Linux FINAL

Ace your homework & exams now with Quizwiz!

What operator below is known as the NOT operator?

!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

#!

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

$

The contents of a certain variable in memory can be viewed using which metacharacter in combination with the echo command?

$

The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.

$PS1

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

$PS1

What metacharacter indicates background command execution?

&

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.​

(h0,0)

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

*

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character. a. + b. ^ c. ? d. *

*

The _____ regular expression metacharacter matches 0 or more occurrences of the previous character.

*

In a file's mode, a permission that is unavailable is represented by what character?

-

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?​ a. -o loop b. --mode l c. --option l d. --loop

--loop

To view a list of files and their type, use the _____ switch to the ls command.

-F

Which switch below can be added to the ls command to show a list of files and their type?

-F

Which switch command can be added to the ls command to show a list of files and their type?

-F

When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.

-c

To remove a package from the system, you can use the ____ option to the rpm command.

-e

When used with the compress command, the ____ option can be used to compress symbolic links.

-f

Select the command below that can be used to provide a long listing for each file in a directory:

-l

The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.

-l

When using the cpio utility, the ____ option causes a new archive to be created.

-o

When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.

-p

What option, when added to the rm command, is commonly referred to as the -resume option?

-r

The mkfs command can be issued with what switch in order to specify a filesystem type? a. -o b. -f c. -c d. -t

-t

The ____ option can be used with the tar command to extract a specified archive.

-x

dd

. In vi, using command mode, what series of key presses below will cause the line on which the cursor is on to be deleted?

200 MB

. What is the recommended size for the /home directory?

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

The filename extension given to files compressed with bzip2 is ____.

.bz2

The File system Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/boot

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/boot

Under what directory is the Linux kernel stored?

/boot

Which device file below represents the first primary partition on the second PATA hard disk drive? a. /dev/hdb1 b. /dev/hdc2 c. /dev/hdc1 d. /dev/hda1

/dev/hdb1

What character device file represents the second serial port on a system (COM2)? a. /dev/ttyS1 b. /dev/tty2 c. /dev/tty1 d. /dev/ttyS0

/dev/ttyS1

In Fedora 20, where are user configured settings for Xorg stored?​

/etc/X11/xorg.conf.d/

The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

/etc/profile

What two files below are the first two BASH environment files to be executed and controlled by the sysadmin (root user)?​

/etc/profile /etc/bashrc

The File system Hierarchy Standard specifies what directory as the root user's home directory?

/home

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

/root

Under the root directory in Linux, which directory contains system commands and utilities?

/usr

What directory under / contains the log files and spools for a Linux system?​

/var

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

0

On Linux, the root user always has a UID of what number?​

0

The file descriptor stdin is represented by the number ____.

0

What number represents the stdin file descriptor?

0

What number represents the stdout file descriptor?

1

In Linux, what runlevel is also known as the multiuser mode?

2

The file descriptor stderr is represented by the number ____.

2

What number represents the stderr file descriptor?

2

What is the recommended size for the /home directory?

200MB

-wx-w-r-x

325

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

4

r--

4

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

what are the three numbers representing rwx?

421

r-x

5

​Select the mode below that corresponds to setting r-x:

5

If no level of compression is specified, the gzip command assumes the number ____.

6

rw-

6

The average compression ratio for gzip is ____%.

60-70

rw-r-xrwx

657

rw- rw- rw-

666

When using the chmod command, the mode rwx can be represented by which number?

7

rwx

7

What hex code is associated with a Linux swap type partition?​ a. ​96 b. 83 c. 12 d. 82

82

At the vi command mode prompt, what key combination will force a quit from the vi editor without saving changes?

:q!

​At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes? a. ​:q! b. ​:! c. :exit d. :q

:q!

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?

;

You can redirect a file to the standard input of a command using the ____ metacharacter.

<

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

>

You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.

>

What metacharacter should be used to append stdout to a file?

