CIT 352 Operating Systems Exam 1 Study Guide

Ace your homework & exams now with Quizwiz!

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command. True or False?

False

If you boot your computer from Linux live media, you will be able to use a fully functional Linux system prior to installing Linux on permanent storage. True or False?

False

Linux commands entered via the command line are not case sensitive. True or False?

False

The less command offers less functionality than the more command. True or False?

False

There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file, and the other means that it is on a directory. True or False?

False

Users enter commands directly to the kernel of the Linux operating system. True or False?

False

Find the match. Ken Thompson Dennis Richie Richard Stallman Linus Torvalds (Options) UNIX Linux C and co-creator of UNIX Free Software Foundation

Ken Thompson - UNIX Dennis Richie - C and co-creator of UNIX Richard Stallman - Free Software Foundation Linus Torvalds - Linux

Find the match. (Options) Open Source Closed Source Freeware Shareware (Options) Microsoft Windows The source code is made available to the public Free for a limited use/time Adobe Acrobat Reader

Open Source - The source code is made available to the public Closed Source - Microsoft Windows Freeware - Adobe Acrobat Reader Shareware - Free for a limited use/time

A Linux distribution is a collection of bundle software containing the Linux kernel and libraries, combined with add-on software specific to a certain use. True of False?

True

A directory is a type of file. True or False?

True

Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?

True

Linux has only one root directory per directory tree. True or False?

True

The /root user account is created during the installation process; however, the associated root password is NOT set during the install. True of False?

True

The operating system software is necessary for a computer to function. True or False?

True

To install Linux within a virtual machine, you can specify the path to an ISO image that contains the Linux installation media within virtualization software without having to first write the ISO image to a DVD or a USB flash drive. True or False?

True

Underlying kernel is common to all types of Linux distributions. True of False?

True

Which prompt do regular users receive when logged in to the system? a. $ b. @ c. # d. !

a. $

Which two people are credited with creating the UNIX operating system? (Choose two answers.) a. Dennis Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson

a. Dennis Ritchie d. Ken Thompson

Which common GUI environments are available in most Linux distributions? (Choose all that apply.) a. GNOME b. CDE c. KDE d. RPM

a. GNOME c. KDE

How can you tell if your Linux OS has a development kernel? (Select two) a. Kernel version includes the postfix -rc* where (asterisk) is a number b. The desktop screen will display "Development Kernel" c. The OS will terminate abruptly and frequently d. Kernel version has an odd numbered minor number if it is a pre-2.6.0 release

a. Kernel version includes the postfix -rc* where (asterisk) is a number d. Kernel version has an odd numbered minor number if it is a pre-2.6.0 release

Linux was developed by __________ to resemble the _________ operating system a. Linus Torvalds, MINIX b. Linux Torvalds, GNU c. Richard Stallman, GNU d. Richard Stallman, MINIX

a. Linus Torvalds, MINIX

Linux was developed by __________ to resemble the __________ operating system. a. Linus Torvalds, MINIX b. Linus Torvalds, GNU c. Richard Stallman, GNU d. Richard Stallman, MINIX

a. Linus Torvalds, MINIX

What are some good reasons for using Linux in a corporate environment? (Choose all that apply.) a. Linux software is unlikely to be abandoned by its developers. b. Linux is secure and has a lower total cost of ownership than other operating systems. c. Linux is widely available for many platforms and supports many programming languages. d. Most Linux software is closed source.

a. Linux software is unlikely to be abandoned by its developers. b. Linux is secure and has a lower total cost of ownership than other operating systems. c. Linux is widely available for many platforms and supports many programming languages.

Which of the following can be used on Linux to provide file and print services? a. Samba b. Apache c. Squid d. OpenStack

a. Samba

Which of the following can be used on Linux to provide file and print services? a. Samba b. Apache c. Squid d. OpenStack

a. Samba

After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1 What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.

a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

Which commands could be used to receive helpful information on Linux or shell commands? (Select three) a. apropos b. find c. info d. man

a. apropos c. info d. man

When applied to a directory, the SGID special permission _________. a. causes all new files created in the directory to have the same group membership as the directory, and not the entity that created them b. cannot be used, because it is applied only to files c. allows users the ability to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory

a. causes all new files created in the directory to have the same group membership as the directory, and not the entity that created them

