LPI Linux Essentials 010-160

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

64 bit platforms can access more memory than 32 bit platforms. A. True B. False

A

A GID is associated with a group name. A. True B. False

A

A __________ uses a one-way mathematical process with additional random input to produce what looks like nonsense to humans. A. salted hash B. password encryption C. firewall

A

A software release cycle describes: A. How often upgrades come out for software B. How often the software's memory is released back to the operating system C. How often the computer must be upgraded to support new software D. How often security fixes are implemented E. How often the computer must be rebooted

A

A source and a hard link must be part of the same filesystem. A. True B. False

A

A successful command may, or may not print output to STDOUT. A. True B. False

A

A user can belong to... A. At least 16 groups B. Only five groups C. Only groups with a GID over 500 D. Only one group

A

Bundling utilities, management tools, and application software with a Linux kernel is called a: A. A distribution of Linux B. A text editor C. A type of hardware D. A trademark

A

By convention, environment variable names are all uppercase. A. True B. False

A

Error messages generated by commands are sent where by default? A. STDERR B. STDIN C. Log files D. STDOUT

A

For non-root users, the passwd command can only be used to change the password of the user running the command. A. True B. False

A

GIDs under 500 (or 1000) are usually reserved for what kind of groups? A. System use B. Are not used for groups, but for user accounts C. Administrators D. User private groups (UPG)

A

Given a file called documents.zip, how can you extract just the files under ProjectX? A. unzip documents.zip ProjectX/* B. unzip documents.zip | grep ProjectX C. unzip documents.zip ProjectX D. zip -x documents.zip ProjectX E. unzip -t documents.zip ProjectX

A

HOME is an example of _________. A. An environment variable B. A path variable C. A local variable D. An internal command E. An alias

A

In order to rename the directory ~/documents/letters to ~/documents/archive, which of the following commands should be used? A. mv ~/documents/letters ~/documents/archive B. cp -m ~/documents/letters ~/documents/archive C. copy -m ~/documents/letters ~/documents/archive D. rename ~/documents/Ietters ~/documents/archive

A

Sudo privileges allow users to execute commands as another user. A. True B. False

A

The acronym CLI stands for: A. Command Line Interface B. Computer Link Interpreter C. Command Line Interpreter D. Computer Line Interface

A

The asterisk character is used to represent zero or more of any character in a filename. A. True B. False

A

The last command displays reboot records... A. By default B. Never C. Only when issued by the root user D. After restarting the system E. When issued with the -p switch

A

The main purpose of using glob characters is to be able to provide a list of filenames to a command. A. True B. False

A

The man command searches each of the sections in order until it finds a match. A. True B. False

A

What are the three sets of permission for a file? A. User, group, others B. Administrator, standard user, others C. User, standard user, others D. Administrator, group, others

A

What are two special permission bits exist, similar to the sticky bit? A. SUID and SGID B. UID and User C. Octal Code and Symbolic Code

A

What command can be used to find man pages that exist for a given command? A. whatis B. whereis C. whenis D. whois

A

What command should be used to display the permissions for every file in the current directory? A. ls -la B. dir -la C. Is -all D. dir -all

A

What does a distribution provide to add and remove software from the system? A. Package Manager B. Application Programming Interface (API) C. Partitioning tool D. Compiler E. Bash

A

What does the acronym FHS stand for among the the standards supported by the Linux Foundation? A. Filesystem Hierarchy Standard B. File Hierarchy Standard C. Filesystem Hierarchy Structure

A

When using the cp command, you must provide both a source and a destination. A. True B. False

A

Which of the following answers is true for cloud computing? A. Cloud Computing provides new tools to manage IT resources B. Cloud Computing means downsizing the IT department from a business perspective C. Cloud Computing is the opposite of green IT since green IT focuses on using regenerative energy for computing technologies D. Cloud Computing implies sharing all information with everyone else in 'the cloud'

A

Which of the following can be used to represent the letters A through Q using only lowercase letters? A. [a-q] B. [a-qA-Q] C. [A-Q] D. [a1 -q16]

A

A user cannot delete a file if they do not own it. A. True B. False

B

Only servers have hostnames. A. True B. False

B

The chown command can be used to change the user owner on a file by: A. The file owner B. Only root C. The file owner and root D. A user that belongs to the files current group

B

The free command outputs statistics about: A. CPU usage B. Software usage C. Memory usage D. Disk usage

C

Which of the following is a Linux based operating system for use on mobile devices? A. iOS B. CentOS C. Android D. Debian

C

Which of the following files contains group IDs? A. /etc/passwd B. /etc/usr C. /etc/shadow D. /etc/group

D

What is the UID of the user root? A. 1 B. -1 C. 255 D. 65536 E. 0

E

The process (ps) command shows only processes running in the current shell by default. A. True B. False

A

What is true about the owner of a file? A. Each file is owned by exactly one user and one group. B. The owner of a file always has full permissions when accessing the file. C. The user owning a file must be a member of the file's group. D. When a user is deleted, all files owned by the user disappear. E. The owner of a file cannot be changed once it is assigned to an owner.

A

What key do you press to quit reading a man page? A. Q B. X C. ALT + F4 D. ESC key

A

Which of the following commands is used to show the information about a directory or a symbolic link? A. ls -d B. ls -s C. ln -d D. ln -s

A

_________ is a placeholder for a value that will be determined when the script runs. A. Variable B. Script C. Pipeline command

A

In virtualization, what are the host and guest? (choose two) A. The host is the machine that runs the virtual machines B. The guest is the machine that runs the virtual machines C. The terms can be used interchangeably D. A host is a virtual machine E. A guest is a virtual machine

A, E

Open source means: (choose two) A. You can modify the software's source code B. You must share your changes C. You must support the software you share D. You cannot charge anything for the software E. You can view the software's source code

A, E

The two main families of Linux shells are: (choose two) A. Bourne Shell B. Python Shell C. Korn shell D. Emacs E. C Shell

A, E

What are the differences between hard disk drives and solid state disks? (Choose two.) A. Hard disks have a motor and moving parts, solid state disks do not. B. Hard disks can fail due to physical damage, while solid state disks cannot fail. C. Solid state disks can store many times as much data as hard disk drives. D. /dev/sda is a hard disk device while /dev/ssda is a solid state disk. E. Solid state disks provide faster access to stored data than hard disks.

A, E

Which are examples of permissive software licenses? (choose two) A. BSD B. LGPLv3 C. GPLv3 D. GPLv2 E. MIT

A, E

Which of the following programs are web servers? (Choose two.) A. Apache HTTPD B. Postfix C. Curl D. Dovecot E. NGINX

A, E

Which two programs use the Lempel-Ziv-Markov chain algorithm? (choose two) A. xz B. lossless C. lossy D. bzip E. gzip

A, E

A computer only requires a single piece of information to connect to a typical network (its IP address). A. True B. False

B

After installing a new package, in which directory are you most likely to find its configuration file? A. /conf B. /etc C. /usr D. /opt

B

The Samba application is a: A. Security Server B. File Server C. Mail Server D. Web Server

B

The _____ command can be used to find any file, not just commands or man pages. A. whatis B. locate C. whereis D. apropos

B

The if command looks for what exit code to consider a condition to be true? A. 1 B. 0 C. 2 D. 10 E. 255

B

The if command looks for what exit code to consider a condition to be true? A. 255 B. 0 C. 2 D. 1 E. 10

B

The largest difference between the GPLv2 and BSD licenses is: A. Nothing, they are virtually identical B. BSD has no copyleft provision C. GPLv2 requires assigning copyright to the FSF D. GPLv2 is not approved by the OSI E. Only BSD allows commercial use

B

The logging daemon on recent Linux distributions based on systemd is called: A. klogd B. journald C. rsyslogd D. syslogd

B

The ls command color codes results by default. A. True B. False

B

The ls command without options or arguments... A. ...prompts for a directory to list. B. ...lists the contents of the current directory. C. ...lists the contents of a user's home directory. D. ...generates an error as this command requires arguments.

B

The most common shell used for Linux distributions is the ________ shell. A. Fish B. Bash C. Tsch D. Zshv

B

The most popular Linux platform for mobile phones is: A. IOS B. Android C. BlackBerry D. Slackware E. MobileLinux

B

The permission string waxnrvxnw means _______________. A. Read permission for the owner, no permission for anybody else. B. Read, write, and execute permissions for all users. C. Read and write permissions for the owner. Read-only permission for all others.

B

The regular expression b[aeiou]g will match the words: A. bag, beg, big B. bag, beg, big, bog, bug C. baeioug

B

The statement that describes the difference between a man page and an info page is: A. The man page is like a guide; the info page is a more concise reference. B. The info page is like a guide; a man page is a more concise reference. C. The man page is a long detailed reference; the info page is very terse. D. There is very little difference between them.

B

The sticky bit can be set with the chown command in either of two ways: A. Kernel and Daemon B. Octal Code and Symbolic Code C. Parse and Compile

B

The superuser or administrator, is traditionally called _________ in Linux. A. Toor B. Root C. admin D. su

B

The two forms of commonly used regular expressions: basic and complicated. A. True B. False

B

The user owner of a file will always have the same or higher permissions as "other". A. True B. False

B

The user sysadmin will be able to read a file because they own it. A. True B. False

B

The way to code a script to end is by setting a return value or ___________. A. For loop B. Exit value C. Conditional expression

B

What does the grep command allow a user to do? A. Rename a file or directory B. Search for files that contain a specified string C. Repeat the previous command D. Move a file from one folder to another

B

What does the term GPL stand for? A. Great Programmers License B. General Public License C. Generic Public License D. General Private License

B

Which command copies the contents of the directory /etc/, including all sub-directories, to /root/? A. copy /etc /root B. cp -r /etc/* /root C. cp -v /etc/* /root D. rcp /etc/* /root E. cp -R /etc/*.* /root

B

Which command displays the list of groups to which a user belongs? A. isgroup B. id C. whoami D. who

B

Which command is used to display only the user's primary group? A. who B. id -g C. man D. whoami E. about

B

Which command is used to print the last 10 lines of a file to the display? A. cat B. tail C. head D. less

B

Which command is used to provide information about a user's identity, including the names of the groups that the user belongs to? A. cat /etc/groups B. id C. echo $UID D. cat /etc/passwd

B

Which command shows if /usr/bin is in the current shell search path? A. cat PATH B. echo $PATH C. echo %PATH% D. cat $PATH

B

Which command shows who is logged on and what they are doing in the system? A. who B. w C. whoami D. id

B

Which command will display running process information in realtime? A. ps current B. top C. show current D. process

B

Which of the following commands can be used to display socket statistics, and supports all major packet and socket types? A. route B. ss C. ifconfig D. top

B

Which of the following commands can be used to modify a user? A. adduser B. usermod C. moduser D. useradd

B

Which of the following commands could be used to connect to a remote server and execute some commands securely? A. telnet B. ssh C. scp D. ftp

B

Which of the following commands creates an archive file work.tar from the contents of the directory ./work/? A. tar --new work.tar ./work/ B. tar --cf work.tar ./work/ C. tar --create work.tgz --content ./work/ D. tar work.tar < ./work/

B

Which of the following commands puts the lines of the file data.csv into alphabetical order? A. a..z data.csv B. sort data.csv C. abc data.csv D. wc -s data.csv E. grep --sort data.csv

B

Which of the following commands will allow you to log into a remote machine? A. route B. ssh C. dig D. netstat

B

Which of the following commands will create a zipfile with the contents of your Documents directory? A. zip -f mydocs.zip Documents B. zip -r mydocs.zip Documents C. zip -c mydocs.zip Documents D. zip mydocs.zip Documents E. zip -cf mydocs.zip Documents

B

Which of the following commands will display the group(s) a user belongs to? A. all B. id C. whoami D. group

B

Which of the following commands will display the groups that the user bob belongs to? A. group bob B. id bob C. all bob D. groups -a

B

Which of the following commands will display the groups that the user bob belongs to? A. group bob B. id bob C. groups -a D. all bob

B

Which of the following commands will set setgid on /shared? A. None of the above B. chmod 2777 /shared C. chmod 1777 /shared D. chmod 4777 /shared E. chmod 6777 /shared

B

Which of the following commands will set setuid for /usr/bin/program? A. chmod 1755 /usr/bin/program B. chmod 4755 /usr/bin/program C. chmod 2755 /usr/bin/program D. None of the above

B

Which of the following is NOT a valid rule in naming a variable? A. Variable names must start with a letter B. Variable names must start with numbers C. Underscores are used instead of embedded spaces D. Punctuation marks are not allowed

B

Which of the following is TRUE about open source software? A. Open source software is always free B. Open source software is a prominent example of open collaboration C. Open source software is more secure than closed source software D. Open source software does not have any support

B

Which of the following is a mobile operating system based on a modified version of the Linux kernel designed primarily for touchscreen mobile devices? A. Symbian B. Android C. LinuxMobile D. Linux Go

B

Which of the following is a tool that helps you anonymize your Internet browsing? A. Web proxy B. Tor Browser C. Iptables D. AnonFirefox E. CookieCleaner

B

Which of the following is an open-source relational database management system? A. MyDatabase B. MySQL C. Open Database D. MSdatabase

B

Which of the following is the core computer program with complete control over everything in the system? A. Command Prompt B. Kernel C. Windows D. Startup

B

Which of the following is the correct order of a computer's operation: (1) The computer executes the command, (2) The computer waits for user input, (3) The user selects a command and enters it via the keyboard or mouse A. 3, 2, 1 B. 2, 3, 1 C. 1, 2, 3 D. I, 3, 2

B

Which of the following statements is TRUE for a Linux distribution used in an enterprise environment? A. These distributions contain proprietary business—related software B. These distributions contain software versions that have proven to be stable even when they are not the most recent version of the software available C. These distributions always contains the newest versions of all packages to ensure that the most new features are available to the end users D. These distributions have a large upfront cost and are only affordable by large organizations

B

Which of the following statements is true about Free Software? A. It is developed by volunteers only. B. It may be modified by anyone using it. C. It must always be available free of charge. D. It only runs on Linux. E. It is only distributed as a compiled binary.

B

Which of the following statements may be used to access the second command line argument to a script? A. "$1" B. "$2" C. $1 D. '$2' E. "ARG$2"

B

Which of the following ways can you not run a command-line task as the root user? A. Log in directly as root at a text-mode shell or by using a remote login tool such as SSH. B. Disabling firewall and force open a directory, file or folder C. By using the sudo command

B

Which of the following ways would NOT allow a user to perform a command-line task that requires root privileges? A. Log in directly as root at a text-mode shell or by using a remote login tool such as SSH B. Disabling firewall and Force open a directory, file, or folder C. By using the sudo command D. By using the su command

B

Which of these is NOT a function of the DNS? A. Maintains a directory of domain names and translate them to IP addresses B. Helps the operating system create a network connection C. Allows browsers to load Internet Resources

B

Which option can be used to redirect the errors of a command to a specified file? A. 1> B. 2> C. E> D. X>

B

Which program is used to access the shell? A. Kernel B. Terminal C. Command Line D. Shell

B

Which server software would you use to create a company directory that you could search and authenticate against? A. bind B. OpenLDAP C. Samba D. ISC DHCP E. Netatalk

B

You can only run one instance of the shell. A. True B. False

B

You have downloaded a large Linux distribution as an ISO that requires 3 GB of installation files. You want to perform the install from an optical drive. What type of disc should you burn the ISO file onto? A. CD B. DVD C. USB D. ZIP

B

Your system is having an issue that you think is being caused by a faulty device driver. Which of the following commands should you use to print the message buffer of the kernel? A. printdriver B. dmseg C. ps D. syslog

B

If a podcast is licensed under the CC BY-ND license, you may: (choose two) A. Use an interview or song from it for your own podcast B. Post it to your website C. Share it as long as you give credit to the author D. Sell it as part of a compilation E. Add ads to it and post it to your website.

B, C

The "setgid" permission... (choose two) A. ...prevents the group owner of a file from being changed. B. ...allows a command to be run as the group owner of the file. C. ...allows files created in a directory to be owned by the group that owns the directory. D. ...can only be set on files.

B, C

The "setgid" permission... (choose two) A. ...prevents the group owner of a file from being changed. B. ...allows files created in a directory to be owned by the group that owns the directory. C. ...allows a command to be run as the group owner of the file. D. ...can only be set on files.

B, C

The two main families of Linux shells are: (choose two) A. Emacs B. C Shell C. Bourne Shell D. Python Shell E. Korn shell

B, C

What are two character sequence is present at the beginning of an interpreted script? (Choose two) A. ~ B. # C. ! D. \

B, C

Which distributions are made by, or are clones of, RedHat? (choose two) A. Debian B. CentOS C. Fedora D. Ubuntu E. Slackware

B, C

Which of the following are traits of cloud computing? (choose two) A. You don't have to worry about performance any more B. Resources can be accessed from anywhere over a network C. Scales IT resources so you pay for what you use D. You own the hardware but pay for it over time E. Only Linux works in cloud computing

B, C

Which of the following are valid partitioning types? (choose two) A. PC B. MBR C. GPT D. BIOS

B, C

Which of the following chown commands will change the myFile user ownership to the user sam and the group ownership to administrators? (choose two) A. chown sam administrators myFile B. chown sam.administrators myFile C. chown sam:administrators myFile D. chown sam+administrators myFile

B, C

Which of the following commands can be used to access the home directory of the user "bob" while logged in as root? (choose two) A. cd && B. cd /home/bob C. cd ~bob D. ~bob

B, C

Which of the following ls commands, when executed, will only show information about the directory itself? (choose two) A. ls -h B. ld -d C. ls -ld D. ld -a

B, C

Which statement about the directory /etc/skel are correct? (Choose two answers) A. The directory contains the global settings for the Linux system B. The files from the directory are copied to the home directory of the new user when the account is created C. The directory contains a default set of configuration files used by the useradd command D. The personal settings of root are in this directory E. The files from the directory are copied to the home directory of the new user when starting the system

B, C

Choose all of the following statements that are true in regard to virtual RAM: (choose three) A. Virtual RAM is stored in the CPU B. Virtual RAM is also called swap space C. Virtual RAM is stored on a hard drive D. Virtual RAM is used when available physical RAM is low.

