computer is started.)

Generally speaking, on which types of files do administrators use Set User ID (SUID)? Executable Devices Binary data Plain text

Executable Administrators typically use SUID on executable files.

Why is the second extended filesystem (ext2) still supported in contemporary Linux filesystems? Ext2 is supported for backward compatibility. Ext2 is supported to remain compatible with Virtual File Allocation Table (VFAT) and New Technology File System (NTFS). Ext2 is supported for Master Boot Record (MBR) partitioned systems. Ext2 is supported for disks under 2 terabytes (TB) in size.

Ext2 is supported for backward compatibility. The ext2 filesystem is still supported for backward compatibility. Ext2 is not compatible with VFAT or NTFS.

Which type of disk partition may contain several file systems? Converged Extended Hyper-converged Primary

Extended (An extended partition may contain multiple file systems. A primary partition may contain only one file system. There are no converged or hyper-converged partition types on hard drives.)

Which information does the apt-cache show openssl command display? Extended information about the openssl package Version information plus package dependencies How much disk space the openssl package requires Security information about the package

Extended information about the openssl package (The apt-cache show openssl command displays extended information about the openssl package, including size, file name, version, architecture, maintainer, and much more.)

What is the physical location of the master boot record (MBR) on the hard disk? First physical sector Last physical sector A randomly chosen physical sector Multiple, redundant physical sectors

First physical sector (The MBR occupies the first physical sector on a hard drive.)

A program that a user executes interactively at the command line, such as ls -lR *.txt, is which type of process? Killed Foreground Paged Background

Foreground A command or process that a user executes interactively at the command line is an example of a foreground process. A background process is not interactive with the user. A paged process is saved to disk. A killed process is no longer in memory.

Which of the following is another term for creating a filesystem? Integrity checking Superblocking Formatting Debugging

Formatting Creating a filesystem is more commonly referred to as formatting a filesystem. Debugging is attempting to correct errors. Integrity checking locates and repairs errors. There is no superblocking action.

What is the maximum number of primary partitions that a system administrator can configure on a disk? Four Eight Three Two

Four (A hard disk can have a maximum of four primary partitions.)

Which filesystem is the default filesystem for Linux installations? Third extended filesystem (ext3) Second extended filesystem (ext2) Fifth extended filesystem (ext5) Fourth extended filesystem (ext4)

Fourth extended filesystem (ext4) The ext4 filesystem is the default Linux filesystem for installation. Previously, ext2 and then ext3 filesystems were the default. There is no ext5 filesystem.

From where does the apt-cache command obtain its information? From the apt.cache file From package metadata From the apt.conf file From package cache in memory

From package metadata (The apt-cache command obtains its information from package metadata. There is no in-memory package cache. The apt.conf file is a configuration file for the apt-get command. There is no apt.cache file.)

Identify an advantage to changing the partitioning style from Master Boot Record (MBR) to Globally Unique Identifier (GUID) Partition Table (GPT). GPT can be set up to boot multiple operating systems. GPT can address multiple disks. GPT can handle disks more than 2 terabytes (TB) in size. GPT works with Linux and Windows operating systems.

GPT can handle disks more than 2 terabytes (TB) in size. The primary advantage to GPT over MBR, although there are others, is that GPT can handle disks larger than 2 TB, while MBR cannot. Both GPT and MBR can boot multiple operating systems, work well with Linux and Windows, and can address multiple disks.

If the grub> prompt appears on boot, what is likely the problem? LInux LOader (LILO) was installed over GRand Unified Bootloader (GRUB). GRand Unified Bootloader (GRUB) may be corrupted. A Windows installation overwrote the GRand Unified Bootloader (GRUB) install. The GRand Unified Bootloader (GRUB) installation is outdated.

GRand Unified Bootloader (GRUB) may be corrupted. (If a system incompletely boots to the grub> prompt, then it is likely that the GRUB installation has been corrupted. If another operating system overwrote or installed over the GRUB boot loader, then the grub> prompt would not appear. GRUB will not stop on the grub> prompt if outdated.)

What does the acronym GPT stand for? Generic Partition Table Globally Unique Identifier Partition Table GRUB-controlled Partition Table General Purpose Table

Globally Unique Identifier Partition Table The GPT acronym stands for Globally Unique Identifier (GUID) Partition Table (GPT).

What does the following command do? chgrp -R users /data Read permission has been removed from the /data directory for the users group. The users group has been granted read permission of the /data directory. Group ownership of the /data directory has changed to users, recursively. The users group has been removed from /data, recursively.

Group ownership of the /data directory has changed to users, recursively. Group ownership of the /data directory is now the users group, and it has been changed recursively. The -R option does not mean 'read'; it means recursive.

What is the name of the graphical version of the vim editor? Gvim KWrite gedit emacs

Gvim Gvim is the graphical version of the vim editor. Emacs is an alternative to vi for command-line interface (CLI) editing. Gedit and KWrite are both graphical editors.

Which of the following commands moves the cursor to the top of the screen? gg G H L

H The H command moves the cursor to the first line of the screen. The gg command moves the cursor to the first line of the file. The G command moves the cursor to the last line of the file. L moves the cursor to the bottom of the screen.

Hard links have two significant limitations. What are they? Hard links cannot cross filesystems or directories. Hard links cannot cross directories or have their linked file edited. Hard links cannot have their linked file edited or have the same inode as another file. Hard links cannot have the same inode as another file or cross filesystems.

Hard links cannot cross filesystems or directories. Hard links cannot cross directories or filesystems—they must reside in the same directory on the same filesystem as their linked file. The other options are hard link features.

Which vi keyboard shortcut moves the cursor to the beginning of the line? I O H G

I I moves the cursor to the beginning of the current line. H moves the cursor to the beginning of the file. G moves the cursor to the beginning of the last line. O opens a new line above the current line.

Why can the system administrator specify the mount point or the filesystem to mount, but is not required to specify both when mounting a filesystem? Because the system knows which filesystem the administrator has been working with to configure. The /etc/fstab must contain the 'auto' option under <options> for this to work. The filesystem must have the 'auto' option specified in the mount command for this to work. If the entry is in /etc/fstab, the administrator can specify either the filesystem or the mount point, but does not have to specify both.

If the entry is in /etc/fstab, the administrator can specify either the filesystem or the mount point, but does not have to specify both. If the filesystem has an entry in /etc/fstab, the administrator has to only specify either the filesystem or the device to mount the filesystem. The system does not know which filesystem the administrator has been working with in order to mount it. No option in /etc/fstab enable this feature other than the entry itself.

Where on a hard drive is the GRand Unified Bootloader (GRUB) boot loader installed? In the master boot record (MBR) In an extended partition On a logical partition Anywhere within the first 1,024 cylinders of the first disk

In the master boot record (MBR) (The GRUB boot loader is typically installed into the MBR on the hard drive. The boot loader cannot be installed in an extended partition or into a logical partition. The now deprecated LInux LOader (LILO) boot loader had to be installed into the MBR of a disk with no more than 1,024 cylinders.)

When using the locate command, where does the locate search take place for a file? In the system.map file On the file system, including all directories and subdirectories In the mlocate database In a memory-cached list of files

In the mlocate database The locate command uses the mlocate database file that keeps a list of all files on the file system. It is more efficient to search through a single file database rather than searching through an entire file system. The list of files on most systems is too large to keep cached in memory. The system.map file is a file used by the Linux kernel to look up symbol names and their addresses in memory.

Where are static libraries found on the file system? In /lib/static and in /usr/lib/static Only in the /opt/lib directory In the same locations as shared libraries In the virtual file system, /stlib

In the same locations as shared libraries (Static and shared libraries are found in the same locations, /lib, /usr/lib, and in other locations with individual application libraries. The locations /lib/static, /usr/lib/static, and /stlib do not exist on standard Linux systems.)

What is the Logical Volume Manager (LVM)? It is a software tool used to manage disk storage. It is a management tool used by sound engineers. It is a scripting tool for moving large chunks of data. It is a management interface for virtual machines.

It is a software tool used to manage disk storage. (The LVM is a software tool used to manage disk storage on a computer system.)

Identify the correct method of resetting the priority of a process. renice -v PID priority In top, press n, enter the process ID (PID) of the process to alter, and enter the nice value. In top, press r, enter the process ID (PID) of the process to alter, and enter the nice value. nice PID priority

In top, press r, enter the process ID (PID) of the process to alter, and enter the nice value. Using the top command, type r for renice, enter the PID, and enter the nice value. The n value is a number of processes to display in top. The nice and renice commands have the incorrect syntaxes for their use.

In the command mail user@domain < /etc/passwd, what is the file /etc/passwd for the purposes of this command? Filter Output Input Piped filter

Input (The /etc/passwd file in the command mail [email protected] < /etc/passwd is input for the command. Output requires the > operator. Piped filter requires the pipe (|) and a filter command. A filter requires one of the filter commands.)

When a user runs a bash script, where do the commands inside the script run? When a user runs a bash script, where do the commands inside the script run?

Inside the child shell (The script executes in the parent shell, but the commands inside the script run in the child shell. )

Which task should a system administrator perform if they find that the GRand Unified Bootloader (GRUB) installation has become corrupted? Install GRUB again in rescue mode Fix the /etc/fstab file in rescue mode Run fsck on the root (/) file system Replace GRUB with LInux LOader (LILO)

Install GRUB again in rescue mode (If the system administrator finds that GRUB has become corrupt, they should reinstall GRUB in rescue mode. There is no need to run fsck on the root file system if GRUB is the only casualty of the corruption. The /etc/fstab needs to be fixed only if one or more file systems fail to mount on boot. There is no need to replace GRUB with LILO in any instance.)

Which of the following tasks do the Debian package management tools perform? Perform backup for packages and their dependencies Install, list, and remove packages Provide predictive analytics for software packages Display capacity and performance data for packages

Install, list, and remove packages (The Debian package management tools install, list, and remove software packages and their dependencies.)

What is the purpose of the Yellowdog Updater, Modified (YUM) component of the RPM Package Manager (RPM)? It acts as the front-end package installer for RPM. It is responsible for the modification of RPM packages. It is the RPM package security handler. It is the RPM local database client that tracks package installs.

It acts as the front-end package installer for RPM. (YUM is the component of the RPM package manager that acts as the front-end package installer.)

The find command not only searches for and locates files, but also possesses features that allow a user to do what with the find command? It allows a user to perform actions on the found files. The find command can be scripted and used with cron. Its output can be piped to another command. It allows a user to send input to the find command.

It allows a user to perform actions on the found files. The find command feature is the capability to take action on found files in the command. Piping to find is not a function of find. Piping find's results to another command is not a feature of find, but of the command being piped to. Any command can be scripted and used with cron.

What does the 'auto' option grant or provide when entered into the <options> column in /etc/fstab? It tells the system to automatically perform filesystem checks. It sets up a mounted filesystem with system default options. It automatically detects the filesystem type (second extended filesystem [ext2], third extended filesystem [ext3], etc.). It allows the system to automount the filesystem.

It allows the system to automount the filesystem. The 'auto' option under <options> in /etc/fstab means that the system may automatically mount the filesystem upon boot.

What is the function of the ? key in command mode? It searches for recently changed text in a file. It allows the user to search backward through the document for specific text. It copies the line directly above the cursor. It temporarily escapes vi to the shell to allow the user to run commands

It allows the user to search backward through the document for specific text. The ? allows the user to search backward through a document for a string.

What function does the jobs command perform for a user? It allows the user to selectively stop processes. It allows the user to assign new priorities to background processes. It bypasses system security for background processes. It allows the user to view all processes the user has placed into the background.

It allows the user to view all processes the user has placed into the background. The jobs command allows the user to view all background processes and their statuses. The jobs command allows users to only view the processes, and it does not bypass security.

What does the 2>> operator do when it is used as part of a command, ls FY2011.txt 2>> files.txt, for example? It empties the files.txt file. It redirects errors to both the screen and to the files.txt file. It appends any error output to the files.txt file. It overwrites the files.txt file with error information.

It appends any error output to the files.txt file. The 2>> operator will append any information in the files.txt file with its own error information. It will not overwrite anything. The >> is the append redirection operator.

The grep utility is a versatile one in that it can search for strings inside of files, but it can also accept which type of information from other commands? It can accept information interactively from the command line. It can accept standard error (stderr) as input. It can accept input from piped streams. A user can redirect output into grep.

It can accept input from piped streams. The grep utility can accept input from piped streams. In fact, piping to grep is perhaps the most popular method of using it. Grep cannot accept redirected output, stderr, or interactive information.

What can setting a limit on the number of inodes cause on a filesystem? It can cause the system to randomly reboot. It can cause the filesystem to fill up. It can cause all users to lose their storage privileges. It can cause the system to run out of inodes.

It can cause the filesystem to fill up. Setting a limit on the number of files (inodes) only can still cause the filesystem to fill up because it doesn't limit the amount of space a user may consume. If users store 10 1-gigabyte (GB) files, to consume 10 GB each, it could fill up a filesystem, but with only a few files.

What does the following command do? chown -R www:www /var/html/htdocs The www user and www group are granted read permission recursively on the specified directory. It removes the read permission recursively for the www user and the www group on the specified directory. It removes the www user and the www group from the permissions of the specified directory, recursively. It changes the ownership of the files to the www user and to the www group recursively on the specified directory.

It changes the ownership of the files to the www user and to the www group recursively on the specified directory. The command changes the permissions of the /var/html/htdocs directory recursively to the ownership of the www user and the www group. The -R option is recursive and does not refer to the read permission.

What does quotacheck -a do? It checks all mounted filesystems. It checks all mounted non-Network File System (NFS) filesystems in /etc/mtab. It performs an integrity check on all quota configurations. It checks hidden filesystems only.

It checks all mounted non-Network File System (NFS) filesystems in /etc/mtab. The quotacheck -a option checks all mounted non-NFS filesystems listed in /etc/mtab.

Why would an administrator run the warnquota -u command on a regular basis? It checks if users are not exceeding the allotted quota limit. It displays a list of users who have received quota limit warnings. It can be used to start soft limit quota grace periods. It sends a warning to all users who are close to their allotted quota limits.

It checks if users are not exceeding the allotted quota limit. The warnquota -u command checks if users are not exceeding the allotted quota limit.

What does the following command do? cp dir1 ../ It copies dir1 to the root (/) directory. It copies dir1 to the directory one level above the current directory. The ../ is shorthand for /dev/null, so the copy is deleted. It copies the dir1 directory to the user's home directory.

It copies dir1 to the directory one level above the current directory. The ../ designation means one level above the current directory. If the user has permission to write to that directory, the command proceeds. A user's home directory is specified by the ~/ designation.

What is the function of the following command for a system administrator in setting up quotas on the /opt/data filesystem? quotacheck -cug /opt/data It creates a quota report for the /opt/data filesystem. It creates the user and group quota files on /opt/data. It scans the /opt/data filesystem for correct permissions. It checks the /opt/data filesystem for quota compatibility.

It creates the user and group quota files on /opt/data. The quotacheck -cug /opt/data command sets up new user and group quota files on the /opt/data filesystem. There is no quota compatibility check. A quota report is generated by using the repquota utility. Quotacheck does not scan for permissions.

When using the xargs command, what is the -d option's function? It describes a string delimiter. It substitutes \ for " in text files for processing. It deletes command output. It decompresses archives on execution.

It describes a string delimiter. The xargs -d option describes a file's delimiter, which is to say the character that separates lines or items in a file.

What does the repquota utility display if an administrator issues it at the command with no options, as shown below? # repquota /dev/sdb1 It displays all users who have files and quotas on the specified filesystem. It displays the equivalent of the du -h command, which is a file listing with sizes. It displays an error, "Bad number of arguments." It displays the help information for repquota.

It displays all users who have files and quotas on the specified filesystem. The repquota command with no options displays detailed information for the specific filesystem with quotas and users who have quotas on those filesystems.

Describe the result of the following command: cat newfile.txt It displays the contents of newfile.txt to the screen. The newfile.txt file will be appended (concatenated) onto itself. The newfile.txt file is sent to the recycle bin. The newfile.txt file is redirected as input into the cat command.

It displays the contents of newfile.txt to the screen. The cat newfile.txt command displays the contents of the newfile.txt file to the screen. Newfile.txt is not being redirected to any location or to any command. Cat does concatenate, but without options, it only displays the contents of a file.

What is the function of the :num command? It displays line numbers for all lines in the file. It displays the line number of the cursor position and the text. It displays the number of edits since opening the file or since the last save. It displays the total number of navigations since the last save.

It displays the line number of the cursor position and the text. The :num command displays the line number at the cursor's position in the file and displays the line of text.

If an administrator issues the set command with no options or arguments, what does the command display? It displays the names and values of all shell variables and functions. It displays a list of environment variables. It displays a list of user-created variables and their values. It displays a used variable history and values.

It displays the names and values of all shell variables and functions. The set command with no options or arguments displays a list of shell variables, their values, and functions.

Which information does the quota -uv bsmith command display? It displays all quotas that user bsmith has exceeded. It displays the quota report for the bsmith user with verbose output. It displays all quotas for user bsmith with verification. It displays quotas where user bsmith has committed a security violation.

It displays the quota report for the bsmith user with verbose output. The quota -uv bsmith command displays quotas for user bsmith with verbose output.

What does the repquota -u bsmith command do? It replaces the bsmith user's current quota with a new blank one. It removes all quotas related to the bsmith user. It replaces the bsmith user's quota with a default one. It displays the quota report for the bsmith user.

It displays the quota report for the bsmith user. The repquota -u bsmith command displays the quota for the bsmith user.

What information is displayed with the command ldconfig -V? It displays the current version number, the name of each directory as it is scanned, and any links that are created. It displays the version information for ldconfig. It displays ldconfig command usage information. It displays the lists of directories and candidate libraries stored in the current cache.

It displays the version information for ldconfig. (The ldconfig -V command displays version information for the ldconfig utility. The ldconfig -v command displays current version number, the name of each directory as it is scanned, and any links that are created. The ldconfig -p command displays lists of directories and candidate libraries stored in the current cache. The ldconfig -? command displays usage information.)

What is the notable feature of the fgrep command? It is used for files with the .txt extension only. It does not recognize regular expressions. It formats the output for printing. It runs in the foreground only.

It does not recognize regular expressions. The fgrep command does not recognize regular expressions. Extensions are meaningless to the Linux operating system shells.

