Linux Essentials 010-150 Part 2

Ace your homework & exams now with Quizwiz!

Mary finds that she can delete George's file in /tmp. What might this imply? A. This is normal; all users should be able to delete files from /tmp B. The SUID bit is present on /tmp; it should be removed C. World write permissions are set on /tmp; they should be removed D. The sticky bit is missing from /tmp; it should be set E the /tmp partition is mounted read-only; it should be mounted read/write

D. The sticky bit is missing from /tmp; it should be set

An OS developed in 1969, and on which Linux is Largely modeled, is _____. A. Windows B. MS-DOS C. Apple Mac OS X D. Unix E. Android

D. Unix

What program can you use to manually bring up a network interface in Linux? A. iwlist B. route C. telnet D. ifconfig E. traceroute

D. ifconfig

Which of the following commands is equivalent to typing apropos (keyword)? A. find -l (keyword) B. less (keyword) C. whatis (keyword) D. man -k (keyword) E. grep -r (keyword)

D. man -k (keyword)

Which common man page section would provide pointers to related information in the man system? A. Files B. History C. Author D. Synopsis E. See Also

E. See Also

What symbol do you place after a command to run the program in the background? A. & B. + C. > D. | E. #

A. &

Which of the following options to chown changes the ownership of all the subdirectories of any specified directories, rather than just the files or directories that are explicitly passed to it? A. -R B. -tree C. -recursive D. -all E. -t

A. -R

You want to create a new system account for a server program you're installing. What option can you pass to useradd when creating the account to ensure that it's created as a system account? A. -system B. -nouser C. -sysaccount D. -shared E. -nohome

A. -system

Which Linux directory holds the system configuration files? A. /etc B. /bin C. /lib D. /usr E. /home

A. /etc

Which of the following productivity software packages used to be owned by Oracle? A. Apache OpenOffice B. Calligra C. GNOME Office D. LibreOffice E. Microsoft Office

A. Apache OpenOffice

Core Unix tools include which of the following? (Select all that apply.) A. GNU tool set B. Startup scripts C. X Windows System D. Aqua user interface E. Linux Kernel

A. GNU tool set & C. X Windows System

Which of the following two office suites are most closely related to one another? (choose two) A. LibreOffice B. GNOME Office C. Calligra D. Microsoft Office E. Apache OpenOffice

A. LibreOffice & E. Apache OpenOffice

What type of information can netstat provide? (Chose all that apply.) A. Network Interface Information. B. Routing table data. C. A list of open ports D. Round-trip network travel time. E. The identities of broken routers.

A. Network Interface Information B. Routing table data & C. A list of open ports

Which of the following distributions use RPM's for package management? (Select all that apply.) A. OpenSUSE B. Debian C. CentOS D. Gentoo E. Ubuntu

A. OpenSUSE & C. CentOS

_____ files are those the control how the computer operates and includes things like system startup scripts, program support files, and system log files. A. System B. Daemon C. Archived D. Zipped E. Program

A. System

Which key would you press if you wanted to do a command completion of a longer filename or command? A. Tab B. Spacebar C. Enter D. Shift E. Ctrl

A. Tab

Which of the following pieces of information on user accounts is not normally stored in the /etc/passwd file on the modern Linux distributions? A. The account's default shell B. The account's default GID number C. The account's UID number D. The account's username E. The account's Password

A. The account's default shell

Which of the following commands supports both gzip and bzip2 compression? A. tar B. archive C. zip D. zcat

A. tar

Which regular expression string matches any sequence of characters of any length? A. \. B. [ ] C. .* D. . E. *

C. .*

Which character that represents the start of a line in a regular expression? A. % B. | C. ^ D. &

C. ^

You've received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this? A. tar cvf data79.tar B. tar xvf data79.tar C. tar tvf data79.tar D. tar Avf data79.tar E. tar uvf data79.tar

C. tar tvf data79.tar

You're writing a script that should accept two arguments, a username and a year, specified in that order on the command line. What variable would you use to access the year? A. $1 B. $year C. $annum D. $2 E. $B

D. $2

Which basic command will create a symbolic link (shortcut)to a file? A. cp B. touch C. echo D. ln E. cat

D. ln

Which of the following is a Linux software that can be used to create 3D images (Both stills and animations)? A. Audacity B. Blender C. The GIMP D. Image Magick E. Handbrake

B. Blender

Which of the following actions is performed when a file is uncompressed? A. Execute B. Extract C. Archive D. Remove

B. Extract

Which of the following programs enable root to set the ownership of files? A. chmod B. chown C. usermod D. Nautilus E. touch

B. chown & D. Nautilus

How many man page sections are there total? A. 4 B. 5 C. 6 D. 8 E. 9

E. 9

Which of the following is NOT a way companies can legally make money using GPLed software? A. By offering to add features to the GPLed software for a price. B. By selling a mix of GPLed software and proprietary Software. C. By selling technical support services associated with the GPLed software. D. By releasing GPLed software to make use of hardware that the company sells. E. By incorporating GPLed software into a proprietary program that the company sells.