B, C, D

The "execute" permission on a directory allows you to: (choose three) A. Along with write permission to successfully delete the directory B. Along with read permission to successfully perform ls -l C. Along with write permission to successfully create new files D. Change to that directory or use it as part of a path

B, C, D

What information is stored in /etc/passwd? (Choose three.) A. The user's storage space limit B. The numerical user ID C. The username D. The encrypted password E. The user\s default shell

B, C, D

Which of the following commands will check hard disk GPT partitions? (choose three) A. sfdisk B. sgdisk C. gdisk D. cgdisk E. gfdisk

B, C, D

When choosing a distribution of Linux, you should consider: (choose five) A. Popularity on social media B. Does the distribution offer a "stable" version C. Does your organization require long-term support for the system D. If the application software is supported by the distribution E. Will users require a GUI F. Will commercial support be required for the OS

B, C, D, E, F

The touch command can be used to: (choose two) A. Change ownership of a file B. Create new files C. Change a file's name D. Update the timestamp of existing files

B, D

Which of the following are valid video cable connector types? (choose two) A. HDA B. VGA C. AMD D. DVI

B, D

Which of the following commands can be used to scroll through a text file? (choose two) A. cat B. less C. some D. more

B, D

Which of the following commands can be used to scroll through a text file? (choose two) A. some B. more C. cat D. less

B, D

Which of the following commands will display the routing table? (choose two) A. dig B. netstat -r C. ifconfig D. route

B, D

Which of the following commands will set the variable text to olaf is home? (Select two answers) A. text=='olaf is home' B. text=="olaf is home" C. $text='olaf is home' D. text=olaf\ is\home E. text=$olaf is home

B, D

Which of the following ls commands, when executed, will only show information about the directory itself? (choose two) A. ls -h B. ld -d C. ld -a D. ls -ld

B, D

Which of the following tar options handle compression? (Choose two.) A. -bz B. -z C. -g D. -j E. -z2

B, D

Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)? (choose two) A. -s B. -g C. -S D. -G

B, D

Which two pager commands are used by the man command to control movement within the document? (choose two) A. grep B. less C. page D. more

B, D

The Linux shell: (choose three) A. Is responsible for tracking the location of configuration files B. Has a scripting language C. Has a built-in text editor D. Is customizable E. Allows you to launch programs

B, D, E

The three main modes of tar are: (choose three) A. Copy B. List C. Compress D. Extract E. Create

B, D, E

What are the advantages of solid state disks when compared to traditional spinning platter hard disks? (choose two) A. Less heat B. Faster system boot times C. Higher capacity D. Low cost E. Low power consumption

B, E

A ______ is a program written in an interpreted language, typically associated with a shell or a compiled program. A. Command B. Textfile C. Script

C

A command that will continuously update statistics about running processes: A. tail B. head C. top D. Bottom

C

A copyleft provision in a software license means: A. You must provide support for your modifications B. You may not link against third party closed source software C. If you redistribute the software, you must distribute the source to any changes you make D. You must provide free copies of the software if you use it E. You give up your copyright to the software

C

A generic term for Open Source and Free Software is: A. SLOFF B. OS/FS C. FLOSS D. GPL E. Libre Software

C

A maintenance cycle: A. Describes how often updates for software come out B. Should be short so you always have the freshest releases C. Describes how long a version of software will be supported D. Only has meaning for paid software E. Should be long so that you have time before you need to upgrade

C

Channel 2 is: A. STDALL B. STDOUT C. STDERR D. STDIN

C

If you are reading the synopsis of a command from a man page, then items in square brackets are: A. Required arguments B. Comments C. Optional D. Required options

C

The ________ is responsible for managing every other piece of software on a running Linux computer. A. Package file B. Host C. Kernel

C

Which of the following is NOT a Linux desktop environment? A. KDE B. XFCE C. Dwarf D. Gnome

C

Which of the following commands will display how long the system has been running since the last boot? (choose two) A. who B. id C. uptime D. w

C, D

Which of the following are properties of a strong password? (choose three) A. Based on easy to remember items like birthdays B. Long so that it can be reused on multiple sites C. Includes symbols D. At least 10 characters long E. A mix of upper and lower case

C, D, E

Which of the following commands can be used to compress a file? (choose three) A. bunzip2 B. cat C. zip D. bzip2 E. gzip

C, D, E

Which of the following pieces of software deal with file sharing? (choose three) A. X-Windows B. PostgreSQL C. Netatalk D. Samba E. NFS

C, D, E

Which of the following are common busing systems? (choose two) A. CPU B. BIOS C. USB D. RAM E. PCI

C, E

A directory contains the following files: a.txt b.txt c.cav What would be the output of the following shell script? for file in *.txt do echo Sfile done A. *.txt B. a b C. cav D. a.txt

D

A division of a hard drive may be referred to as a _______ . A. label B. block C. portion D. partition

D

A file begins with #!/bin/csh. This means: A. This is a Perl script B. The operator should not be using /bin/csh C. C Shell compatibility mode is enabled D. Running the script will invoke /bin/csh to interpret the rest of the file E. Nothing, this is a comment

D

Which option for the cut command is used to specify the field? A. -d B. # C. -D D. -f

D

Which option for the wc command will print the total number of words in a file? A. -l B. -C C. -L D. -w

D

Which option of the head command will display only the first five lines of a file? A. No option needed; head displays only five lines by default. B. -n C. -l 5 D. -n 5

D

Which option(s) can be used to prevent cp from overwriting an existing file? (choose two) A. -z B. -n C. -N D. -i

D

Which string should you add to put the date into the prompt of the shell? A. \D B. /d C. /D D. \d

D

The current directory contains the following file: -rwxr-xr-x 1 root root 859688 Feb 7 08:15 test.sh Given that the file is a valid shell script, how can this script be executed? (Choose two.) A. run test.sh B. ${test.sh} C. cmd ./test.sh D. ./test.sh E. bash test.sh

D, E

Which are appropriate editors for writing shell scripts? (choose two) A. Firefox B. /bin/bash C. LibreOffice Writer D. vi E. nano

D, E

Which of the following are examples of a web server? (choose two) A. NFS B. postfix C. WordPress D. Nginx E. Apache

D, E

Which of the following commands are used to get information on the proper use of ls? (Choose two.) A. option ls B. usage ls C. manual ls D. man ls E. info ls

D, E

Which of the following commands are used to view memory usage (Choose two correct answers) A. nice B. ps C. memory D. top E. free

D, E

Which of the following commands will output all of the lines that contain either the string Fred or fred? (Choose Two correct answers) A. grep '[f]red' data_file B. egrep fred data_file C. grep -v fred data_file D. grep -i fred data_file E. grep '[Ff]red' data_file

D, E

Apple's OS X is: (choose three) A. Derived from Linux B. Able to natively run Windows binaries C. Primarily used to manage network services D. A fully certified UNIX distribution E. Tightly integrated with Apple hardware F. Partially based on code from the FreeBSD project

D, E, F

A computer running Linux can: A. Outperform proprietary systems at certain tasks B. Function as a web server C. Serve a government agency D. Be used to create new programs E. All of the above

E

Traditional UNIX systems allowed users to belong to how many groups? A. 65,000 B. 10,000 C. 1 D. 256 E. 16

E

What is the correct way to assign the word "Hello" to a variable? A. A = "Hello" B. echo "Hello" &gt; A C. echo $A "Hello" D. $A="Hello" E. A="Hello"

E

What is a set of pages that explain every command available on the system? A. Man pages B. Help pages C. Master pages D. Information pages

A

What is the practice of offering people the right to freely distribute copies and modified versions of a work with the stipulation that the same rights be preserved in derivative works created later called? A. Copyleft B. Copyright C. Openwrite D. OpenCopy

A

Which of the following commands will create a single directory named dir1 dir2? A. mkdir dir1dir2 B. mkdir "dir1 dir2" C. make dir1/dir2 D. create directory2

B

Which of the following statements may be used to access the second command line argument to a script? A. $arg2 B. $2 C. $1 D. $var2

B

Which of the following tasks is not performed automatically for a user account when it is created using the useradd command? A. Assign a UID B. Create the user's home directory C. Assign a default shell D. Define the user's home directory

B

You have been asked to create a script will present the user with a onboard menu in which they can select 4 different commands to run by entering 1, 2, 3, or 4. Which of the following statements should you use to create the simplest and most effective method of choosing the command to run based on the user's input? A. if B. case C. for D. while

B

Your current present working directory is /home/jason/documents/. You just entered cd .. into the command line and then enter pwd. What output do you receive? A. /home/jason/documents/ B. /home/jason C. /home D. /home/jason/documents/..

B

What is the proper command to use to compress the file filename.txt into the zip archive called myfile.zip? A. zip myfile.zip filename.txt B. unzip filename.txt myfile.zip C. zip filename.txt myfile.zip D. unzip myfile.zip filename.txt

A

What keyword should be used to fill in the blank in the following segment of the given shell script? for i in *; _____ cat $i done A. do B. then C. when D. fi

A

What permissions does foo1.txt have after running "chmod 644 foo1.txt"? A. foo1.txt is readable/writeable by the owner B. foo1.txt is readable/writeable by everyone C. foo1.txt is executable D. foo.txt is writeable by the group

A

Which network interface always exists in a Linux system? A. lo B. eth0 C. wlan0 D. vlan0

A

Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home? A. tar -cf backup.tar /home B. tar -cf /home backup.tar C. tar -xf /home backup.tar D. tar -xf backup.tar /home

A

Which of the following commands will output all of the lines with the name Fred in upper or lower case but not the word red from the file data_file? A. grep '[Ff]red' data_file B. grep -v fred data_file C. grep '[f]red' data_file D. egrep fred data_file

A

Which of the following directories contain all of the installed kernels on your system and their needed drivers? A. /boot B. /proc C. /sys D. /dev

A

Which of the following directories is often used to store log files? A. /var B. /temp C. /dev/hdc1d2p3 D. /usr

A

Which of the following information can be displayed by top? A. Running processes, ordered by CPU or RAM consumption B. User accounts, ordered by the number of logins C. User groups, ordered by the number of members D. CPU cores, user groups, free storage

A

Which of the following is NOT TRUE about the Linux Distribution Life cycle? A. Linux distros are always short term releases B. Most release schedules are publicly announced months or years in advanced C. Some developers come up with catchy names for versions D. Final release versions are considered to be stable

A

Which of the following is the act of creating a virtual version of components such as storage devices and computer network resources called? A. Virtualization B. Virtual Reality C. Actualization D. Realization

A

Which of the following is the file descriptor number used to represent the Standard In (STDIN)? A. 0 B. 1 C. 2 D. 3

A

Which of the following programs on a Linux system could you use instead of Windows Media Player? A. VLC B. QuickTime C. iTunes D. WinAmp

A

Which of the following provides the correct syntax to search for lines beginning with the given pattern using the grep command? A. ^pattern B. pattern^ C. $pattern D. pattern$

A

Which option can be used with useradd to specify the home directory for a user? A. -d B. -c C. -b D. -h

A

Which type of link contains the data in the target file? A. Hard link B. Symbolic link C. Sticky link D. Smooth link

A

Your current present working directory is /home/jason/documents/. You just entered cd . into the command line and then enter pwd. What output do you receive? A. /home/jason/documents/ B. / /home/jason C. /home D. /home/jason/documents/ ..

A

After installing a new package, in which directory are you most likely to find its configuration file? A. /lib B. /etc C. /conf D. /usr

B

Consider the following script: #!/bin/bash ip=`route -n | grep UG | tr -s " " | cut -f 2 -d " "` echo "Checking to see if $ip is up..." ping -c 5 $ip Which of the following would be the first line displayed to the screen when the script is executed by the user? A. Pinging ipaddress... B. Checking to see if ipaddress is up... C. Checking ipaddress... D. Pinging IP ...

B

How is it possible to determine if an executable file is a shell script read by Bash? A. The file must end with .sh B. The first line start with #!/bin/bash C. /bin/bash has to be run in debug mode D. Only if you are logged in as root

B

What command would a user enter to delete a directory containing no other files or directories within it? A. mkdir B. rmdir C. cpdir D. mvdir

B

What does HCL mean? A. Hindustan Computer Limited B. Hardware Compatibility List C. Hardware Computer List D. House Computer Linux

B

When using a web browser, what should a user do to prevent private data from being stored locally? A. There is no way to achieve that because Linux always logs network data B. Browsers can be configured to use a private mode that does not store any data locally C. Delete the profile directory in the home directory and create a new one after the work is done D. Use the secure versions of the web browser

B

Which command can be used to search help files that mention the word "copy"? A. whatis copy B. man -k copy C. man copy D. copy help

B

Which file on a Linux system contains the passwords for each user on the system? A. /etc/password B. /etc/shadow C. /etc/passwd D. /etc/users

B

Which keyboard shortcut allows copying highlighted text while working in the command line terminal? A. CTRL + C B. CTRL + SHIFT + C C CTRL + ALT + C D CTRL + TAB + C

B

Which of the following is true about a recursive directory listing? A. It includes the permissions of the directory listed B. It includes the content of sub—directories C. It includes details of file system internals such as inodes D. It includes details of the users and groups of the directory

B

Which of the following is used as a virtual or pseudo filesystem used to interface with the kernel and process? A. /boot B. /proc C. /sys D. /dev

B

Which of the following options is used to gzip a file called filename? A. gzip -c filename B. gzip filename C. gzip -x filename D. gzip -z filename

B

Which of the following options must be used with rmdir to remove a directory and its subdirectories? A. rmdir -r B. rm -r C. rmdir D. rm -all

B

Which storage device would be listed as /dev/sdb in Linux? A. 1st hard drive B. 2nd hard drive C. 3rd hard drive D. 4th hard drive

B

Which type of link is used to points to another file like a shortcut in Windows or a Macintosh alias? A. Hard link B. Symbolic link C. Sticky link D. Smooth link

B

Which version of Linux should be installed on a system with a 64-bit processor? A. x32 B. x64 C. x86 D. x99

B

What column tells the "w" program which session is running? A. STATUS B. PROGRAM C. WHAT D. WHICH

C

What directly controls hardware and translates the commands from a piece of software into something the hardware can understand and act upon? A. Finder B. Explorer C. Kernel D. Procmon

C

What is a daemon? A. A special system file B. A type of virus that destroys system files C. A program that runs in the background of the system D. A configuration file

C

What is a set of standards that underlie most modern network communications at the software level? A. Wi-Fi B. Internet C. TCP/IP D. IEEE 1394

C

What option can be used with cat to display line numbers with the text of a file to the screen? A. # B. -x C. -n D. -1

C

What statement is used to get input from the terminal when a shell script is being run? A. input B. scan C. read D. in

C

Where should temporary files be stored on a Linux system that can be safely deleted during a reboot? A. /var/tmp B. /etc/tmp C. /tmp D. /bin/tmp

C

Which command is used to change the password of a user's account? A. useradd B. pwd C. passwd D. chuser

C

Which command is used to copy files from one directory to another? A. mv B. copy C. cp D. rm

C

Which command is used to print the first 10 lines of a file to the display? A. cat B. tail C. head D. less

C

Which command line can be used to search help files that mention the word 'copy'? A. help copy B. man copy C. man -k copy D. info copy

C

Which of the following displays network connections for Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics? A. net B. ping C. netstat D. traceroute

C

Which of the following does Raspbian Linux run on? A. AWS Cloud B. Smartphone C. Raspberry Pi D. Vehicle Entertainment System

C

Which of the following is NOT contained in the /etc/passwd file? A. User Identification Number (UID) B. Home directory for the user C. The password of the user's account D. Default login shell

C

Which of the following is an American non-profit organization devoted to expanding the range of creative works available for others to build upon legally and to share? A. Open Commons B. Open Source Non-profit C. Creative Commons D. Free Creative

C

Which of the following programs on a Linux system could you use as a replacement for Microsoft Word? A. Pages B. Pico C. Writer D. Nano

C

You have just created a text file with a secret password in it called password.txt. You want to ensure that the password is not seen when the ls command is run within the current directory. What command should you use to ensure the text file is hidden from the filesystem? A. rn password.txt .password.txt B. mv password.txt password.hidden C. mv password.txt .password.txt D. rn password.txt password.hidden

C

How can the normal output of a command be written to a file while discarding the error output? A. command < output > /dev/null B. command > discard-error > file C. command > /dev/null 2%>1 output D. command >file 2>/dev/null

D

What does GUI stand for? A. General User Interface B. Great User Image C. Generic Unique Interlink D. Graphical User Interface

D

What is NOT one of the ways that DHCP can be used to deliver IP addresses? A. Manual B. Automatic C. Dynamic D. Permanent

D

What is defined by a Free Software license? A. The programming languages which may be used to extend the licensed program B. A complete list of libraries required to compile the licensed software C. Limits on the purposes for which the licensed software may be used D. The conditions for modifying and distributing the licensed software

D

What must the user do to run a program that is not within a directory located in the PATH variable? A. create a script B. create a new path C. re-install the program D. include the file path to the program

D

Which command would a user type to create a new file within the current directory? A. mv B cp C. rm D. touch

D

Which command would be used to change the owner of foo1.txt from jasondion to administrator? A. chmod B. ls -la C. ls -d D. chown

D

Which command-line tool will create a filename that ends in .gz? A. zip B. bzip2 C. xz D. gzip

D

Which of the following commands will output a list of all of the file names under your home directory and all subdirectories with file names ending with .pdf? A. search .pdf B. Is -name -R '*.pdf' C. find /home/*.pdf D. find ~ -name '*.pdf'

D

Which of the following is a requirement of the GPL license but not the BSD license? A. The GPL license forbids the removal of copyright and license notices from source code files that are distributed B. The GPL license contains a disclaimer of warranty requiring users not to hold the software authors liable for any damages C. The GPL license requires that nay legal disputes be settles with the mediation of the Free Software Foundation D. Users who modify and distribute the software under the GPL license must make modification they made available to the recipients under the same license

D

Which of the following is a valid option for a typical command to get its built-in usage information? A. -? B. help C. --manual D. -help

D

Which of the following statements is FALSE? A. An installer disk is always used to install Linux B. Developers usually host their distro's installer on their website C. Most distros are free to download and install D. Installers are usually packaged as ISO files which can be burned to optical discs or made into bootable USB's

A

Which of the following are glob characters? (choose three) A. The question mark "?" B. The dash character "-" C. The square brackets "[" and "]" D. The asterisk "*"

A, C, D

Which of the following are examples of text editors? (choose four) A. nano B. Yum C. pico D. vim E. emacs

A, C, D, E

Which of the following are properties of a strong password? (choose three) A. At least 10 characters long B. Based on easy to remember items like birthdays C. Includes symbols D. Long so that it can be reused on multiple sites E. A mix of upper and lower case

A, C, E

A network packet contains ...(choose two) A. ...the IP address of the source machine. B. ...a hard drive partition. C. ...the name of the router. D. ...the IP address of the destination machine.