What does the dumpe2fs utility do? It creates an interactive shell used to examine and modify an extended filesystem. It creates a new swap space in memory. It dumps (snapshots) the current memory status of the system. It dumps the status of an extended filesystem to standard output (stdout).

It dumps the status of an extended filesystem to standard output (stdout). (The dumpe2fs utility dumps the status of an extended filesystem to stdout. The mkswap utility creates a new swap space. An interactive shell is created using the debugfs utility. The snapshot dump is a core dump and is not created using dumpe2fs.)

What does the following typical administrative find command do? find / -atime +90 -print It finds files that have been deleted in the last 90 days. It finds all files that have been edited in the last 90 days. It finds all files that have been created in the last 90 days. It finds all files that have not been accessed in the last 90 days.

It finds all files that have not been accessed in the last 90 days. The command finds all files that have not been accessed in the last 90 days. The -atime option is accessed time, and +90 is 90 days.

What does the following find command do? find / mlocate.db It finds and removes the mlocate.db backup file. It displays the location of mlocate.db: /var/lib/mlocate/mlocate.db. It gives an error: No such file or directory. It finds and removes the mlocate.db file.

It gives an error: No such file or directory. The find / mlocate.db command gives an error: No such file or directory because the file doesn't exist under /. The correct command to find this file is: find / -name mlocate.db.

For which purpose is the aptitude program used? It has the same functionality as apt-get. It updates Debian mirror repositories. It only removes software from a system. It is a repair and recovery utility for the Debian package management suite.

It has the same functionality as apt-get. (Aptitude has the same functionality as the apt-get program. It does not update Debian mirror repositories. It can remove software, but that is not its only function. It is not a repair or recovery tool.)

What is the purpose of the -i option for the egrep command?

It ignores case. The egrep -i option means to ignore case in the same way that grep -i does.

What does the following command do? rpm -i openssl-1.0.0-27.el6.x86_64.rpm It simulates installation of the openssl package. It installs the openssl package. It initiates the download of the openssl package. It removes the openssl package.

It installs the openssl package. (The rpm -i package-name.rpm command installs the file. The -i switch is the install switch for the rpm command.)

What is a mount point? It is a device name, such as /dev/sdb2. It is a directory upon which a device or a filesystem is accessed. It is the mount command complete with options and locations. It is the device filesystem type, such as second extended filesystem (ext2), third extended filesystem (ext3), or fourth extended filesystem (ext4).

It is a directory upon which a device or a filesystem is accessed. The mount point is a directory location where users are able to access a device or a filesystem.

What is the jobs table? It is a historical list of jobs placed into the background since the last system reboot. It is a list of jobs running in the background. It is a list of jobs running in the foreground and in the background (all current user jobs). It is a list of jobs (commands) that a user can place into the background.

It is a list of jobs running in the background. The jobs table is a list of all jobs running in the background. The jobs command displays only current background jobs and their statuses.

What is a regular expression? It is a stream filter for text files. It is a string of characters that form a pattern in order to match an alphanumeric string or range of strings. It is a method of matching digits only, such as ZIP codes and phone numbers. It is a method of checking date and time stamps of files.

It is a string of characters that form a pattern in order to match an alphanumeric string or range of strings. All of the options are possible using regular expressions, but regular expressions themselves are strings of characters that form a pattern in order to match an alphanumeric string or range of strings.

What is the process table? It is a table of programs that can run in memory. It is a list of jobs running in memory and their statuses. It is a list of processes owned by the root user. It is a summary of processes currently running on a system.

It is a summary of processes currently running on a system. The process table is a summary of currently running processes on a system. The list of jobs is the jobs table. A list of processes owned by the root user is part of the process table. No table of programs that can run in memory exists on a system by default.

Which of the following is NOT a feature of the fourth extended filesystem (ext4)? It can handle volumes up to one exbibyte (EiB). It supports journaling. It is compatible with New Technology File System (NTFS). It supports files up to 16 tebibytes (TiB) in size.

It is compatible with New Technology File System (NTFS). The correct answer is that it is NOT compatible with NTFS.

What does the 1> operator do in the command ls 1> files.txt? It is standard output (stdout) and the same as >. It directs only the first line of output to the files.txt file. It reverses standard output (stdout) and makes it standard input (stdin). It directs standard error (stderr) to the files.txt file.

It is standard output (stdout) and the same as >. The 1> operator is the same as the >, standard output (stdout), operator. Standard error is 2>. There is no operator other than < for input.

What is a disk quota? It is the minimum number of files a user must store on a device. It is the maximum number of small files (< 1 kilobyte [KB]) allotted to a user. It is the disk space allotted to a user for file storage. It is the maximum number of binary files a user can store on a filesystem.

It is the disk space allotted to a user for file storage. A disk quota is the disk space that is allotted to a user for file storage on a computer. There are no minimum numbers or maximums for types of files per user.

In the /etc/fstab file, what does the <type> category or heading mean? It is the filesystem type. It is the type of device that's mounted. It is the mode of the filesystem, such as rw or ro. It specifies user access by account, such as root or wheel.

It is the filesystem type. The <type> heading refers to the filesystem type, such as second extended filesystem (ext2), third extended filesystem (ext3), etc.

In the mount /dev/sda3 /test command, what is /test? It is the mount test to check for mount errors. It is the mountable filesystem. It is the mount point. It is a remote filesystem.

It is the mount point. In the mount /dev/sda3 /test command, the /test directory is the mount point. The mount point is always a local directory upon which some filesystem, local or remote, is mounted.

When using the dd command, what is the purpose of the 'of' option? It is the octal format designation. It is the overflow option. It is the output file option. It is the input file option.

It is the output file option. The 'of' option defines the outfile for the dd command. The input file option is 'if'. There are no overflow or octal format options.

What is the importance of the root (/) file system? It is the parent directory for all other directories. It is the largest of all directories. It has the greatest number of permission restrictions. It is dynamically expandable even on simple partitioning schemes.

It is the parent directory for all other directories. (The root (/) file system is the parent of all other file systems—it lies at the root level. It is not dynamically expandable under simple partitioning. It has the same general permission restrictions as other directories. It is often the smallest of all directories because system administrators historically have stated that nothing needs to be written to the / directory for any reason.)

What is the nice value of a process? It is how extensive its logging is—more logging produces more stress on a system, therefore it is not as nice as one that does not stress the system with extensive logs. It refers to the resiliency of a process. It is the processes' priority in using shared system resources. It is how well behaved or compatible a process is with other processes running in memory.

It is the processes' priority in using shared system resources. The nice number refers to the priority a process has on the system. Because all resources have to be shared, if a process has a high priority, it is not as nice as one with a normal priority.

What is the disk quota soft limit? It is the quota value beyond which disk space usage is allowed during the grace period. It is the disk space limit that is within 10 percent of the maximum allotted space for a user. It is the theoretical limit for the amount of space a user may consume. It is the amount of disk space that a user may consume without receiving a warning.

It is the quota value beyond which disk space usage is allowed during the grace period. The soft limit is the quota value beyond which disk space usage is allowed only during the grace period. When a user surpasses the soft limit, the user receives a warning. There is no theoretical limit, nor is there any warning for using up to the soft limit—only when the user surpasses the limit.

What is the LD_LIBRARY_PATH variable typically used for? It is used for custom applications. It is used in development and testing. It is typically used only in commercial UNIX systems, but not in Linux. It is used in multi-user environments as a personal variable.

It is used in development and testing. (The LD_LIBRARY_PATH is used for development and testing, but not in normal use.)

Which of the following tasks is NOT performed by the kernel during boot? It launches the graphical user interface/graphical desktop. It configures the available hardware, including processors, input/output (I/O) subsystems, and storage devices. It decompresses the initrd image and mounts it. It initializes Logical Volume Manager (LVM) or software Redundant Array of Independent Disks (RAID).

It launches the graphical user interface/graphical desktop. (The kernel does NOT load the graphical user interface/graphical desktop—the init program launches it if the runlevel is configured.)

What does the following command, issued by the root user, do to the test.sh (PID 6547) script issued by user bsmith? renice 5 6547 -u bsmith It raises the priority by five points. It sets a 5-second delay on the execution of the test.sh script. It lowers the priority to 5. It raises the priority to 5.

It lowers the priority to 5. The renice command lowers the priority to a value of 5. Remember that a negative number raises or increases the priority, while a positive number lowers or decreases the priority.

What does setting the Globally Unique Identifier (GUID) on a folder do? In other words, why do administrators set GUID on folders? It makes it so that all files created in that folder are created with the group ID of the folder. Files in a folder where GUID has been set cannot be hacked. It protects files in that folder from being deleted. It makes all files in that folder executable by default.

It makes it so that all files created in that folder are created with the group ID of the folder. The purpose of setting GUID on a folder is so that all files created in that folder bear the group ID of the folder, regardless of the primary group of the creator. Files created in that folder are not executable by default. Files can be deleted by the owner or group member. The files may still be hacked.

An administrator creates a script and then issues the following command: chmod a+x. What does this command do to the script? It makes the script read-only for everyone. It makes the script executable for everyone. It removes the execute permission for everyone. It allows execution by the group owner only.

It makes the script executable for everyone. The chmod a+x command makes the file executable for everyone, because the '+' adds permissions, the 'x' is executable, and the 'a' means all users or everyone.

An administrator attempts to unmount a filesystem but receives the message, "device is busy." What does this message mean? It means that a user has the mounted filesystem as their current directory. It means that the filesystem is in a "locked" state by an application. It means that data is being accessed or written to the filesystem. It means that the filesystem is being backed up.

It means that a user has the mounted filesystem as their current directory. The "device is busy" message means that someone on the system has the mounted filesystem as their current working directory. It is possible that the root user's current directory is the mounted filesystem.

What does setting the sticky bit on a folder, /tmp for example, do for the folder or its files? It means that no user can delete the /tmp directory. It provides an audit trail for those who use the /tmp directory. It means that only the root user can unmount the /tmp directory. It means that only the file owner or root can delete a file from /tmp.

It means that only the file owner or root can delete a file from /tmp. Setting the sticky bit on a directory means that only the file creator/owner can delete the file, which is a good method to prevent shared folders from having files that are accidentally overwritten or removed. Only root can delete or umount /tmp. The sticky bit does not provide an audit trail for files.

A user attempts to list the file FiscalYear2015.txt with the command ls FiscalYear2015.txt 2> files.txt. The user receives no output on the screen. What does no output to standard output (stdout) mean? It means that the file does not exist in that directory. It means that the file is hidden. It means that the user redirected stdout to the files.txt file. It means that there are no errors to report.

It means that the file does not exist in that directory. The ls command, ls FiscalYear2015.txt 2> files.txt means that the file does not exist because the user redirected standard error (stderr) (2>) only and that the error information is contained in the files.txt file.

If a user's shell is set to /bin/false, what does this mean to the user? It means that the user cannot log in to the system. It means that the user account has been deleted. It means that the user account is disabled. It means that the user was caught hacking into other systems.

It means that the user cannot log in to the system. The /bin/false designation means that the user account cannot log in to a shell on that system. This usually means that the user account is a daemon or service account and it would be a security problem if this user could log in. For an account with /bin/false, it just means that there's no interactive shell available, but the account has not been deleted or disabled. It has nothing to do with a security violation, such as hacking attempts.

Since directories don't have anything to execute in the way of launching a program or script, what does the execute (x) permission mean on a directory? It means that users can change permissions on a directory. It means that users can rename a directory. It means that users can change directory (cd) into the directory. It means that users can save files to a directory.

It means that users can change directory (cd) into the directory. The execute permission on a directory means that users can cd into the directory. To modify a directory, the user has to be the owner or have write permission to save files in that directory.

What is meant by the term, file globbing? It means using wildcard characters as a pattern match. It means removing files recursively. It refers to the recursive copying of files to a new directory. It means renaming files in batch mode.

It means using wildcard characters as a pattern match. File globbing means to use wildcards to specify a large number of files to be processed or to gather a set of files based on some pattern. Globbing can be used for any of the other options, but the options themselves are not globbing.

What does the mount -a command do when issued by the root user? It performs a sequential unmount, filesystem check, and remount on all filesystems. It mounts a freshly created filesystem in async mode. It mounts all filesystems as read only (ro). It mounts all unmounted filesystems specified in /etc/fstab

It mounts all unmounted filesystems specified in /etc/fstab. The mount -a command mounts all unmounted filesystems specified in /etc/fstab.

What does the j key do in vi? It deletes a single character at a time. It navigates right one space at a time. It navigates up in the file one line at a time. It navigates down in the file one line at a time.

It navigates down in the file one line at a time. The j key navigates downward in a file one line at a time. The k key navigates up one line at a time. To navigate right, use the l key. The x key deletes one character at a time.

In using the grep utility, what does the -v option do? It verifies the information prior to displaying it. It prints the grep utility's version number information. It displays verbose information to standard output (stdout). It omits the specified string following it.

It omits the specified string following it. The -v option omits the string following it.

Administrators often add the following redirection to shell scripts: 2>/dev/null What does the redirection do for the administrator who uses it? It sends all standard error (stderr) to standard output (stdout). It is a standard redirect to a tape archive. It redirects all standard error (stderr) to /dev/null, essentially discarding it. The standard error (stderr) information is saved to a file named /dev/null for further processing.

It redirects all standard error (stderr) to /dev/null, essentially discarding it. This command sends all stderr to /dev/null, which discards it from the system. It is a method of suppressing errors. There is no further processing available after a redirect to /dev/null. A redirect to a tape archive would be a pipe rather than a redirect. To send all stderr to stdout, use 2>&1.

What does the following rpm command do? rpm -e lynx It removes the lynx rpm package. It upgrades the lynx package and its dependencies. It reinstalls the lynx package. It simulates the installation of the lynx package.

It removes the lynx rpm package. (The rpm -e lynx command removes the lynx package. The rpm -U command would upgrade lynx. The rpm -F command reinstalls lynx. The rpm --test lynx command simulates an installation. Lynx is a text-based browser that is used at the command line. It is very fast, but somewhat limited in use.)

What function does the . command have in vi? It deletes the current word. It is a shortcut for undo. It repeats the last text edit. It finds the next line with a period character (.) in it.

It repeats the last text edit. The . command repeats the last text edit.

Which operation does the following command perform for a user who has a file containing a list of words? sed -re 's/^(B|b)/C/' file.txt It replaces all occurrences of the letter B with C and of b with c. It replaces all occurrences of the letters B or b in a file with the letter C. It replaces the first occurrence of B or b with the letter C. It replaces all occurrences of words beginning with the letters B or b in a file with the letter C.

It replaces all occurrences of words beginning with the letters B or b in a file with the letter C. The command replaces all occurrences of words beginning with the letters B or b in a file with the letter C, but only replaces the first letter because of the ^ metacharacter. The pipe character is the regular expression for or.

Piping a command to the grep utility is a very common practice in Linux. What does grep do for a Linux user? It searches for a string inside a file. It prepares a file for printing by reformatting it. It is a file archive utility. It splits a file into equally sized smaller files.

It searches for a string inside a file. The grep utility searches for a string within a file or a group of files. The split utility splits files into equally sized parts. The pr utility is one that prepares a file for printing. There are several archive utilities, such as tar, compress, and bzip2.

What does the apt-cache search openssl command do? It searches the local system for openssl installations. It searches the cached package list for a particular regular expression (regex) pattern (openssl). It searches the Debian repository for updated openssl packages. It searches the local system for openssl and dependency installations.

It searches the cached package list for a particular regular expression (regex) pattern (openssl). (The apt-cache command searches through the local cache for a regex pattern, such as openssl.)

What does the < operator do for a user? It writes standard input to standard output. It redirects all errors to /dev/null. It sends the contents of a file to a command as input. It is the standard error redirector operator.

It sends the contents of a file to a command as input. The < operator sends the contents of a file to a command as input for that command. Typing words at the prompt is writing standard input to standard output. Redirecting errors to /dev/null or anywhere else requires the standard error, 2>, operator.

What is the function of the export command? It sends the results or output of scripts to other users. It makes the variable available to other users on the system. It redirects script output to child shells. It sets an environment variable that is passed to child shells.

It sets an environment variable that is passed to child shells. (The export command makes variables set in a parent shell available to scripts and commands in child shells. The export command cannot provide variable values to other users, send outputs to other users, or redirect output to other shells. )

A user edits a file with the vi editor, with the following command: vi file.txt. Immediately after editing the file, the user issues the following command: ^vi^cat^. What does this command do? It substitutes cat for vi, so that the new command is cat file.txt. It opens the file again in the vi editor and then displays the file with cat. It cats (displays the file) and then opens it in vi. It removes all instances of vi from shell history and replaces them with cat.

It substitutes cat for vi, so that the new command is cat file.txt. The caret (^) is a substitution operator. The command ^vi^cat^ replaces vi with cat for the previously run command and then executes it.

Which of the following is a major feature of the Virtual File Allocation Table (VFAT) filesystem compared to the File Allocation Table (FAT) filesystem? It is equivalent to the XFS filesystem. It is a 64-bit filesystem that supports journaling. It supports long file names. It is compatible with the second extended filesystem (ext2).

It supports long file names. The VFAT filesystem is a 32-bit filesystem that was introduced with Windows 95, and it supports long file names. It is not compatible with ext2, nor does it compare favorably with XFS.

What is the purpose of the RPM Package Manager (RPM) database? It reports back to and syncs with a central RPM database. It tracks packages that are installed on a system. It records all RPM-related transactions on a system. It tracks package usage for billing purposes.

It tracks packages that are installed on a system. (The RPM local database tracks packages that are installed on a system. It has no other purpose, nor does the database interact with other databases.)

What other function does a package manager perform other than allowing the administrator to search for, install, upgrade, and remove packages? It assumes responsibility for package security. It tracks the files that are provided with each package. It covers Basic Input-Output System (BIOS) patching as well as software package management. It handles all package file permissions.

It tracks the files that are provided with each package. (The package manager tracks the files that are provided with each package. The package manager does not assume package security responsibility, handle file permissions, or cover BIOS patching.)

What does the following xz command do? xz -dq files.tar.xz It uncompresses the compressed archives and suppresses errors. It compresses the archive and suppresses errors. It refreshes the archives and performs a file integrity check. It uncompresses the archive and then quits the xz utility.

It uncompresses the compressed archives and suppresses errors. The xz -dq files.tar.xz command uncompresses the compressed archive and suppresses errors. The -q option is for -quiet (suppress errors), not quit. The -d means decompress. The -t option is used to perform an integrity check.