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root, respectively? a. chown user1:root file1 b. chown user1 : root file1 c. This cannot be done because user and group ownership properties of a file must be modified separately. d. chown root:user1 file1 e. chown root : user1 file1

a. chown user1:root file1

You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do remember it will flush a variable from your system. Which command typed at a command prompt displays a list of commands that would likely contain the command you desire? a. man -k flush b. man -k find all c. man flush d. man -key flush

a. man -k flush

Many types of software are available today. Which type of software does Linux represent? a. open source software b. closed source software c. freeware d. shareware

a. open source software

Many types of software are available today. Which type of software does Linux represent? a. open source software b. closed source software c. freeware d. shareware

a. open source software

Which of the following are factors that determine which Linux distribution a user will use? (Choose all that apply.) a. package manager support b. hardware platform c. kernel features d. language support

a. package manager support b. hardware platform c. kernel features d. language support

Which culture embraced the term "GNU" (GNU's Not UNIX) and laid the free software groundwork for Linux? a. the hacker culture b. the MIT culture c. the cracker culture d. the Artificial Intelligence culture

a. the hacker culture

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules

a. when you need support in Linux for new hardware c. when you need to increase the stability of Linux

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.) a. when you need support in Linux for new hardware b. when you need another user interface c. when you need to increase the stability of Linux d. when you need to use kernel modules

a. when you need support in Linux for new hardware c. when you need to increase the stability of Linux

The command chmod 317 file1 would produce which of the following lines in the ls command? a. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1 b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1 c. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1 d. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1

b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1

Which statement best describes a process? a. An executable file stored on a disk b. A program being executed in memory and performing a task c. A piece of hardware soldered on a motherboard d. A series of steps to achieve a task

b. A program being executed in memory and performing a task

What is the most common open source Web server available for Linux? a. Samba b. Apache c. Squid d. OpenStack

b. Apache

What is the most common open source Web server available for Linux? a. Samba b. Apache c. Squid d. OpenStack

b. Apache

Which of the following is an absolute pathname? (Choose all that apply.) a. Home/resume b. C:\myfolder\resume c. resume d. /home/resume e. C:home/resume

b. C:\myfolder\resume d. /home/resume

Who formed the Free Software Foundation to promote open development? a. Dennis Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson

b. Richard Stallman

Who formed the Free Software Foundation to promote open development? a. Dennis Ritchie b. Richard Stallman c. Linus Torvalds d. Ken Thompson

b. Richard Stallman

Which of the following are characteristics of Open Source Software? (Choose all that apply.) a. The value of the software is directly related to its price. b. The software is developed collaboratively. c. The source code for software is available for a small fee. d. Any bugs are fixed quickly.

b. The software is developed collaboratively. d. Any bugs are fixed quickly.

Which of the following are characteristics of Open Source Software? (Choose all that apply.) a. The value of the software is directly related to its price. b. The software is developed collaboratively. c. The source code for software is available for a small fee. d. Any bugs are fixed quickly.

b. The software is developed collaboratively. d. Any bugs are fixed quickly.

The vi editor can function in which two of the following modes? (Choose both that apply.) a. text b. command c. input d. interactive e. insert

b. command e. insert

Linux is a __________ and __________ operating system. a. production, stable b. multiuser, multitasking c. processing, closed source d. large, useful

b. multiuser, multitasking

Which command do you use to rename files and directories? a. cp b. mv c. rn d. rename

b. mv

A special device file is used to _________. a. enable proprietary custom-built devices to work with Linux b. represent hardware devices such as hard disk drives and ports c. keep a list of device settings specific to each individual user d. do nothing in Linux

b. represent hardware devices such as hard disk drives and ports

After you log in to a terminal, you receive a user interface called a _________. a. GUID b. shell c. text box d. command screen

b. shell

What does the /var directory contain? a. various additional programs b. spools and log files c. temporary files d. files that are architecture-independent e. local variance devices

b. spools and log files

Which command searches for and displays any text contents of a binary file? a. text b. strings c. od d. less

b. strings

Which command displays the users who are currently logged in to the Linux system? a. finger b. who c. id d. date

b. who

What is the shell prompt for the root user? a. ! b. @ c. # d. $

c. #

After typing the command umask 731, the permissions on all subsequently created files and directories will be affected. In this case, what will be the permissions on all new files? a. rw-rw-rw- b. rwxrw-r-- c. ---r--rw- d. ----wx--x

c. ---r--rw-

Which of the following kernels are developmental kernels? (Choose all that apply.) a. 2.3.4 b. 3.5.5 c. 4.1-rc5 d. 4.4.4

c. 4.1-rc5

When sitting at a computer running Linux, what key combination do you press to open the graphical terminal? a. Ctrl+Alt+G b. Ctrl+Alt+F4 c. Ctrl+Alt+F1 d. Ctrl+7

c. Ctrl+Alt+F1

What was created to define a standard directory structure and common file location for Linux? a. FSH b. X.500 c. FHS d. root directory

c. FHS

To which license does Linux adhere? a. open license b. artistic license c. GNU General Public License d. free source license

c. GNU General Public License

What does the mv command do? (Choose all that apply.) a. It makes a volume. b. It makes a directory. c. It moves a directory. d. It moves a file.

c. It moves a directory. d. It moves a file.