A, D

A permissive free software license: (choose two) A. Means you can use the software for anything you want B. Does not allow the software to be locked to certain hardware C. Places the software in the public domain D. Places no restrictions on sharing modifications E. Requires you share software changes but not binaries

A, D

In graphical mode, you can get to a shell by running which applications? (choose two) A. Terminal B. Gbash C. console D. Xterm E. Guiterm

A, D

The Free Software Foundation believes that: (choose two) A. Software should be free to modify B. People should write software with no expectation of making money C. Software should not have copyright D. Software should be free to share E. No money should ever change hands

A, D

Which command will archive /home and its content to /mnt/backp? (Choose two correct answers) A. tar -cf /mnt/backup/archive.tar /home B. copy -r /home /mnt/backp C. mv /home /mnt/backp D. cp -ar /home /mnt/backp E. sync -r /home /mnt/backp

A, D

Which command(s) can be used to sort the lines of list.file alphabetically and display it on the screen? (choose two) A. sort < list.file B. cat list.file >> sort C. echo list.file > sort D. cat list.file | sort

A, D

Which files contain user account information? (choose two) A. /etc/shadow B. /etc/group C. /etc/passwords D. /etc/passwd

A, D

Which of the following are valid partitioning types? (choose two) A. GPT B. PC C. MBR D. BIOS

A, D

Which of the following commands will allow you to view all processes on the system? (choose two) A. ps -ef B. ps C. ps -A D. ps aux E. ps -eLf

A, D

Which of the following commands will display CPU information? (choose two) A. lscpu B. cpuinfo C. lspic D. arch E. showcpu

A, D

Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)? (choose two) A. -g B. -S C. -s D. -G

A, D

Which two pager commands are used by the man command to control movement within the document? (choose two) A. more B. page C. grep D. less

A, D

Which of the following commands will check hard disk MBR partitions? (choose three) A. fdisk B. gfdisk C. gdisk D. cfdisk E. sfdisk

A, D, E

A new server needs to be installed to host services for a period of several years. Throughout this time, the server should receive important security updates from its Linux distribution. Which of the following Linux distributions meet these requirements? (Choose two.) A. Ubuntu Linux LTS B. Fedora Linux C. Debian GNU/Linux Unstable D. Ubuntu Linux non-LTS E. Red Hat Enterprise Linux

A, E

Which of the following statements are true regarding a typical shell script? (Choose two.) A. It has the executable permission bit set. B. It starts with the two character sequence #!. C. It is located in /usr/local/scripts/. D. It is located in /etc/bash/scripts/. E. It is compiled into a binary file compatible with the current machine architecture.

A, E

DHCP stands for __________. A. Dynamic Host Configuration Protocol B. Data Host Connection Program C. Direct Host Connection Protocol

A

Daemons are basically __________. A. programs that run in the background B. a type of virus that destroy system files C. system files

A

Debian is a community effort that supports many hardware platforms A. True B. False

A

Deleting a source file will break an associated symbolic link. A. True B. False

A

Each user belongs to at least one group. A. True B. False

A

Given the following script that is run through ./test.sh hello goodbye: if [ -f $2 ]; then echo "I am here" fi When will "I am here" be printed? A. If a file called "goodbye" exists in the current directory B. Never C. The script will always print "I am here" D. If there are two files in the current directory E. If a file called "hello" exists in the current directory

A

Hidden files are files that begin with what character? A. A period (.) B. An asterisk (*) C. A plus (+) D. A dash (-)

A

How can the current directory and its subdirectories be searched for in the file named MyFile.xml? A. find -name MyFiIe.xm| B. grep MyFile.xml | find C. grep -r MyFiIe.xml D. find -P MyFile.xml | grep

A

How would you obtain output similar to the following? compressed / uncompressed ratio / uncompressed_name 278168 / 1016950 / 72.6% / tags A. gzip -l tags B. gunzip -t tags C. file tags

A

How would you represent rwxr-xr-- in octal notation? A. 754 B. 742 C. 724 D. 624

A

How would you write a test that says "if /tmp/foo is a directory or USERS is greater than 5"? A. test -d /tmp/foo -o $USERS -gt 5 B. test -d /tmp/foo | $USERS > 5 C. test /tmp/foo || $USERS > 5 D. test /tmp/foo -d -o $USERS -gt 5

A

If a software release is in a state in that it has many new features that have not been rigorously tested, it is typically referred to as beta software. A. True B. False

A

In Linux, ping continues sending packets once every second or so until interrupted with a _______ keystroke. A. CTRL + C B. CTRL + ^ C. SHIFT + Enter

A

In computer networks, what does DHCP stand for? A. Dynamic Host Configuration Protocol B. Data Host Connection Protocol C. Direct Host Connection Protocol D. Direct Host Control Protocol

A

In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user. A. True B. False

A

In order to exit viewing a man page, press: A. q B. z C. x D. y

A

In the command tar -czf foo.tar.gz bar, what is the purpose of the f flag? A. Tells tar to write to the file that follows the flag B. Tells tar to print the name of each file as it is processed C. Tells tar to read from the file that follows the flag D. Specifies extra compression is to be used E. Tells tar to copy only files, and not directories

A

Information about the init process can be found in the /proc/1 directory. A. True B. False

A

IoT is one application of embedded systems: A. True B. False

A

Is the following path absolute or relative? /etc/ppp A. Absolute B. Relative

A

Is the following path absolute or relative? sysadmin/Documents A. Relative B. Absolute

A

Linux distros ship with their own repositories pre-configured but you can also add other repositories to the system. A. True B. False

A

Linux does not use drive letters as Windows does. A. True B. False

A

Linux supports two types of links, and both of which are created with the In command. A. Hard and symbolic B. Hard and soft C. Dynamic and static D. Dynamic and symbolic

A

Linux users can skip the GUI when logging into the system locally via a text-mode console. A. True B. False

A

Loops tell the script to perform the same task repeatedly until it executes the program in a specified number of times. A. True B. False

A

One characteristic of Linux that sets it apart from other OS is that its native filesystems are case-sensitive. A. True B. False

A

Pipes or command-pipelines help users mash-up two or more commands at the same time and run them consecutively. A. True B. False

A

Pressing the ___ key within top sorts processes by memory use, thus identifying the ones that are consuming the most memory. A. M B. C C. ^

A

Processes consume system resources, the most important of these being CPU time and memory. A. True B. False

A

Social network "like" buttons can track your activity across the Internet. A. True B. False

A

Software that allows hardware devices to communicate with the installed operating system is called? A. Drivers B. Instructions C. Packages D. Programs

A

Source code refers to: A. A human-readable version of computer software B. The interface that software uses to talk to the kernel C. The version of a program that the computer runs on the CPU D. The license that dictates how you may use and share the software

A

Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users. A. True B. False

A

The "Epoch" began on January 1, 1970. A. True B. False

A

The /etc/passwd file contains encrypted user password information. A. False B. True

A

The /etc/shadow file contains encrypted passwords. A. True B. False

A

The /etc/shadow file is usually stored with restrictive permissions, with ownership by root. A. True B. False

A

The /proc directory contains a subdirectory for each process present on the system. A. True B. False

A

The /tmp directory is a temporary directory designed as a location where any user can create a temporary file. A. True B. False

A

The /var directory has files that change over time. A. True B. False

A

The Is command: A. lists the files in a directory B. shows the current owner of a file C. lists all the users using a file

A

The SUID option tells Linux to run the program with the permissions of whoever owns the file rather than with the permissions of the user who runs the program. A. True B. False

A

The ______ represents the start of a line, and the _____ denotes the end of a line. A. ^ and $ B. \ and . C. # and *

A

The chmod command can be used on a file by: A. The file owner and root B. The file owner C. Only root D. A user that belongs to the files current group

A

The chown command can be used to change the owner and group of a file. A. True B. False

A

The command echo "text" > file.txt will create file.txt if it does not already exist. A. True B. False

A

The command echo "text" >> file.txt will not overwrite file.txt if it already exists. A. True B. False

A

The command man -k is the same as the command apropos. A. True B. False

A

The command rm -r will... A. remove a directory along with any files or subdirectories. B. generate an error; -r isn't a valid option. C. remove only empty directories. D. prompt for each confirmation before deleting each file in a directory.

A

The fdisk command is a tool used for working with the MBR partitioned disks. A. True B. False

A

The first character in a long listing (ls -l) indicates: A. If something is a file, directory, or symbolic link B. The size C. The permissions D. The owner

A

The free command outputs statistics about: A. Memory usage B. Disk usage C. Software usage D. CPU usage

A

The grep command can be used with glob characters. A. True B. False

A

The groupmod command can be used to change a group GID. A. True B. False

A

The groupmod command can be used to change a group name. A. True B. False

A

The info command merges all available documentation into a single "book". A. True B. False

A

The most popular Linux platform for mobile phones is: A. Android B. Slackware C. BlackBerry D. IOS E. MobileLinux

A

The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in? A. test $USERS -eq 5 B. test $USERS,5 C. test -f USERS=5 D. test $USERS = 5 E. test $USERS -a 5

A

The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in? A. test $USERS -eq 5 B. test -f USERS=5 C. test $USERS = 5 D. test $USERS,5 E. test $USERS -a 5

A

The process that launched a given process is called its ________. A. Parent B. Host C. Children

A

The rm command can delete multiple files at once. A. True B. False

A

The sbin directories are primarily intended to be used by the root user. A. True B. False

A

The semicolon (;) can be used to separate multiple commands to be executed in order. A. True B. False

A

The shell program interprets the commands you type into the terminal into instructions that the Linux operating system can execute. A. True B. False

A

The sudo command allows regular users to... A. ...execute commands as another user. B. ...execute any command as root, after providing the root password. C. ...run any command as root, after providing the sudo password. D. ...run any commands as a system account without logging in.

A

The top-level directory on a Linux system is represented as: A. / B. /home C. /root D. C:

A

The top-level directory on a Linux system is represented as: A. / B. /home C. C: D. /root

A

The user sysadmin will be able to change the permissions of a file because they own it. A. True B. False

A

The whatis command is the same as man -w. A. False B. True

A

To be able to output messages to the screen, use the _______ command: A. echo B. print C. display D. type

A

To determine if the last command run on a system was successful, which command should be executed? A. echo $? B. echo $# C. exit$ D. echo $0

A

To exit the info page, press: A. Q B. x C. z D. x

A

To protect your privacy online, you can configure your computer to check for updates periodically. A. True B. False

A

To start searching a man page, the first key you press is: A. / B. f C. s D. !

A

To use a file that's been compressed, it must first be uncompressed with a matching program. A. True B. False

A

True or False: Some televisions can run Linux. A. True B. False

A

Users can change anyone's password on the system using the "sudo passwd username" command. A. True B. False

A

Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command. A. True B. False

A

What does the letter t at the end of drwxrwxrwt indicate within the following directory permissions? drwxrwxrwt 14 root root 36864 2012-03-02 11:17 /tmp A. The t is used to show that the directory is globally writable, but only the owner can delete their own files within the directory B. The directory is accessible by everyone C. The directory contains only temporary files that can be deleted by the system when more space is needed D. The files contained in this directory can only be access by the root user

A

What does the rm -rf command do in Linux? A. Remove all the files in the directory and subdirectories B. Remove all the files in the current directory C. Rename all the files in the directory and subdirectories D. Rename all the files in the current directory

A

Which command launches the web browser Firefox from the command line? A. firefox B. run -a firefox C. web firefox D. netbrowser

A

Which command to use to show which shell is being used? A. echo $SHELL B. show SHELL C. $SHELL D. display SHELL

A

Which command would list files that do not begin with a "T" or a "W"? A. echo /etc/[!TW]* B. echo /etc/[*TW]! C. echo /etc/!TW D. echo /etc/*[TW!]

A

Which environment variable contains a list of directories that is searched for commands to execute? A. PATH B. PS1 C. PS2 D. EXEC

A

Which keyboard shortcut allows pasting a previously copied highlighted text while working in the command line terminal? A. CTRL + SHIFT + V B. CTRL + V C. CTRL + TAB + V D. CTRL + ALT + V

A

Which log file contains messages regarding authentication and authorization? A. secure B. dmesg C. syslog D. messages

A

Which of the following BEST describes open source software? A. Open source software is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose B. The source code of open source software is available for inspection only C. Open source software is usually developed by private developers D. Open source software does not need a license

A

Which of the following commands can be used to display socket statistics, and supports all major packet and socket types? A. ss B. ifconfig C. route D. top

A

Which of the following commands can be used to extract content from a tar file? A. tar -xvf B. tar -vf C. tar -c D. tar -v E. tar -e

A

Which of the following commands can be used to modify a group? A. groupmod B. groupadd C. modgroup D. addgroup

A

Which of the following commands is used to view memory usage on a system? A. free B. ps C. route D. netstat

A

Which of the following commands sets "other" permissions on file to r-x? A. chmod 775 file B. chmod 776 file C. chmod 777 file D. chmod 774 file

A

Which of the following commands will append its output to output.file? A. echo Testing >> output.file B. echo Testing > output.file C. output.file < echo Testing D. echo Testing -> output.file

A

Which of the following commands will display a list of all files in the current directory, including those that may be hidden? A. Is -a B. Is -h C. Is -all D. Is -hidden

A

Which of the following commands will display lines that contain either start or end? A. egrep 'start|end' file.txt B. egrep (start|end) file.txt C. egrep start end file.txt D. egrep start&end file.txt

A

Which of the following commands will display lines that contain either start or end? A. egrep 'start|end' file.txt B. egrep start end file.txt C. egrep start&end file.txt D. egrep (start|end) file.txt

A

Which of the following commands will display the IP address on a Linux system? A. ifconfig B. dig C. route D. ipconfig

A

Which of the following commands will display the IP address on a Linux system? A. ifconfig B. route C. ipconfig D. dig

A

Which of the following commands will list hidden files as well as their ownership? A. ls -la B. ls -l C. ls -a D. ls -z

A

Which of the following commands will set setuid for /usr/bin/program? A. chmod 4755 /usr/bin/program B. chmod 2755 /usr/bin/program C. None of the above D. chmod 1755 /usr/bin/program

A

Which of the following commands would create a hard link, link to file? A. ln file link B. ln -s link file C. ln link file D. ln -s file link

A

Which of the following commands would create a hard link, link to file? A. ln file link B. ln link file C. ln -s file link D. ln -s link file

A

Which of the following commands, run as root, will prevent the user bob from logging in? A. usermod -L bob B. usermod -D bob C. usermod -d bob D. usermod -l bob

A

Which of the following commands, run as root, will prevent the user bob from logging in? A. usermod -L bob B. usermod -l bob C. usermod -D bob D. usermod -d bob

A

Which of the following directories contains information, documentation and example configuration files for installed software packages? A. /usr/share/doc/ B. /etc/defaults/ C. /var/info/ D. /doc/ E. /usr/examples/

A

Which of the following files contains a mapping of IP addresses to URLs locally on your Linux machine? A. /etc/hosts B. /etc/names C. /etc/dns D. /etc/lookup

A

Which of the following files contains encrypted user password information? A. /etc/shadow B. /etc/group C. /etc/usr D. /etc/passwd

A

Which of the following files contains user IDs? A. /etc/passwd B. /etc/shadow C. /etc/group D. /etc/usr

A

Which of the following is NOT one of the core technologies of the World Wide Web? A. Browser B. HTML C. CSS D. JavaScript

A

Which of the following is a Debian-based computer operating system for Raspberry Pi? A. Raspbian B. Ubuntu C. Solaris D. Pi

A

Which of the following is a combined audio/video interface for transmission of digital data? A. HDMI B. VGA C. DVI D. DVD E. ATI

A

Which of the following is a piece of software that listens for network requests and responds to them? A. Apache B. Sioux C. OpenWeb D. NetServer

A

Which of the following is an example of embedded Linux? A. Android B. Red Hat Linux C. Fedora D. Linux Mint

A

Which of the following is true about environment variable names by convention? A. Contains all uppercase letters B. Contains all lowercase letters C. Contains only numbers D. Contains only symbols

A

Which of the following is used to redirect the standard output of a command to a file? A. 1> B. 2> C. &1 D. &2