>>

The _____ symbol indicates a linked file.

@

When issuing the ls -F command, what special character indicates a linked file?

@

RAID-Z

A ZFS volume that uses a variable stripe size and requires a minimum of three hard disks to protect against single disk failure is known as:

cal

A calendar for the current month can be shown on the command line by issuing which command?

character

A device that transfers data in a character-by-character fashion is referred to as what type of device?

4

A hard drive or SSD can be divided into partitions. What is the maximum number of primary partitions that can be used on these devices?

env

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

pwconv

A system that uses an /etc/passwd file only can be converted to use /etc/shadow for security by using what command?

-L

A user account can be locked with the usermod command using what option?

lpstat

Adding the -t option to what command below will provide a list of all printers on the system and their status?

fg

After a background process has been started, what command below can be used to move it to the foreground?

exit

After a shell is no longer needed, what command can be given to exit the shell?

Run the ldconfig command.

After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated?

shell

After logging into a terminal, a user will receive an interface known as which option below?

newaliases

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?

grub-mkconfig

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?

chmod a+x file1

All categories (the user, the primary group and all others) have execute permission.

hexadecimal

An IPv6 IP address consists of 16-bit numbers in what numbering scheme?

rpm2cpio

An RPM package can be converted to a cpio archive using what command?

tarball

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

​A utility that can be used to manage DPM packages using a graphical interface.

Aptitude

____ are back-up copies of files and directories.

Archives

Universal Access

Assistive technologies are configured using what utility on Fedora 20 in GNOME?

:q!

At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes

0

At what runlevel does a Linux system have no daemons active in memory, allowing it to be safely powered off?

____ is burning software that comes with Red Hat Fedora Core 2.

Brasero Disc Burner

1024

By default, the shell on a Linux system limits the number of filehandles a program can have open to what value?

To display the contents of a text file called data, what command should be used?

Cat data

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?

Cd ../..

____ are values that are calculated using a MD5 algorithm, a SHA-1 algorithm, or a SHA-256 algorithm. Read Answer Items for Question 13.

Checksum

The software whose source code is not freely available from the original author; Windows 98 is an example.

Closed Source Software

Most configuration files on Linux systems are delimited using ____ characters.

Colon

A ____ is a standard set of instructions used to compress a file.

Compression algorithm

The rate of compression is called the ____.

Compression ratio

In order to switch between terminals in Linux, a user can press what two keys in combination with the F1-F6 keys?​

Ctrl + Alt

What key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl + g

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl +g

What key combination is commonly used in the vi editor command mode, displays current line statistics?

Ctrl+g

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​ a. ​Ctrl+k b. ​dd c. ​Ctrl+a d. ​Ctrl+d

Ctrl+k

What installation media source is the most common source for Linux packages?

DVD

tracks

Data is read from physical hard drives in concentric circles known as which of the following?

____ are constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.

Decision construct

C

Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?

The _____ is a special file that serves as placeholders to organize other files.

Directory

target ID

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

8-bit

Each octet in an IP address represents a binary number consisting of how many bits / bytes?

An alternative to the vi editor that offers an equal set of functionality is the GNU _____ editor.

Emacs

An alternative to the vi editor that offers an equal set of functionality is the GNU _________________________.

Emacs (Editor MACroS) editor

The LISP artificial intelligence programming language can be used with which text editor ?

Emacs editor

The LISP artificial intelligence programming language can be used with which text editor below? a. Kedit editor b. Nedit editor c. Joe editor d. Emacs editor

Emacs editor

The _____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.

Emacs editor

____ are shell variables that are typically set by the system and contain information that the system and programs access regularly.

Environment variables

filesystem corruption

Errors on a filesystem are common on most filesystems. What do these errors indicate?

ln file1 file2

Everything about the files is the same and the link count is increased by one.

____________________ defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

__________defines a standard set of directories for use by all Linux and UNIX systems, as well as the file and subdirectory contents of each directory.