Which of the following Linux distributions is likely to be used by a CyberSecurity worker? a. Fedora b. Ubuntu c. Kali d. Gentoo

c. Kali

When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a __________. a. new kernel b. new platform c. Linux distribution d. GNU Project

c. Linux distribution

When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a: a. new kernel b. new platform c. Linux distribution d. GNU Project

c. Linux distribution

Which of the following is not an example of virtualization software that can be used to install Linux within another operating system? a. Oracle VirtualBox b. Microsoft Hyper-V c. Spiceworks d. VMWare

c. Spiceworks

What will be the output? [user1@localhost ~]$ echo $HOME /home/user1 [user1@localhost ~]$ echo "This is my \$HOME" a. This is my /home/user1 b. This is my \/home/user1 c. This is my $HOME d. This is my \$HOME

c. This is my $HOME

What must a user do to run cp or mv interactively and be asked whether to overwrite an existing file? (mark all that apply) a. There is no choice because the new file will overwrite the old one by default. b. Type interactive cp or interactive mv. c. Type cp -i or mv -i. d. Type cp -interactive or mv -interactive. e. Just type cp or mv because they run in interactive mode by default.

c. Type cp -i or mv -i. e. Just type cp or mv because they run in interactive mode by default.

Using wildcard metacharacters, how can you indicate a character that is not an a or b or c or d? a. [^abcd] b. not [a-d] c. [!a-d] d. !a-d

c. [!a-d]

What command is equivalent to the man -k keyword command? a. find keyword b. man keyword c. apropos keyword d. appaloosa keyword

c. apropos keyword

A user typed the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the / home/jim directory? a. cd .. b. cd /jim c. cd ../.. d. cd ./.

c. cd ../..

What are the three standard Linux permissions? a. full control, read-execute, write b. read, write, modify c. execute, read, write d. read, write, examine

c. execute, read, write

What will the following wildcard regular expression return: file[a-c]? a. filea-c b. filea, filec c. filea, fileb, filec d. fileabc

c. filea, fileb, filec

Which of the following is not a piece of information that the Fedora installation program prompts you for? a. time zone b. installation destination c. firewall settings d. installation language

c. firewall settings

If "resume" is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume? a. /home/resume b. /resume c. resume d. \home\resume

c. resume

Every computer consists of physical components and non-physical components. The non-physical components of a computer that understand how to work with the physical components are referred to as__________. a. hardware b. records c. software d. processors

c. software

What is a hacker in early days of UNIX? a. A person who cuts wood with heavy blows b. A person who is a wacker c. A person who gains unauthorized access to computers d. A person who attempts to expand their knowledge of computing through experimentation

d. A person who attempts to expand their knowledge of computing through experimentation

You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate? a. Special permissions have been set on the file. b. The file has one or more files on the filesystem that are hard-linked to it. c. The sticky bit directory permission has been set on the file and will remain inactive as a result. d. Additional entries exist within the ACL of the file that can be viewed using the getfacl command.

d. Additional entries exist within the ACL of the file that can be viewed using the getfacl command.

Which one is NOT true for MBR? a. At most 4 primary partitions b. One partition can be extended partition c. Extended partition can be divided into logical drives d. At most 4 logical drives

d. At most 4 logical drives

What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH

d. BASH

After typing the ls -a command, you notice a file whose filename begins with a dot ( . ). What does this mean? a. It is a binary file. b. It is a system file. c. It is a file in the current directory. d. It is a hidden file.

d. It is a hidden file.

After typing the ls -F command, you notice a filename that ends with an * (asterisk) character. What does this mean? a. It is a hidden file. b. It is a linked file. c. It is a special device file. d. It is an executable file

d. It is an executable file

How can you specify a text pattern that must be at the beginning of a line of text using a regular expression? a. Precede the string with a /. b. Follow the string with a \. c. Precede the string with a $. d. Precede the string with a ^.

d. Precede the string with a ^.

How can a user switch from insert mode to command mode when using the vi editor? a. Press the Ctrl1Alt1Del keys simultaneously. b. Press the Del key. c. Type a : character. d. Press the Esc key.

d. Press the Esc key.

