Linux Essentials

Ace your homework & exams now with Quizwiz!

You wish to count the number of lines in a file using the grep command. Which of the following options will you use to accomplish the task?

-n

Click to select the steps for creating a new regular user, and then drag them into the correct order.

1) Log in as the root User 2) Execute the useradd command 3) Execute the passwd command

You're using bash, and you type emacs to launch the emacs editor. In this case, emacs is bash' ____.

child

A ______ computer is likely to run a word processor and Web browser.

desktop

Match the commands with their corresponding uses.

dig >> Query DNS ping >> Test Reach ifconfig >> Config. IP adress netsat >> List TCP ports

Which of the following commands is used to create a new group in a Linux server?

groupadd

You want to view the most recent commands you have executed today. Which of the following commands will you use?

history

Most Linux distributions maintain information on what packages are installed in the ___. (Two words.)

package database

Match the operating systems with the interfaces they provide.

DOS >> CLI Windows 7 > GUI Linux >> CLI UNIX >> CLI

Which of the following number formats is used to represent an IPv6 address?

Hexadecimal

Which of the following are the major components of a desktop computer? Each correct answer represents a complete solution. Choose all that apply.

Peripheral devices, Monitor or display, Systems unit, Keyboard & mouse

Text editors are similar to word processors, which provide various features for writing documents. Following is a list of three text editors that are available on Linux. Drag the names of the text editors in front of their appropriate descriptions.

Pico, Vi, Emacs

Match the commands with their respective functions.

sort >> arranges locate >> searches find >> searches grep >> matches wc >> Counts

Sam is working as a Network Administrator at uCertify.com. He wants to view the last 20 users who joined the company. Which of the following commands should he use to accomplish the task?

tail 20 /etc/passwd

In a Linux system, you want to change a file's access and modification timestamps. Which of the following commands can you use to accomplish the task?

touch

You have found many times that your files get deleted by other users created on your Linux computer. Which of the following safety measures will you take to protect your files from being deleted by other users?

Execute the chmod o+t filename command.

Which of the following devices or components should only be maintained or replaced by a computer professional? Each correct answer represents a complete solution. Choose all that apply.

Powersupply, Microprocessor, Memory

The ____ command displays the path to the current working directory.

pwd

Which of the following commands is used to uncompress a compressed file named zipped.tar.gz?

tar -xzf zipped.tar.gz

___ is the first line of any shell script. It tells which shell should be invoked to run the rest of the commands.

#!/bin/sh

Which of the following options of the groupmod command helps you change the gid of a group?

-G

You want to copy a file (origfile.txt) to the backups directory, but if a file called origfile.txt exists in the backups directory, you want to go ahead with the copy only if the file in the source location is newer than the one in backups. The command to do this is cp ___ or ___ origfile.txt backups/.

-u, --update

Sam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system that runs on the Linux operating system. Sam wants to investigate and review local software, system libraries, and other applications installed on the system. Which of the following directories in Linux will he review to accomplish the task?

/sbin

The ____ directory contains the documentation of Linux. It links itself to /usr/doc. This directory contains documentation files for various packages. It often has valuable information that may not be in the man pages.

/usr/share/doc

Drag the umask (User Mask or User file creation MASK) values to match them with their descriptions.

022, 077, 066

Match each OSI's principle with its corresponding description.

1 >> A 2 >> B 3 >> C

Match the following numbers with their corresponding permissions.

1 >> Execute 7 >> Full Permission 0 >> No Permission 2 >> Write 4 >> Read

You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to know how many words are present in the file named file1.txt. You type the following command on the terminal: wc file1.txt. The command displays the following output: 40 245 1800 file1.txt How many words are present in the file file1.txt?

245

Which of the following numbers is the correct representation for providing read and write permissions to owner, read, write, and execute permissions to group, and read permission to other?

674

You are logged on to your Linux computer as a root user. You want to list the files created by the user sam. Which of the following commands will you use to accomplish the task?

: # cd /home/sam # ls

You work as a network administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory named Sales on a file server. David, a Sales Manager, has to use this directory to keep sales reports. David reports that he is unable to save his reports in the directory. When you list the directory using the ls -l sales command, you get the following result: drwxr-xr-x 2 root root 2048 Jan 2 2006 Sales What is the most likely cause?

David does not have the write permission on the directory.

Consider the line echo $SHELL. Which of the following quotes allows printing of the value of $SHELL variable by disabling the meaning of wildcards and then allowing command substitution?

Double quotes (")

You work as a Network Administrator for uCertify.com. You have created a new local network in one of the floors of your office. All networking devices and computers are physically connected to one another through cables. How will you verify the logical connectivity among them?

Executing the ping command

Maria works as a Desktop Technician for BlueWells Inc. The company has a Windows-based network. Maria has been assigned a project to configure computer systems with third-party software. Which of the following software can Maria use to accomplish the task?