What does the following command do? # grub2-mkconfig -o /boot/grub2/grub.cfg It updates the GRand Unified Bootloader (GRUB) 2 configuration file. It upgrades the GRand Unified Bootloader (GRUB) Legacy configuration file to the GRUB 2 configuration file. It removes the GRand Unified Bootloader (GRUB) 2 configuration file. It creates an empty GRand Unified Bootloader (GRUB) 2 configuration file.

It updates the GRand Unified Bootloader (GRUB) 2 configuration file. (The grub2-mkconfig -o /boot/grub2/grub.cfg updates the GRUB 2 configuration file after editing it.)

What does the Debian package manager apt-get update command do for a system administrator? It updates the list of new packages available. It updates the main Debian repository with your system's installed packages as a restore point. It updates the Debian repository list. It updates the Debian system with new software.

It updates the list of new packages available. (The apt-get update command updates the local list of packages that are available to the system from which the command was run. The apt-get upgrade command updates the system with new software. There is no Debian command that updates the repository list. There is no Debian repository for local package restore points.)

What is unique about the /var directory? It contains the system's configuration files. It holds system binaries. Its contents change often. It is the common mount point for remote filesystems.

Its contents change often. The /var directory's contents change often. The /var directory is typically set up as its own filesystem because of this feature and sometimes has its own very fast disk because of its ever-changing contents requirement of writing to files.

Which storage unit is used in setting quotas on a filesystem? Kilobytes Megabytes Depends on the size of the filesystem Gigabytes

Kilobytes The storage unit for quotas is set and measured in kilobytes.

What is the difference in the two commands L and G? L moves the cursor to the first hyperlink in a file and G moves it to the bottom of the file. L moves the cursor to the bottom of the screen and G moves to the bottom of the file. L moves the cursor to the leftmost point in the file and G moves it to the bottom of the screen. L moves the cursor to the top of the file and G moves it to the bottom of the file.

L moves the cursor to the bottom of the screen and G moves to the bottom of the file.

Which Linux boot loader menu contains the following entry by default? image=/boot/memtest.bin label=memtest86 LInux LOader (LILO) GRand Unified Bootloader (GRUB) Legacy GRand Unified Bootloader (GRUB) 2 Dual Boot - Linux/Windows GRand Unified Bootloader (GRUB) 2

LInux LOader (LILO) (The memtest entry shown is a LILO standard boot option.)

Which of the following is a feature of using symbolic links, but is not possible with hard links? Persistent linking to files that change names Linking to more than one file Linking files across different filesystems Sharing the same inode with the linked file

Linking files across different filesystems Symbolic links can link across different filesystems, but hard links cannot. Hard links can link to more than one file, have persistent links to files that change names, and share inodes—symbolic links do none of those.

What is the matching pattern for the command egrep '^\w{6,8}'? Match all lines containing either six or eight characters Match all lines that begin with any alphanumeric characters between six and eight characters in length Match all lines containing non-numeric characters between six and eight characters in length Match words that begin with the letter 'w' that are between six and eight characters in length

Match all lines that begin with any alphanumeric characters between six and eight characters in length Match all lines that begin with any alphanumeric characters between six and eight characters in length.

What does the nohup command's acronym mean? No hangup Ignore uptime Notify when up No uptime

No hangup The nohup acronym means no hangup, which is to say, do not kill the task when the shell logs out.

To use pkill properly, what does a user need to know about a process? Only part of its name The exact command name The full path to the executable The process ID (PID)

Only part of its name For pkill to work, the user needs to know only part of the name of the in-memory process. The kill command requires the PID. The killall command requires the exact command name. The full path to the executable is not required for any kill command.

What are symbols such as <, >, =, >>, 2> known as when used as part of a command? Operators Variables Redirects Pipes

Operators These symbols, when used as part of a command sequence, are operators. Some of the symbols are redirects (>, <, >>, 2>). Pipes always have the pipe symbol (|) in the command. Variables are assigned using the = operator.

What is the variable name of the filesystem exclusions for the locate command in /etc/updatedb.conf? NOSEARCHFS PRUNEFS EXCLUDEFS OMITFS

PRUNEFS The variable name for excluded filesystems in the /etc/updatedb.conf file is PRUNEFS.

Why do system administrators like to use package managers for installing software? Package managers allow system administrators to quickly and easily install software and all dependencies. Package managers allow administrators to fully customize software installation by specifying additional switches and installation options at the command line. Package managers create restore points before installation in case something goes wrong during installation. Package-manager-installed software is more secure than software installed by other methods.

Package managers allow system administrators to quickly and easily install software and all dependencies. (System administrators like package managers because they allow quick and easy software installation. Package manager software is not necessarily more or less secure. Package managers do not create restore points, although sometimes the package will back up or not overwrite local configurations. For the most part, package-manager-installed software is not customized. There are a few parameters that can be altered, but for full control, source code compiles are preferable.)

What information does the apt-cache search openssl display? The package name and dependencies The package name, dependencies, and prerequisite package names The installed package name and version Package name and short description

Package name and short description (The apt-cache search openssl command displays all cached software packages that match the regular expression (regex) openssl. What is displayed is the package name, with no version information, and a short description of the package. The package name can be used to install the package.)

How can a user create a permanent environment variable? Place the variable into the .profile file and export it Ask the root user to create the variable in a global configuration file Create a script with the variable in it and run it upon each login Place the variable into the .variable file in the user's home directory

Place the variable into the .profile file and export it To create a permanent environment variable, the user must edit the .profile file, enter the variable, export the variable, and save the file. The variable will be available at login. The root user would not create a personal environment variable in a global file. The script option would not work, because child shell variables are not available to the parent shell. There is no .variable file.

Escaping a string of text or a single character involves doing what to the text or character? Placing " " marks around the text or character Placing a \ in front of the text or character Using single quote marks ' ' around the text or character Using the comment character # before the text or character

Placing a \ in front of the text or character Escaping text or a character means that you have to place a leading \ so that the processing program will ignore it. For example, \Clever becomes lever, because the \ tells the program to ignore the next letter, which is C.

How can a user overwrite multiple characters in vi? xx R r dd

R The R key is used to allow a user to overwrite an unlimited number of characters. The dd command deletes an entire line of text. The xx combination deletes two characters. The r command allows a user to overwrite a single character.

Which of the following ps command fields describes the physical memory in kilobytes (KB) used by a process? PRI SIZE TT RSS

RSS The RSS field is the amount of physical memory in KB used by a process. PRI is the priority. SIZE is the virtual image size. TT is the TTY or terminal associated with a process.

The term regex refers to what in Linux? The output of the regex command The input to the regex command The matched string from a regular expression Regular expressions

Regular expressions The term regex refers to regular expressions, which are sequences of characters that define a string search pattern.

Which action should a system administrator take if the GRand Unified Bootloader (GRUB) boot loader screen does not appear on boot? Run the fsck command on the root (/) file system Reinstall the system fresh from a bootable compact disc (CD)/digital video disc (DVD) Reinstall GRUB in rescue mode Install a new kernel in rescue mode

Reinstall GRUB in rescue mode (The system administrator should reinstall GRUB from rescue mode. Installing a new kernel will not fix a corrupted or overwritten boot loader. Running the fsck command will not repair a damaged boot loader. Reinstalling the operating system will only waste time and potentially lose data.)

Which of the following is NOT a good option for recovering a corrupt boot sector? Reinstall the system from an original distribution compact disc (CD)/digital video disc (DVD) Use a Live compact disc (CD)/digital video disc (DVD) distribution to recover the system Boot to a recovery compact disc (CD)/digital video disc (DVD) Run grub2-install from a Universal Serial Bus (USB)-bootable Linux installation

Reinstall the system from an original distribution compact disc (CD)/digital video disc (DVD) (Reinstalling the entire system because of a corrupted boot sector is a waste of time and will result in the loss of data.)

Which user account must the system administrator account use to install or reinstall GRand Unified Bootloader (GRUB) on a system? Grub Root Bootloader Sysadmin

Root (GRUB has to be installed by the root user or by a user with the permission to use sudo.)

Packages include all files required to perform which function? Work with a package manager Run an application Function on any Linux distribution Install from a repository

Run an application (Packages include all files required to run an application.)

Which of the following ps command fields has possible values of R (running), T (stopped), D (asleep and uninterruptible), S (asleep), Z (zombie), or N (positive nice value)? STAT PRI SHARE NI

STAT The STAT, or status, field displays the status of a process as R, T, D, S, Z, or N. PRI is the priority of a process. NI is the nice value for a process. SHARE is the amount of shared memory consumed by a process.

For which activity is the apt-cache utility used? Creating the apt package cache on the local system Distributing updated packages to other Debian systems as a repository Searching through the lists of available software packages Downloading and installing packages for update

Searching through the lists of available software packages (The apt-cache command is used to search through local software lists for software packages.)

Section 4

Section 4

Section 5

Section 5

Section 7

Section 7

Section 8

Section 8

The /etc/systemd directory contains which type of files? Service password files Special service device files Service configuration files Links to unit files

Service configuration files (The /etc/system directory contains service configuration files.)

How do shared libraries become shared? Shared libraries are shared by the system administrator for a specific list of applications. They are manually loaded and shared by the system user. Shared libraries are libraries that are loaded by programs when they start. They are shared on a common mount point, such as /opt.

Shared libraries are libraries that are loaded by programs when they start. (Shared libraries are loaded into memory by programs when they start. All programs that start afterwards use the shared libraries. The location of the libraries does not matter. Libraries are not loaded or shared by any user.)

Why is it important to have a standard location for files on Linux systems? So that administrators and software vendors can have consistency among Linux distributions So that Windows administrators can find files and directories on Linux systems So that new users will be able to understand Linux systems better So that there is some unity among distributions in case of distribution mergers

So that administrators and software vendors can have consistency among Linux distributions The primary reasons are that administrators often have to work with multiple distributions and some consistency among distributions is essential to prevent mistakes and misconfigurations. Software vendors also need to have consistent locations in which to install software and to gain access to libraries. New user consideration, Windows users, and mergers are not seriously considered for this standard.

What, historically, was the purpose of setting the sticky bit on a program? So that it could not be deleted by anyone, including the root user So that it would remain running after a reboot So that it would inherit the permissions of the user who executed it So that it would remain in memory after execution

So that it would remain in memory after execution The sticky bit was set so that the program would remain in memory after execution. The program would not survive a reboot. Such programs can be deleted by the owner or by root. Sticky bit programs do not inherit the permissions of the user who executed them.

For application developers, what is the advantage of setting and using the LD_LIBRARY_PATH variable? So that the developer can bypass standard system security. So that the developers can test their own shared libraries. In order to clean up conflicts in standard system libraries. The practice makes it easier for the developer to hack into a system.

So that the developers can test their own shared libraries. (Developers who set and use the LD_LIBRARY_PATH variable do so to test their own shared libraries, because the libraries listed in that variable are searched before standard file system locations. The practice of using LD_LIBRARY_PATH has nothing to do with security or bypassing security—it is used for testing. Its use does not help in clearing any conflicts in standard libraries.)

What is another name for a symbolic link? System link Soft link Semaphore link Stretch link

Soft link Soft link is another name for symbolic link.

Why does an administrator set special permissions on files? Special permissions are only for use with programs used with cron. Special permissions are set so that no one but root can execute the files. Special permissions are set to protect valuable libraries and executables. Special permissions are set so that non-privileged users can execute the files.

Special permissions are set so that non-privileged users can execute the files. Special permissions are set so that non-privileged users can execute the files. With special permissions, less privileged users are allowed to execute a file that can usually be run only by the root user.

Data entered via the keyboard is which type of stream? Standard input Standard entry Standard output Standard transfer

Standard input The keyboard is standard input. Standard output is data that is sent to the screen. There are no streams identified as transfer or entry.

In the command wc < blah.txt, which type of stream does the < operator represent? Standard output (stdout) Standard stream Standard error (stderr) Standard input (stdin)

Standard input (stdin) The < symbol represents standard input from the blah.txt file into the wc command. Standard output is the > operator. Standard error is 2>. There is no standard stream.

A user types 'ls' at the command line and receives the following information displayed on the screen: list.txt processes.txt blah.txt Which type of stream is the response from the ls command? Standard output (stdout) File list Standard input (stdin) Standard error (stderr)

Standard output (stdout) The output from the ls command is stdout, or a screen display. There is no standard input to the ls command. The file list is the output from the ls command. There are no errors, so there is no stderr.

Which of the following is not a type of stream? Standard transfer Standard input Standard error Standard output

Standard transfer Standard transfer is NOT a stream type.

What is the major problem with statically linked programs, i.e., programs that use static libraries? Statically linked programs are very large. They require special permissions to run. Programs that use static libraries are often malware infected. Statically linked programs require a lot of additional code at runtime.

Statically linked programs are very large. (The major problem with statically linked programs is that they are generally very large in comparison to those that used shared libraries, because the static libraries are part of the executable program. Statically linked programs require no additional code at runtime because they contain all the additional code that they require. They need no special permissions to run, nor do they contain malware by design.)

What is the difference between terabyte and tebibyte? A terabyte is a trillion bits and a tebibyte is a trillion bytes. A terabyte is a trillion bytes and a tebibyte is a trillion bits. A terabyte is a term used for storage and tebibyte is used for memory (RAM). Terabyte is a decimal reference and tebibyte is its binary equivalent.

Terabyte is a decimal reference and tebibyte is its binary equivalent. The terabyte is a decimal reference for the same amount of information as a tebibyte, but the terabyte is expressed in decimal notation and the tebibyte is expressed in binary notation. Both terms refer to either quantity of storage or memory. Both a terabyte and a tebibyte represent a trillion bytes.

What is the significance of the $ in the environment variable $SHELL? The $ means that the object is a shell variable name. The $ is an identifier that designates the object as an environment variable. The $ designates the object as hidden, much like the dot (.) preceding a file name. The $ identifies the object as being owned by the root user.

The $ means that the object is a shell variable name. (The $ designates an object as a variable. A variable is usually in all caps. The variable name is the $ and the variable. For example, the variable FOO has the variable name $FOO.)

Consider the following entry from the ls -la command: drwxr-xr-x 1 bob users 170 Jan 5 2015 files What does the 'd' in the first column mean? The 'd' means the file was downloaded from the Internet. The 'd' means deprecated. The 'd' means directory. The 'd' means deleted.

The 'd' means directory. The 'd' means directory. There are no designations for downloaded, deprecated, or deleted.

How does the locate command prevent updates from searching every directory from /? ' The locate command can traverse only directories that a user has access to. The /etc/updatedb.conf file lists exclusions. The locate process removes temporary filesystems from memory as a feature. The /etc/updatedb.conf file is configured by the administrator and lists directories that users have access to.

The /etc/updatedb.conf file lists exclusions. The /etc/updatedb.conf files lists filesystem and directory exclusions so that not every filesystem is searched—nfs mounts, usb drives, and /proc to name a few.

An administrator creates a new script inside the /opt/patches folder and then issues ls -l and observes the following: rwxr-xr-x 1 root patch 2048 2015-05-02 14:21 setup.sh Why does the new file have the patch Group ID, when it should have root as the Group ID? The /opt/patches folder has the sticky bit set. The /opt/patches folder has been hacked and should be removed immediately. The /opt/patches folder has the Set User ID (SUID) set for the patch group. The /opt/patches folder has the Globally Unique Identifier (GUID) set for the patch group

The /opt/patches folder has the Globally Unique Identifier (GUID) set for the patch group. The /opt/patches folder has the GUID set and therefore, when the root user created the file, it has patch group ownership.

How does a system administrator allow a user to mount a filesystem? The administrator grants temporary root access to the specific user. The administrator specifies 'user' under the <options> heading in /etc/fstab. The administrator changes the permissions on the filesystem root to 777. The administrator gives the user sudo access for the mount command.

The administrator specifies 'user' under the <options> heading in /etc/fstab. The administrator adds the 'user' option under the <options> heading in /etc/fstab. The administrator would never grant temporary root or sudo access to a regular user for any reason. The administrator would also never change permissions on an entire filesystem to 777.

Other than Internet sites, where else can system administrators install Debian software packages from using the apt-get command? A Debian mirror The Debian distribution digital video disc (DVD) A Network File System (NFS)-mounted Debian system A Red Hat Enterprise Linux digital video disc (DVD)

The Debian distribution digital video disc (DVD) (The Debian distribution DVD is the best answer here. Apt-get will install from DVD if the DVD is set up in the /etc/apt/sources.list file. A Debian mirror is an Internet site. You cannot install Red Hat packages onto a Debian system using the apt-get command. Not just any NFS-mounted Debian directory will allow an administrator to install software—DEB packages have to exist on the mounted directory, and that source has to be set up in the /etc/apt/sources.list file.)

If you run ls -l at the command line and see the following entry, what does it mean? rwsr-xr-x 1 bsmith bsmith 1024 2015-05-01 12:33 script.sh The sticky bit has been set for this file. The Globally Unique Identifier (GUID) has been set for this file. The file has been recovered from deletion. The Set User ID (SUID) has been set for this file.

The Set User ID (SUID) has been set for this file. The SUID has been set for this file.

Three weeks ago, a user requested for a digital video disc (DVD) to be mounted on a shared system, but noticed that the DVD is no longer mounted and the system has an uptime of two days. What happened? The system administrator unmounted the DVD. The administrator did not make the mount persistent. The user unmounted the DVD. The DVD was damaged during the reboot two days ago and could not be mounted.

The administrator did not make the mount persistent. The administrator did not make the DVD mount persistent. It is possible, but not likely, that the administrator unmounted the DVD. A user typically cannot unmount a filesystem. The DVD was not damaged during a reboot.

A user creates several files in a group-owned directory under /opt, but later during a search with locate, does not find the files. What is the problem? The administrator removed the files because they were in the wrong directory. The administrator has not run updatedb since the user created the files. The files were automatically removed by system housekeeping commands. The user forgot to set the sticky bit on the files, so therefore they were all temporary.

The administrator has not run updatedb since the user created the files. The administrator had not yet run the updatedb command to update the mlocate.db database. Administrators and housekeeping scripts typically do not remove user-owned files. The user does not have to set the sticky bit for files to be permanent.

A user attempts to compile and create an executable in their home directory, but it doesn't work. What has the administrator done to prevent this user action? The administrator has changed the home directory's permissions to read only. The administrator has removed the execute (x) bit from all home directories. The administrator has set the noexec option for the filesystem in /etc/fstab. The administrator has restricted the user's permissions via an Access Control List (ACL).