A

Which of the following long listings represents setgid set for /shared ? A. drwxrwsrwx. 12 root group 4096 Oct 21 13:12 /shared B. drwsrwxrwx. 12 root group 4096 Oct 21 13:12 /shared C. drwxrwxrws. 12 root group 4096 Oct 21 13:12 /shared D. drwSrwxrwx. 12 root group 4096 Oct 21 13:12 /shared

A

Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of? A. -G B. -u C. -g D. -U

A

Which of the following options for the useradd command allows root to specify the UID to be associated with the account? A. -u B. -g C. -M D. -G

A

Which of the following options for the useradd command allows you to use a different primary group then the default? A. -g B. -G C. -U D. -u

A

Which of the following options is used with tar to create a new .tar archive file? A. -c B. -v C. -f D. -n

A

Which of the following permissions are set on the /tmp/ directory? A. rwxrwxrwt B. ------rwX C. rwSrw-rw- D. rwxrwS--- E. r-xr-X--t

A

Which of the following properly identifies the third partition, on the second hard disk, on the first IDE controller on a PC system? A. /dev/hdb3 B. /dev/hd1b3 C. /dev/hdc1d2p3 D. /dev/hdc1a3

A

Which of the following software packages is an email server? A. Postfix B. MySQL C. Apache D. Thunderbird E. GIMP

A

Which of the following statements concerning the General Public License (GPL) is true? A. The GPL is designed to ensure that the source code of a software remains freely available B. GPL software may not be used to run nuclear reactors or air traffic control systems C. The GPL is identical to the BSD license D. If you changed a program you received under the GPL, you must send your changes to the original author for approval E. GPL software may never be sold for money

A

Which of the following commands will allow you to log into the machine server1 with the account name nick? A. ssh nick&server1 B. ssh nick-server1 C. ssh nick@server1 D. ssh nick->server1

C

Which of the following commands will direct error messages to the file, error.log? A. ls /root >> error.log B. ls /root > error.log C. ls /root 2> error.log D. ls /root $> error.log

C

Which of the following commands, run as root, will prevent the user jane from logging in? A. usermod -d jane B. usermod -D jane C. usermod -L jane D. usermod -l jane

C

Which of the following examples shows the general structure of a for loop in a shell script? A. for *.txt as file => echo $file B. for *.txt ( echo $i ) C. for file in *.txt do echo $i done D. for ls *.txt exec {} \; E. foreach @{file} { echo $i }

C

Which of the following hardware devices links a number of computers together to form an Ethernet LAN? A. Connector B. Terminal C. Switch D. Server E. Access point

C

Which of the following information is provided in the default output of the who command? A. Username, password, ip address, shut down time B. GID, UID, password, files C. Username, Terminal Identifier, Login Date and Time D. Username, User Group, Passwords, Files

C

Which of the following is NOT correct when naming variables? A. Variable names must start with a letter B. Underscores are used instead of embedded spaces C. Variable names must start with numbers D. Punctuation marks are not allowed

C

Which of the following software packages is a mail server? A. Thunderbird B. Apache C. Postfix D. GIMP

C

Which of the following steps will increase the risk to your computer system? A. Enabling a firewall B. Shutting down unused servers C. Establishing an Internet Connection

C

Which one of the following statements concerning Linux passwords is true? A. Users cannot change their password once it has been set B. All passwords can be decrypted using the system administrator's master password C. Passwords are only stored in encrypted form D. Passwords may be at most six characters long E. Passwords may never start with a non-letter

C

Which option can be used with tail to print the last X bytes of a file to the screen? A. -n B. -b C. -c D. -x

C

Which option can be used with useradd to create a new user without a home directory? A. -N B. -G C. -M d. -D

C

Which option for the ls command, when used in conjunction with the -l option, will display human-readable file sizes? A. -S B. -H C. -h D. -M

C

Which option of the command history can be used to clear the user's history? A. -clr B. /c C. -c D. $Clear

C

Which package manager is used in Fedora, a Red Hat derived system? A. tar B. bash C. yum D. vim E. apt-get

C

Which redirection operator accepts text on the following lines as standard input? A. <> B. >> C << D. ><

C

Which statement about users and user groups is correct? A. Users do not have to belong to a user group B. There can be only one user group on a system C. Every user belongs at least to one user group D. A group can only have one main user

C

Which user can view the /etc/shadow file? A. Any member of the password group B. No users C. The root user D. All users

C

Which version of Linux should be installed on a system with a 32-bit processor? A. x32 B. x64 C. x86 D. x99

C

While deleting all files beginning with the letter a there was still the file Access.txt left. Assuming that it had the correct ownership, why was it not deleted? A. The file Access.txt was probably opened by another application B. The file Access.txt was hidden C. Linux file names are case sensitive D. Files with extensions need a different treatment E. rm had to be called with the option -R to delete all files

C

Why are web browser cookies considered dangerous? A. Cookies are always public and accessible to anyone on the internet B. Cookies consume significant amounts of storage and can exhaust disk space C. Cookies support identification and tracking of users D. Cookies leave crumbs on the keyboard

C

Why is the file data.txt empty after executing sort data.txt > data.txt? A. Because sort cannot sort text files, only binary files B. Because sort detects that both files are the same C. Because the file gets truncated before sort is executed D. Because the file gets executed before sort is truncated

C

You type gzip myfile.tar. What happens? (choose two) A. An error; you forgot to specify the file with -f B. myfile.tar is unarchived into the current directory C. myfile.tar is removed D. An error; you forgot to pass the name of the output file E. myfile.tar.gz holds a compressed version of myfile.tar

C, E

You type gzip myfile.tar. What happens? (choose two) A. myfile.tar is unarchived into the current directory B. An error; you forgot to pass the name of the output file C. myfile.tar.gz holds a compressed version of myfile.tar D. An error; you forgot to specify the file with -f E. myfile.tar is removed

C, E

A license where you don't have access to the source code is called: A. Sourceless B. Impaired source C. Open source D. Closed source

D

A long software release cycle is: A. Better because old hardware can be utilized beyond its service life B. Only offered by Red Hat and SUSE C. Makes programming more difficult since new features cannot be used D. Valued by businesses that want stability E. Characterized by infrequent security fixes

D

A service is... A. ...another name for a computer's hostname. B. ...a file that contains configuration information. C. ...like an IP address. D. ...a feature provided by one computer to another.

D

A service is... A. ...like an IP address. B. ...a file that contains configuration information. C. ...another name for a computer's hostname. D. ...a feature provided by one computer to another.

D

A user is currently in the directory /home/user/Downloads/ and runs the command ls ../Documents/Assuming it exists, which directory's content is displayed? A. /home/user/Documents/ B. /home/user/Documents/Downloads/ C. /home/user/Downloads/Documents/ D. /Documents/ E. /home/Documents

D

After running a command to delete all of the files beginning with the letter "a", the file Access.txt remained. Assuming that the user had the correct ownership and permissions, why was Access.txt not deleted when the command was run? A. Files with extensions require a different command to be used B. rm had to be called with the option -R to delete all files C. The file Access.txt was still opened and in use by another application D. Linux file names are case sensitive

D

Commands typically executed by a user are covered in what section of the manual? A. 5 B. 3 C. 2 D. 1

D

Compression of a file works by: A. Removing the high order bit from each byte B. Eliminating gaps within the file C. Storing most of the data on removable media and just leaving a pointer D. Removing redundant information E. Consolidating multiple files into one

D

Embedded Systems means: A. Companies must share their changes B. You can view the software's source code C. Businesses cannot charge anything for the software, only the hardware D. Systems designed to do a specific task on hardware optimized for only that purpose E. Users must support the systems themselves

D

Error messages generated by commands are sent where by default? A. STDIN B. Log files C. STDOUT D. STDERR

D

GIDs under 500 (or 1000) are usually reserved for what kind of groups? A. Are not used for groups, but for user accounts B. Administrators C. User private groups (UPG) D. System use

D

Hidden files are files that begin with what character? A. A plus (+) B. An asterisk (*) C. A dash (-) D. A period (.)

D

How can the normal output from a command be written to a file while discarding the error output? A. command < output > /dev/nul| B. command > discard-error > file C. command > /dev/nul| 2&>1 output D. command >file 2>/dev/nu||

D

How would you finish your script with an exit code of 42? A. return 42 B. break 42 C. CODE=42 D. exit 42 E. $?=42

D

If you want to store logins and passwords for different websites in a secure manner, you could use: A. A text file in your home directory B. A LibreOffice document C. A sticky note on your monitor D. KeePassX E. In a spiral bound notebook in your file cabinet

D

In general, for which of the following would you want to use lossless compression? A. An mp3 audio file B. An encrypted email C. A JPEG image D. A log file E. A movie

D

Members of a team already have experience using Red Hat Enterprise Linux. For a small hobby project, the team wants to set up a Linux server without paying for a subscription. Which of the following Linux distributions allows the team members to apply as much of their Red Hat Enterprise Linux knowledge as possible? A. Ubuntu Linux LTS B. Raspbian C. Debian GNU/Linux D. CentOS E. openSUSE

D

Octal notation uses the following values for the permissions granted: A. r = 7, w = 5, x = 0 B. r = 3, w = 2, x = 1 C. r = 4, w = 2, x = 0 D. r = 4, w = 2, x = 1

D

SUSE is derived from which distribution? A. Fedora B. Debian C. Red Hat Enterprise Linux D. Slackware E. Scientific Linux

D

Section 5 of the manual pages covers: A. System administration commands B. Games C. User commands D. File Formats

D

Setting setgid on a directory... A. ...will allow scripts in the directory to be executed as the group owner of the directory. B. ...is not allowed by the system. C. ...does nothing. D. ...will set the group owner of all files created in the directory to the group owner of the directory.

D

Source code refers to: A. The version of a program that the computer runs on the CPU B. The interface that software uses to talk to the kernel C. The license that dictates how you may use and share the software D. A human-readable version of computer software

D

The "setuid" permission... A. ...prevents the owner of a file from being changed. B. ...allows files in a directory to be manipulated as by the directory owner. C. ...reports the output of a script to the owner. D. ...allows a command to be run as the file owner.

D

The /etc/group file follows what structure? A. group:GID:user_list B. groups -a C. user:group D. group_name:password_placehoder:GID:user_list

D

The Creative Commons version of Public Domain licensing is: A. NoAttribution-ShareAlike (CC BY-SA) B. Attribution-NonCommercial (CC BY-NC) C. Attribution (CC BY) D. No Rights Reserved (CC0) E. Attribution-NonCommercial-ShareAlike (CC BY-NC-SA)

D

The _____ command can be used to find any file, not just commands or man pages. A. apropos B. whereis C. whatis D. locate

D

The _____ command is normally executed daily to update the database of all files that are on the system. A. find B. locate C. search D. updatedb

D

The _______ command will print a list of the commands that you've previously executed. A. list B. eval C. exec D. history

D

The chmod command can be used on a file by: A. Only root B. A user that belongs to the files current group C. The file owner D. The file owner and root

D

The command ls -S will sort files: A. By size, smallest to largest B. By modification date, newest to oldest C. By number of symlinks, largest to smallest D. By size, largest to smallest

D

The directory where additional documentation for software packages most likely can be found is: A. /var/share/doc B. /var/lib/doc C. /usr/software/doc D. /usr/share/doc

D

The double dot (..) can be used with the cd command to represent: A. A user's home directory. B. Any two single characters C. Nothing; it has no special meaning. D. The directory above the current working directory

D

The echo command: A. Copies variables from one to another B. Tests a variable for duplication C. Is used for variable assignment D. Is used to output text to the console E. Duplicates the input stream to the output stream

D

The first line of this command displays how long the system has been running since being rebooted. A. id B. getent C. who D. w E. su

D

The following are examples of package managers EXCEPT: A. APT B. YUM C. pacman D. Ghosts

D

The following are examples of popular package formats used by Linux distros except: A. .deb B. .rpm C. .tar D. .exe

D

The ls command without options or arguments... A. ...prompts for a directory to list. B. ...generates an error as this command requires arguments. C. ...lists the contents of a user's home directory. D. ...lists the contents of the current directory.

D

The most common shell used for Linux distributions is the ________ shell. A. Zsh B. Fish C. Tsch D. Bash

D

What would an account with the UID 376 typically be used for? A. White hat hackers. B. Temporary employees. C. New users with full privileges. D. System service access. E. Root user access.

D

Which of the following commands can be used to modify a user? A. adduser B. moduser C. useradd D. usermod

D

Which of the following commands can be used to rename a file? A. rm B. cp C. name D. mv

D

Which of the following commands can be used to resolve a DNS name to an IP address? A. dnsname B. dns C. query D. host E. iplookup

D

Which of the following commands can be used to view a file and do search operations within it while viewing the contents? A. find B. grep C. see D. less E. report

D

Which of the following commands is used to lookup the current IP address of a system? A. sysinfo | grep ipaddress B. ipconfig C. less/proc/net/ipconfig D. ifconfig E. showip

D

Which of the following commands sorts the output of the command export-logs? A. export-logs < sort B. export-logs > sort C. export-logs & sort D. export-logs | sort E. export-logs <> sort

D

Which of the following commands will allow you to log into a remote machine? A. dig B. netstat C. route D. ssh

D

Which of the following commands will display only lines that begin with start? A. grep \start file.txt B. grep $start file.txt C. grep *start file.txt D. grep ^start file.txt

D

Which of the following commands will display only lines that begin with test? A. grep $test* file.txt B. grep *test file.txt C. grep &test file.txt D. grep ^test file.txt

D

Which of the following commands will display only lines that begin with test? A. grep *test file.txt B. grep &test file.txt C. grep $test* file.txt D. grep ^test file.txt

D

Which of the following commands will list hidden files as well as their ownership? A. ls -a B. ls -z C. ls -l D. ls -la

D

Which of the following commands will prevent any aliased options to the ls command? A. %ls B. /ls C. `ls D. \ls

D

Which of the following commands will search for the file foo.txt under the directory /home? A. search /home ""file foo.txt B. search /home foo. txt C. find /home "" file foo.txt D. find /home ""name foo.txt E. find /home foo.txt

D

Which of the following commands would create a symbolic link, link to file? A. ln file link B. ln -s link file C. ln link file D. ln -s file link

D

Which of the following devices represents a hard disk partition? A. /dev/ttyS0 B. /dev/sata0 C. /dev/part0 D. /dev/sda2 E. /dev/sda/p2

D

Which of the following directories must be mounted with read and write access if it resides on its own dedicated file system? A. /opt B. /lib C. /etc D. /var E. /usr

D

Which of the following files contains encrypted user password information? A. /etc/usr B. /etc/group C. /etc/passwd D. /etc/shadow

D

Which of the following files contains the IP addresses of the name servers the system should consult in any attempt to resolve names to IP addresses? A. /etc/nsswitch.conf B. /etc/resolve.conf C. /etc/hosts D. /etc/resolv.conf

D

Which of the following files does the groupadd command use to determine the new GID when a GID isn't specified? A. /etc/usr B. /etc/shadow C. /etc/passwd D. /etc/group

D

Which of the following is NOT an example of a Linux software package manager? A. dpkg B. yum C. rpm D. abc

D

All Linux distros are capable of creating a network connection automatically. A. True B. False

B

All Linux systems allow administrators to log in as root. A. True B. False

B

All log files contain only text data. A. True B. False

B

Is the following path absolute or relative? ../../home/sysadmin A. Absolute B. Relative

B

Linux Mint is: A. Compatible with Android systems B. A fork of Ubuntu Linux C. A proprietary version of Ubuntu with advanced features D. A refreshing after dinner treat E. Distributed in every country without license restrictions

B

Linux does not allow multiple users to access the computer simultaneously. A. True B. False

B

Linux has a dedicated filesystem feature to hide files from the ls command. A. True B. False

B

Linux is distributed under which license? A. MIT B. GPLv2 C. GPLv3 D. Linux Foundation E. BSD

B

Linux limits the number of user accounts in a single computer to 100. A. True B. False

B

Linux originally only ran on: A. Macintosh B. Intel 386 PCs C. Raspberry Pi computers D. Specialized processor chips E. Xerox copy machines

B

Linux source code is available to: A. Employees of the FBI, CIA and NSA with top secret clearance B. Anyone who has the knowledge needed to access it C. Only university researchers with a government grant D. Only employees of the Linux Foundation

B

Linux users normally download and install applications from the applications' websites. A. True B. False

B

On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob. A. True B. False

B

On a system that uses UPG, the UID must not be the same as the GID.. A. True B. False

B

Only one set (user, group, other) of permission can be changed at once using the symbolic method. A. True B. False

B

Reverse DNS assigns hostnames to IP addresses. How is the name of the IP address 198.51.100.165 stored on a DNS server? A. In the A record for 165.100.51.198.ipv4.arpa. B. In the PTR record for 165.100.51.198.in-addr.arpa. C. In the RNAME record for 198-51-100-165.rev.arpa. D. In the ARPA record for 165.100.51.198.rev. E. In the REV record for arpa.in-addr.198.51.100.165.

B

Select the command that can report the location of a command: A. what B. which C. where

B

Setting setgid on a directory... A. ...will allow scripts in the directory to be executed as the group owner of the directory. B. ...will set the group owner of all files created in the directory to the group owner of the directory. C. ...is not allowed by the system. D. ...does nothing.

B

Software packages are compiled for compatibility with any version of a specific Linux distro. A. True B. False

B

Software that allows hardware devices to communicate with the installed operating system is called? A. Instructions B. Drivers C. Packages D. Programs

B

Text files can include graphics, use multiple fonts, emphasize words by italicization, and other special forms of representation. A. True B. False

B

The "cd" command is short for _____________. A. Check Directory B. Change Directory C. Change Disk D. Check Disk

B

The "execute" permission is never set on files by default. A. True B. False

B

The "sticky bit" permission... A. ...changes the group ownership of existing files in a directory. B. ...prevents others from removing files they don't own from a common directory. C. ...sets the group ownership of any new file created in a directory. D. ...prevents others from overwriting files they don't own in common directories.