E. By incorporating GPLed software into a proprietary program that the company sells.

Which of the following makes a good password? A. The word Password. B. Your username. C. The name of a character from your favorite book. D. Your telephone number. E. None of the above.

E. None of the above.

What option can you pass to groupadd to have it create a group with GID number 1027 A. -groupnum 1027 B. -gnum 1027 C. -gidnum 1027 D. -group 1027 E. -gid 1027

E. gid 1027

Which Linux command provides the information by displaying the names of files in a directory? A. mv B. cp C. ln D. mkdir E. ls

E. ls

Which of the following commands displays the name of the directory in which you're working? A. wc B. cat C. echo D. cd E. pwd

E. pwd

Which command would create a zip file containing the files holiday.tif and desc.txt and compress it as much as possible? A. zip -1 trip.zip holiday.tif desc.txt B. zip -1 hoilday.tif desc.txt trip.zip C. zip -c holiday.tif desc.txt trip.zip D. zip -9 holiday.tif desc.txt trip.zip E. zip -9 trip.zip holiday.tif desc.txt

E. zip -9 trip.zip holiday.tif desc.txt

Which of the following is a typical directory location for program documentation? A. /usr/share/doc/ B. /bin/ C. /usr/local/bin/ D. /usr/local/doc/ E. /sbin/

C. /usr/local/bin/

Which of the following is NOT a function of the Linux kernel? A. Managing a computer's hardware. B. Providing mechanisms for programs to interact with each other. C. Displaying common GUI elements such as dialog boxes. D. Allocating CPU time to programs that run concurrently. E. Managing memory allocation, including managing swap space.

C. Displaying common GUI elements such as dialog boxes.

A popular Linux GUI help program that assists users with info pages is _____. A. The GIMP B. Blender C. GNU Emacs D. Evolution E. less

C. GNU Emacs

Which of the following is a common Linux server program? A. GNOME B. The GIMP C. Samba D. LibreOffice E. Firefox

C. Samba

Which Linux desktop program is what would be used to provide a text-mode user interface inside a window? A. Xfce B. Dolphin C. Terminal D. Evolution E. Konquerer

C. Terminal

Where did the Linux kernel originate? A. American Telephone and Telegraph B. The Massachusetts Institute of Technology C. The University of Helsinki D. The University of California E. Apple Computer

C. The University of Helsinki

Which of the following are risks you take when you browse the web as an ordinary user on a properly configured Linux System? (Select all that apply.) A. Data transferred to or from a web site can be intercepted, possibly exposing sensitive data to theft B. A web site with malicious dynamic content could steal your personal data files C. The server computer, if compromised, could create a new account on your computer, thus compromising it D. A Malicious web site can charge you money to access their services E. A virus intended for Windows, when delivered via a web site to a Linux system, will damage your video card

A. Data transferred to or from a web site can be intercepted, possibly exposing sensitive data to theft & B. A web site with malicious dynamic content could steal your personal data files

What types of information does the id command provide? (Choose all that apply.) A. Your UID Number B. Your terminal identifier C. Your current group D. All your group memberships E. Your username

A. Your UID Number C. Your current group D. All your group memberships & E. Your username

Which of the following is a text-mode command that is helpful in identifying CPU information? A. cat /proc/cpuinfo B. lscpu C. lspci D. cfdisk E. uname -a

A. cat /proc/cpuinfo B. lscpu & E. uname -a

You're logged in as root and you type passwd auser to change auser's password. What information will passwd ask you to enter? A. The root password and the new password, two times B. The new password, two times C. auser's old password and the new password, two times D. The new password once E. None of the above; root can't change another user's password

B. The new password, two times

You want to copy the contents of the ~/important directory, including all it's subdirectories, to /media/usb. What command can you type to accomplish this goal? A. cp ~/important/media/usb B. cp -R ~/important/media/usb C. cp -u ~/important/media/usb D. cp -i ~/important/media/usb E. cp -f ~/important/media/usb

B. cp -R ~/important/media/usb

What command can you use to retrieve user input into a variable in a Bash script? A. inline B. read C. get D. getline E. input