The administrator has set the noexec option for the filesystem in /etc/fstab. The administrator has mounted the /home filesystem with the noexec option.

An administrator issued the following command on a system. What is the administrator looking for by using this command? find / -size +10M -print The administrator is looking for files larger than 10 megabytes in their home directory (/root). The administrator is searching for files smaller than 10 megabytes on the entire system. The administrator is looking for all files larger than 10 megabytes on the entire system. The administrator is looking for files accessed in the last 10 days.

The administrator is looking for all files larger than 10 megabytes on the entire system. The administrator is searching for files larger than 10 megabytes on the entire system, from the root (/) directory. If the administrator wanted to find files by last accessed time, they would use the -atime option. To find files smaller than 10 megabytes, the administrator would use -10M. To find files in the administrator's home directory, they would search from /root, or . if they were in the home directory.

If the gdisk utility supports only one command line option, how can a system administrator use gdisik to manipulate partitions? The administrator has to create a configuration file for the gdisk utility to use. The gdisk utility can manipulate partitions through its web-based interface only. The administrator manipulates partitions through an interactive gdisik dialog at the command line. The gdisk utility uses the fdisk utility with the -g option for its partition manipulations.

The administrator manipulates partitions through an interactive gdisik dialog at the command line. The administrator uses gdisk at the command line in an interactive session, much like fdisk.

When would a system administrator mount a filesystem and prevent its entry into /etc/fstab? Not allowing an entry into /etc/mtab is a typical testing practice. The administrator mounts a filesystem without allowing the entry in /etc/fstab to prevent users from knowing the filesystem is mounted. The administrator mounts a filesystem without allowing the entry to be added to /etc/fstab when /etc/ is on a read-only filesystem. The administrator makes such a mount when wanting to bypass standard security.

The administrator mounts a filesystem without allowing the entry to be added to /etc/fstab when /etc/ is on a read-only filesystem. The primary reason that an administrator prevents an entry into /etc/mtab is because /etc is mounted on a read-only filesystem.

If a system administrator installs a Linux system that will provide file storage services for approximately 200 users, how should the administrator configure the disk for easy management? The administrator should set up simple disk partitions and add disks as necessary. The administrator should set up simple disk partitions and limit each user to 10 MB of space each. The administrator should set up a very large /home partition using simple disk partitions. The administrator should set up logical volumes in order to grow the volumes as needed.

The administrator should set up logical volumes in order to grow the volumes as needed. (For 200 users, who will use the file server to store large amounts of data, the administrator should set up logical volumes in order to grow the volumes as needed. A simple disk partitioning scheme is not as enterprise-friendly in that simple partitioning will require downtime for the services and the system during expansion. Limiting users to 10 MB of space is not a good practice, because 10 MB will be consumed too quickly by every user.)

What does the command df -h display? The filesystem types for all mounted filesystems The numbers and names of deleted files in command history The numbers of Inodes used and free on a system The amounts of used and free disk space in human readable format

The amounts of used and free disk space in human readable format (The df -h command displays used space and free space on a system in human readable format. The numbers of Inodes can be found by using: df -i. The filesystem types can be found by using: df -T. There is no command for tracking deleted files.)

In vi, the letters hjkl are equivalent to which other keys on the keyboard? Home, Del, Ins, and Backspace Ctrl-Alt-Delete The arrow keys F1-F4

The arrow keys The navigation keys, hjkl, are equivalent to the arrow keys on a keyboard.

What happens if a user issues the bash command while using the bash shell? The bash command opens another instance inside the current bash shell. The new bash shell replaces the old one as the user's default shell. The second bash command dies without dialog. The new bash shell hangs in a "wait" state ready for input

The bash command opens another instance inside the current bash shell. The new bash shell opens within the current shell and looks identical to the original.

What happens if a user enters !6 on the command line? The command at offset 6 will execute from the user's shell history. The command from six lines back will execute from the user's shell history. The most recent command from the user's shell history will execute six times. The command at offset 6 will be displayed from the user's shell history.

The command at offset 6 will execute from the user's shell history. The command at offset position 6 will execute from the user's shell history. To execute the command from six lines back in the user's shell history, the user enters !-6.

What does the following command do for the user who executed it? touch newfile.txt ; mv newfile.txt /tmp The command creates the newfile.txt file and then moves it to the /tmp directory. The command creates the newfile.txt file and then renames it to /tmp. The command tells the user which type of file newfile.txt is and then moves it to the /tmp directory. The command displays newfile.txt's contents and then changes its name to /tmp.

The command creates the newfile.txt file and then moves it to the /tmp directory. The command creates the newfile.txt file and then moves it to the /tmp directory. The cat command displays a file's contents, and a user cannot rename a file to /tmp because it is a system directory name. The file command displays the type of file.

What happens if a user enters the command, type rm? The command displays aliases for the rm command. All files in the user's home directory are deleted. It displays hard and symbolic links to the rm command. It displays the type of file that rm is: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.18, stripped.

The command displays aliases for the rm command. The type rm command displays aliases to the rm command. The rm -rf command will remove all files in the user's home directory. The file command responds with the type of file (text, executable, data). The ls -li command displays links to a file.

What is the result of the root user issuing the command ldd /usr/bin/tee? The command loads /usr/bin/tee's shared libraries into memory. The shared libraries associated with /usr/bin/tee are unloaded from memory. The command displays the shared libraries in use by /usr/bin/tee. The shared libraries associated with /usr/bin/tee are deleted.

The command displays the shared libraries in use by /usr/bin/tee. (The ldd /usr/bin/tee command displays the shared libraries in use by /usr/bin/tee.)

What is the expected output from the following command? find . -name "*.txt" -print The command searches for and lists files named with a .txt ending, and sends them to the default printer. The command searches the current directory and displays a list of all files with a .txt ending. The command searches for and lists all hidden text files. The command searches for and lists all files that do not end with .txt.

The command searches the current directory and displays a list of all files with a .txt ending. The find command lists all files in the current directory with a .txt ending. The -print option means print to the screen or stdout. The "*.txt" is a wildcard that gathers all files regardless of name or name length, as long as they have the .txt ending. The (.) after find means to search the current directory, which includes all subdirectories (a recursive search by default) of the current directory.

What happens if the following command is executed, but the destination directory (dir2) does not exist? cp -R dir1 dir2 The copy command creates the dir2 directory and recursively copies the contents of dir1 to it. The copy command creates dir2, copies the data from dir1 into it, and preserves all user rights to dir2. The copy command reverses all changes made to dir2. The copy command removes dir1 and creates dir2.

The copy command creates the dir2 directory and recursively copies the contents of dir1 to it. The cp -R dir1 dir2 command copies dir1 and its contents to dir2. If dir2 does not exist, the copy command creates it.

A user creates an executable shell script, file_list.sh, in their home directory and attempts to execute it by typing file_list.sh. They receive an error: file_list.sh: command not found. What is the problem? The user forgot to add #!/bin/bash to the first line of the script. The script has been named with an incorrect extension (.sh); it should be .exe. The script is not set to be executable. The file is in their current directory, but the current directory is not in their path.

The file is in their current directory, but the current directory is not in their path. The script is in the user's current directory and the current directory is not part of the default path. The extension has nothing to do with the file type in Linux.

What is the danger of using Set User ID (SUID) on files? It causes some programs to become unresponsive. It increases the file size to use SUID. SUID can cause programs to "bloat" in memory. The files execute as root, which has unlimited rights.

The files execute as root, which has unlimited rights. The real danger with using SUID is that the program then runs as root, which has unlimited permissions. So, if there is a programming problem or hack in the program, this feature can be used to harm a system or its files.

Which of the following is a major of advantage of using find over other file location utilities? The find command uses fewer system resources when searching for files. The find command searches a database instead of the filesystem. The find command is much faster than the other options. The find command can be used with regular expressions.

The find command can be used with regular expressions. The find command can be used with regular expressions to create very powerful and very specific searches. Find does not use a database; locate does. Find uses a lot of system resources because it performs a fresh search each time it is issued. Find is much slower than other methods of locating files.

What does the following locate command send to the screen as output? locate filename.txt -n 10 Limit the search results to 10 characters The first 10 search results for filename.txt The last 10 search results for filename.txt Limit the search results to 10 levels of subdirectories

The first 10 search results for filename.txt The locate command with the -n 10 option displays the first 10 results of a locate search. None of the other options listed exist for the locate command.

What is the result of entering the following command for a file? chgrp staff file1.txt The staff group was removed from file1.txt. User and group ownership of file1.txt change to staff. The user ownership of file1.txt changes to staff. The group ownership of file1.txt changes to staff.

The group ownership of file1.txt changes to staff. The group ownership of file1.txt changes to staff. The chgrp command changes group ownership.

What is the result of the following command: echo Hello > hello.txt? The hello.txt file is created and the word Hello is added to it. hello.txt is copied to the Hello file. The system gives the error: hello.txt: No such file or directory. Hello and hello.txt are echoed to the screen.

The hello.txt file is created and the word Hello is added to it. echo Hello > hello.txt creates the hello.txt file and copies Hello into it.

How does a Linux system identify the init or systemd process? The init or systemd process has its own user ID (UID) and group ID (GID). The init or systemd process' process ID (PID) is always 1. The init or systemd process has no process ID (PID). The init or systemd process has no user account associated with it.

The init or systemd process' process ID (PID) is always 1. The init or systemd process always has a PID of 1. The root user runs the init or systemd process and runs under root's UID and GID.

How can a user determine which job was executed most recently? The jobs table displays a status of Current for the job. The jobs table displays a (+) next to the job name. The most recent job is at the top of the list. The most recent job has a status of Running.

The jobs table displays a (+) next to the job name. The jobs table displays a (+) next to the most recently executed job. All running jobs have a status of Running. There is no Current job status. The list order is not in the correct order of execution.

In a user's .profile file, there is an entry: TZ='America/Chicago' ; export TZ. What is the purpose of this line? The line creates the local variable TZ (time zone) and sets it to America/Chicago. The line resets the default TZ (time zone) variable to 'America/Chicago', and export changes the system's time zone. The line sets the TZ (time zone) variable, and the export command unsets the variable. The line sets the TZ (time zone) variable to America/Chicago, and export TZ makes TZ an environment variable.

The line sets the TZ (time zone) variable to America/Chicago, and export TZ makes TZ an environment variable. (This line has two effects. The first is that it sets the TZ (time zone) variable to America/Chicago, and second, it exports the variable TZ so that it is an environment variable.)

A system administrator issues the ldconfig -p command. What does this command display? The partitions where libraries are installed. The lists of directories and candidate libraries stored in current cache. The prerequisites for all shared libraries not currently in cache. The -p switch prompts the user for a password prior to displaying cache information.

The lists of directories and candidate libraries stored in current cache. (The ldconfig -p command displays the lists of directories and candidate libraries stored in cache.)

A system administrator issues the ldconfig -p command. What does this command display?

The lists of directories and candidate libraries stored in current cache. (The ldconfig -p command displays the lists of directories and candidate libraries stored in cache.)

A user uses a sed command to convert the letter b to B in a file, but when the user looks at the file, there are no changes to it. What happened? The user failed to redirect the converted output to a file. The user forgot to use sed with the -e (edit) option. The user did not pipe the output to the grep command. The user used the wrong command to make the conversion.

The user failed to redirect the converted output to a file. The user failed to redirect the converted output to a file. The sed command does not rewrite the file.

A user searched their home directory for a file named history.doc using the locate command, but locate returned several files matching history.doc as if the user had used a wildcard, such as "*history.doc*" in the search. Why did locate return so many matches? The locate command automatically wildcards all searches. There was no file specifically named history.doc in the user's home directory. The user forgot to specify the home directory in the search. The user did not have direct access to the mlocate database, so locate performed a wildcard search.

The locate command automatically wildcards all searches. The locate command uses wildcards at the beginning and at the end of a string. For example, a locate search for the file name of history results in a wildcard search as *history*.

In the GRand Unified Bootloader (GRUB) (Legacy or 2) menu file, what does the hd0,0 specify to the boot loader? The first disk to check for a root file system The location of the master boot record (MBR) The location of initrd The location of the login screen image

The location of the master boot record (MBR) (The hd0,0 GRUB menu entry specifies the location of the master boot record (MBR).)

What is the result of a user issuing the following command? ls -lR | tee list1.txt list2.txt list3.txt The ls command's output displays to the screen and is written to all three files in its entirety. The ls command's output is split into three equal portions and copied to the three files specified in the command. The ls command's output is displayed on the screen and is copied to list1.txt only. The ls command's output displays on the screen, but the tee command gives the error: "Too many parameters."

The ls command's output displays to the screen and is written to all three files in its entirety. The ls command's output is shown on the screen and is copied, in its entirety, to each of the three files. The output is not split. Users can specify as many files as they want for the tee command and it will write to each of them.

If a system administrator mounts /dev/sdb1 on the /mnt directory, what happens to this mount after a system reboot? The mount still exists after reboot. The /dev/sdb1 filesystem returns to a raw format and has to be re-created with fdisk and mkfs. The /mnt directory has been deleted from the system. The mount does not persist after the reboot.

The mount does not persist after the reboot. The mount will not persist after a reboot because the administrator did not create an /etc/fstab entry for the filesystem, which would make the mount permanent and persistent. No filesystem or directory will be removed or reset on the system.

What does the count option refer to when using the dd command? The number of blocks written to the input or to the output file. The number of total bytes transferred from the input file to the output file. It refers to the maximum size of the output file. The number of bytes written to the input or to the output file.

The number of blocks written to the input or to the output file. The count, for example count=1024, is the number of blocks to be written to the output file or from the input file. There is no maximum output file size. The number of bytes transferred is specified by the bs parameter.

In the following command, what is the bs=1M designation? dd if=/dev/zero of=/tmp/fileout bs=1M count-1024 The number of bytes per second to copy to the output file. The number of bytes written to the output file. The amount of random-access memory (RAM) to reserve for the dd command to execute. The number of bytes read from memory.

The number of bytes written to the output file. The bs=1M designation in this command refers to the number of bytes written to the output file during the command's execution. The other options are not part of the dd command or its options.

There are two locations in which the GRand Unified Bootloader (GRUB) boot loader can reside: the master boot record (MBR) and where else? In the swap partition In the system's Basic Input-Output System (BIOS) Anywhere within the first 1,024 cylinders of a disk The partition boot record of an active partition

The partition boot record of an active partition (The GRUB boot loader may reside in the MBR or in the partition boot record of an active partition. These are the only locations allowed for a primary boot loader.)

Which of the following is NOT part of the process table? The process ID (PID) The process job status The user account running the process The command that is running

The process job status The process job status is NOT part of the process table. The jobs table displays job status.

What is the result of executing the following command? df -h | tee diskspace.txt The df command's output is redirected to the tee command and to the diskspace.txt file. The df command's output is piped to tee that filters the input on the term, diskspace.txt. The result of the df command displays on the screen and is copied to the diskspace.txt file. The df command's output displays on the screen and tee gives the error: "Not enough parameters."

The result of the df command displays on the screen and is copied to the diskspace.txt file. The tee command displays its input to the screen and to the file specified in the command following it. This command is a pipe and not a redirect. Tee does not filter text. Tee takes the output from almost any command as input for itself and displays it on the screen and copies it into a specified file.

How does a user initiate a foreground process at the command line? The user issues a command. The user issues a command preceded by exec, for example, exec ls. The user issues a sleep command prior to entering the command, for example, sleep 100 ; ls. The user issues a command with a trailing &.

The user issues a command. To run a program in the foreground, the user simply issues the command. Unless the user places the command into the background with a trailing &, commands are always in the foreground.

What is shared in shared libraries? The libraries are located in a common directory, /lib, for easy application access. The routines stored in the libraries are shared among multiple applications. The libraries and the applications share a common space, such as /opt. The libraries are shared to all applications by the kernel.

The routines stored in the libraries are shared among multiple applications. (The shared part of shared libraries is that these libraries contain routines that are common to and shared by many different applications. Libraries are mainly located in /lib, but that is for organizational purposes and has nothing to do with their sharing. No libraries are loaded by default to /opt unless they are application specific and therefore not shared. The kernel does not share libraries.)

Which of the following is equivalent to stdout? The screen /dev/null The mouse The keyboard

The screen (Standard output or stdout is the screen. The keyboard is standard input. The mouse is part of standard input. The /dev/null designation is not a stream but a null device, kind of like a trash bin.)

How does the system administrator mount the swap partition for use? The swap partition is always mounted on /mnt. The swap partition is not mounted on a mount point. The administrator mounts the partition on the hidden /swapfs partition. The administrator mounts the swap partition on /tmp.

The swap partition is not mounted on a mount point. The swap partition is not mounted in the traditional sense in that it has no mount point and it can be neither mounted by the root user nor unmounted.

If a user creates a symbolic link from file1.txt to storage.txt, then renames storage.txt to inventory.txt, the symbolic link from file1.txt to storage.txt is broken. What happens if the user creates a new file named storage.txt? The user receives a message that file1.txt must be deleted before proceeding. The link is now a hard link and no longer a symbolic link. The user receives an error that storage.txt already exists. The symbolic link is re-established from file1.txt to storage.txt.

The symbolic link is re-established from file1.txt to storage.txt. The symbolic link is restored from file1.txt to storage.txt.

Other than current time, running time, and currently logged on users, what information appears in uptime? The current kernel version The platform (32-bit or 64-bit) The system load average The system name and operating system version

The system load average The uptime command also reports the load average for the system. The three numbers present the last 1 minute, 5 minutes, and 15 minutes load averages.

What happens after a system administrator issues the shutdown -r now command?

The system reboots after a warning to all users. (The shutdown -r now command warns all users that the system is going down for reboot and then begins the reboot process. To send the warning to all users, but not shut down, use the -k switch. There are no shutdown options for disconnecting users without shutdown or for a restart in recovery mode.)

What happens after a system administrator issues the shutdown -r now command? The system reboots after a warning to all users. The system restarts in recovery mode. The system does not shut down, but sends the warning message to all users. The system resets all user logins, disconnecting them, but does not shut down.

The system reboots after a warning to all users. (The shutdown -r now command warns all users that the system is going down for reboot and then begins the reboot process. To send the warning to all users, but not shut down, use the -k switch. There are no shutdown options for disconnecting users without shutdown or for a restart in recovery mode.)

If a system administrator issues the reboot command as the root user, what happens? The system reboots. The system notifies all users on the system with, "The system will reboot in 5 minutes, please log off now." The system prompts with, "Are you sure (Y/N)?" The system requires the root user to enter the root password. .