B

The "sticky bit" permission... A. ...sets the group ownership of any new file created in a directory. B. ...prevents others from removing files they don't own from a common directory. C. ...changes the group ownership of existing files in a directory. D. ...prevents others from overwriting files they don't own in common directories.

B

The /etc/shadow file contains plain-text passwords. A. True B. False

B

The Mem: line reveals total ____________ A. CPU statistics B. RAM statistics C. System information

B

The Process ID (PID) of the init process is: A. 0 B. 1 C. 100 D. varies

B

The RSA key fingerprint allows the dig command to connect to remote systems. A. True B. False

B

The _____ command is normally executed to search for a command or man page. A. updatedb B. whereis C. find D. man -k

B

The application packaging is the same for each distro family. A. True B. False

B

The chown command permits changing group ownership done by root only. A. True B. False

B

The command echo "text" > file.txt will not overwrite file.txt if it already exists. A. True B. False

B

The command ls -S will sort files: A. By modification date, newest to oldest B. By size, largest to smallest C. By number of symlinks, largest to smallest D. By size, smallest to largestvv

B

The command to change the ownership of a file in a text-mode manner is ____________. A. chnguser B. chown C. transferown

B

The current directory contains the following file: -rw-r""r"" 1 root exec 24551 Apr 2 12:36 test.sh The file contains a valid shell script, but executing this file using ./test.sh leads to this error: bash: ./test.sh: Permission denied What should be done in order to successfully execute the script? A. The file's extension should be changed from .sh to .bin. B. The execute bit should be set in the file's permissions. C. The user executing the script should be added to the exec group. D. The SetUID bit should be set in the file's permissions E. The script should be run using #!./test.sh instead of ./test.sh.

B

The difference between the GPL and LGPL licenses are: A. LGPL applies to web services B. LGPL ensures that all variants of the original GPL program has the same freedom of use as the original C. LGPL allows you to distribute the software in binary-only form D. LGPL is shorter than GPL E. LGPL was made by the OSI while GPL was made by the FSF

B

The double ampersand characters (&&) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed. A. True B. False

B

The double dot (..) can be used to represent the directory... A. ...below the current directory. B. ...above the current directory. C. ...with any two single numbers. D. ...above the current directory only when using the cd command.

B

The fields in /etc/group contains the following: A. Shell, Kernel, Package Information B. Group Name, Password, GID C. IP address, metamask, domain name

B

The following file is found in which system file? root:x:0:0::/root:/bin/bash A. /etc/password B. /etc/passwd C. /usr/bin/shadow D. /etc/shadow E. /etc/user.cong

B

The grep command allows you to A. Rename a file or directory B. Search for files that contain a specified string C. Repeat the previous command

B

The grep command... A. ...will display all the lines that begin with the specified Regular Expression. B. ...will display all the lines in a file containing the specified Regular Expression. C. ...is not case sensitive. D. ...will display the line numbers in a file that contain a specified Regular Expression.

B

The grep command... A. ...will display all the lines that begin with the specified Regular Expression. B. ...will display all the lines in a file containing the specified Regular Expression. C. ...will display the line numbers in a file that contain a specified Regular Expression. D. ...is not case sensitive.

B

The groupdel command can be used to delete primary groups. A. True B. False

B

The groupmod command can be used to add users to a group. A. True B. False

B

The groupmod command cannot be used to change a group GID. A. True B. False

B

The heightened value proposition of open source software compared to proprietary software include the following EXCEPT: A. Security B. Popularity C. Interoperability D. Localization

B

The whatis command will only return the first result for which section a man page is stored in. A. True B. False

B

There is absolutely no cost in acquiring and maintaining open source software. A. True B. False

B

This is similar to using the right-click mouse button and selecting New Folder in a Windows desktop. A. Typing "mk newfolder'" B. Typing "mkdir newfolder'" C. Typing "newdir folder" D. Typing "new folder"

B

To be able to output messages to the screen, use the _______ command: A. print B. echo C. display D. type

B

To display the group(s) a user belongs to use this command: A. all B. id C. grep D. group E. whoami

B

To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it: A. /etc/sysinfo.conf B. /etc/sysctl.conf C. /etc/procctl.conf D. /etc/procsys.conf

B

To start searching a man page, the first key you press is: A. f B. / C. s D. !

B

Two types of command parameters are: A. Opinions and Debates B. Options and Arguments C. Opt-ins and Assessments D. Open and Argumentative

B

Ubuntu is derived from which distribution? A. Slackware B. Debian C. Scientific Linux D. Red Hat Enterprise Linux

B

Unlike other Operating Systems, Linux is a single-user operating system. A. True B. False

B

Usernames cannot be the same as group names. A. True B. False

B

What command can be used to find the executable and man pages that exist for a given command? A. where B. whereis C. executeis D. executeman

B

What command would you use to create a symbolic link in Linux? A. In -d B. In -s C. link -d D. link —s

B

What does LAMP mean? A. The Linux Advanced Mode Programming Interface which gives advanced capabilities to application developers B. The combination of Linux, Apache, MySQL and PHP or other programming languages C. The bus ID of an attached USB device that emits light D. Short for Lightweight Access Management Protocol which synchronizes permissions in a network

B

What does the redirection operator <> do? A. Accepts text on the following lines as standard input B. Causes the specified file to be used for both standard input and standard output C. Sends the contents of the specified file to be used as standard input D. Sends the contents of the specified file to be used as standard output

B

What information can be displayed by top? A. Existing files, ordered by their size. B. Running processes, ordered by CPU or RAM consumption. C. User accounts, ordered by the number of logins. D. User groups, ordered by the number of members. E. User accounts, ordered by the number of files.

B

What information is held inside $? ? A. The name of the command run B. The previous command's exit code C. The number of arguments passed to the script D. The current process id E. The current user ID

B

Where are the passwords stored for users on a Linux system? A. /etc/passwd B. /etc/shadow C. /etc/ske| D. /etc/group

B

Where is the BIOS located? A. RAM B. Motherboard C. Hard drive D. Monitor

B

Which command can be used to determine a user's most recent log in? A. history B. last C. login D. shell

B

Which command can be used to display and clear the command line history for a given user? A. cls B. history C. clear D. currentuser

B

Which command can be used to print line numbers? A. ln B. nl C. sort D. num

B

Which command can be used to print line numbers? A. num B. nl C. ln D. sort

B

Which command will display the last line of the file document.txt? A. head -n 1 document.txt B. tail -n 1 document.txt C. tail document.txt D. last -n 1 document.txt

B

Which command will display the last line of the file foo.txt? A. head -n foo.txt B. tail -n 1 foo.txt C. tail foo.txt D. last -n 1 foo.txt

B

Which command will display the users that are currently logged in to the system? A. about B. who C. id D. whoami

B

Which command will display the users that are currently logged in to the system? A. id B. who C. about D. whoami

B

Which command will show what is inside the compressed tarball with a name of foo.tar.gz? A. tar -tf foo.tar.gz B. tar -tzf foo.tar.gz C. tar -xf foo.tar.gz D. tar -lf foo.tar.gz E. tar -tjf foo.tar.gz

B

Which command would a user type to compress and package several files into a single file? A. compress B. zip C. bundle D. package

B

Which directory is the root of the filesystem? A. /sys B. / C. /var D. /home E. /root

B

Which environment variable contains a list of directories that is searched for commands to execute? A. PS2 B. PATH C. EXEC D. PS1

B

Which file on a Linux system is modified to set the maximum number of days before a password must be changed? A. /etc/groups B. /etc/shadow C. /etc/passwd D. /etc/users

B

Which flag would you pass to tar in order to have it make a new archive? A. -t B. -c C. -n D. -x E. -j

B

Which function does a shell program serve? A. It is responsible for establishing a connection to another computer B. It receives user commands and executes them C. It provides a graphical environment D. It is responsible for logging a user into the system

B

Which information is used by a computer to connect to a typical local area network? A. User group B. IP address C. Domain name D. Memory capacity

B

Which is a suitable command to find the next appearance of the word hidden, in a man page being viewed from the command line? A. /? hidden B. /hidden C. CTRL-F hidden D. find hidden

B

Which network device serves as the gateway between your internal network and external network? A. Switch B. Router C. Wireless access point D. Hub

B

Which of the following are not man page sections? A. Name B. Mistakes C. Configuration D. Return Value

B

Which of the following can be used to represent a single number from 3 to 9? A. [3456789] B. [3-9] C. [three-nine] D. [9-3]

B

Which of the following commands can be used to change default permissions for files and directories at the time of creation? A. chmod u-rx,go-r filename B. umask C. chown D. chgrp

B

Which of the following commands will set the "sticky bit" on /shared? A. chmod 2777 /shared B. chmod 1777 /shared C. chmod 6777 /shared D. chmod 4777 /shared

B

Which of the following commands would be used to display the value of the HOME variable to the terminal's display? A. echo HOME B. echo $HOME C. echo &HOME D. echo "HOME"

B

Which of the following file systems is most commonly used for Linux distributions? A. NTFS B. Ext4 C. HFS+ D. FAT32

B

Which of the following files contains user IDs? A. /etc/group B. /etc/passwd C. /etc/usr D. /etc/shadow

B

Which of the following files holds the definition of the local user accounts? A. c/users B. /etc/passwd C. c/id B. c/home

B

Which of the following is NOT a Linux desktop environment: A. KDE B. ABC C. XFCE D. Unity

B

Which of the following is NOT a heightened value proposition of Open Source Software compared to Proprietary Software? A. Security B. Popularity C. Interoperability D. Localization

B

Which of the following is the dmseg command used for? A. To show the user login and logoff attempts B. To show the kernel log messages C. To show the syslog file's informational messages D. To show the messages for the daemon logs

B

Which of the following is the file descriptor number used to represent the Standard Out (STDOUT)? A. 0 B. 1 C. 2 D. 3

B

Which of the following is the valid device file name for the first IDE hard drive on the system? A. /dev/ide B. /dev/hda C. /dev/sda D. /dev/hd1

B

Which of the following is used to untar a tar archive file? A. untar B. tar -x C. unzip -t D. tar-u

B

Which of the following licenses was made by the FSF? A. Creative Commons B. GPLv3 C. Apache D. BSD E. MIT

B

Which of the following options for the useradd command allows you to use a different login shell than the default? A. -g B. -s C. -u D. -U

B

Which of the following options is used with tar to display the tar command's progress during execution? A. -c B. -v C. -f D. -n

B

Which of the following programs on a Linux system could you use as a replacement for Adobe Photoshop? A. Paint B. Gimp C. Draw D. Keynote

B

Which option can be used with tail to print the last 10 lines of a file and then keep printing any new lines that may be added continuously? A. -n B. -f C. -x D. -a

B

Which option for the wc command will print the number of lines in a file? A. -w B. -l C. -L D. -C

B

Which option will cause the echo command NOT to output a trailing newline? A. -p B. -n C. -s D. -t

B

Which package management tool is used in Red Hat-based Linux Systems? A. portage B. rpm C. apt-get D. dpkg E. packagectl

B

Which shell command accepts input from the user's keyboard? A. echo B. read C. gets D. input E. $1

B

An interpreted programming language: (choose two) A. Requires a compilation step but no linking step B. Is converted into machine specific instructions as the program runs C. Tends to offer more features than compiled languages D. Requires a linking step but no compilation step E. Takes fewer resources to run than a compiled language

B, C

Given the following script: while [ ! -f /tmp/foo ]; do echo -n "." process_data > /tmp/foo done Which of the following are true? (choose two) A. The screen will fill with dots. B. If a file called /tmp/foo exists, process_data won't be run C. process_data will be called at most once D. process_data will never be run E. /tmp/foo will be removed if it exists

B, C

Creative Commons licenses allow you to: (choose three) A. Receive royalties on the use of the work B. Allow or disallow commercial use C. Specify whether or not people may distribute changes D. Get a veto on where the work is used E. Specify whether or not changes must be shared

B, C, E

How can you make money from open source software? (choose three) A. Unlock premium features for people that pay B. Sell hardware that's built to work with the software C. Take payments for fixing bugs D. Charge a yearly fee for the right to use the software E. Provide paid consulting services for users

B, C, E

An interpreted programming language: (choose two) A. Takes fewer resources to run than a compiled language B. Is converted into machine specific instructions as the program runs C. Requires a linking step but no compilation step D. Tends to offer more features than compiled languages E. Requires a compilation step but no linking step

B, D

The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system: (choose two) A. /devices B. /proc C. /info D. /sys

B, D

What can be done to prevent unauthorized users from accessing your computer remotely? (choose two) A. Block third party cookies B. Turn on a firewall C. Block all cookies D. Use strong passwords on all user accounts E. Don't use wireless networks - only wired

B, D

Which are appropriate editors for writing shell scripts? (choose two) A. LibreOffice Writer B. vi C. Firefox D. nano E. /bin/bash

B, D

What are the differences between a private web browser window and a regular web browser window? (Choose three.) A. Private web browser windows do not allow printing or storing websites. B. Private web browser windows do not store cookies persistently. C. Private web browser windows do not support logins into websites. D. Private web browser windows do not keep records in the browser history. E. Private web browser windows do not send regular stored cookies.

B, D, E

Given the command tar -cvjf homedirs.tbz /home, which of the following are true? (choose two) A. Only files starting with /home will be extracted from the archive B. The command will print out each filename as it is processed C. The /home directory will be restored with the contents of homedirs.tbz D. Files that are present in the archive might overwrite files in /home E. The output file will be compressed

B, E

Running the command rm Downloads leads to the following error: rm: cannot remove 'Downloads/': is a directory Which of the following commands can be used instead to remove Downloads, assuming Downloads is empty? (Choose two.) A. undir Downloads B. rmdir Downloads C. dir -r Downloads D. rem Downloads E. rm -r Downloads

B, E

POP and IMAP are related to: A. Serving web pages B. Reading and writing music C. Email D. Letting users log in to multiple servers with 1 set of credentials E. Sharing files

C

Richard Stallman is associated with: A. BSD Unix B. Microsoft C. The Free Software Foundation D. The Apache foundation E. The Open Source Initiative

C

Section 9 of man pages relates to what? A. Library Calls B. Games C. Kernel Routines D. System Calls E. Miscellaneous

C

Select the command that can report the location of a command: A. what B. where C. which

C

Software is backward compatible if: A. It can be upgraded without downtime B. People still use old versions C. It still supports old file formats or applications D. If the next version still works the same way E. It works across Linux/Mac/Windows

C

Software packages specially compiled for a specific Linux distro and version are contained in: A. Depositories B. Definitive media libraries C. Repositories D. Public libraries

C

The "execute" permission on a file allows you to: A. Move the file to a new directory B. Delete the file C. Run the file as a script D. This permission isn't meaningful for text files.

C

The "setuid" permission... A. ...prevents the owner of a file from being changed. B. ...reports the output of a script to the owner. C. ...allows a command to be run as the file owner. D. ...allows files in a directory to be manipulated as by the directory owner.

C

The Linux platform that runs on mobile phones is called: A. MicroLinux B. IOS C. Android D. Teledroid E. LinuxMobile

C

The Process ID (PID) of the init process is: A. 100 B. 0 C. 1 D. varies

C

The Raspberry Pi is popular with experimenters because: A. It runs Microsoft Office B. End users have to pay for programming expenses C. It's cheap and adaptable D. The hardware never changes E. It takes months or years to develop an application

C

The _______ command will print a list of the commands that you've previously executed. A. list B. eval C. history D. exec

C

The _________ column tells what program the session is running. A. STATUS B. PROGRAM C. WHAT

C

The _____________ maintains a database of information about installed packages. A. Kernel B. Shell script C. Package software

C

The acronym CLI stands for: A. Computer Line Interface B. Command Line Interpreter C. Command Line Interface D. Computer Link Interpreter

C

The cd command by itself will take you to what directory? A. None; it is not a valid command B. The system root directory C. Your home directory D. The directory above the current working directory

C

The cd command by itself will take you to what directory? A. The directory above the current working directory B. None; it is not a valid command C. Your home directory D. The system root directory

C

The chgrp command can be used on a file by: A. A user that belongs to the files current group B. Only the file owner C. The file owner and root D. Only root

C

The default shell in most Linux distros is bash which stands for. A. Born Again Shell B. Beautiful Amazing Shell C. Bourne Again Shell D. Bash As Shell

C

The directory where additional documentation for software packages most likely can be found is: A. /usr/software/doc B. /var/lib/doc C. /usr/share/doc D. /var/share/doc

C

The first character in a long listing (ls -l) indicates: A. The permissions B. The owner C. If something is a file, directory, or symbolic link D. The size

C

The first line of this command displays how long the system has been running since being rebooted. A. su B. getent C. w D. id E. who

C

The following are examples of Linux commands EXCEPT: A. Is B. cd C. password D. clear

C

The output of the program date should be saved in the variable actdat. What is the correct statement? A. set actdat='date' B. date | acdat C. actdat='date' D. date > $actdat E. actdat=date

C

The output of the program date should be saved in the variable datenow. What is the correct statement to enter into the shell to set this variable? A. set datenow='date' B. date | datenow C. datenow='date ' D. date > $datenow

C

The script.sh consists of the following lines: #!/bin/bash echo $2 $1 Which output will appear if the command, ./script.sh test1 test2, is entered? A. test1 test2 B. script.sh test2 C. test2 test1 D. script.sh test1

C

The tar can be used to back up or archive data, which stands for A. Transfer tool B. Target archive C. Tape archive

C

The userdel -r command will... A. ...will prompt before deleting each file owned by a user. B. ...delete the user account, but leave the user's files by default. C. ...automatically delete a user and the user's home directory and mail spool and their contents. D. ...automatically delete a user and all the files owned by that user.

