DCOM 142 - MIDTERM EXAM
What standard directory contains the root user's home directory
/root
Which Linux command allows you to perform pattern matching on a file?
awk
What is the second step in a troubleshooting module?
Establish a theory of probable cause.
"An application that enables you to view, create, or modify the contents of text files."
text editor
What are the three commands used to properly edit the /etc/passwd file? (Select all Three)
useradd, usermod, userdel
Which text editor is favored by many sysadmins and developers?
vim
Displays complete path of a specified command.
which
What standard directory contains files necessarary to boot up Linux?
/boot
The file provides system-wide Bash settings.
/etc/bashrc
What octal number represents the execute attribute.
1
"What is the recognition, diagnosis, and resolution of problems?"
Troubleshooting
A Linux system references a user account by a user's
UID
"To control password expiration, warnings, inactive days and aging info, use thic command."
chage
Which file type is container for other files?
directories
What special symbol is recognized by shells as the parent directory?
double period (..)
Which are type of links? (Select all that apply)
hard, symbolic or soft
What is the second step in the procedure to remove a file?
Enter rm {file name}
Which Linux distribution is Debian-based and used for penetration testing?
Kali Linux
What command is used to view the current directory at the terminal?
pwd
What is the process of accepting input data from a source other than the keyboard and sending output data to a destination other than the display device?
redirection
What special symbol is recognized by shells as the home directory?
tilda(~)
"Which ls command option can be used to show all files in a directory, including files that begin with a period?"
"""-a"""
What is used to specify a group ID?
"""-g"""
Which option can be used with the rm command to prompt before deleting?
"""-i"""
"Which one of the setfacl command options used to set the access control list (ACL) of an object, can also replace the same ACL if it already exists?"
"""-s"""
Which is not an operator use by chmod in symbolic mode?
*
"As a system administrator, why might you issue the id command? (Select all that apply)"
-displays UID information display primary GID information -display secondary group information -display password aging information
Which file is only read when you first login to the system?
.bash_profile
Which file provides shell configuration for the initial login environment?
.bash_profile
The top-level directory on a Linux system is represented as:
/
Which two files are referenced in the creation of an user's account.
/etc/login.defs /etc/skel
Where should administrators set system-wide variables in scripts on a Linux system?
/etc/profile.d
This file is used to store the hashed version of a user's password.
/etc/shadow
Which directory's contents are copied to the user's home directory upon account creation?
/etc/skel
What standard directory contains variable or constanly changing files?
/var
What file does the last command retrieve information from?
/var/log/wtmp
What is the function of the Linux man command?
1.) Include a list of related commands 2.) Provide examples of common usage of the command. 3.)Give a description of the specific Linux command s purpose
What octal number represents the read attribute.
4
What is the default permissions for a file created by a regular user?
664
"Which command supported by Vim, has the function that reverts to the last saved format without closing the file?"
:e!
Which symbol represent reading input from a a file?
<
Which symbol represent appending stdout to the end of a file?
>>
What is the second step when changing a user s profile?
Enter vim .bash_profile
"A data structure used by an operating system to store, retrieve, organize, and manage files/directories on storage devices is called a?"
File systems
A Linux system references a group account by a group's
GID
"As a system administrator, why might you issue theid command?"
To display user ID (UID) and group ID (GID) information.
Which Linux Debian-based distribution is the most popular for general use?
Ubuntu
What does the Principle of Least Privilege state?
Users should be given no more authority on the system than they need to perform their job.
You can get more granular with controlling access to a file or directory by using
access control lists
Which Linux command can you use to read a file? (Select all that apply)
cat, less, more
Which type of computers have a specific functions in a larger systems.
embedded systems
What is the second thing to do when searching for a file using locate?
enter updatedb
Which keyboard key will return a user in VIM to command mode?
esc
Manual or man pages are not available if your Internet goes down?
false
The find command searches a database to find a file.
false
The locate command allows you to perform one or more actions on files found.
false
User student can access the shadow file by running 'cat /etc/shadow'.
false
Which common editor in Linux is useful if desktop is installed?
gedit
You can find student's UID by doing the following. (Select all that apply)
id student cat /etc/passwd | grep student
Which are modes used by vim? (Select all that apply)
insert, command, visual
What is a single-key shortcut that is used to navigate through files in command mode?
motions
Which of the following commands would you type to rename newfile.txt to afile.txt?
mv newfile.txt afile.txt
Which common editor in Linux displays command shortcuts at the bottom of the screen?
nano
In which major computing roles does Linux NOT dominate the market?
personal computers (PCs)
Which type of user account plays two roles on a Linux system?
root user
Which are types of user account? (Select three)
root user, standard user, service user
SUID or SGID special permissions are represented with this letter in the user or group owner's execute position.
s
Which of the following can not be a source of standard input?
screen
Which type of computers provide services to multiple users over a network.
servers
Sticky Bit special permission are represented with this letter in the other's execute position.
t
Which command is used to translate a string of characters and is predominantly used to change the case of letters in a file?
tr
Nano can support opening multiple files simultaneously?
true
Which command is used to create a user account and configure basic settings?
useradd
Which command is primarily used to display the details of users who are currently logged in to a system and their transactions?
w
In Linux, which command will provide a one-line description of a given command's purpose?
whatis
What command is used to know the logged in user?
whoami
Which Linux distro is a no-cost version of RHEL
CentOS
"If a user is unable to access a file, despite the owner context having full permissions what is causing this to happen?"
The user is not the owner of the file.
What octal number represents the write attribute.
2`
Which is a common editor in Linux?
nano, emacs, gedit
What are the advantages of using Linux? (Select all that apply.)
1.) Its free and open source software (FOSS) nature promotes transparency. 2.) Its design emphasizes simplicity and modularity
What does the ls -l command do?
Lists directory contents in long format
Which file type enable process communication without network sockets?
Names pipes
You have a user who is denied permission to execute a script that they themselves created. What is the cause of this problem?
The execute permission is not automatically set for new files.
There are many common symptoms that can relate to permission issues. What symptom can be caused by the owner not being granted read access?
The owner of a text file is denied permission to view the contents of the text file.