The system reboots. (When the root user issues the reboot command, the system immediately begins shutting down for reboot. There are no prompts and no warnings to other users.)

What happens when the root user issues the halt -p command? The system shuts down and powers off. The system prompts all users to log off and then begins shutdown. The system prompts for the root password and then halts. The system halts after a short pause.

The system shuts down and powers off. (The halt -p command means that the system will shut down and power off immediately, without prompting any user.)

What happens if a user has no soft inode limit and an inode hard limit of 100 is met, but a lot of space is still available for saving files? The user's account is disabled until the administrator unlocks it. The user can save new files until the filesystem space limit is met. The user cannot save new files. The administrator receives a notification message about the user's limitation being met.

The user cannot save new files. If the user's inode limit has been met, then the user cannot save new files.

A user has a soft block limit of 100 kilobytes (KB) and a hard limit of 1,000 KB (1 megabyte [MB]). What happens to the user's ability to save new files after the grace period if they have 150 KB of data on that filesystem? The user can save up to 1 MB of files. The user cannot save new files. The user is given a new grace period. The user's files are deleted by the system in last in, first out (LIFO) order.

The user cannot save new files. The user cannot save new files. Once the user passes the soft limit, the grace period begins, and after it expires, the user can write no more data. There is no new grace period and no files are ever deleted by the system.

How does a user turn a local variable into an environment variable? The user must request that the root user set the variable. The user must export the variable. The user can only set local variables. The user has to place them into the /etc/profile file.

The user must export the variable. (To turn a local variable into an environment variable, the user has to export the variable. The user-exported variable is not permanent if created in an interactive environment and will disappear upon logout.)

What happens if there is no soft limit set and the user hits the hard limit? The user receives no warning and cannot save more files. The user's account is disabled as soon as they hit the hard limit. The user's files are purged from the filesystem. The user receives a warning that they have hit the hard limit.

The user receives no warning and cannot save more files. The user receives no warning, but cannot save any new files to the filesystem.

A user attempts to remove a directory and receives the following error: rmdir: failed to remove `dir1': Directory not empty. Explain the problem. The user attempted to remove the home directory rather than the intended directory, dir1. The user used the correct command, rmdir, to remove the directory; however, the directory is not empty and cannot be removed with rmdir. The user does not have sufficient permissions to continue with the remove command, rmdir, which can only be run by the root user. The user should have used the -ignore-fail-on-non-empty option in order to successfully remove the directory.

The user used the correct command, rmdir, to remove the directory; however, the directory is not empty and cannot be removed with rmdir. The rmdir command cannot remove a directory that contains files. Any user can execute the rmdir command. The -ignore-fail-on-non-empty option only suppresses the error, but does not remove the directory.

What information is displayed by issuing the pwd command? The user's current working directory Documents waiting in the print queue How many users are logged in to the system How long the system has been running since the last reboot

The user's current working directory The pwd command stands for print working directory and displays the user's current working directory. Documents in the print queue are listed with the lpq command. The who command lists the users logged in to a system. The uptime command displays how long the system has run since the last reboot.

A user issues the following command: ls 2> files.txt. What information displays to the screen if the user then issues: cat files.txt? There is no information to display to the screen. A list of the sizes of all files listed by the ls command. A list of files from the ls command. A list of errors created by the ls command.

There is no information to display to the screen. The ls 2> files.txt redirects errors to the files.txt file, but there are no errors, so there is nothing to display. The files.txt file is empty.

What is the common attribute of the following directories: /tmp, /var, /opt, /home? Their sizes all vary based on the number of users on a system. They are all subdirectories of the root (/) directory. They all need to be at least 1 GB in size. All of them hold personal user data.

They are all subdirectories of the root (/) directory. (The common attribute for the /tmp, /var, /opt, and /home directories is that they are all subdirectories of the root (/) directory. Their sizes are based on multiple factors, but only the /home directory's size is based on the number of users. Only the /home directory holds personal user data.)

What is the significance of the leading dot in some file names, such as .bash_history, .profile, and .bashrc? They are hidden from a standard file listing. It means that they are executable. It means that they are owned by the root user. They are generated by the system and not for direct user interaction.

They are hidden from a standard file listing. (The leading dot (.) in a file name means that it is hidden from a standard directory listing. Files named with a leading dot are not necessarily executable or owned by the root user—as any user can create them and interact with them. )

How does a user know if two files are hard linked to each other? They have no inode. They both have the same inode. One has a positively numbered inode and the other has a negatively numbered inode. They have consecutive inodes.

They both have the same inode. Hard linked files both have the same inode. There are no negatively numbered inodes.

How does a system administrator verify that the GRand Unified Bootloader (GRUB) password they set up works? They have to supply the password prior to entering edit mode. The password is required at boot, at reboot, and at system shutdown. The system prompts for a password prior to booting to the GRUB menu. They must supply the password at the grub> prompt.

They have to supply the password prior to entering edit mode. (The only time the GRUB password is required is prior to entering edit mode to change boot options.)

The vi and the vim editors are often known as simple editors because of which feature? They are command-line interface (CLI) editors. They are small and load fast into memory. They use simple keystrokes to perform complex text editing tasks. They cannot perform complex editing tasks.

They use simple keystrokes to perform complex text editing tasks. The vi and vim editors are known as simple editors because they use simple and somewhat intuitive keystrokes to perform complex editing tasks.

What is the purpose of this statement: ps -ef >> processes.txt? This statement sends all process information to the screen and to the processes.txt file. This statement appends process information to information already in processes.txt. To overwrite any information in the processes.txt file. To create processes.txt and write information into it.

This statement appends process information to information already in processes.txt. The statement appends any information in the processes.txt file with current process information. The single operator > will create the file and overwrite any existing information. To send process information to a file and to the screen requires the tee command.

How many stages does the Debian archive package installation process have? It depends on the package. Five Three Seven

Three (The Debian archive package installation process consists of three steps: check for dependency, unpack, and configure.)

The rmdir command removes a directory, but which particular idiosyncrasy does the rmdir command have? To remove multiple directories at a time, the -f (force) option must be used The directory to be removed must have a name shorter than 15 characters. It has to be used recursively, with the -R option. To be used successfully, the directory has to be empty

To be used successfully, the directory has to be empty To remove a directory with the rmdir command, the directory has to be empty. There are no -R or -f options for rmdir. There is no character limitation for directory names to be removed.

Why does a Linux system run a filesystem check at startup? To check for an adequate amount of free space on all disks and filesystems To check the integrity of newly added disks To check for viruses at boot time To check for errors at boot time

To check for errors at boot time The fsck command runs anytime the system detects that there might be errors on the disk.

What is the primary function of the gzip command? To compress files with the .gz suffix To compress archive files so that they consume less disk space To unarchive files compressed by the tar utility To send compressed files to streaming tape for backup

To compress archive files so that they consume less disk space The gzip command compresses files so that they consume less disk space. Files with the .gz suffix are already compressed. The tar command both archives and unarchives files. The tar command traditionally is used to send files to streaming tape for backup.

What are text filters sometimes used for? To insert or remove headers To pass text into a file To execute one program after another To read data from a file

To insert or remove headers Filters are shell scripts and are sometimes used to insert or remove headers. Passing text into a file is redirection. Reading data from a file is parsing. Executing one program after another is performed by using a semicolon between the commands.

What is the function of the J (uppercase j) command in vi? To join the current line with the line below it To jump down five lines at a time in a file To delete the remainder of the file from the current cursor position To spell check the current document

To join the current line with the line below it The J command joins the current line with the line below it. To jump down five lines in a file, use the 5j command. There is no spell check in vi. The dG command deletes from the current cursor position to the end of the file.

What is the main purpose of Debian's package management tool suite? To make Debian more user friendly To compete favorably with other Linux distributions To prevent numerous system reboots related to software management To make Debian distribution more proprietary

To make Debian more user friendly (The main purpose of the Debian package management tool suite is to make Debian more user friendly. All Linux systems have some type of package management system. Software management typically does not require rebooting of the system. A package management system does not make a distribution more or less proprietary.)

What is the purpose of the 'g' in the following sed command? sed -e 's/b/B/g' file.txt If no b is found in the line, replace the letter g with B To make the substitution if the letter b occurs either at the beginning or at the end of the line or word To make the substitution only if there is a 'g' in the line or in the word To make the substitution globally

To make the substitution globally The 'g' means replace globally, or every occurrence of the letter b in the file with B, regardless of where in the line or in the word that it occurs.

Users and administrators both use regular expressions for which purpose? To match strings based on a pattern To collect information from memory into a file To replace text with text or other characters To use wildcards when searching for a file on a system

To match strings based on a pattern While there are many different applications of regular expressions, the primary purpose of them is to match strings based on a pattern. Regular expressions often use wildcard characters, but that is not their overall purpose.

What is the function of the :! command in vi? To quit vi without saving the current file or the buffer To clear the vi buffer of all copied, pasted, and deleted content To search an external file for a specific string To run an external command and see the results while in vi

To run an external command and see the results while in vi The :! command allows a user to issue an external command while in vi and display the command's results.

What is the purpose of the timeout entry in the GRand Unified Bootloader (GRUB) Legacy menu.lst file? To specify the value in seconds before rebooting the system To specify the amount of time given prior to shutdown To specify the time limit for the login screen to be displayed To specify the length of time given before booting into safe mode

To specify the time limit for the login screen to be displayed (The GRUB timeout entry specifies the amount of time that the GRUB menu is displayed on the screen. After the timeout value has been reached, the system will boot into the default operating system.)

Why do system administrators run the ldconfig command? To display loaded shared library files To interactively edit the /etc/ld.so.conf shared library configuration file To update the shared library config file /etc/ld.so.conf To update shared library locations to the /etc/ld.so.cache

To update shared library locations to the /etc/ld.so.cache (Running ldconfig updates the shared library locations to the /etc/ld.so.cache file. The /etc/ld.so.conf file is automatically updated by the installation of new libraries. The ldd command is used to display a list of loaded shared libraries for a specific command. If an administrator needs to interactively edit the /etc/ld.so.conf file, the vi editor is used.)

What is the function of the :w! command? To write (save) the file to the buffer (memory) To write (save) the file and then quit vi To write (save) the file to a temporary file in the /tmp directory for recovery To write (save) the file and overwrite the permissions if the user has privileges to do so

To write (save) the file and overwrite the permissions if the user has privileges to do so The :w! command writes or saves the file and overwrites the permissions if the user has privileges to do so.

At a minimum, how many partitions can a Linux system have? Two Four One Three

Two (The minimum number of partitions a Linux system should have is two, the root (/) partition and a swap partition.)

How many components comprise the Master Boot Record (MBR)? Two Sixteen One Four

Two The Master Boot Record is composed of two main components: The Master Partition Table and the Master Boot Code.

Which task must the administrator perform to activate quotas on a filesystem once the additions have been made to /etc/fstab? Unmount and remount the filesystem Restart networking Log off all users Restart the Secure Shell (SSH) daemon

Unmount and remount the filesystem The filesystem on which quotas were enabled via the /etc/fstab entries has to be unmounted and remounted. Logging off users, restarting the SSH daemon, or restarting networking will have no effect.

What task should an administrator perform prior to running the fsck utility on a filesystem? Run fdisk and re-create the partition to be checked Reformat the filesystem with mkfs Unmount the filesystem to be checked Check for adequate free space for filesystem repair

Unmount the filesystem to be checked Prior to running the fsck utility on filesystems, the administrator should unmount the filesystem to prevent damage. Using mkfs or fdisk will wipe out any data contained on the disk, and neither is necessary to perform a filesystem check. A minimal amount of free space is required for repairs, so there is no need to check free space.

If a user wants to terminate only one instance of a particular process, what must the user do? Use pkill <command or partial command name> to kill the instance Use the top command, issue the 'k' command to kill a process, and provide the instance's process ID (PID) to be killed Use ps -ef | grep <command> and selectively use the kill command to terminate the specific instance Use killall <command> to kill the process

Use ps -ef | grep <command> and selectively use the kill command to terminate the specific instance The ps -ef |grep <command> ; kill PID is the best method. Using killall will kill all processes with the command name and not just the specific one. The pkill command can kill more than one instance, especially when using a partial name. The top command can work, but only if the desired instance appears near the top of the list.

As a junior level system administrator prepares to install a print server system for approximately 10 users in a small office, the junior administrator asks the lead administrator which type of disk partitioning to use. What is the lead administrator's response? Use logical volumes Use simple partitioning with home directory encryption Use logical volumes with home directory encryption Use simple partitioning

Use simple partitioning (Simple partitioning with no home directory partitioning is a good choice for this particular business application. There is no need to use logical volumes due to the small number of users and the fact that the system is a print server. And there is no need for home directory encryption because users will not store data on the system; it is a print server and probably will have a very small disk.)

How does a user search for a particular word or string in vi? Use the jj key combination, type the word, and press ENTER Use the \n key combination, type the word, and press ENTER Use the :e! command, type the word, and press ENTER Use the / key, type the word, and press ENTER

Use the / key, type the word, and press ENTER Use the / key, type in the word, and press ENTER. Typing jj will move the cursor down two lines, but not allow a search. The \n combination has no effect, because the \ is invalid in vi. The :e! command reverts to the last saved version of a file without closing the file.

A user finds that they have repeated the same five commands in performing a housekeeping task. How can they use their command history to repeat the commands in the most efficient manner? Enter echo history 5 at the command prompt to echo and execute the last five shell commands Enter tail -5 .bash_history to repeat and execute the last five used shell commands Use the history command and the number 5 for the last five commands used Use the Up Arrow key to find the command, and press ENTER when the desired command is found

Use the Up Arrow key to find the command, and press ENTER when the desired command is found (Use the Up Arrow key on the keyboard to cycle through the last 1,000 commands issued at the command line, beginning with the most recent first. The history 5 command shows the last five commands used, but does not execute them. The echo history 5 command will display the words history 5. The tail -5 .bash_history command will display the last five commands, but will not execute them.)

How does a user or an administrator start a long-running task that might take longer than the automatic logout time limit for a system? Use the & to place the task into the background Use Ctrl+Z to suspend the command until it can be continued Use the nohup command and the & to place the task into the background Use the & command to place the task into the background and then Ctrl+Z to suspend it to a later time

Use the nohup command and the & to place the task into the background The user or administrator uses the nohup command with a trailing &. The other options will not continue to run the task after the automatic logout, which is the point of the exercise. Using nohup plus the & will run the task to completion without user intervention.

Which two attributes does a process inherit from the user who starts the process? Shell environment variables and process ID (PID) User ID (UID) and home directory Process ID (PID) and group ID (GID) User ID (UID) and group ID (GID)

User ID (UID) and group ID (GID) When a user starts a process, the process inherits the user's user ID and the user's group ID. The process is assigned a process ID from the system and has nothing to do with the user. The process does not inherit a user's home directory or the user's shell environment variables.

Which information does the system administrator place into the configuration file to enable GRand Unified Bootloader (GRUB) password protection? Encrypted user name and encrypted password A randomly generated user name and encrypted password User name and encrypted password The path to the grub.cfg file and the encrypted password

User name and encrypted password (The system administrator enters user name and the encrypted password into the configuration file to enable GRUB password protection.)

As the final part of the boot process and after the user logs in to the system, what happens? User profile and login scripts run. The kernel loads into memory. The user is prompted with a graphical screen displaying bootable operating system options. The recovery console opens.

User profile and login scripts run. (The user's profile and login scripts run to complete the boot process.)

What are the three access categories in Linux? User, Group, and Other Global, User, and System User, Group, and System User, System, and Other

User, Group, and Other The three access categories in Linux or Unix are User, Group, and Other (ugo).

What is the possible result if a new administrator assigns a small space soft limit, but does not specify a hard limit? Users can store only the amount of data that reaches the soft limit with no warning. Users can continue to store files beyond the soft limit grace period. Users have no grace period in this scenario. Users can store as much data as they want until the grace period expires.

Users can store as much data as they want until the grace period expires. The administrator who makes this mistake runs the risk of filling a filesystem, because users may store as much data as they want until the grace period expires.

Other than using the nohup command, which other method exists to allow running commands after a user logs out of a system? Manipulating bg and fg Using & to background the task as the root user Running the task in the background in a second level or child shell Using the screen command

Using the screen command The screen command allows a user to run a process that might require multiple hours to complete, but still log out of the system. Using bg and fg will not allow a user to log out of a system and leave a process running. Using & will not allow a user to log out while running a process. Once a user logs out of a system, all shells and child shells die.

Under which circumstances would a boot loader located in the master boot record (MBR) load a boot loader in a partition boot record (a process known as chain loading)? When the secondary MBR is corrupt When GRand Unified Bootloader (GRUB) boots a Windows partition When there are multiple disks on a system When the primary boot loader fails

When GRand Unified Bootloader (GRUB) boots a Windows partition (When GRUB boots a Windows partition. GRUB can load other operating systems on other partitions for dual or multi-boot configurations. If the primary boot loader (GRUB) fails, the system does not boot. Multiple disks do not matter to GRUB, because it addresses them as partitions. There is no secondary MBR.)

Which of the following filesystems handles large files efficiently? Third extended filesystem (ext3) Fourth extended filesystem (ext4) ReiserFS XFS

XFS XFS handles large files efficiently. ReiserFS handles small files efficiently. The ext3 and ext4 filesystems are filesystems that attempt to handle files of varying sizes efficiently, but are not optimized for small files or for large files.

What does the acronym YUM stand for? Young's Updater and Manager YUM Unified Manager Yellowdog Updater, Modified Young's Unix Manager

Yellowdog Updater, Modified

Which keyboard shortcut writes (saves) the current file and then quits vi? yy dd gg ZZ

ZZ ZZ writes and then quits vi. The dd command deletes a line. The yy command yanks (copies) a line. The gg command moves the cursor to the first line of the file.

What does the regular expression '.*' mean? Strings that have a period (.) anywhere in the string Strings that do not contain a period (.) Strings that begin with a period (.) Zero or more of any number of characters in a row

Zero or more of any number of characters in a row The .* regular expression means zero or more of any number of characters in a row.

A user needs to extract information that includes a period (.) from text files, but has had no success thus far. Which regular expression metacharacter will help the user collect the information required? .* *.* ./ \.

\. The \. metacharacter matches lines with periods or dots in them. The ./ is not a metacharacter, but how one launches a script or executable that is in the same directory. The *.* metacharacter means everything and is no different than simply using cat to view the contents of a file. The .* metacharacter means capture all.