FHS

1. A symbolic link is also known as a soft link and is depicted by an @ appearing at the beginning of the filename when viewed using the ls -l command. True or False?

False

3. There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file and the other that it is on a directory. True or False?

False

A swap partition contains a filesystem.

False

Each device attached to a system can be represented by multiple device files.

False

In Linux, you are restricted to using only one type of filesystem on a system.

False

In the past, SATA hard disks were referred to as Integrated Drive Electronics (IDE).​

False

Shell scripts do not require the execute permission in order to be run the same way binary programs are run.

False

T/F - Filenames can include up to 200 characters.

False

T/F - Given the syntax command && command, the command on the left of the && construct is executed only if the command on the right of the && construct completed successfully.

False

T/F - If a compression utility compresses a file to 52% of its original size, it has a compression ratio of 52%.

False

T/F - In Linux, the root directory is represented by a \ character.

False

T/F - In a decision construct, you can have an unlimited number of if then statements.

False

T/F - Is the graphical Emacs editor harder to use than the Emacs editor?

False

T/F - Is vim the Linux equivalent of vi?

False

T/F - It is acceptable to use shell metacharacters when naming files.

False

T/F - Pressing the Esc key at the prompt while using the more command displays a help screen.

False

T/F - The command strings /bin/echo displays the binary characters inside the /bin/echo binary executable program.

False

T/F - The rmdir command automatically removes a directory and all of its subdirectories and files.

False

T/F - To decompress files that have been compressed with the compress utility, you can use the decompress command followed by the names of the files to be decompressed.

False

T/F - To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?

False

T/F - To perform a case-insensitive grep search, would you use the -a option to the grep command?

False

T/F - To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

False

T/F - Traditionally, CDs/DVDs were used to back up data.

False

T/F - Users can create their own custom variables, called shell variables.

False

T/F - When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

False

T/F - When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.

False

T/F - When using the less command, can you use the cursor keys on the keyboard to scroll up and down the contents of the file?

False

T/F - When you first open the vi editor, you are placed in edit mode.

False

T/F - You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

False

Volumes can contain a filesystem but they can't be mounted to directories within the Linux filesystem hierarchy.​

False

You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

False

What command is most effective at identifying different types of files?​

File

What command is most effective at identifying different types of files?

File command

____ are labels representing command input and output.

File descriptors

What software type is software that is distributed free of charge, but the source code is not available?

Freeware

Archiving all data on a filesystem is performing a ____.

Full backup

An alternative to the vi editor that offers an equal set of functionality is the_______ editor.

GNU Emacs

​The way in which a hard disk or SSD partition is formatted to allow data to reside on the physical media.

GUID Partition Table

State two ways of linking files in Linux.

Hard Link Symbolic Link (Symlink)

Filenames that start with a period, such as .file, are referred to as

Hidden Files

@server

How can you specify the intended DNS server to query with the dig command?

three

How many DNS servers can be configured in the /etc/resolv.conf file?

64

How many different kill signals can be sent by the kill command to a given process?

every ten minutes

How often are sar commands scheduled to run on both Fedora 20 and Ubuntu Server 14.04?

vim file1

I order to quickly create an empty file, what command can be used?

:

IPv6 IP addresses are delimited by what character below?

xwininfo

If X Windows fails to start, what command can be used to troubleshoot the issue?

segmentation fault

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

SIGHUP

If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:

Tab

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

TCP wrapper

If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?

6

If no level of compression is specified, the gzip command assumes what compression level?

chmod +x file2

If no user is specified, all categories have execute permission.

umask (user mask)

If these default permissions are too permissive, a special variable on the system named ___ takes away permissions on new files and directories immediately after they are created. This command is meant to be used for newly created files and directories.

journald

In Fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

tty1

In Fedora 20, what terminal is used for graphical login?

​tty1

In Fedora 20, what terminal is used for graphical login?​

/etc/X11/xorg.conf.d/

In Fedora 20, where are user configured settings for Xorg stored?