Firefox, Winamp, Thunderbird, Audacity, Plug-ins

Match each software application with its related term.

GNOME >> DE GIMP >> GE Xfce >> DE Mozilla >>EC Evolution >> EC

Which of the following causes are responsible for supplying no power or shutting down the computer abnormally? Each correct answer represents a complete solution. Choose three.

Incorrect power connection, Third party hardware, Incorrect power supply

Which of the following are valid rules for declaring a shell variable? Each correct answer represents a complete solution. Choose two.

It comprises lowercase and uppercase letters., It can contain underscore (_).

You have executed the # chmod 3775 [directory]. What output does this command yield?

It sets SGID and Sticky bit set on a directory.

What does the cat /etc/passwd command perform?

It shows complete information about each user.

Sam works as a Network Administrator for uCertify.com. He is asked to delete the user account for the user james. Sam executes the $ userdel james command, but the command fails. Which of the following reasons identify the probable cause of the issue?

The user james may be logged in somewhere on any terminal, Sam must be a root user.

Which of the following is a free email application from Mozilla that makes email communication easy and simpler?

Thunderbird

Drag the editor components from the bottom onto their matching descriptions on the left.

Title, Status, Shortcut

You run the ping command on one of your Linux terminals without specifying the "t" parameter. As a result, the ping command is continuously running on the terminal. You wish to list files located under the root directory. Which of the following steps will you take to accomplish the task?

Use the CTRL+ALT+Fn key.

You work as a Senior Linux Professional for uCertify Inc. The company has a Linux-based network comprising a stand-alone Samba server. The Samba server is now configured to be a domain controller. Accounts created before the server becomes a domain controller are not working. How will you verify that accounts are created before or after the Samba server becomes a domain controller?

Use the command pdbedit -L -v username.

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have to create user accounts for four new Management Trainees. You also have to create a group named MT and provide membership of this group to the new user accounts. How will you accomplish the task?

Use the groupadd command to create the MT group. Use the useradd command to create the user accounts and provide them the membership of the MT group.

You are currently working on a Linux computer. You forgot the syntax of the tar command in order to take a backup of a directory. Which of the following measures will you take to obtain information about the tar command?

Visit the man page of the command.

Match the operating systems with the interfaces they provide.

Windows 7 is the ONLY one with a GUI

You need to create a user named james on your newly installed Linux computer. You have logged in to a terminal that ends with the $ symbol. You are unable to create the user. Which of the following options is the cause of the issue?

You need to login on a terminal with the # symbol.

Which of the following commands is used to search the Whatis database and to display the short descriptions of the specified system command?

apropos

You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. You want to locate commands by keyword lookup. Which of the following commands can you use to accomplish the task?

apropos

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to implement an LDAP directory over the network. Which of the following tools will you use to install the OpenLDAP package on a computer having Ubuntu Linux?

apt-get

______ is the most popular shell on Linux and one that is recommended by the Linux Professional Institute (LPI). It is an enhanced version of the original Bourne shell program used on many UNIX systems and acts as the shell program.

bash

Which of the following commands can be used to set a password so that the user is required to change it every 30 days? Each correct answer represents a complete solution. Choose two.

chage, passwd

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below: rwxr--r-- You want to add a sticky bit to the file. Which of the following commands will you use?

chmod 1744 report

You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network. You have created a script named lf.cgi. You want to provide the following permissions on it:

chmod 6754

John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server. John wants to give the following file permissions to the file named "makelog": Read, write, and execute permissions to the user account that is the owner Read and write permissions to groups Read only permissions to other users Which of the following commands will John use to accomplish the task?

chmod 764 makeloG

The FSF's general principles are summarized by the term ____, which refers to using copyright laws for purposes that are in some ways contrary to copyright's original intent.

copyleft

Match the following commands with their corresponding actions.

cp >> copy files and... rm >> delete files touch >> update... mv >> rename...

You have executed a script. Which of the following commands will you execute to verify that the script is executed successfully?

echo $?

Match the following commands with their corresponding descriptions.

echo >> display... esac >> End... export >> Use an... echo $? >> Exit

You saw many empty files in your Linux computer. As these files are useless, you decide to remove those files. Which of the following commands will you execute to find the empty files?

find . -empty, find . -type f -empty

The ___ command is used to display free and used memory space in megabytes.

free -m

You are trying to connect your Linux computer to a local network in your cyber cafe. Which of the following commands will you use to verify that the IP address is provided in your computer?

ifconfig

Which of the following commands can you use to switch the Linux operating system from GUI mode to command line mode?

init

Which of the following commands is used to get USB information attached to a Linux computer?

lsusb

Linux uses a ______ kernel design, as contrasted with a microkernel design.

monolithic

Which of the following commands can list all the TCP ports on which the Linux server is listening?

netstat

The ____ pathnames are opposite to the absolute pathname. It does not begin with a slash ( / ). This is mostly used to shorten a path name.