C

This command which is short for copy, copies files. A. mv B. cpy C. cp D. mve

C

To execute the same command as previously executed five commands ago, you would type: A. @-5 B. !5 C. !-5 D. &5

C

To get help while using the info command, press: A. g B. A C. Shift+H D. Shift+z

C

To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it: A. /etc/sysinfo.conf B. /etc/procctl.conf C. /etc/sysctl.conf D. /etc/procsys.conf

C

To see all the variables that are in the user's environment, use the _______ command. A. printer B. ping C. printenv D. processvar

C

UIDs 1-499 are usually reserved for what kind of users? A. Remote log-in accounts B. Are not used for user accounts, but for group accounts C. System accounts, such as server processes D. Log-in (human) users

C

What are the two character sequences present at the beginning of an interpreted script? A. ~. B. #~ C. #! D. ~#

C

What command is used to change the group ownership of a file? A. group B. cgroup C. chgrp D. changegroup

C

What command would you use to get comprehensive documentation about any command in Linux? A. echo command B. locate command C. man command D. get command

C

What directory contains a user's home directory? A. /user B. / C. /home D. /rootfs

C

What is the command that will show system boot time messages? A. echo B. lspci C. dmesg D. display system boot

C

What is the correct way to save the current directory to a variable? A. pwd $A B. A = cwd C. A =`pwd` D. A = pwd E. pwd | $A

C

What is the maximum amount of memory accessible by a 32-bit operating system? A. 1GB B. 2GB C. 4GB D. 8GB

C

What is the number called that is used to identify a process? A. Process Entry B. Proc Num C. PID D. PIN

C

What is the standard option to provide a command-line program to view its documentation? A. -h B. -info C. -help D. -doc

C

What is the symbolic representation of the octal numeric permission 644? A. r--rw-rw- B. rwx-r-xr-x C. rw-r--r-- D. rw-------

C

What keyword is used in a shell script to begin a loop? A. if B. while C. for D. do

C

What umask should be set for a directory to have 700 as its octal permissions? A. rwxrwxrwx B. r--r--r-- C. rwx------ D. rwx---rwx

C

When a computer boots, it can get its network information through: A. LDAP B. DNS C. DHCP D. SMTP E. X11

C

When issuing the service network restart command, which of the following occurs? A. ...brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted. B. ...the networking for the system is stopped and then started back up. C. ...takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.

C

Where does Linux stores most of its log files in the directory tree? A. /var/system B. /sys/var/ log C. /var/|og D. /system/log/var

C

Where is the operating system of a Raspberry Pi stored? A. On the master device attached to the Raspberry Pi's IDE bus. B. On a read only partition on the Raspberry Pi's firmware, next to the BIOS. C. On a removable SD card which is put into the Raspberry Pi. D. On a Linux extension module connected to the Raspberry Pi's GPIO pins. E. On rewritable flash storage which is built into the Raspberry Pi.

C

Which Linux distribution is used as a basis for the creation of Scientific Linux? A. Linux Mint B. Ubuntu C. Red Hat D. Debian

C

Which command adds the new user tux and creates the user's home directory with default configuration files? A. usercreate tux B. useradd -o default tux C. useradd -m tux D. passwd —a tux

C

Which command can be used to display the contents of multiple files to the screen at once? A. head B. tail C. cat D. less

C

Which command is used to make a shell variable known to subsequently executed programs? A. announce B. env C. export D. transfer

C

Which command is used to rename a file on Linux? A. rename B. rn C. mv D. ren

C

Which command lists all files in the current directory that start with a capital letter? A. Is A-Z B. ls A-Z* C. ls [A-Z]* D. ls --uppercasefiles

C

Which command will display the UID, GID and groups your current user belongs to? A. whoami B. Who C. id D. about

C

Which command will display the groups that the root user belongs to? A. all -t B. groups -a C. id root D. all E. group -r

C

Which command would allow a user to execute commands as root? A. whoami B. about C. sudo D. who E. grep

C

Which command would list files that do not begin with a "T" or a "W"? A. echo /etc/*[TW!] B. echo /etc/!TW C. echo /etc/[!TW]* D. echo /etc/[*TW]!

C

Which directory contains the files and directories automatically copied over to a new user's home directory when the account is first created? A. /etc/group B. /etc/user C. /etc/skel D. /etc/temp|ate

C

Which directory is the root of the filesystem? A. /sys B. /root C. / D. /home E. /var

C

Which file contains the information passed to the kernel at boot time? A. /proc/kargs B. /proc/kopts C. /proc/cmdline D. /proc/kernel

C

Which of the following Ubuntu releases is considered most stable and fit to use for business purposes? A. Xubuntu Server B. Ubuntu Vanilla C. LTS D. Xubuntu E. Kubuntu

C

Which of the following commands sets the variable USERNAME to the value bob? A. set USERNAME bob B. $USERNAME==bob C. var USERNAME=bob D. USERNAME<=bob E. USERNAME=bob

E

Which of the following commands will display CPU information? (choose two) A. cpuinfo B. lscpu C. showcpu D. lspic E. arch

E

Which of the following is a protocol used for automatic IP address configuration? A. NFS B. LDAP C. SMTP D. DNS E. DHCP

E

Which of the following outputs comes from the command free? A. 21:04:15 up 14 days, 7:43, 3 users, load average: 0.89, 1.00, 0.99 B. avg—cpu: %user %nice %System %iowait %steal %idle 34.04 0.03 13.88 1.06 0.00 50.99 C. Filesystem | Size | Used | Avail | Use% | Mountedon /dev/mapper/vg_ssd-root | 25G | 20G | 3 . 6G | 85% | / D. 1.8M /tmp E. total | used | free | shared | buff/cache | available Mem: 16123128 | 12565680 | 2011624 | 412128 | 1545824 | 7180416

E

Which of the following outputs could stem from the command last? A. 1 ls 2 cat text.txt 3 logout B. Password for user last changed at Sat Mar 31 16:38:57 EST 2018 C. Last login: Fri Mar 23 10:56:39 2018 from server.example.com D. EXT4-fs (dm-7): mounted filesystem with ordered data mode. Opts: (null) E. root tty2 Wed May 17 21:11 - 21:11 (00:00)

E

Which of the following statements regarding Linux hardware drivers is correct? A. Drivers are regular Linux programs which have to be run by the user who wants to use a device. B. Drivers are not used by Linux because the BIOS handles all access to hardware on behalf of Linux. C. Drivers are stored on their devices and are copied by the Linux kernel when a new device is attached D. Drivers are downloaded from the vendor's driver repository when a new device is attached. E. Drivers are either compiled into the Linux kernel or are loaded as kernel modules.

E

Which of the following values could be a process ID on Linux? A. /bin/bash B. 60b503cd-019e-4300-a7be-922f074ef5ce C. /sys/pid/9a14 D. fff3 E. 21398

E

Which permissions should be given to a file that needs to be opened and edited by the file's owner and opened read-only by the file's group? A. 0466 B. 0444 C. 0540 D. 0751 E. 0640

E

You have a program called /user/bin/foo. You wish to create a symbolic link, /home/user/bin/foo, that points to it. Which command will do this task? A. ln --symlink /home/user/foo /user/bin/foo B. ln /user/bin/foo /home/user/foo C. ln /home/user/foo /user/bin/foo D. ln -sys /home/user/foo /user/bin/foo E. ln -s /user/bin/foo /home/user/foo

E

A network of inexpensive computers connected to sensors and controllers is called: A. Internet of Things (IoT) B. Creative commons C. Open source networking D. Closed source computing E. Relationational database

A

A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter. A. True B. False

A

By default, the zip command replaces uncompressed files with compressed files. A. True B. False

A

Commands must follow certain rules known as: A. Syntax B. Synapse C. Command Rules and Regulations D. Command Execute

A

Consulting log files can therefore be an important part of diagnosing problems with daemons. A. True B. False

A

DHCP can be used to deliver IP addresses in one of two ways: A. Fixed and Dynamic B. Manual and Automatic C. Dial-up and DSL

A

Which command is used to print the full contents of a file to the screen at once? A. cat B. tail C. head D. less

A

What does this shell script do? FOO=/tmp/foo if [ ! -d $FOO ]; then mkdir $FOO fi A. Creates /tmp/foo if it does not exist B. Outputs a message to the screen C. Creates /tmp/foo and raises an error if there is a problem D. Nothing, since there is a problem with the conditions in the if statement E. Makes the /tmp/foo directory if a file by that name exists

A

What is the correct statement to be used for comparison in a Linux shell script? A. if [ $x -gt $y ] B. if $x -gt $y C. if ( $x -gt $y) if { $x -gt $y }

A

What is the correct way to save the current directory to a variable? A. A=`pwd` B. pwd | $A C. A=cwd D. A=pwd E. pwd $A

A

What is the ls command used for in Linux? A. Lists the files within a directory B. Lists all shared files on a system C. Lists all users utilizing a file D. Lists all saved cookies on a system

A

What is the main difference between the desktop environments of Windows/Mac OS and Linux? A. Windows/Mac OS each have an inseparable desktop environment while Linux desktop environments are modular B. Windows/Mac OS desktop environments are drag and drop while Linux desktop environments are not C. Windows/Mac OS each have beautiful desktop environments while Linux desktop environments are ugly D. Windows/Mac OS each have a modular desktop environment while Linux desktop environments are inseparable

A

What is the meaning of $(( $i + 1)) ? A. 1 will be added to the i variable B. If i is 0, the loop will stop C. This will return the value of the next argument to the script D. This will return the value of the first argument to the script E. This runs the command stored in variable i

A

What is the preferred source for the installation of new applications? A. The distribution's package repository B. The vendor's version management system C. A retail store D. A CD-ROM disk E. The vendor's website

A

What is the program called that takes commands from the keyboard and gives them to the kernel to execute? A. Shell B. Kernel C. Root D. Command

A

What is the purpose of the PATH environment variable? A. It allows the execution of commands without the need to know the location of the executable. B. It increases security by preventing commands from running in certain locations. C. It specifies the location of a user's home directory. D. It indicates the location of the default shell to be used when a user logs in. E. It contains the absolute path to the current directory.

A

What is used as a placeholder for an unknown value in a script, and its value is then calculated or determined when the script is executed? A. Variable B. Function C. Pipeline D. String

A

What option can be used with tail or head to specify the number of lines to display to the screen? A. —n B. —b C. —c D. —x

A

What option for the ls command will display all files, including hidden files? A. -a B. -L C. -H D. -w

A

What symbol can be used to represent none, one, or multiple characters within search criteria? A. * B. ? C. x D. .

A

What type of multitasking does Linux use? A. Preemptive B. Cooperative C. Multi-user D. Single-user

A

When a new user is added, where does the user ID get stored? A. /etc/passwd B. /etc/pass C. /etc/realm D. /etc/shpasswd E. /etc/users

A

When issuing the service network restart command, which of the following occurs? A. Takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted. B. The networking for the system is stopped and then started back up. C. Brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.

A

When typing a long command line at the shell, what single character can be used to split a command across multiple lines? A. \ B. / C. * D. &

A

When using the sudo command to execute a command as the root user, the command prompts for the user's own password, not that of the root user. A. True B. False

A

When you execute the dmesg command, the system displays messages that are generated by the kernel. A. True B. False

A

Which GID is usually used to represent the root group on a Linux system? A. 0 B. 1 C. 10 D. 100

A

Which UID is usually used to represent the root user on a Linux system? A. 0 B. 1 C. 100 D. 1000

A

Which command allows you to view or change some of the default values used by the useradd command? A. useradd -D B. useradd -r C. modvalue D. useradd -f

A

Which command can be used to determine a user's most recent log in? A. last B. login C. history D. shell

A

Which of the following would be considered a host? A. A printer attached to the network via an IP address B. A network cable C. A CD-ROM D. The computer's hard drive

A

Which of the following would properly identify the device associated with the second partition on the first hard disk on the first IDE controller of a system? A. /dev/hda2 B. /dev/hd1b2 C. /dev/hdc1d2p2 D. dev/hdc1a2

A

Which operator in a regular expression matches the preceding character either zero or one time? A. ? B. * C. + D. % E. $

A

Which option for the usermod command can be used to specify a user's primary group ID? A. -g B. -S C. -G D. -s

A

Which package format is used by Ubuntu? A. .deb B. .rpm C. .tar D. .tgz

A

Which permission string will be represented by this type of permission: "Read and write permission for the user. The user's group and all other users should only be able to read the file." A. rw-r--r-- B. r-------- C. rwxrwxrwx

A

Which software handles the installation and removal of software on Debian and Ubuntu? A. apt B. install C. rpm D. yum

A

Which symbol is used to prefix a variable? A. $ B. & C. % D. @

A

Which type of IP addresses uses a dotted-decimal notation? A. IPv4 B. IPv5 C. IPv6 D. MAC

A

Which type of files is an important part of diagnosing problems with daemons? A. Log files B. System files C. Configuration files D. User files

A

You archived your users' directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention: home/username/somefile How will you extract just the files for the user called fred? A. tar -xzf backup.tar.gz home/fred/ B. tar -tjf backup.tar.gz /home/fred C. tar -xjf backup.tar.gz home/fred/ D. tar -xzf backup.tar.gz fred E. tar -tzf /home/fred < backup.tar.gz

A

You try to compress a file that is already compressed. Which of the following statements is true? A. The file will not be compressed any further than it already was B. The compression algorithm needs to be set to the "currently compressed" mode for it to be compressed further C. The file changed while you were compressing it D. The file will be deleted E. The file will actually be uncompressed

A

A package manager: (choose two) A. Downloads software from the Internet B. Keeps track of which files belong to which packages C. Can optionally repartition your disk to make room for Linux D. Performs a fresh install of Linux E. Emails you when software is out of date

A, B

The Free Software Foundation believes that: (choose two) A. Software should be free to modify B. Software should be free to share C. Software should not have copyright D. People should write software with no expectation of making money E. No money should ever change hands

A, B

To get help on using the info command, execute: (choose two) A. man info B. info info C. help info D. info -q

A, B

To search the man page sections for the keyword example, which of the following command lines could you execute? (choose two) A. man -k example B. apropos example C. man -f example D. whatis example

A, B

Two components that provide the ability to implement a firewall include: (choose two) A. iptables B. gufw C. ifconfig D. Cerberus E. Ipfw

A, B

What are tradeoffs of increasing the level of privacy you have in your web browser? (choose two) A. You may have to explicitly permit some cookies to be saved B. Sites may not work properly C. You may get viruses D. Websites may load slower E. Images won't load properly

A, B

Which of the following answers are true for cloud computing? (Choose two correct answers) A. From the business perspective, Cloud Computing means outsourcing or centralization of IT operations B. Cloud Computing provides new tools to manage IT resources C. Cloud Computing is the opposite of the Green IT; i.e., the use of fossil non-regenerative energy for computing D. Cloud Computing implies sharing all information with everyone else in 'the cloud'

A, B

Which of the following are valid CPU types for Intel-based platforms? (choose two) A. 64-bit B. 32-bit C. 48-bit D. 24-bit

A, B

Which of the following commands output the content of the file Texts 2.txt? (Choose two.) A. cat 'Texts 2.txt' B. cat -- Texts 2.txt C. cat |Texts 2.txt| D. cat 'Texts\ 2.txt' E. cat Texts\ 2.txt

A, B

Which of the following commands will allow you to view all processes on the system? (choose two) A. ps -ef B. ps aux C. ps -eLf D. ps -A E. ps

A, B

Which of these commands will return /etc/gai.conf /etc/pam.conf /etc/ucf.conf? (choose two) A. ls /etc/???.???? B. echo /etc/???.*f C. echo /etc/*?.*o? D. ls /etc/p???.**

A, B

Apple's OS X is: (choose three) A. A fully certified UNIX distribution B. Tightly integrated with Apple hardware C. Partially based on code from the FreeBSD project D. Primarily used to manage network services E. Derived from Linux F. Able to natively run Windows binaries

A, B, C

Lossy compression: (choose three) A. Usually results better compression than lossless B. Is often used with images C. Sacrifices some quality D. Is often used with documents E. Decompresses to an identical version as the original

A, B, C

Microsoft Windows: (choose three) A. Has a scripting environment called PowerShell B. Is generally backwards compatible with previous versions C. Offers both desktop and server products D. Has a short maintenance cycle E. Has a Linux compatibility mode F. Has a new desktop version every year.

A, B, C

Which of the following are traits of a multiuser operating system? (choose three) A. Many users can log in simultaneously with a unique account B. Users can protect their information from other users C. Resources are shared between users D. Each user can only log in once per day E. An administrative user gets a dedicated CPU

A, B, C

Which of the following are traits of a multiuser operating system? (choose three) A. Resources are shared between users B. Users can protect their information from other users C. Many users can log in simultaneously with a unique account D. Each user can only log in once per day E. An administrative user gets a dedicated CPU

A, B, C

Which of the following commands can be used to compress a file? (choose three) A. zip B. bzip2 C. gzip D. bunzip2 E. cat

A, B, C

When choosing a distribution of Linux, you should consider: (choose four) A. Does your organization require long-term support for the system B. Does the distribution offer a "stable" version C. If the application software is supported by the distribution D. Will commercial support be required for the OS E. Popularity on social media

A, B, C, D

When choosing a distribution of Linux, you should consider: (choose five) A. Does the distribution offer a "stable" version B. Will users require a GUI C. Will commercial support be required for the OS D. Does your organization require long-term support for the system E. Popularity on social media F. If the application software is supported by the distribution

A, B, C, D, F

The following sections commonly appear on a man page: (choose three) A. SYNOPSIS B. NAME C. LICENSE D. DESCRIPTION

A, B, D

The following system load averages are displayed by the top command: (choose three) A. 15 minute B. 1 minute C. 10 minute D. 5 minute

A, B, D

Which of the following are glob characters? (choose three) A. The square brackets "[" and "]" B. The question mark "?" C. The dash character "-" D. The asterisk "*"

A, B, D

Which of the following pieces of software deal with file sharing? (choose three) A. Netatalk B. Samba C. X-Windows D. NFS E. PostgreSQL

A, B, D

Lossy compression: (choose three) A. Usually results better compression than lossless B. Is often used with images C. Is often used with documents D. Decompresses to an identical version as the original E. Sacrifices some quality

A, B, E

Microsoft Windows: (choose three) A. Is generally backwards compatible with previous versions B. Offers both desktop and server products C. Has a Linux compatibility mode D. Has a short maintenance cycle E. Has a scripting environment called PowerShell F. Has a new desktop version every year.