The root user utilizes the chgrp command to give ownership of a file to another user. What must the root user do to regain ownership of the file? a. Run chgrp again listing the root user as the new owner. b. Nothing, because this is a one-way, one-time action. c. Have the new owner run chgrp, and list the root user as the new owner. d. Run chown and list the root user as the new owner.

d. Run chown and list the root user as the new owner.

Which one is NOT an implication of Open Source Software (OSS)? a. Software is developed rapidly through widespread collaboration b. Software bugs are noted and promptly fixed c. Software features evolve quickly based on users needs d. Software will receive a high bid from potential buyers of the project

d. Software will receive a high bid from potential buyers of the project

Which one is NOT a Linux distribution (at least not widely used if it exists)? a. openSUSE d. Debian c. Red Hat d. Yellow Hat

d. Yellow Hat

Which of the following are common methods for gaining support for Linux? a. HOWTO documents at www.tldp.org b. a local Linux User Group c. Internet newsgroups d. all the above

d. all the above

If a user's current directory is /home/ mary/project1, which command could she use to move to the etc directory directly under the root? a. cd .. b. cd /home/mary/etc c. cd etc d. cd /etc e. cd \etc

d. cd /etc

A file has the following permissions: r----x-w-. The command chmod 143 would have the same effect as the command _________. (Choose all that apply.) a. chmod u+x-r,g+r-x,o+w file1 b. chmod u=w,g=rw,o=rx file1 c. chmod u-r-w,g+r-w,o+r-x file1 d. chmod u=x,g=r,o=wx file1 e. chmod u+w,g+r-w,o+r-x file1 f. chmod u=rw,g=r,o=r file1

d. chmod u=x,g=r,o=wx file1

Which command blanks the terminal screen, erasing previously displayed output? a. erase b. clean c. blank d. clear

d. clear

The tac command _________. a. is not a valid Linux command b. displays the contents of hidden files c. displays the contents of a file in reverse order, last word on the line first and first word on the line last d. displays the contents of a file in reverse order, last line first and first line last

d. displays the contents of a file in reverse order, last line first and first line last

What command can you use to safely shut down the Linux system immediately? a. shutdown -c b. shutdown -r c. down d. halt

d. halt

What equivalent to the man command generally provides an easier-to-read description of the queried command and contains links to other related information? a. who b. man help c. man -descriptive d. info

d. info

Which command would a user type on the command line to find out the current directory in the directory tree? a. pd b. cd c. where d. pwd

d. pwd

What will typing q! at the : prompt in command mode do when using the vi editor? a. quit as no changes were made b. quit after saving any changes c. nothing because the ! is a metacharacter d. quit without saving any changes

d. quit without saving any changes

The default permissions given by the system prior to analyzing the umask are _________ for directories and _________ for files. a. rw-rw-rw-and rw-rw-rw- b. rw-rw-rw-and r--r--r-- c. rw-rw-rw-and rwxrwxrwx d. rwxrwxrwx and rw-rw-rw- e. rwxrw-rw-and rwx-rw-rw-

d. rwxrwxrwx and rw-rw-rw-

Which of the following refers to the third primary partition on the second SAS hard disk within Linux? a. hdb2 b. sda3 c. hdb3 d. sdb3

d. sdb3

The which command _________. a. can only be used to search for executables b. searches for a file in all directories, starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

d. searches for a file only in directories that are in the PATH variable

When you change the data in a file that is hard-linked to three others, _________. a. only the data in the file you modified is affected b. only the data in the file you modified and any hard-linked files in the same directory are affected c. the data in the file you modified and the data in all hard-linked files are modified because they have different inodes d. the data in the file you modified as well as the data in all hard-linked files are modified because they share the same data and all have the same inode and file size

d. the data in the file you modified as well as the data in all hard-linked files are modified because they share the same data and all have the same inode and file size

How can you protect a metacharacter (such as the $ character) from shell interpretation? a. Precede it with a /. b. Follow it with a \. c. Precede it with a $. d. It cannot be done because metacharacters are essential. e. Precede it with a \.

e. Precede it with a \.

A user types the command head / poems/mary. What will be displayed on the terminal screen? a. the first line of the file mary b. the header for the file mary c. the first 20 lines of the file mary d. the last 10 lines of the file mary e. the first 10 lines of the file mary

e. the first 10 lines of the file mary


Related study sets

Unit 10 World War 2 & the Cold War.

View Set

Chapter 13 Developmental Psychology

View Set

Chapter 4 World History LESSON 3

View Set