relative

You accidently wrote Debian in place of Linux in your file named File1. Which of the following commands will you use to replace the word debian with Linux?

sed

A type of software that's distributed for free but that requires payment on the "honor system" if a person uses it is called _____.

shareware

Which of the following commands starts the GNOME display manager service?

sudo /etc/init.d/gdm start

You are having four files in one of your directories. Which of the following commands will you execute to compress all four files together?

tar

Which of the following commands will you execute to decompress a GZipped tar file?

tar -zxvf

Which of the following commands restores a compressed backup file named homebkup.tar.gz in the current directory of a Linux computer?

tar -zxvf homebkup.tar.gz

Which of the following commands will you use to update the access time of a file?

touch

You work as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. While running a script you want to determine whether the output for the script is a terminal (that is, to an interactive user) or to some other destination such as another program or a printer. Which of the following commands can you use to accomplish the task?

tty

Which of the following commands provides a quick summary of every user logged into a computer?

w

You are asked to write a document on Linux development in about 500 words. You have written the document and need to verify the number of words in it. Which of the following commands will you use to accomplish the task?

wc -w document

Which of the following commands displays the executable path of commands? Each correct answer represents a complete solution. Choose two.

whereis, which

You are a newly appointed network technician at Net Perfect Inc. The company has a Linux-based network. You want to install a package named firefox on your Linux system. Which of the following commands will you use to accomplish the task?

yum install firefox

You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have installed the Samba package on your system. You want to configure Samba using the graphical interface tool. What should you do to open the Samba Server Configuration window? Each correct answer represents a complete solution. Choose all that apply.

Click System Settings > Server Settings > Samba Server., Use the redhat-config-samba tool.

You have successfully created a user using the useradd command. However, you cannot log in to a Linux computer with that user. Which of the following reasons correctly explains the issue?

The passwd command is not executed.

Which of the following commands is used to switch from one user login to another in a Linux computer?

SU

Which of the following shell variables describes the display type?

TERM

Match the following commands with their corresponding actions.

locate >> location of files whereis >> location of commands apropos >> searches... man >> detailed... whatis >>short description...

Match each programming language with its corresponding description.

PHP >> This language was... Peri >> This interpreted... Assembly >> This is a low-level... Python >> This language supports.

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. Your network is configured with the following TCP/IP settings: TCP/IP Configuration Settings Network Address 192.168.20.0 Subnet Mask 255.255.255.0 Default Gateway 192.168.20.100 A router is configured on the network with the static IP address 192.168.20.100/24. You want the router to reject the requests addressed for the 192.168.20.0/24 network. Which of the following commands will you use?

ROUTE add - net 192.168.20.0 netmask 255.255.255.0 reject

You want to use various software packages such as word processor, spreadsheet, graphics, and math formula bar on your Linux computer. Which of the following suites will you use to accomplish the task?

LibreOffice

Which of the following operating systems highly supports the Graphical User Interface and has become the most popular in the IT field?

Microsoft Windows

Which of the following users are created automatically when the Linux operating system is installed on a computer? Each correct answer represents a complete solution. Choose two.

System users, Root users

Mark works as a Database Administrator for Net Perfect Inc. The company has a Linux-based network. Mark locates a file created in /home successfully by using the slocate command. He finds that the slocate command could locate that file even after deletion. Which of the following could be the possible solutions to stop listing the deleted files?

Run updatedb to update the database., Run slocate -u to update the database.

Match each software type according to its description.

Shareware >> It is copyrighted... Commercial Software >> It is developed... Open source software >> It is defined...

You have to search a file on your Linux computer. With which of the following parameters can you search a file using the find command? Each correct answer represents a complete solution. Choose three.

Size, Access Time, Owner and Permission

Which of the following components exist in the motherboard? Each correct answer represents a complete solution. Choose three.

Super I/O, RAID, Northbridge

You use the DIG tool to analyze a domain named mydomain.com to get the information whether or not the domain is on hold. You also want to know whether the authoritative name servers are answering for the given domain. You recognize that domain is showing SERVFAIL status. What does it mean?

The domain exists and the root name servers have information about domain, but that the authoritative name servers are not answering queries for this domain.

The _____ command searches a database of filenames and quickly identifies the locations of files and directories. The ____ command is used to search a file and display the location of a file, not of a command.

locate, locate

To view all files, including hidden files and directories, in the current directory, you would type _____

ls -a

You want to view all the files (including hidden files) in the home directory and its subdirectories. Fill in the blank with the command that you will use to accomplish the task.

ls -aR /home,ls -aR ~

Which of the following commands will you use to arrange directories of the root in reverse order?

ls -s | sort -nr


Related study sets

Covenant Theology -- Davidic Covenant

View Set

Michigan Ornamental Pest Management (Category 3B)

View Set

Lesson 11-9: What is a generator?

View Set

7.4 investment analysis and strategies

View Set