A, B, E

The three main modes of tar are: (choose three) A. List B. Create C. Compress D. Copy E. Extract

A, B, E

Which of the following are typical services offered by public cloud providers? (Choose three.) A. Platform as a Service(PaaS) B. Infrastructure as a Service(IaaS) C. Internet as a Service(IaaS) D. Graphics as a Service (GaaS) E. Software as a Service (SaaS)

A, B, E

Which of the following commands will check hard disk GPT partitions? (choose three) A. gdisk B. sgdisk C. sfdisk D. gfdisk E. cgdisk

A, B, E

Open source means: (choose two) A. You can view the software's source code B. You must share your changes C. You can modify the software's source code D. You cannot charge anything for the software E. You must support the software you share

A, C

The touch command can be used to: (choose two) A. Update the timestamp of existing files B. Change ownership of a file C. Create new files D. Change a file's name

A, C

To get help on using the info command, execute: (choose two) A. man info B. info -q C. info info D. help info

A, C

Which commands provide help for a specific Linux command? (Choose two answers). A. man B. ask C. info D. whatdoes E. helpme

A, C

Which files contain user account information? (choose two) A. /etc/passwd B. /etc/passwords C. /etc/shadow D. /etc/group

A, C

Which of the following Linux distributions use the dpkg package management system? (Choose two correct answers) A. Debian B. Mandriva C. Ubuntu D. Red Hat E. Suse

A, C

Which of the following are examples of desktop software? (choose two) A. Music player B. File share C. Web browser D. Compiler E. Web server

A, C

Which of the following are valid CPU types for Intel-based platforms? (choose two) A. 64-bit B. 24-bit C. 32-bit D. 48-bit

A, C

Which of the following are valid IPv4 addresses? (choose two) A. 10.33.55.77 B. 192.105.10.10.2 C. 192.105.10.10 D. 192.301.25.25

A, C

Which two commands do the same thing? (choose two) A. tar -czf foo.tar.gz foo B. tar -tzf foo.tar.gz C. tar -c foo | gzip > foo.tar.gz D. tar -x foo | gzip E. tar -xzf foo.tar.gz

A, C

Choose all of the following statements that are true in regard to virtual RAM: (choose three) A. Virtual RAM is stored on a hard drive B. Virtual RAM is stored in the CPU C. Virtual RAM is used when available physical RAM is low. D. Virtual RAM is also called swap space

A, C, D

Creative Commons licenses allow you to: (choose three) A. Specify whether or not people may distribute changes B. Receive royalties on the use of the work C. Allow or disallow commercial use D. Specify whether or not changes must be shared E. Get a veto on where the work is used

A, C, D

Permissive free software licenses: (choose three) A. Can allow software to be used inside closed source software B. Include the GPLv2 and BSD C. Are not approved by the FSF D. Don't have a copyleft provision E. Are not approved by the OSI

A, C, D

The Linux shell _____________: (choose three) A. Is customizable B. Has a built-in text editor C. Allows you to launch programs D. Has a scripting language E. Is responsible for tracking the location of configuration files

A, C, D

The following sections commonly appear on a man page: (choose three) A. NAME B. LICENSE C. DESCRIPTION D. SYNOPSIS

A, C, D

Which criteria are useful when deciding which operating system to use? (Choose three correct answers) A. License costs B. Linux can do everything, there is no need for further evaluation C. Availability of mandatory applications and tools D. Skills of the administrators and staff E. Ideological preferences of the system administrator

A, C, D

Which of the following applications are used to play an MP3 file on a Linux system? (Choose three answers) A. Banshee B. Xara Xtreme C. Amarok D. Audacious E. LibreOffice Player

A, C, D

A Linux computer currently has no access to the internet. Which command is used to display and manipulate the information about the network gateway for the system? A. gateway B. route C. ifconfig D. netstat

B

A Mail Transfer Agent's primary purpose is to: A. Serve email to end clients B. Deliver mail between servers C. Manage the end user's inbox D. Filter out spam E. Act as a gateway between faxes and email

B

A _____ lets you edit documents that are stored in plain-text format. A. File editor B. Text Editor C. File viewer

B

A __________ is a program or system setting that polices network transactions, allowing or disallowing them based on programmed criteria. A. Shell B. Firewall C. Antivirus

B

A conditional that lets you make multiple comparisons with a pattern is called: A. fanout B. case C. if D. branch E. test

B

A copyleft provision in a software license means: A. You may not link against third party closed source software B. If you redistribute the software, you must distribute the source to any changes you make C. You must provide free copies of the software if you use it D. You must provide support for your modifications E. You give up your copyright to the software

B

A directory contains the following three files:texts 1.txttexts 2.txttexts 3.csvWhich command copies the two files ending in .txt to the /tmp/ directory? A. cp ??.txt /tmp/ B. cp *.txt /tmp/ C. cp. \.txt /tmp/ D. cp ?.txt /tmp/ E. cp $?.txt /tmp/

B

A division of a hard drive may be referred to as a _______ . A. block B. partition C. portion D. label

B

A license where you don't have access to the source code is called: A. Impaired source B. Closed source C. Open source D. Sourceless

B

A load average of 1.0 always means the system is fully loaded. A. True B. False

B

A package system can be installed directly from the internet. A. True B. False

B

A pair of double quotes ( " ) will prevent the shell from interpreting any metacharacter. A. True B. False

B

A source file and a symbolic link must be part of the same file system. A. True B. False

B

A value of 0 in the "minimum" password aging field means the user cannot change their password. A. True B. False

B

Artificial intelligence has little potential for gains in efficiency, safety and productivity. A. True B. False

B

Brackets cannot be used to a represent a range of characters. A. True B. False

B

Bundling utilities, management tools, and application software with a Linux kernel is called a: A. A trademark B. A distribution of Linux C. A type of hardware D. A text editor

B

DNS stands for Domain Name Source. A. True B. False

B

Deleting a source file will break an associated hard link. A. True B. False

B

File permissions cannot be edited by the root user. A. True B. False

B

For root users, the passwd command can only be used to change the password of the user running the command. A. True B. False

B

Given a file called documents.zip, how can you see what's in it without extracting the files? A. zip -lf documents.zip B. unzip -l documents.zip C. unzip -list documents.zip D. zip -l documents.zip E. showzip documents.zip

B

Given the following part of a script: if [ -f $1 ]; then echo "I am here" fi What is the meaning of $1? A. It is a parameter to -f, indicating the size of the file B. It is the first argument passed to the script C. It is a special variable that indicates the exit code of the command before it D. It is a file called $1 E. It is a list of files that gets interpolated

B

How do you perform a recursive listing from the command prompt? A. Is /s B. Is -R C. dir /s D. dir -R

B

If you wanted to create and print an invoice, which software could you use? A. Evolution B. LibreOffice C. GNOME D. Compiz E. Firefox

B

In Linux, a dash (-) serves as a "quote" or "escape" character to enter otherwise hard-to-specify characters, such as spaces, as part of a filename. A. True B. False

B

In general, for which of the following would you want to use lossless compression? A. A JPEG image B. A log file C. An encrypted email D. A movie E. An mp3 audio file

B

In order to hide a file or directory from being viewed by the Is command, you just have to: A. Put * in the beginning of the filename B. Put . in the beginning of the filename C. Save the file as a .xyz file

B

In the command tar -cvjf foo.tbz a b c, what are a, b, and c? A. Nothing; -cvjf only expects one parameter B. File names to be added to the archive C. a is the directory that will be prepended to files; b and c are files inside it D. Matching operators; anything starting with a, b, or c will be added E. Extra flags passed to tar

B

What is a Linux distribution? A. The Linux file system as seen from the root account after mounting all file systems. B. A bundling of the Linux kernel, system utilities and other software. C. The set of rules which governs the distribution of Linux kernel source code. D. An operating system based on Linux but incompatible to the regular Linux kernel. E. A set of changes to Linux which enable Linux to run on another processor architecture.

B

What is a special permission bit set on a file or a directory that lets only the owner of the file/directory or the root user delete or rename the file? A. SGID B. Sticky bit C. SUID D. Special bit

B

What is one of the most basic features of a shell script? A. The ability to compile programs B. The ability to run commands C. The ability to ask for user input D. The ability to display command output

B

What is the default user for the su command? A. All users B. The root user C. Any member of the password group D. The most recently created user

B

What is the generic name given to the action of protecting shell meta-characters from being treated specially by the shell? A. Nulling B. Quoting C. Slashing D. Queuing

B

What is the main difference between Linux and Windows/MAC OS? A. There is no real difference B. Linux is open source software while the other two are closed source operating systems C. Linux is affordable while Windows/MAC OS is expensive D. You have to install Linux while Windows/MAC OS is pre—installed

B

What is the output of the following command? for token in a b c; do echo -n ${token}; done A. anbncn B. abc C. $token$token$token D. {a}{b}{c}

B

What is the output of the following command? tail -n 20 test.txt A. The first 20 lines of test.txt B. The last 20 lines of test.txt including the black lines C. The last 20 lines of test.txt omitting the black lines D. The last 20 lines of test.txt with line numbers

B

What is the usual absolute path A. /home B. /home/foo C. /root/home/foo D. /root

B

What permissions would be represented by the octal 517? A. rwx--xr-x B. r-x--xrwx C. --xr-xrwx D. r-wxwx--x

B

What symbol can be used to represent a single character within the search criteria? A. * B. ? C. x D. .

B

When interpreting the SYNOPSIS of a command found on a man page, the "|" means: A. The items it separates can be used together B. The items it separates cannot be used together

B

When looking at the primary IPv4 configuration file, if the device was configured to be a DHCP client, then the BOOTPROTO value would be set to none. A. True B. False

B

When the free command is run, what does the Mem: line reveal about the system? A. CPU statistics B. RAM statistics C. Graphics specifications D. System information

B

Which of the following are correct about for and while loops? (choose two) A. for loops have a test each cycle to determine if it should run again B. for loops operate over a fixed list of items C. for loops require a variable over which to iterate D. while loops operate over a fixed list of items E. while loops have a test each cycle to determine if it should run again

B, E

Which of the following commands increases the number of elements in a directory (choose two answers) A. create newfile B. mkdir newdirectory C. rmdir newdirectory D. ls newfile E. touch newfile

B, E

Who founded the Open Source Initiative? (choose two) A. University of California at Berkeley B. Richard Stallman C. Bruce Perens D. Linus Torvalds E. Eric Raymond

B, E

What option to the netstat command has information shown as numbers rather than names? A. -name B. -r C. -t D. -n

D

A pipe allows you to... A. ...send the same input to multiple commands. B. ...type multiple commands at one prompt. C. ...send the output of one command to another. D. ...send the output of a command to a file.

C

A software release cycle describes: A. How often security fixes are implemented B. How often the software's memory is released back to the operating system C. How often upgrades come out for software D. How often the computer must be rebooted E. How often the computer must be upgraded to support new software

C

Channel 2 is: A. STDOUT B. STDALL C. STDERR D. STDIN

C

Cloud computing is: A. Requires fewer resources because systems are shared among many users B. Allows users in different geographical regions to work together in real time C. All are correct D. Is made possible by faster internet speeds E. Is useful for both business and home users

C

Compression of a file works by: A. Eliminating gaps within the file B. Consolidating multiple files into one C. Removing redundant information D. Storing most of the data on removable media and just leaving a pointer E. Removing the high order bit from each byte

C

HOME is an example of _________. A. A path variable B. A local variable C. An environment variable D. An alias E. An internal command

C

How could one search for the file foo.txt under the directory /home? A. find /home foo.txt B. search /home foo.txt C. find /home -name foo.txt D. find /home -file foo.txt E. search /home -file foo.txt

C

How would you represent r-xrw-r-- in octal notation? A. 754 B. 624 C. 564 D. 541

C

If a user is deleted, the files and directories that the user owned... A. ...are deleted as well. B. ...will have no user owner. C. ...may be important for others in the organization D. ...will have no UID owner.

C

If a user is deleted, the files and directories that the user owned... A. ...will have no user owner. B. ...will have no UID owner. C. ...will show a UID as the owner, but not user name. D. ...are deleted as well.

C

If you wanted to let a Linux machine share files with Windows clients and servers, you would use: A. Netatalk B. DNS C. Samba D. NFS E. bind

C

In the command tar -czf foo.tar.gz bar, what is the purpose of the f flag? A. Tells tar to copy only files, and not directories B. Tells tar to read from the file that follows the flag C. Tells tar to write to the file that follows the flag D. Tells tar to print the name of each file as it is processed E. Specifies extra compression is to be used

C

Information provided in the default output of the who command includes the following: A. Username, password, ip address B. GID, UID, password C. Username, Terminal Identifier, Login Date and Time

C

Linux distributions use this to add and remove software from the system: A. Application Programming Interface (API) B. Partitioning tool C. Package manager D. Bash E. Compiler

C

Linux is a ____________ system. A. Multi operating B. Single user C. Multiuser D. Super user

C

Linux originally only ran on: A. Xerox copy machines B. Specialized processor chips C. Intel 386 PCs D. Raspberry Pi computers E. Macintosh

C

Linux stores most log files in the __________ directory tree. A. /var/system B. /sys/var/log C. /var/log

C

Most account features are defined in the /etc/passwd file, except: A. Username B. Password C. Connection type

C

Most of nano's commands take the form of: A. Mouse clicks B. Escape followed by another character C. Control and another character D. The F1 through F12 function keys E. Alt and another character

C

Which of the following are true about compiled programming languages? A. Ruby is a compiled language B. Compiled languages are great for system administration tasks like scripting C. C is a compiled language D. Perl is a compiled language E. A programmer is usually more productive when using a compiled language

C

Which of the following are two types of output messages? A. Manual and Automatic messages B. Standard Output and Input messages C. Standard Output and Standard Error messages D. Error Input and Automatic Output

C

Which of the following characters in a shell prompt indicates the shell is running with root privileges? A. & B. * C. # D. $

C

Which of the following commands can be used to create a file? A. nico B. create C. touch D. mkfile E. build

C

Which of the following commands can be used to determine the time of the last login of a given user? A. showlog B. recent C. last D. history

C

Which of the following commands can be used to rename a file? A. cp B. rm C. mv D. name

C

Which of the following commands can be used to resolve a DNS name to an IP address? A. dns B. query C. host D. iplookup

C

Which of the following commands can be used to resolve a DNS name to an IP address? A. dns B. query C. nslookup D. iplookup

C

Which of the following commands can search for executable programs or scripts located in the PATH variable? A. what B. why C. which D. how

C

Which of the following commands creates the ZIP archive poems.zip containing all files in the current directory whose names end in .txt? A. zip *.txt > poems.zip B. zcat *.txt poems.zip C. zip poems.zip *.txt D. zip cfz poems.zip *.txt E. cat *.txt | zip poems.zip

C

Which of the following commands extracts the contents of the compressed archive file1.tar.gz? A. tar -czf file1.tar.gz B. ztar file1.tar.gz C. tar -xzf file1.tar.gz D. tar --extract file1.tar.gz E. detar file1.tar.gz

C

Which of the following commands finds all lines in the file operating-systems.txt which contain the term linux, regardless of the case? A. igrep linux operating-systems.txt B. less -i linux operating-systems.txt C. grep -i linux operating-systems.txt D. cut linux operating-systems.txt E. cut [Ll] [Ii] [Nn] [Uu] [Xx] operating-systems.txt

C

Which of the following commands increases the number of files within a directory? A. ls newfile B. create newfile C. touch newfile D. rmdir newfile

C

Which of the following commands is used to extract files from a zip archive? A. zip -x B. tar -xcf C. unzip D. untar -z

C

Which of the following commands set "other" permissions on file to r-x? A. chmod o-r-w file B. chmod o+rx file C. chmod o=rx file D. chmod o=r+x file

C

Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups? A. usermod -G extra bob B. usermod -ag bob extra C. usermod -aG extra bob D. usermod -a extra bob

C

Which of the following commands will add the group extra to the user jane's secondary groups in addition to jane's current secondary groups? A. usermod -a extra jane B. usermod -ag jane extra C. usermod -aG extra jane D. usermod -G extra jane

C

Which of the following is an interpreted, high-level, general-purpose programming language? A. Cobra B. C+ C. Python D. Programmer

C

Which of the following is the file descriptor number used to represent the Standard Error (STDERR)? A. 0 B. 1 C. 2 D. 3

C

Which of the following is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user? A. Remote Computing B. On-demand Computing C. Cloud Computing D. Passive Computing

C

Which of the following is used as a virtual or pseudo filesystem used to interface with the kernel and system as a whole but not with individual processes? A. /boot B. /proc C. /sys D. /dev

C

Which of the following options for the useradd command allows root to specify the UID to be associated with the account? A. -g B. -G C. -u D. -M

C

Which of the following options is used with tar to specify the filename of the tar archive? A. —c B. —v C. —f D. —n

C

Which of the following outputs might be displayed when executing the command last? A. Last login: Fri Mar 23 10:56:39 2019 from server.diontraining.com B. EXT4-fs (dm-7): mounted filesystem with ordered data mode. Opts: (null) C. root tty2 Wed Sep 29 21:11 - 21:11 (00:00) D. system uptime 2.6.32—131.0.15. Mon Oct 31 17:45 - 17:48 (00:03)

C

Which of the following programs is not a graphical web browser? A. Opera B. Firefox C. Links D. Konqueror E. Chrome

C

Which of the following programs on a Linux system could you use as a replacement for Microsoft Outlook? A. MyMail B. LinuxMail C. Thunderbird D. Linux Outlook

C

Which of the following protocols defines how network communication functions? A. DHCP B. DNS C. TCP/IP D. SSH

C

You have just installed a wireless network adapter in your Linux system, but you cannot connect to the wireless network. What is most likely the problem? A. The adapter is broken B. The adapter isn't getting enough power C. You didn't install the right driver for the device D. There is no WiFi in range

C

Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2? A. You must ensure your custom kernel runs on a regular Intel machine B. There are no requirements C. You must make the source to your kernel available D. You must make your hardware designs available E. You must make the source to your custom web interface available

C

______________ is a set of standards that underlie most modern network communications at the software level. A. Wi-Fi B. Internet C. TCP/IP

C

_________________ enables a script to perform one of several actions relying on a particular condition or value of a variable. A. Delimiter B. Variables C. Conditional Expression

C

In graphical mode, you can get to a shell by running which applications? (choose two) A. Gbash B. Guiterm C. Terminal D. Xterm E. Console

C, D

Open source licenses differ, but generally agree that: (choose two) A. You are not allowed to sell the software B. You must redistribute your changes C. You should be able modify the software as you wish D. You should have access to the source code of software

C, D

Which of the following DNS record types hold an IP address? (Choose two.) A. NS B. AAAA C. MX D. A E. CNAME

C, D

Which of the following are correct about for and while loops? (choose two) A. while loops operate over a fixed list of items B. for loops have a test each cycle to determine if it should run again C. while loops have a test each cycle to determine if it should run again D. for loops operate over a fixed list of items E. for loops require a variable over which to iterate

C, D

Which of the following are methods for setting permissions using the chmod command? (choose two) A. letter B. primary C. symbolic D. octal

C, D

Which of the following are valid IPv4 addresses? (choose two) A. 192.105.10.10.2 B. 192.301.25.25 C. 10.33.55.77 D. 192.105.10.10

C, D

What is true about the dmesg command? (Choose two.) A. It traces the execution of a command and shows each step the program carries out. B. It sends messages to the command lines of all current user sessions. C. It displays the content of the Linux kernel's ring buffer. D. It immediately outputs all new messages written to the system journal. E. It might not display older information because it was overwritten by newer information.