A user notices that when using string matching with \w, no lines with spaces or special characters display in the results, although the user knows those types of lines exist. Which metacharacter matches lines with those types of characters? [w] \s \d \W

\W The \W metacharacter will only match lines containing special characters and spaces. The \d metacharacter matches digits. The \s metacharacter matches lines only containing whitespace. The [w] is not a metacharacter, but a bracket expression that only matches lines containing a w.

How does a user match all lines that end with a period using grep with no options? .$ \\.$ . \.$

\\.$ \\.$ is the correct answer, as in: grep \\.$ file.txt. The first \ escapes the second one and greps for a period at the end of the line ($). The \.$, .$, and . are all the same to grep and yield all lines from the file. In this case, egrep would be a better choice for differentiating among the choices.

Which command provides a list of all available packages from cache? apt-cache pkgnames * apt-cache show all apt-cache show apt-cache pkgnames

apt-cache pkgnames (The apt-cache pkgnames command displays a list of all available packages from cache. The apt-cache show command gives an error. The apt-cache pkgnames * command searches for package names that begin with *. The apt-cache show all command reports no packages found.)

Which apt-cache command displays a package's dependencies and reverse dependencies for the openssl package, for example? apt-cache show openssl apt-cache showpkg openssl apt-cache pkgnames openssl apt-cache search openssl

apt-cache showpkg openssl (The apt-cache showpkg openssl displays the package's dependencies and reverse dependencies. The search option displays a regular expression (regex) matched list for openssl. The show option displays extended information about openssl. The pkgnames option searches package cache for packages that begin with the name openssl.)

Which of the following Debian Linux commands installs software packages from Internet sources? yum apt-get make ; make install dpkg

apt-get (The apt-get command installs software from Internet sources, such as Debian mirrors or specifically configured sites. Yum is the Red Hat Linux equivalent of apt-get. Dpkg installs single DEB software packages located on media. The make ; make install commands compile and then install software from source files.)

Which command does a system administrator use to install a single software package and its dependencies from an Internet site (for example, the openssl package)? apt-get install openssl rpm -qa | grep openssl yum install openssl man install openssl

apt-get install openssl (The Debian command to install a single software package, such as openssl, is apt-get install openssl. The apt install openssl command does nothing because there is no apt command—APT is the name of the tool: Advanced Package Tool. The yum install openssl command is the equivalent command on Red Hat Linux systems. The rpm -qa |grep openssl command will list the openssl.rpm package, if installed, on Red Hat Linux systems.)

Which of the following commands functions exactly like d$ in vi? y$ s $ c$

c$ The d$ and the c$ command have the same functions in vi. They both delete to the end of a line without deleting the line. The y$ has no significance in vi; it reads as a y. $ sends the cursor to the end of the line. The s substitutes one character under the cursor.

Which command does a system administrator use to confirm the device where the GRand Unified Bootloader (GRUB) 2 boot loader is installed? cat /etc/redhat-release dmesg |grep -i grub cat /boot/grub/menu.lst cat /boot/grub2/device.map

cat /boot/grub2/device.map (For the GRUB 2 boot loader, the system administrator uses cat /boot/grub2/device.map to determine where GRUB 2 is installed. The /etc/redhat-release file displays the Red Hat Linux version running, but nothing about the boot loader. The /boot/grub/menu.lst contains the information, but for GRUB Legacy and not GRUB 2. The dmesg command has no information about the install location of the GRUB 2 boot loader.)

A user wants to search the /etc/passwd file for a particular username, Bob Jones. Which command performs the search correctly? cat /etc/passwd | grep "Bob Jones" cat /etc/passwd > grep "Bob Jones" ls -l /etc/passwd | grep "Bob Jones" ls /etc/passwd | grep "Bob Jones"

cat /etc/passwd | grep "Bob Jones" cat /etc/passwd | grep "Bob Jones" is the correct option. First, the /etc/passwd is passed through cat to create a text stream and then piped into grep, which searches for the string, "Bob Jones". Grep cannot have output redirected into it. The ls command will not expose the contents of the file to grep.

An administrator wants to know how many users on a particular system use the C shell (csh) as their default shell. Which command produces the desired result as a single number? file /etc/passwd |grep -c csh grep csh /etc/passwd cat /etc/passwd | grep csh | wc -l ls /etc/passwd |grep csh | wc -l

cat /etc/passwd | grep csh | wc -l The cat /etc/passwd |grep csh | wc -l command is the correct answer. The grep csh /etc/passwd command will not count the number of entries. Neither file nor ls will expose the contents of the /etc/passwd file.

Which of the following is the INCORRECT method of using the sort command? sort file.txt cat file.txt | sort uniq file.txt | sort cat file.txt > sort

cat file.txt > sort The sort command cannot have input redirected to it. The cat file.txt > sort command will copy the contents of the file.txt file into a new file named sort.

Which of the following is the proper use of the grep command using regular expressions to isolate words at the end of a line or on a single line that have the 'arch' ending in their names? cat file.txt | grep arch cat file.txt | grep \arch cat file.txt | grep 'arch$' cat file.txt | grep [arch]

cat file.txt | grep 'arch$' The cat file.txt | grep 'arch$' command is the correct one to isolate lines or words with the arch ending in their names or words that end in 'arch' that occur at the end of a line. The cat file.txt | grep [arch] command will return any file with one of the letters a, r, c, or h in it. The cat file.txt | grep arch command is a standard grep for a string that returns any line with the 'arch' pattern anywhere in the line. The cat file.txt |grep \arch command returns any line with the 'arch' pattern in it.

Which of the following commands displays the contents of a file (file.txt) as output and then uses that output as input for a command that searches for a pattern (one) in that file and outputs the result? set file.txt | cat one cat file.txt | grep one echo file.txt | cat one cat file.txt | rm one

cat file.txt | grep one (The correct command is: cat file.txt |grep one.)

Which command changes the permissions for a file or a directory? chdir chown chgrp chmod

chmod The chmod command changes the permissions for a file or a directory. The chown command changes file or directory ownership. The chgrp command changes group ownership of a file or a directory. The chdir command changes directory and is more commonly issued as 'cd'.

How does an administrator set the sticky bit on a folder, named files, using the octal method? chmod 2755 files/ chmod 1755 files/ chmod 6755 files/ chmod 4755 files/

chmod 1755 files/ Use chmod 1755 files/. 4755 is Set User ID (SUID). 2755 is Globally Unique Identifier (GUID), and 6755 sets both SUID and GUID.

Which command assigns the sticky bit to the apps folder? chmod o+s apps/ chmod o-s apps/ chmod o+t apps/ chmod o-t apps/

chmod o+t apps/ The command is: chmod o+t apps/. You have to add (+) the sticky bit, and the sticky bit is set to other. Placing the Set User ID (SUID) on other does not work because it is the wrong permission location.

Which cp command copies the /etc/passwd file to a backup location (/opt/bkup) only if the source is newer than the backup? cp -b /etc/passwd /opt/bkup cp -R /etc/passwd /opt/bkup cp -u /etc/passwd /opt/bkup cp /etc/passwd /opt/bkup

cp -u /etc/passwd /opt/bkup The cp -u /etc/passwd /opt/bkup command will copy the passwd file to /opt/bkup, but will not do so again until the original /etc/passwd file has been changed, regardless of how many times it is run. The cp /etc/passwd /opt/bkup command copies and overwrites the /opt/bkup/passwd file each time it is run. For this example, the -R option performs the same function as no option because there are no files or directories other than the passwd file to copy. The cp -b command creates a backup of the passwd file in each directory specified—in this example, the cp -b command creates /etc/passwd~ and /opt/bkup/passwd~.

Which of the following is the correct syntax to duplicate a file in the same directory? file file1.txt file2.txt cp file1.txt file2.txt mv file1.txt file2.txt COPY file1.txt file2.txt

cp file1.txt file2.txt The cp file1.txt file2.txt command is the correct command to duplicate a file. COPY is the DOS/Windows command line copy command. The file command describes the type of file. The mv command in this example renames the file.

Which of the following is NOT a correct method of using cpio? ls *.txt | cpio -ov > /opt/bkup/backup_Monday.cpio find . -name "*.txt" | cpio -ov > /opt/bkup/backup_Monday.cpio cpio -idv < /opt/bkup/backup_Monday.cpio cpio -ov > /opt/bkup/backup_Monday.cpio

cpio -ov > /opt/bkup/backup_Monday.cpio The cpio -ov > /opt/bkup/backup_Monday.cpio command is the incorrect choice. The cpio command must have input piped to it when creating an archive. The command cpio -idv < /opt/bkup/backup_Monday.cpio is correct because this command extracts files from the archive.

Which of the following commands does an administrator use with the ps -ef command to extract only the user account names running processes on a system? pr split uniq cut

cut The cut command using the output from ps -ef as input is used to isolate columns and fields of data. The split command splits files into two equal parts. The uniq command filters repeated instances or lines in a file or stream. The pr command converts a text file into a printable format.

Which command deletes the current line and the line above it in vi? dd 2dd d- d$

d- The d- command deletes the current line and the line above it. The dd command deletes the current line. 2dd deletes the current and the next line. The d$ command deletes from the cursor to the end of the line.

Which command deletes from the current cursor position to the end of the file in vi? dG d) d- d$

dG The dG command deletes from the current cursor position to the end of the file. The d$ command deletes from the cursor to the end of the line. The d) command deletes to the end of the sentence. The d- command deletes the current and previous lines.

If a new administrator is unsure of which specific options to specify under <options> in /etc/fstab, what should the administrator enter in that section for a filesystem? standard defaults auto normal

defaults The administrator should use 'defaults' in the <options> section of /etc/fstab if unsure of which specific options to set for a filesystem. The defaults are: rw, suid, dev, exec, auto, nouser, async, and relatime. Placing 'auto' in this section means that the filesystem will be automounted. There are no standard or normal options.

How does a system administrator find packages selected for installation, but which for some reason have not been installed on a Debian system? dpkg --set-selections dpkg --compare-versions dpkg --clear-selections dpkg --yet-to-unpack

dpkg --yet-to-unpack (The dpkg --yet-to-unpack command searches for and finds packages that for some reason have not been installed. The dpkg --clear-selections command tells the system to set the requested state of every non-essential package to deinstall. The dpkg --compare-versions command compares version numbers of packages. The dpkg --set-selections command sets the package state on the command line.)

Which command does a system administrator use to list the contents of a package (for example, the openssl package)? dpkg -l openssl dpkg -L openssl dpkg openssl dpkg -p openssl

dpkg -L openssl (The dpkg -L openssl command lists the openssl package's contents. The dpkg -l openssl command views the installation status of the openssl package. The dpkg -p openssl command displays the version, dependencies, and integrity of the package. The dpkg openssl command displays the help information for dpkg.)

Which of the following is the correct command to install a downloaded software package (openssl.deb) onto a Debian system? dpkg -i openssl.deb rpm -i openssl.deb dpkg -L openssl.deb yum -i openssl.deb

dpkg -i openssl.deb (The dpkg -i openssl.deb command installs the openssl.deb package from a local directory. The dpkg -L openssl.deb command fails because specifying the DEB file name fails the command. The rpm -i command has the correct syntax, but not for a Debian package file. Yum does not install Debian files; it is a Red Hat Linux command.)

Which dpkg command displays the version, dependencies, and integrity of a software package (for example, openssl)? dpkg openssl dpkg -l openssl dpkg -S openssl dpkg -p openssl

dpkg -p openssl (The dpkg -p openssl command displays the version, dependencies, and integrity of the openssl package. The dpkg openssl command, without any switches, displays the dpkg help information. The dpkg -l command views the installation status. The dpkg -S command searches and displays packages that contain the name specified on the command line (openssl in this example).)

Which Debian package management utility is the archive manipulation tool? dpkg-deb deb rpm dpkg

dpkg-deb (The archive manipulation tool is dpkg-deb. The dpkg tool is the main package management program. Deb is not a command, but a package type—Debian packages are named with the .deb suffix. RPM is the Red Hat package manager query utility.)

Which of the following utilities does the system administrator of a Debian system use to extract DEB package contents and to display package information? dselect dpkg dpkg-split dpkg-deb

dpkg-deb (The dpkg-deb utility is used to extract DEB packages and to display package information. The dpkg utility is the main package management program. Dselect is a menu-driven front end for the dpkg utility. The dpkg-split utility splits packages up into smaller pieces so that they can fit onto limited-size media such as floppy disks.)

Which Debian package utility allows a system administrator to alter installed packages and specify options for those alterations? dpkg-reconfigure dpkg dpkg-split dpkg-deb

dpkg-reconfigure (The dpkg-reconfigure utility allows an administrator to reconfigure packages once they are installed and allows the administrator to specify certain options during reconfiguration. The dpkg utility is the main Debian package management program. The dpkg-split utility breaks packages up into smaller chunks for easy storage on small-capacity media. The dpkg-deb utility is the archive manipulation tool for the Debian package management system.)

Which of the Debian package management utilities would be the easiest to use for a new or junior-level system administrator for installing, configuring, and removing software packages? dpkg-reconfigure dselect dpkg dpkg-deb

dselect (The dselect utility is a command line, text-based menu system and is appropriate for new and junior-level system administrators. The dpkg, dpkg-deb, and dpkg-reconfigure utilities are all command line utilities that require switches and parameters to be passed to them and are not intuitive to use.)

How can a user find how many shell commands are kept in .bash_history? echo $HISTSIZE history echo .bash_history echo history

echo $HISTSIZE echo $HISTSIZE. The HISTSIZE environment variable holds the value for the number of commands that are kept in history. The history command displays all the commands in history. The echo .bash_history command will display the word .bash_history, and echo history will display the word history.

Which command does a user run to view the current PATH variable? echo $PATH $PATH echo PATH show PATH

echo $PATH (The correct method to show just the PATH variable is to use echo $PATH. $PATH by itself is not a command. The echo PATH command will echo only the word PATH. There is no show command in Linux.)

Which editor does an administrator use to edit the quota files? vi edquota nano emacs

edquota Since the quota files are binary and not directly editable, the administrator must use edquota to edit the files. No other listed editor can successfully edit the binary quota files.

Which command can a user run to view all of the user's shell environment variables? env uname echo $SHELL $SHELL

env The env command displays the user's shell environment variables. $SHELL is not a command, but is a shell variable. The echo $SHELL command displays the user's default shell. The uname command displays system information.

A user wants to remove all the tabs in a file and convert them to spaces, but to do so manually is time-consuming and tedious. Which command performs this function for the user? expand split paste fmt

expand The expand command converts tabs in a file to the equal number of spaces. The fmt command formats text to a specific width by filling empty lines for the file. The split command splits a file into two equally sized files. The paste command merges the lines of one or more files.

Which disk management tool prepares a disk for simple partitioning? pvcreate lvcreate fdisk vgcreate

fdisk (The fdisk command prepares the disk for simple partitioning. The pvcreate command prepares physical volumes to be used in logical volumes. The lvcreate command creates and names logical volumes. The vgcreate command creates and names volume groups.)

Which utility does an administrator use to create new partitions? mkfs swapon mkswap fdisk

fdisk The fdisk utility is used to create new disk partitions. The mkfs utility is used to create a filesystem. The swapon and mksiwap utilities have to do with activating and creating swap partitions.

An administrator sets up a new disk on an existing system. Which utilities, and in which order, does the administrator use to set up the new disk for use? mkfs, mount, fdisk mkfs, mkswap, fdisk, mount mount, fdisk, mkfs fdisk, mkfs, mount

fdisk, mkfs, mount The administrator first uses fdisk to set up the disk's partitions, then uses mkfs to create the filesystem(s), and finally uses mount to use the disk's partitions.

How does a user bring a background job (process) to the foreground? Ctrl+C Ctrl+Z fg %# bg %#

fg %# A user brings a process to the foreground by issuing the fg %# command, where # is the job number found from issuing the jobs command. Ctrl+Z suspends a job. Ctrl+C kills a job. Using bg %# will send a job to the background.

Which of the grep commands would find the line containing pa$$word in a file using pa$ as the expression to match? grep fgrep pgrep egrep

fgrep The fgrep command will find the word pa$$word in a file using pa$ as the pattern to match because it ignores regular expressions and uses the text as typed to match. The grep and egrep commands would only find a match if a word ended in pa$. The pgrep command is for processes, not files.

A user finds a file named file_backup on the system. How can the user determine which type of file it is, because it has no discernable extension or other identifier? ls | cpio -ov > file_backup find file_backup file file_backup dd file_backup

file file_backup The user should use the file file_backup command to determine what type of file it is. None of the other options will give any information about the type of file, and the ls | cpio command will overwrite the file as a cpio backup.

Which command do Linux users usually pipe input from when using xargs? ls cat find grep

find The output of the find command is used as a filter for xargs and then xargs is used to take some action, such as removing files, further filtering results, or to display results in a more convenient pattern.

A user created a document, but is unsure what they named it. They think the name is either "Heritage" or "heritage," but they also do not remember the extension or if it had one. Which command will find the file? locate [H,h]eritage find . -name "[H,h]eritage*" -print find . -name "H-heritage*" -print locate heritage

find . -name "[H,h]eritage*" -print The correct command to use is find. -name "[H,h]eritage*" -print. The find . -name "H-heritage*" -print command will find files named only H-heritage plus any suffix. The locate command uses regex filters, but only with the --regex option. The locate heritage command will only find the file heritage if it is named with a lowercase h.

Which find command would an administrator use to find every file on the system from /? find / find /*.* find -all / find ~/

find / The find / command will find every file on the system. There is no -all option for find. The find /*.* command will return an error that no such file as *.* exists. The find ~/ command finds every file under the root user's home directory, /root.

How does an administrator find all files owned by user bsmith? find / -user bsmith whereis bsmith which bsmith locate bsmith

find / -user bsmith The administrator uses find / -user bsmith. This command finds all files owned by bsmith. Locate will find files named bsmith only. Whereis bsmith attempts to find binaries, source, and man pages for a command. Which searches for executables in the PATH or in a specified directory.

Which of the following is the correct method for running the firefox application in the background? firefox sleep 100 ; firefox exec firefox firefox &

firefox & firefox &. The correct method for running a command in the background is to issue the command with an & following it. Issuing the command with no & places the command into the foreground. Using the exec firefox command would start firefox, but kill the user shell. Using sleep prior to a command delays the start of the command by a number of seconds, but does not place the command into the background unless the command is followed by an &.