B. read

Which of the following syntaxes will you use to extract a file using the tar command? A. tar -cvf {.tgz-file} B. tar -zxvf {.tgz-file} C. tar -xvf {.tgz-file} D. tar -zwvf {.tgz-file}

B. tar -zxvf {.tgz-file}

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused? A. free B. mem C. mf D. avail E. df

A. free

Which Linux directory holds program files that are critical for normal operation and that ordinary users may run? A. /etc B. /bin C. /lib D. /usr E. /home

B. /bin

The tail basic command will output the last _____ lines of a file. A. 5 B. 10 C. 15 D. 20 E. 25

B. 10

Which of the following outcomes will you get after executing the -cvf /tmp/etc.tar /etc command? A. Compressed File B. Archived File C. Extracted file D. Encrypted file

B. Archived File

Which of the following organizations bases its philosophy on software licensing on a strong moral imperative that users should be able to modify their software? A. OSI B. FSF C. FOSS D. BSD E. MIT

B. FSF

Which of the following terms best characterizes the Linux kernel? A. Commercial B. Open source C. Freeware D. Shareware E. Proprietary

B. Open source

Which of the following actions does the find command perform? A. Matching a pattern in a file B. Searching a file in a directory C. Changing text in a file D. Listing all hidden files and directories

B. Searching a file in a directory

How can you browse to a new node using the standard info documentation reader? A. Type the letter corresponding to the first character of the link. B. Select a link using the arrow keys and then press the Enter key. C. Move the mouse pointer over the link and click it. D. Type the number displayed next to the link you want to read. E. None of the above.

B. Select a link using the arrow keys and then press the Enter key.

What does the permission string -rwxrwx--- Mean? A. the file's owner may read, write and execute the file but nobody else may access it. B. The file is a directory. The directory's owners and members of it's group may read, write, and search it, but other users have no access to it. C. The file's owner and members of it's group may both read, write, and execute the file, but other users have no access to it. D. All users of the computer may read, write and execute the file. E. The file is a directory. All users of the computer may read, write, and search the directory.

C. The file's owner and members of it's group may both read, write, and execute the file, but other users have no access to it.

Which of the following basic commands will change directory or take the user back to /home? A. rm B. cp C. cd D. head E. tail

C. cd

You're writing a script that will be called by other scripts. You want to signal abnormal termination of your script by passing a value of 8 to the external script under some circumstances. What command can you use in your own script to do this? A. die 8 B. term 8 C. exit 8 D. pass 8 E. send 8

C. exit 8

Where do most log files reside on a Linux computer? A. /home/logging B. /usr/log C. /etc/logging D. /var/log E. /log/usr

D. /var/log

Which of the following is the port number for the DNS protocol? A. 22 B. 23 C. 25 D. 53 E. 67

D. 53

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents? A. 2> B. &> C. > D. >> E. |

D. >>

You type touch afile.txt in a directory that contains no files. What will be the effect? A. The afile.txt file from your home directory will be copied to the current directory. B. The afile.txt file in your home directory will have its time stamp updated. C. Nothing, the command will return without doing anything. D. A new empty file called afile.txt will be created in the current directory. E. The touch command will return a file not found error.

D. A new empty file called afile.txt will be created in the current directory.

Which Linux distribution are you most likely to find in use on a cell phone? A. Debian B. Fedora C. CentOS D. Android E. Slackware

D. Android

Which of the following programming languages is most often implemented as a compiled language? A. Python B. Bash Shell C. Perl D. C++ E. PHP

D. C++

What keystroke deletes a line of text when using nano? A. Ctrl+C B. Ctrl+X C. Ctrl+Y D. Ctrl+K E. Ctrl+D

D. Ctrl+K

What _____ was created to give a standardization to the Linux filesystem structure. A. NTFS B. ReFS C. ext4 D. FHS E. There is no standardization for Linux in filesystem structure.

D. FHS

Which of the following is an inappropriate choice for a filesystem to hold the majority of a Linux installation? A. JFS B. ext4fs C. ReiserFS D. HFS E. XFS

D. HFS

Which following legal area governs general ideas, independent of their specific implementation? A. Copyright. B. Maritime. C. Trademark. D. Patent. E. Ex post facto

D. Patent.


Related study sets

Human Growth and Development Final Study Quiz

View Set

Chapter 6 - Network Security Devices, Design, and Technology

View Set

Wong Ch 16:Health Problems of School-Age Children and Adolescents

View Set

AP Human Geography - End of Chp 2 (also the first like 15 terms are off the notes, rest is off the book!!!)

View Set

MyProgrammingLab - Chapter 8: A Second Look at Classes and Objects (Tony Gaddis)

View Set