C, E

Which of the following are correct commands for changing the current directory to the user's home? (Choose TWO answers) A. cd /home B. cd .. C. cd ~ D. cd / E. cd

C, E

Which of the following are examples of desktop software? (choose two) A. File share B. Compiler C. Music player D. Web server E. Web browser

C, E

Which of the following directories are designed as locations where any user can create a temporary file? (choose two) A. /sbin B. /lost+found C. /tmp D. /home E. /var/tmp

C, E

The statement that describes the difference between a man page and an info page is: A. The man page is a long detailed reference; the info page is very terse. B. There is very little difference between them. C. The man page is like a guide; the info page is a more concise reference. D. The info page is like a guide; a man page is a more concise reference.

D

The term for individual computers running multiple systems at the same time is: A. MultiRun B. Cloud priority C. Distribution D. Virtualization E. Googleization

D

The tilde (~) is used to represent: A. Any two single characters B. Nothing; it has no special meaning C. The directory above the current working directory D. A user's home directory

D

The tilde (~) is used to represent: A. Nothing; it has no special meaning B. Any two single characters C. The directory above the current working directory D. A user's home directory

D

The top-level directory on a Linux system is represented as: A. /home B. C: C. /root D. /

D

The usermod command can be used to unlock a users account with the following option. A. -s B. -u C. -f D. -U

D

Typing $ followed by pressing which key twice, in quick succession, will list all of the variables? A. CTRL B. ALT C. SHIFT D. TAB

D

UIDs 1-499 are usually reserved for what kind of users? A. Are not used for user accounts, but for group accounts B. Log-in (human) users C. Remote log-in accounts D. System accounts, such as server processes

D

Virtualization means: A. A user can connect to a server over the network and use a virtual console B. Many users can share one hard drive C. A machine can swap memory to disk D. A single host can be split up into multiple guests E. Two users get different memory spaces on the same machine

D

Virtualization means: A. Many users can share one hard drive B. A user can connect to a server over the network and use a virtual console C. A machine can swap memory to disk D. A single host can be split up into multiple guests E. Two users get different memory spaces on the same machine

D

What can be found in the /proc/ directory? A. One directory per installed program. B. One device file per hardware device. C. One file per existing user account. D. One directory per running process. E. One log file per running service.

D

What command displays manual pages? A. help B. /? C. ?help D. man

D

What command will allow you to change your current working directory? A. list B. chdir C. ls D. cd

D

What command will allow you to change your current working directory? A. ls B. list C. chdir D. cd

D

What directory contains a user's home directory? A. /rootfs B. /user C. / D. /home

D

What directory typically contains log files? A. /proc/loc B. /log C. /usr/log D. /var/log

D

What directory typically contains log files? A. /proc/loc B. /usr/log C. /log D. /var/log

D

What does a distribution provide to add and remove software from the system? A. Compiler B. Application Programming Interface (API) C. Bash D. Package Manager E. Partitioning tool

D

What does it mean when a work is placed in the public domain? A. The work was done by a government agency B. You may not use the work for commercial purposes C. The author has died D. The author has relinquished the copyright on the work E. You must redistribute changes to the software

D

What is a pre-integrated, self-contained system made by combining a software application (e.g., server software) with just enough operating system to run optimally on industry-standard hardware or a virtual machine? A. Turnkey B. Server solutions C. Virtual server D. Virtual appliance

D

What is the correct way to assign the word "Hello" to a variable? A. $A="Hello" B. A = "Hello" C. echo "Hello" &gt; A D. A="Hello" E. echo $A "Hello"

D

What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested? A. _ (underscore) B. - (minus) C. \ (backslash) D. . (dot)

D

What is the limit on the number of user accounts in a single computer in Linux? A. 10 B. 100 C. 1000 D. Unlimited

D

What is the meaning of $(( $i + 1)) ? A. If i is 0, the loop will stop B. This runs the command stored in variable i C. This will return the value of the next argument to the script D. 1 will be added to the i variable E. This will return the value of the first argument to the script

D

What is the term for a package that is a prerequisite required for installation of another program? A. Requirements B. Preinstalls C. Prepackage D. Dependencies

D

What one character treats the character that follows it as if it was surrounded by single quotes? A. / B. # C. % D. \

D

Which Linux distribution is used as a basis for the creation of Ubuntu Linux? A. Arch B. SUSE C. Gentoo D. Debian

D

Which UID is usually used to represent the first regular user on a Linux system? A. 1 B. 10 C. 100 D. 1000

D

Which character is known as a root directory? A. ^ B. & C. * D. /

D

Which command can be used to determine a user's most recent log in? A. history B. shell C. login D. last

D

Which command can be used to view the /etc/passwd file entries? A. uptime B. uppasswd C. getpasswd D. getent

D

Which command is used to print one page of text to the screen at a time? A. cat B. tail C. head D. less

D

Which command line tool is used to compress a single file using the Burrows-Wheeler algorithm? A. gzip B. xz C. tar D. bzip2

D

Which command searches manual page names and descriptions for a user-supplied keyword? A. pros B. props C. apos D. apropos

D

Which command shows all of the directories that the shell searches for programs? A. less $PWD B. more $ALL_PATH C. get $PATH D. echo $PATH

D

Which command will display the UID, GID and groups your current user belongs to? A. whoami B. Who C. about D. id

D

Which command will display the groups that the root user belongs to? A. all B. all -t C. group -r D. id root E. groups -a

D

Which command would you use to archive the Documents directory and compress it with bzip2 compression? A. tar -fzc Documents documents.tbz B. tar -cf Documents documents.tbz C. tar -cjf Documents D. tar -cjf documents.tbz Documents E. tar -czf documents.tbz

D

Which file contains a list of the user's secondary groups? A. /etc/passwd B. /etc/shadow C. /etc/user D. /etc/group

D

Which file contains the information passed to the kernel at boot time? A. /proc/kernel B. /proc/kopts C. /proc/kargs D. /proc/cmdline

D

Which file is used to define all of the users on a Linux system? A. /etc/users B. /etc/password C. /etc/user.conf D. /etc/passwd

D

Which is NOT a Linux distribution? A. CentOS B. openSUSE C. Debian D. Torvalds

D

Which of the following can be used to access the command line? A. Xargs B. Firefox C. BIOS D. Terminal E. XWindow

D

Which of the following can you NOT install Linux on? A. Cloud servers B. Desktops C. Smartphones D. Smartcard

D

Which of the following commands can be used to extract files from an archive? A. tar -evf B. tar -v C. tar -e D. tar -xvf E. tar -vf

D

Which of the following is a series of small single-board computers developed to promote the teaching of basic computer science in schools and developing countries? A. Strawberry Pi B. Blueberry Pi C. Blackberry Pi D. Raspberry Pi

D

Which of the following is a suite of client-server software for creating and using file hosting services? A. ownHost B. FileOwn C. DropCloud D. ownCloud

D

Which of the following is a valid Linux option style for Traditional Unix: A. two dashes (-) B. slash (/) C. no dash D. a single dash (-)

D

Which of the following is an example of globbing? A. ls /etc/ 2&gt; files.txt B. ls /etc/ &gt; files.txt C. ls /etc/ | more D. ls /etc/*.txt

D

Which of the following is the UNIX device name for a physical or virtual terminal connection? A. dev B. virt C. phy D. tty

D

Which option for the cut command is used to specify a delimiter? A. -D B. -f C. = D. -d

D

Which of the following is the filesystem for a CD-ROM? A. ext2 B. fast -32 C. procfs D. isofs

D

Which of the following is true about open source software? A. Open source software can not be copied for free B. The freedom to redistribute copies must include binary or executable forms of the software but not the source code. C. Open source software is not for sale D. Open source software is available for commercial use

D

Which of the following keys can be pressed to exit less? A. l B. x C. e D. q E. !

D

Which of the following options for the useradd command allows you to use a different primary group then the default? A. -G B. -u C. -U D. -g

D

Which of the following permissions would allow all users to add, view, and delete files in a directory? A. 750 B. 775 C. 666 D. 777

D

Which of the following programs is a graphical editor for vector graphics? A. Python B. NGINX C. Samba D. Inkscape E. MySQL

D

Which of the following programs on a Linux system could you use as a replacement for Microsoft PowerPoint? A. Draw B. Present C. Keynote D. Impress

D

Which of the following provides the correct syntax to search for lines ending with the given pattern using the grep command? A. ^pattern B. pattern^ C. $pattern D. pattern$

D

Which of the following statements is FALSE? A. A difference between Windows and Linux is the concept of mounting and unmounting partitions, drives, or directories in Linux. B. Linux distinguishes between uppercase and lowercase letters in the file system. C. As opposed to Windows, files in Linux may have a file extension, such as .txt, but do not need to have one. D. Hidden files start with a pound/hashtag.

D

Which of the following statements would be used for sending both standard output and standard error to the same location? A. 2 &> B. 2 >& C. 2 <& D. 2>&1

D

Which of the following types of bus can connect hard disk drives with the motherboard? A. The RAM bus B. The NUMA bus C. The CPU bus D. The SATA bus E. The Auto bus

D

Which of the following will change the group that is associated with a file? A. ls -g B. chmod C. chmod -w D. chown

D

Which one of the following statements concerning Linux passwords is true? A. All passwords can be decrypted using the system administrator's master password. B. Passwords may never start with a non-letter. C. Users cannot change their password once it has been set. D. Passwords are only stored in hashed form. E. Passwords may be at most six characters long.

D

Which option can be used with the rm command to prompt before deleting? A. A B. -P C. l D. -i

D

Which option can be used with the rm command to prompt before deleting? A. l B. A C. -P D. -i

D

A copyleft provision in a software license means: A. You give up your copyright to the software B. You may not link against third party closed source software C. You must provide support for your modifications D. You must provide free copies of the software if you use it E. If you redistribute the software, you must distribute the source to any changes you make

E

A maintenance cycle: A. Describes how often updates for software come out B. Should be short so you always have the freshest releases C. Only has meaning for paid software D. Should be long so that you have time before you need to upgrade E. Describes how long a version of software will be supported

E

Cloud computing is: A. Is made possible by faster internet speeds B. Is useful for both business and home users C. Allows users in different geographical regions to work together in real time D. Requires fewer resources because systems are shared among many users E. All are correct

E

Embedded Systems means: A. Users must support the systems themselves B. You can view the software's source code C. Companies must share their changes D. Businesses cannot charge anything for the software, only the hardware E. Systems designed to do a specific task on hardware optimized for only that purpose

E

If you wanted to set up a blog, which software would be most helpful? A. Samba B. MySQL C. Postfix D. Dovecot E. WordPress

E

If you wanted to write a report that was to be printed, you would probably use: A. A wiki B. Adobe Flash C. Firefox D. Chrome E. LibreOffice

E

In Linux, RPM can be defined as: A. Random program memory B. Relational peak monitoring C. Radical performance machine D. The speed a record plays back at E. The Package Manager program for Red Hat Linux

E

Linux is distributed under which license? A. GPLv3 B. BSD C. Linux Foundation D. MIT E. GPLv2

E

Most commands on Linux can display information on their usage. How can this information typically be displayed? A. By running the command with the option /? or /??. B. By running the command with the option ?! or ?=!. C. By running the command with the option /doc or /documentation. D. By running the command with the option -h or --help. E. By running the command with the option -m or --manpage.

E

Most of nano's commands take the form of: A. Alt and another character B. Escape followed by another character C. The F1 through F12 function keys D. Mouse clicks E. Control and another character

E

The file script.sh in the current directory contains the following content: #!/bin/bash echo $MYVAR The following commands are used to execute this script: MYVAR=value - ./script.sh The result is an empty line instead of the content of the variable MYVAR. How should MYVAR be set in order to make script.sh display the content of MYVAR? A. !MYVAR=value B. env MYVAR=value C. MYVAR=value D. $MYVAR=value E. export MYVAR=value

E

The release cycle: A. Only has meaning for paid software B. Describes how long software will be supported C. Should be long so that you have time before you need to upgrade D. Should be short so you always have the freshest releases E. Dictates how often software is updated

E

The release cycle: A. Only has meaning for paid software B. Should be short so you always have the freshest releases C. Should be long so that you have time before you need to upgrade D. Describes how long software will be supported E. Dictates how often software is updated

E

Traditional UNIX systems allowed users to belong to how many groups? A. 10,000 B. 1 C. 65,000 D. 256 E. 16

E

What is the return value of a shell script after successful execution? A. 1 B. 0 C. -1 D. -255 E. 255

E

What permissions are set on a file with the command chmod 654 file.txt? A. --wxr-x--x B. -rwxrw--x C. drw-r-xr-- D. d--wxr-x-- E. -rw-r-xr--

E

Which application would you use to edit and piece together sound files to make a podcast? A. Audiolicious B. GIMP C. Thunderbird D. Bash E. Audacity

E

Which command can be used to view the /var/log/wtmp file entries? A. getent B. uptime C. getpasswd D. uppasswd E. last

E

Which command will show what is inside the compressed tarball with a name of foo.tar.gz? A. tar -tjf foo.tar.gz B. tar -lf foo.tar.gz C. tar -tf foo.tar.gz D. tar -xf foo.tar.gz E. tar -tzf foo.tar.gz

E

Which distribution is related to Red Hat? A. Raspbian B. Debian C. Ubuntu D. Slackware E. Fedora

E

Which of the following commands adds the directory /new/dir/ to the PATH environment variable? A. $PATH=/new/dir: $PATH B. PATH=/new/dir: PATH C. export PATH=/new/dir: PATH D. export $PATH=/new/dir: $PATH E. export PATH=/new/dir: $PATH

E

Which of the following commands moves the directory ~/summer-vacation and it content to ~/vacation/2011? A. move -R ~/summer-vacation ~/vacation/2011 B. mv /home/summer-vacation /home/vacation/2011 C. mv ~/vacation/2011 ~/summer-vacation D. mv -R ~/summer-vacation ~/vacation/2011 E. mv ~/summer-vacation ~/vacation/2011

E

A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--? A. chmod u-rx,go-r filename B. chmod u+w, go+x filename C. chmod r-wr--r-- filename D. chmod 544 filename

D

Which of the following is the correct order of a computer's operation? A. (1) The computer waits for user input, (2) The computer executes the command, (3) The user selects a command and enters it via the keyboard or mouse B. (1) The computer executes the command, (2) The computer waits for user input, (3) The user selects a command and enters it via the keyboard or mouse C. (1) The user selects a command and enters it via the keyboard or mouse, (2) The computer executes the command, (3) The computer waits for user input D. (1) The computer waits for user input, (2) The user selects a command and enters it via the keyboard or mouse, (3) The computer executes the command

D

Which of the following is used as a virtual or pseudo filesystem to provide a tree of all of the device nodes and drivers in the running kernel? A. /boot B. /proc C. /sys D. /dev

D


Set pelajaran terkait

English Semester 2 Exam (Comprehension TKAM)

View Set

Solving for Side Lengths of Right Triangles Quiz (100%)

View Set

NUR 221 - Ch 37 WB - Nursing Management: Patients with Immunodeficiency HIV Infection and AIDS

View Set

NU310: (prepU: management of patients with kidney disorders)

View Set

Reading- Bud, Not Buddy- Chapters 9-12

View Set

Power Point Chap 3 - Multiple Choice

View Set

Policy Riders provisions options and exclusions

View Set