How does a user display the amount of free memory on a system in megabytes? free -b free -m free -M free -V

free -m The free -m command displays the amount of free memory in megabytes. The -M option is not a functional option. The -b option displays free memory in bytes. The -V option displays the free version.

Which command and option does a user issue to display the amount of free memory on a system continuously and refresh after a specific number of seconds (five)? free -l 5 free -t 5 free -b 5 free -s 5

free -s 5 The free -s 5 command displays the amount of free memory updated every five seconds. None of the other options use the numeric input.

Which of the following is the correct syntax for using fsck? fsck -t {filesystem type} * [options} fsck -t {filesystem type} filesystem [options] fsck /dev/sd* -y fsck {filesystem type} [options]

fsck -t {filesystem type} filesystem [options] The correct syntax for the fsck command is: fsck -t {filesystem type} filesystem [options], but many system administrators simply run: fsck filesystem, such as fsck /dev/sda1.

Which command does the system administrator use to reinstall GRand Unified Bootloader (GRUB)? grub2-install grub2-install /dev/sda grub2-install /mbr grub2-install sda

grub2-install /dev/sda (To reinstall GRUB, the system administrator uses the grub2-install /dev/sda command, where /dev/sda is the system's primary disk that is also bootable. Using grub2-install by itself, /mbr, and with sda only are the incorrect syntaxes for grub2-install. There is no /mbr option.)

Which command does a system administrator issue to generate a Password-Based Key Derivation Function 2 (PBKDF2) encrypted password for GRand Unified Bootloader (GRUB)? grub2-mkpasswd -pbkdf2 -1024 grub2-mkpasswd -pbkdf2 -rsa1024 grub2-mkpasswd-pbkdf2 -rsa 1024 grub2-mkpasswd-pbkdf2

grub2-mkpasswd-pbkdf2 (To set up a PBKDF2 encrypted password for GRUB, enter grub2-mkpasswd-pbkdf2. The command is interactive and will prompt twice for the password to encrypt.)

Which of the following commands is the equivalent of the gunzip files.tar.gz command? gzip -d files.tar.gz tar zxvf files.tar.gz find . files.tar.gz -print ls | cpio -ov > files.tar.gz

gzip -d files.tar.gz The gunzip files.tar.gz command uncompresses the files.tar.gz file and renames it as files.tar. The equivalent command is gzip -d files.tar.gz. The gzip command compresses and uncompresses. It uncompresses with the -d (decompress) option. The tar command, tar zxvf files.tar.gz, will uncompress and untar (unarchive) the files back to the original files before archiving. The find command will locate the files.tar.gz file. The ls | cpio command will create a cpio archive named files.tar.gz; however, it cannot be uncompressed using gzip/gunzip because it is not the correct format.

Identify the match for the regular expression: 'g$' gigantic hag golf bigger

hag The 'g$' regular expression will match any word that ends with the letter g. $ is the end of the word or line regular expression character.

If /dev/sda1 is the bootable partition, how does GRand Unified Bootloader (GRUB) (Legacy or 2) identify the disk /dev/sda? sda1 disk1 sdaX hd0

hd0 (GRUB Legacy and GRUB 2 identify /dev/sda as hd0. This is found in the /boot/grub2/device.map or the /boot/grub/device.map file.)

Which of the following GRand Unified Bootloader (GRUB) Legacy entries corresponds to the bootable partition /dev/sda1? sda1,0 /dev/hd0 hd0,0 disk0a

hd0,0 (The /dev/sda1 is the first partition of the first disk and is assumed to be bootable. It corresponds to hd0,0. The hd0 entry is the first hard disk (0) and the partition number (0) is the first partition.)

Which command allows a user to view the first 10 lines of a file? tail uniq cat head

head The head command displays, by default, the first 10 lines of a file. Tail displays the last 10 lines of a file. The uniq command filters out repeated lines in a file. The cat command displays the entire contents of a file.

How does a user remove all command history? echo > .bash_history history -c rm .bash_history history -d *

history -c To successfully remove all command history, the user issues the history -c command. Using echo > .bash_history and rm .bash_history removes the history file's contents and the file respectively, but all the command history in memory is written to the file upon logout, including the attempts to remove the file and its contents. The history -d * has no effect, because the history command has no wildcard offset.

Which command does a user execute to delete the exit command out of the command history from the history command output below? 1 ls -la 2 ps -ef |more 3 who 4 history 5 rm file.txt 6 touch newfile 7 exit 8 logout history -remove exit del history | 7 history -d 7 rm history | exit

history -d 7 The command history -d 7 will remove the exit command from history. To remove a specific command, use the command's corresponding history position offset.

What type of information does the regular expression '^http(s?):\/\/.*' match? http or https web addresses http web addresses only Password-protected https web addresses https web addresses only

http or https web addresses The regular expression 'http(s?):\/\/.*' matches http or https web addresses.

An administrator can limit the number of files a user can store on a system using quotas by changing which parameter? soft limit blocks hard limit inodes

inodes By limiting the number of inodes, the administrator also limits the number of files a user can store because for every file, there is one inode. Blocks limits the amount of space the user can consume. The hard and soft limits have to do with reaching space limits.

A user has three jobs running in the background. From the jobs table, how does the user terminate the xclock process? [1] Running xclock & [2]- Running firefox & [3]+ Running xterm & terminate xclock kill %1 Ctrl+C kill xclock

kill %1 The kill %1 command will terminate the xclock process. There is no terminate command. The kill xclock command will not work, because the user has not specified a process ID (PID) or job number. Ctrl+C terminates foreground processes only.

Which command properly stops a particular process with a process ID (PID) of 1234? kill -9 1234 kill -HUP 1234 kill -15 1234 kill -SIGKILL 1234

kill -15 1234 (The kill -15 1234 command and kill -SIGTERM command are gentle kills in that they allow the process to terminate normally without losing or corrupting data. The kill -9 and kill -SIGKILL commands are both harsh kill command signals and should be used only when other kill commands do not work. The kill -HUP command is a hangup or restart command and does not terminate the process except momentarily to restart it.)

Which command allows a user to name the command to terminate rather than using a process ID (PID)? killall free kill nohup

killall The killall command allows a user to use the command name rather than the PID to terminate a process. The kill command requires a PID. The nohup command is the opposite of kill, as it keeps a command running even after a user has logged out. The free command reports the amount of free memory.

How does a user kill a process, for example, firefox, with the killall command? ps -ef |grep firefox | killall 2647 killall -9 2647 killall firefox killall 2647 (The firefox process ID)

killall firefox killall firefox. For killall to work correctly, all a user needs is to issue killall and the name of the process. The killall command cannot use the process ID.

Which command, used for testing, does a system administrator run to process the library locations on the command line but not update the cache, and without processing the default library locations? ldd -p ldconfig -n ldd -n ldconfig -p

ldconfig -n (The ldconfig -n command will process the library locations on the command line without updating the cache or processing the default library locations. This method is used for testing new libraries without providing default support through already existing libraries. The ldd commands do nothing. The ldconfig -p command displays the lists of directories and candidate libraries stored in cache.)

Which of the following commands allows a system administrator to search for a specific library entry related to openssl in cache? rpm -qa |grep openssl which openssl ldconfig -p | grep openssl ldd /usr/bin/openssl

ldconfig -p | grep openssl (The ldconfig -p | grep openssl command searches through the shared library cache and prints those libraries whose names contain openssl in them. The rpm command lists all installed rpm packages named openssl. The which command displays the location of the executable file. The ldd command displays a list of all loaded shared libraries associated with the executable file.)

Which of the following is an example of the correct format for a shared library file name? libc.so.6 sda5 twain_32.dll tty20

libc.so.6 (The libc.so.6 file is an actual shared library file found on Linux systems. The tty20 file is a special device file for a terminal connection. The sda5 file is a special device file that refers to a partition on a hard disk. The twain_32.dll file is a Windows dynamically linked library file that is analogous to a Linux shared library file.)

Which command does a user issue to create a hard link from file.txt to list.txt? ln -s list.txt file.txt ln list.txt file.txt ln -f list.txt file.txt ln -s file.txt list.txt

ln list.txt file.txt The user issues the ln list.txt file.txt command. The syntax is: ln {target} {link name}. ln -s creates a symbolic link. The ln -f command removes existing destination files.

Which utility would a user use to quickly find a file if they cannot remember the entire file name? mlocate locate ls -lR retrieve

locate The locate command is very fast, but it searches on strings only. If a user wants to see all possibilities for a file of which they cannot remember the entire name, locate is a good choice. There are no mlocate or retrieve commands. The ls -lR is one method, but it is not fast and it has to search through every mounted filesystem, which can cause performance problems with other applications.

How does a user limit the number of search results from a locate search to 10 results? locate *.txt -filter 10 locate *.txt -i 10 locate *.txt | ls -10 locate *.txt -n 10

locate *.txt -n 10 The correct command is: locate *.txt -n 10. There is no -filter option. Piping to ls with a -10 option gives an error. The locate command with the -i option does not limit the results returned.

Which of the following ls commands allows a user to display all files, even hidden ones? ls ls -a ls -s ls -r

ls -a The ls -a command displays all files in the specified directory, even hidden ones. The ls command with no options shows all files except hidden ones. The ls -r command displays the file list in reverse alphabetical order. The ls -s command displays files by file size and displays the file size.

A user wants to create a list of every file in their home directory and save it to a file named homefiles.txt. Which of the following commands accomplishes this? ls > homefiles.txt locate * > homefiles.txt ls -la * > homefiles.txt ls -aR > homefiles.txt

ls -aR > homefiles.txt The command that creates a complete list of all files in the user's home directory and saves it to the homefiles.txt file is: ls -aR > homefiles.txt. The -a option lists all files, and the -R option lists files recursively. The ls -la command will list files in the current directory only. The ls command will list non-hidden files only. The locate command will list every file in the mlocate database that the user has access to.

Which ls command produced the following output? -rw-r--r-- 1 root root 3042 Feb 16 20:47 passwd ls -s ls -a ls -l ls -r

ls -l The ls -l command provides the user with a long listing of directory contents displaying permissions, file name, file ownership, size, and last modified date and time. The ls -a command displays a list of all files, including hidden ones. The ls -s command displays a list of files by size and with file sizes. The ls -r command lists files in reverse alphabetical order.

Which ls command displays a list of files in the reverse order of when they were last modified? In other words, how does a user list files with the most recently changed files at the bottom of the list? ls -lt ls -r ls -t ls -ltr

ls -ltr The ls -ltr command provides a long list, by modification time, in reverse order. The ls -r command lists files in reverse alphabetical order. The ls -lt command displays a long list sorted by modification time, newest first. And ls -t just displays the list by modification time, newest first.

Which of the following is NOT an acceptable method of using multiple pipes with the grep utility? ls /etc/passwd | grep bash | grep -i fred cat /etc/passwd | grep bash | grep -i fred grep bash < /etc/passwd | grep -i fred grep bash /etc/passwd |grep -i fred

ls /etc/passwd | grep bash | grep -i fred The incorrect command is: ls /etc/passwd | grep bash | grep -i fred.

Duplicate the functionality of the following tee command by using only the ls command. ls | tee files.txt ls < files.txt ; ls files.txt ls files.txt ; ls > files.txt ls > files.txt ; ls ls | ls > files.txt

ls > files.txt ; ls The ls > files.txt ; ls command duplicates the ls | tee files.txt command's output. The ls files.txt command will only display the files.txt file if it exists; otherwise, an error is displayed. The ls | ls > files.txt command gives no output to the screen.

Which of the following ls commands will redirect standard output (stdout) to a file and standard error (stderr) to the same file, logfile.txt, such that the administrator can keep a log of which files do and which files do not exist? ls FY2011.txt >> logfile.txt 2>> logfile.txt ls FY2011.txt > logfile.txt 2> logfile.txt ls FY2011.txt 1> logfile.txt 2> logfile.txt ls FY2011.txt >> logfile.txt ; ls FY2011.txt 2> logfile.txt

ls FY2011.txt >> logfile.txt 2>> logfile.txt The ls FY2011.txt >> logfile.txt 2>> logfile.txt command is the correct option because it uses >> (append) for both redirects of stdout and for stderr. All the other options use a single > (create/overwrite) option.

Which of the following creates the cpio archive, files.cpio, from a list of files? cpio -ov *.txt > /opt/bkup/files.cpio cpio -ov * >> /opt/bkup/files.cpio cpio -ov > /opt/bkup/files.cpio ls | cpio -ov > /opt/bkup/files.cpio

ls | cpio -ov > /opt/bkup/files.cpio ls | cpio -ov > /opt/bkup/files.cpio. The cpio command creates archives by having some file listing piped to it. There are several methods of generating output from which to pipe into cpio, but typically ls or find are used to generate the list of files for its input. None of the other options have input piped into cpio; therefore, none of them work.

When a user searches for a command, ls for example, using whereis, which of the following is the response from the system? ls: /bin/ls Found 1 entry: /bin/ls ls: /bin/ls /usr/share/man/man1p/ls.1p.gz /usr/share/man/man1/ls.1.gz /bin/ls

ls: /bin/ls /usr/share/man/man1p/ls.1p.gz /usr/share/man/man1/ls.1.gz The whereis command returns: ls: /bin/ls /usr/share/man/man1p/ls.1p.gz /usr/share/man/man1/ls.1.gz. It returns the command location and the man page locations for the command.

What information is in the files.txt file if a user issues the following command and the files do not exist? ls FY2014.txt 2> files.txt ; ls FY2015.txt 2> files.txt ; ls FY2016.txt 2> files.txt ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2015.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2015.txt: No such file or directory. The files.txt file is empty. ls: cannot access FY2016.txt: No such file or directory.

ls: cannot access FY2016.txt: No such file or directory. The only entry in the files.txt file is: ls: cannot access FY2016.txt: No such file or directory. The reason is that the user used 2>, which overwrites the files.txt file every time the user issues the command.

What information is in the files.txt file if a user issues the following command and the files do not exist? ls FY2014.txt 2> files.txt ; ls FY2015.txt 2>> files.txt ; ls FY2016.txt 2>> files.txt ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. ls: cannot access FY2015.txt: No such file or directory. ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory.

ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2015.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. The correct answer is: ls: cannot access FY2016.txt: No such file or directory. ls: cannot access FY2015.txt: No such file or directory. ls: cannot access FY2014.txt: No such file or directory. All three ls command error outputs are sent to the files.txt file because the initial ls used 2>, which creates or overwrites the files.txt file, and the subsequent ls commands use 2>>, which appends their error output to the files.txt file.

A user attempts to list the file FiscalYear2015.txt with the command ls FiscalYear2015.txt 2> files.txt. The user receives no output on the screen. What information is in the files.txt file?

ls: cannot access FiscalYear2015.txt: No such file or directory. The output from standard error (stderr), ls: cannot access FiscalYear2015.txt: No such file or directory, was redirected into the files.txt file by the command. The file does not exist and therefore there is no standard output (stdout) to display.

A user attempts to list the file FiscalYear2015.txt with the command ls FiscalYear2015.txt 2> files.txt. The user receives no output on the screen. What information is in the files.txt file? ls: cannot access FiscalYear2015.txt: No such file or directory. The files.txt file is empty. FiscalYear2015.txt A complete directory listing except for the FiscalYear2015.txt file

ls: cannot access FiscalYear2015.txt: No such file or directory. The output from standard error (stderr), ls: cannot access FiscalYear2015.txt: No such file or directory, was redirected into the files.txt file by the command. The file does not exist and therefore there is no standard output (stdout) to display.

Which Logical Volume Manager (LVM) tool creates and names logical volumes? fdisk pvcreate vgcreate lvcreate

lvcreate (The lvcreate command creates and names logical volumes. The vgcreate command creates and names volume groups. The pvcreate command prepares physical volumes to be used in logical volumes. The fdiisk command prepares the disk for simple partitioning.)

How does a user execute a command that is in the user's path, for example the /usr/bin/lynx command? lynx ./lynx man lynx echo lynx

lynx The user enters the lynx command without any pathing. The ./lynx command will not work, because lynx is not in the user's current directory. The man lynx command opens the man page for lynx, but will not execute the lynx application. The echo lynx command will only display the word lynx.

A user wants to mail themselves the contents of a file they created on their Linux system. Which of the following commands accomplishes this task? tr file.txt |mail [email protected] mail [email protected] < file.txt mail file.txt > [email protected] fmt file.txt > mail [email protected]

mail [email protected] < file.txt To mail the contents of any text file on the system that the user has access to, use: mail [email protected] < file.txt.

Which man command option formats a man page so that it enables printing? man -p man -t man -lpd man -d

man -t The man -t option formats a man page so that it looks correct when printed. The man -p option specifies the sequence of preprocessors to run. The man -d option displays debugging information. There is no -lpd option for man pages.

Which command does a user enter if the user needs help with the sudo command? export sudo sudo /? help sudo man sudo

man sudo To get help with sudo, the user enters man sudo. The general form is: man command. Using help sudo will give an error, as will sudo /?, which is the DOS/Windows method of accessing command help. Typing export sudo will set the word sudo as an exported variable.

The mke2fs utility is a more specific version of which other utility? mkfs fsck tune2fs e2fsck

mkfs (The mke2fs utility is a more specific version of the mkfs utility that can create second extended filesystem (ext2), third extended filesystem (ext3), and fourth extended filesystem (ext4) filesystems only)

Which command creates a filesystem suitable as swap space? swaplabel swapon mkswap mkfs.swap

mkswap The mkswap command creates swap space. There is no mkfs.swap command. The swapon command activates the swap space after it has been created with mkswap. The swaplabel command changes the Universally Unique Identifier (UUID) of swap space.

What is the name of the locate database? locate.db updatedb dblocate mlocate.db

mlocate.db The mlocate.db is the locate database. The command that builds and updates the mlocate.db file is updatedb. There are no files named dblocate or locate.db.

Which mount option prevents an entry being made into the /etc/mtab file? mount -a mount -V mount -n mount -f

mount -n The mount -n option prevents an entry being made into the /etc/mtab file. The mount -a option mounts all filesystems. The mount -f option fakes a mounting of a filesystem. The mount -V option displays the version information for mount.

Which command successfully moves an entire directory and its contents to another directory? mv -i dir1 dir2 mv -v dir1 dir2 mv dir1 dir2 mv -v dir1 dir2 ; rm dir1

mv dir1 dir2 The mv dir1 dir2 command moves dir1 into the dir2 directory. The -i option is interactive and will prompt for any overwrites. The -v option means verbose, which shows the user that the directory was moved. The option that includes rm dir1 is not necessary, because the mv command performs this function for the user.

Which of the following is the correct naming convention for RPM Package Manager (RPM) software packages? name-release-version-architecture.rpm name-version-release.architecture.rpm name-architecture-version-release.rpm name.version.release.archtecture.rpm

name-version-release.architecture.rpm (The naming convention for RPM software packages is name-version-release.architecture.rpm.)

Which of the following nice commands does NOT change the execution priority of the test.sh command to a value of 10? nice --10 test.sh nice -n 10 test.sh nice -10 test.sh nice --adjustment=10 test.sh

nice --10 test.sh The option --10 raises the priority to -10, whereas the other options lower the priority to 10.

Which of the following is the correct syntax usage of the nice command to set a specific priority on a user script, ping_network.sh? ./ping_network.sh > nice -10 nice -10 | ping_network.sh nice -10 ./ping_network.sh ./ping_network.sh nice -10

nice -10 ./ping_network.sh The correct syntax for the nice command is: nice -10 ./ping_network.sh.

What is the output of the command sed s/two/nine/ numbers.txt on the contents of numbers.txt below? numbers.txt: one two three one /two/nine/ three one two nine three nine one two three one nine three

one nine three The command sed s/two/nine/ numbers.txt replaces all instances of the string two with the string nine.

A user has a file, list.txt, with the following contents: one one two three four four five If the user cats the file and passes it through uniq (cat list.txt | uniq), what will be the output? one two three four five one four one one four four two three five

one two three four five The uniq command filters out all repeated lines; therefore, the duplicate one and duplicate four would be removed to give the following as output: one two three four five

Which of the following is NOT a method for isolating a single process on a system? ps -p 6847 ps -e ps -C mysqld ps -ef | grep 6847

ps -e The ps -e command lists every command currently running on the system. It is not a method of isolating a single process.

How does a user display the process table for all users on a system? ps -af ps ps -ef ps -a

ps -ef The ps -ef command displays all processes in full format. This is the standard method of displaying the process table. The ps, ps -a, and ps -af commands show processes triggered only by the user who issues the ps command.

Which of the following ps commands provides all user processes, user names, start times, and processes without a terminal associated with them? Hint: This is a very common ps command with options on all Linux and UNIX-like operating systems. ps -ef ps -T ps -u ps aux

ps aux The ps aux command is a comprehensive ps command with options that provide for all user processes, user names, start times, and processes without a terminal. The ps -ef command lists all processes with full format details. The ps -T command excludes processes that were started by any terminal other than the current one. The ps -u command lists processes with the current user and start times.

Which Logical Volume Manager (LVM) tool prepares physical volumes to be used in logical volumes? pvcreate fdisk lvcreate vgcreate

pvcreate (The pvcreate command prepares physical volumes to be used in logical volumes. The lvcreate command creates and names logical volumes. The vgcreate command creates and names volume groups. The fdisk command prepares the disk for simple partitioning.)

How does a user run multiple commands on a single line, for example, run pwd and then run uname on the same line? pwd | uname pwd : uname pwd, uname pwd ; uname

pwd ; uname The proper method of executing multiple separate commands on a single line is: pwd ; uname. Separate the commands using a semicolon. The | operator will not work, because pwd's output is incorrect for uname input and uname accepts no input. Neither the colon nor the comma is a proper command line operator.

What are the three basic permissions for Linux files and directories? user, group, and other read, write, and execute special, character, and block file, folder, and filesystem

read, write, and execute The three basic permissions are read, write, and execute.

Which command does an administrator use to change the priority of a running process? renice chage nice ps

renice The renice command changes the priority of a process. The ps command lists processes. The chage command changes a user's password expiration. The nice command alters the priority of a program at launch, but not while it is running.

Which command removes all files and directories under the current directory? rm *.* rm * rm .* rm -rf *

rm -rf * The rm -rf * command removes all files and directories in the current directory. This is an extremely dangerous command to run, especially for the root user, and its effects are irreversible. The rm * and rm *.* commands remove all visible files but not directories or hidden files in the current directory. The rm .* command removes all hidden files in the current directory.

Which command does a system administrator issue to list all packages installed on a Red Hat or Red Hat-based system? rpm -qa rpm -qp rpm rpm -qc

rpm -qa (The rpm -qa command (with no arguments) lists all installed packages. The rpm -qc command without arguments yields no results, but with a package name, it lists that package's configuration files. Issuing the rpm command by itself displays the rpm command's help information. The rpm -qp command with no arguments yields no results, but supplying a package name or partial package name displays all packages that start with the provided text.)

A system administrator finds what seems to be a stray file (/etc/lynx.lss) on the file system and wants to know which package the file belongs to. Which command does the system administrator run to find which package this file belongs to? rpm -qa /etc/lynx.lss rpm -qf /etc/lynx.lss file /etc/lynx.lss yum info /etc/lynx.lss

rpm -qf /etc/lynx.lss (The rpm -qf /etc/lynx.lss displays the rpm from which the file came. The rpm -qa /etc/lynx.lss command gives an error, as does yum info /etc/lynx.lss. The command file /etc/lynx.lss identifies which type of file it is, but does not provide information about which package the file came from.)

Which rpm command does a system administrator use to find the installed locations (directories) of files in a package (for example, openssl)? rpm -qc openssl rpm -ql openssl rpm -qpl openssl rpm -qa openssl

rpm -ql openssl (The rpm -ql openssl command displays all files in the installed package and their installed locations. The rpm -qc openssl command lists the configuration files for openssl. The rpm -qa openssl command displays the openssl package only. The rpm -qpl openssl command will display an error if the package is installed; if the package is not installed, then the command displays the files in the package.)

How does a system administrator list all files contained in an installed package (for example, openssl) on an RPM Package Manager (RPM)-based system? rpm -ql openssl rpm -qc openssl rpm -qR openssl rpm -qa openssl

rpm -ql openssl (The rpm -ql openssl command lists all files in a package. The rpm -qa openssl command displays the openssl package that is installed. The rpm -qR openssl command lists the package's dependencies. The rpm -qc openssl command lists the package's configuration files.)

Which RPM Package Manager (RPM) utility does a system administrator use to extract individual files from an RPM package? rpm2cpio rpm yum yumdownloader

rpm2cpio (The rpm2cpio utility allows an administrator to extract files from an RPM package. The rpm command installs and removes RPM packages. Yellowdog Updater, Modified (YUM) is the front-end installer for RPM. The yumdownloader utility allows administrators to download RPM packages from yum repositories.)

Which of the following is the default option for mounting a filesystem? uuid verbose rw ro

rw The default mount option is read/write, or rw.

To use a mounted filesystem as storage, which option must be enabled? noexec auto ro rw

rw To use a mounted filesystem as storage, the rw (read/write) option must be enabled. The ro (read only) option only allows read access, but no write. The noexec option means that no executables can be run from this filesystem. The auto option means that the filesystem will be mounted automatically.

Which mount options would be appropriate for a filesystem to be used securely as file storage that users may write to, but not run applications from? ro,noexec,nouser rw,exec,user rw,noexec,async ro,exec,user

rw,noexec,async Use rw,noexec,async. The more secure setting for a storage filesystem that users can write to is noexec, but also requires rw and should be set to async so that multiple users can read and write to the filesystem with the best performance. A noexec setting means that executable programs cannot be run from this filesystem. A read-only filesystem is not useful as a user storage location. The exec setting lowers the security on a filesystem. The user setting also lowers security in that users can mount or unmount a filesystem.

The original permission on a file is rwx rwx r-x. If an administrator issues the chmod o-x command, what is the new permission for the file? rwx rwx r-- rw- rwx r-x rw- rw- r-- rwx rw- r-x

rwx rwx r-- The new permission is rwx rwx r--, because the chmod o-x removes the execute permission (x) from other.

Which of the following is known as the stream editor command? fmt sed split vi

sed Sed is the streams editor command. Vi is the visual editor. Split is a command that splits files into two equal parts. Fmt formats text to a specific width.

Which command allows a user to edit a file without opening the file with an interactive editor program? grep sed egrep fgrep

sed The sed command is the stream editor and it allows a user to edit files without opening them in an editor. The grep commands only search for strings, but cannot edit.

If the regular expression to convert lowercase letters to uppercase is: sed 's/./\U&/g' file.txt, then what is the regular expression for converting uppercase letters to lowercase letters using the sed command? sed 's/./\L&/g' file.txt sed 's/./[:lower:]/g' file.txt sed 's/./\u&/g' file.txt sed 's/./[A-Z]/g' file.txt

sed 's/./\L&/g' file.txt The sed 's/./\L&/g' file.txt command converts all uppercase letters to lowercase in file.txt. The sed 's/./\u/g' file.txt command converts all lowercase letters to uppercase the same as \U. The other options replace letters with the substitution string.

A user has a list of topics in a file and wants to be sure that all topics begin with capital letters. Which of the following commands can accomplish this task? sed -re 'y/^[a-z]/[A-Z]/' file.txt sed -e 's/^[a-z]/[A-Z]/' file.txt sed -re 's/^./\U&/' file.txt sed -re 'y/^[a-z]/[:upper:]/' file.txt

sed -re 's/^./\U&/' file.txt The sed -re 's/^./\U&/' file.txt command will convert all first letters to uppercase on each line. The other options attempt to replace the first match with the literal second argument.

Which command will break the file processes.txt, containing 182 lines of text, into four files? split -l 50 processes.txt split -l 25 processes.txt split -l 91 processes.txt split -l 4 processes.txt

split -l 50 processes.txt The split -l 50 processes.txt command will split the processes.txt file into four files, splitting at 50 lines. The -l option tells the split command how many lines maximum should be in each file split. Three files will have 50 lines, and the fourth file will have 42 lines. The -l 4 option will split the file into 46 files, the -l 25 option will split the file into eight files, and the -l 91 option splits the file into two files. previous

Which apt-cache command option displays overall statistics about the cache? show stats pkgnames showpkg

stats (The stats option displays an extensive listing of statistics about the cache. The show option displays extensive information about a package. The showpkg option displays dependency information about a package. The pkgnames option displays all package names that begin with the word provided.)

Which debugfs option displays filesystem information? ffb open stats close

stats The debugfs stats option displays filesystem information. The open option opens the filesystem for interactive debugging. The close option closes the interactive debug session. The ffb option finds a free block during the interactive debug session.

An administrator wants to find the most recent errors in a log file. Which command allows the administrator to do this? wc head tail od

tail The tail command shows the most recent additions to a file that are always appended at the end of the file. The head command shows the first (oldest) entries in a file, which does not help the administrator identify the most recent errors. The wc command is a word count command and does not display the lines themselves. The od, or octal dump, file displays the contents of a file after it has been converted to octal format, which is not helpful to the administrator.

Which of the following is NOT a method of finding the number of lines in a file, list.txt? tail list.txt cat list.txt | wc -l nl list.txt wc list.txt

tail list.txt The tail list.txt command displays the last 10 lines of the file, but does not give the user any indication of the number of lines in the file.

Which command combines files in such a way that they are packaged into a single file for convenient archiving purposes? tar find file cat

tar The tar, or tape archive, command collects a defined group of files and places them into a single file that makes it easy to transfer and archive those files. The cat command displays the contents of a file. The file command identifies the type of file. The find command locates a file or files based on search criteria.

A user receives a file named documents.tar.gz and asks a system administrator to help open the file to extract the individual documents from it. Which command does the administrator use to do this? gunzip -d documents.tar.gz unexpand -a documents.tar.gz expand -i documents.tar.gz tar zxvf documents.tar.gz

tar zxvf documents.tar.gz For documents.tar.gz, which is gzipped and tarred, use tar zxvf documents.tar.gz to extract the documents from the compressed archive. The gunzip command only uncompresses the file, but does not extract the documents from it. The expand and unexpand commands are for removing and adding TABs in a file and will not extract files from an archive.

Which command syntax does a system administrator use to reboot a system using the telinit command? telinit 6 telinit 5 telinit 0 telinit 1

telinit 6 (The telinit 6 syntax reboots a system, whereas telinit 0 halts a system, telinit 1 places the system into single user mode, and telinit 5 places the system into graphical user mode.)

Which of the following is NOT a method to terminate or kill a process? Ctrl+C terminate <PID> kill <PID> kill %#

terminate <PID> There is no terminate command in Linux.

Identify the match for the regular expression: '^t' best attention better testing

testing The word testing is the only match for '^t', because the caret character (^) matches the character or string at the beginning of the word or line.

Which option allows a user to see only a particular user's processes in top when starting the top program on the command line? top -d username top -u username top -n username top -p username

top -u username The top -u username command allows a user to see the processes specified by username. None of the other top command options work with username as a parameter.

Which of the following commands creates an empty file with the name file.txt? mkdir file.txt touch file.txt cp file.txt file file.txt

touch file.txt The touch file.txt command creates the empty file.txt file. The mkdir file.txt command creates a directory named file.txt. The file file.txt command identifies the type of file that file.txt is, if it exists. The cp file.txt command gives an error because there is no target.

How does a system administrator find the central processing unit (CPU) type for a running system? uname -r echo $PLATFORM uname -a echo $CPUTYPE

uname -a (The uname command prints system information based on a variety of options. The -a option prints all information, including the processor type, operating system, kernel name, and other information. The -p option would also print the processor type. The uname -r command will display the kernel release. No $CPUTYPE or $PLATFORM variables exist.)

How does a user clear a local variable, for example the variable $BLAH, from memory? unset BLAH kill BLAH unalias BLAH unlink BLAH

unset BLAH The command to clear a local variable is unset BLAH, using the general form: unset VAR. Do not use the variable $BLAH; it will not unset the variable. The kill command is for ending processes. The unalias command is to clear an alias. The unlink command removes a file.

How does a user change the value of the variable FOO from blah to blah2? unset FOO ; FOO=blah2 rm FOO ; FOO=blah2 export FOO as blah2 set blah2 = FOO

unset FOO ; FOO=blah2 The proper method of changing the variable FOO from blah to blah2 is: unset FOO ; FOO=blah2. The command rm is for removing files, not variables. Neither of the other options is a working command.

Which command displays the length of time a system has been running since the last reboot? free ps aux uptime screen

uptime The uptime command provides the length of time a system has been running since the last reboot. The free command displays free memory. The ps aux command displays a process table. Screen is a utility that multiplexes between several processes.

At the command line, how does a user open multiple files for editing with vi? vi file1.txt file2.txt file3.txt vi file1.txt | file2.txt | file3.txt vi file1.txt : file2.txt : file3.txt vi is only able to open one file at a time for editing.

vi file1.txt file2.txt file3.txt Execute vi at the command line and all the files to open with it: vi file1.txt file2.txt file3.txt.

Which of the following commands allows a user to navigate to the first letter of the next word in a sentence? ^ r b w

w The w command moves to the beginning of the next word. The b command moves to the beginning of the previous word. The r command replaces a character of text. The ^ moves to the beginning of the current line.

If a system administrator needs to kill or restart a particular application on a shared system, which command does the administrator use in order warn everyone on the system of the impending application shutdown? telinit wall mail shutdown

wall (The administrator uses the wall (write all) command to send a message to all users. Using mail will work, but is not a speedy method of sending messages to all users. The telinit command is not a method of sending messages. The shutdown command warns users of an impending system shutdown.)

What is the term generally used for describing permissions for other? service non-users web world

world The term is world. Unix and Linux administrators refer to other permissions as world, as in world readable or world writable.

Which of the following utilities does NOT require that the administrator first unmount the filesystem? tune2fs xfs_repair xfs_info fsck

xfs_info The xfs_info utility does NOT require that the filesystem be unmounted prior to use. In fact, the xfs_info utility requires that the filesystem must be mounted.

Which XFS utility copies the metadata information to a file? xfs_repair xfs_info xfs_db xfs_metadump

xfs_metadump (The xfs_metadump utility copies the metadata information from an XFS filesystem to a file. The xfs_info utility displays details about the XFS filesystem. The xfs_db utility is a debug utility. The xfs_repair utility is a filesystem check utility.)

Which utility do system administrators use to check and repair XFS filesystems? fsck mkfs.xfs xfs_repair mkswap

xfs_repair (The xfs_repair utility is specifically for checking and repairing XFS filesystems. Although one might be tempted to use fsck, XFS is different enough that its own specific tools should be used for its care and maintenance. The mkfs and mkswap utilities create filesystems but do not check them for integrity, nor do they have any repair functionality.)

Which of the following commands will download and install the lynx package? yum install lynx rpm install lynx yum -i lynx rpm -i lynx

yum install lynx (The yum install lynx command will download the lynx package and install it along with any dependency packages.)

How does a system administrator uninstall a package (for example, lynx) from a system that uses RPM Package Manager (RPM)? yum -e lynx yum uninstall lynx yum remove lynx yum erase lynx

yum remove lynx (An administrator uninstalls a package from an RPM-based system using the yum remove {package} command. For this example, yum remove lynx.)

Which of the following yum commands is equivalent to Debian's apt-get upgrade command? yum update yum check-update yum info yum list

yum update (The Debian apt-get upgrade command matches the yum update command that downloads and installs all available package updates. The yum check-update command only checks which packages have available updates. The yum info command displays a description of the specified package. The yum list command displays details of a specified package or lists the statuses of all packages on the system if a package name is not given.)

The yumdownloader utility is part of which package? rpm yum-utils yum rpmfind

yum-utils (The yumdownloader utility is part of the yum-utils package. The yum command is part of the yum package. The RPM Package Manager suite (RPM) also includes the rpm command. The rpmfind utility locates and downloads non-Red Hat rpm packages.)

Which command line operator accepts the output from one command and pipes it into the next command as input? | & ; !#

| The | (or pipe) takes output from one command and pipes it into the next command as input. For example, cat file.txt | wc -l. This command first displays the contents of file.txt and pipes that content into the wc (word count) command as input. The -l option gives the number of lines in the file.txt file.


Set pelajaran terkait

ECO 101 (Module 10 - Monopolistic Competition and Oligopoly)

View Set

SPRING AFROTC AS100 Final Study Guide

View Set

Renal Disorders/Dialysis & Peritoneal Dialysis NCLEX

View Set

Chapter 3: Variables, Data Types, and Arithmetic Expressions

View Set

International Relations Fall 2018

View Set

Combo with "Nclex Review: Hypertension" and 12 others

View Set