X Windows

In Linux, the core component of the GUI is known as:

2

In Linux, what runlevel is also known as the multiuser mode?

0

In NTP, what stratum consists of atomic devices or GPS clocks?

7

In a SCSI chain the highest priority SCSI device is given what SCSI ID?

sixth

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

-

In a file's mode, a permission that is unavailable is represented by what character?

system-config-keyboard

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

tzselect

In order to change the time zone of a system after installation, what command must be used?

ln

In order to create a hard link, what command must be used?

useradd

In order to create user accounts on a Linux system, what command should be utilized?

-l

In order to display a list of at job IDs, what option can be specified to the at command?

apt-get

In order to download DPM packages, what command should be used below?

net.ipv4.ip_forward

In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?

zfs get all

In order to list all configuration parameters that can be modified for a subfilesystem, what command should be issued?

cd ../..

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued?

<

In order to redirect a file to the standard input of a command, what metacharacter should be used?

lp

In order to send a print job to a printer using CUPS, what command must be used?

chmod 7777 filename

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

rmdir proj_files

In our book this directory is not deleted since it contains files.

1024

In some cases, the installation process fails to place a boot loader on the hard disk properly; this is often caused by hard drives with over what number of cylinders?

(hd0,0)

In standard GRUB notation, select the option below that represents the first hard drive in a system, and the first partition on that hard drive.

image=

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

Ctrl+k

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?

​Ctrl+k

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?​

swapoff

In the event that you wish to disable a swap partition, what command must be used?

swapoff

In the event that you wish to disable a swap partition, what command must be used?​

w

In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?

process state

In the output of the ps -l command, what column is the most valuable to systems administrators because it indicates what the process is currently doing?

The process is currently running on the processor.

In the process state column, what does an "R" indicate?

dd

In vi, using command mode, what ​series of key presses below will cause the line on which the cursor is on to be deleted?

root

In what filesystem are most of the operating system files contained?

command mode

In what mode does the vi editor open by default?

​command mode

In what mode does the vi editor open by default?​

chown -R user1.root Desktop

It changes the file owner to user1 and the group membership to root.

cp /etc/hosts

It copies the /etc/hosts file to the current directory.

touch file1

It creates an empty file called file1.

ls -li

It indicates a long listing of the files including the inode number

which grep

It lists the subdirectory that contains the grep executable file.

chmod 6755 file1

It sets the SUID and SGID for file1.

chmod 1777 dir1

It sets the sticky bit to dir1 so that the users can only delete their own files.

_____ are files that have an association with one another.

Linked files

_____ is a file that contains the most recent entries at the bottom of the file.

Log file

RPM

Most Linux distributions make use of what package manager?

15

Most Parallel SCSI controllers are capable of supporting up to how many devices?

A _____ identifies a channel that passes information from one process in memory to another, and in some cases can be mediated by files on the hard drive.

Named pipe

You can perform up to ____ different incremental backups using the dump/restore utility.

Nine

Is the graphical Emacs editor harder to use than the Emacs editor?

No

To perform a case-insensitive grep search, would you use the -a option to the grep command?

No

jabbering

Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?

chkconfig

On Linux systems that use the traditional UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

0

On Linux, the root user always has a UID of what number?

/var/spool/at

On a Fedora based system, where are the shell environment and scheduled commands for at stored?

xvidtune

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

Options

Hardware Compatibility List (HCL)

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?

​Hardware Compatibility List (HCL)

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?​

0

Processes are started with what nice value by default?

Network Address Translation (NAT)

Proxy servers keep track of the information passed to each client by maintaining what type of table?

Most Linux distributions today use ____ as their package manager.

RPM

package dependency

RPM packages that require other RPM packages to be installed on a system prior to being installed creates a relationship known as?

State the three regular permissions that may be assigned to each user.

Read Write Execute

If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.

Read and execute

Text wildcards used to ease the searching of specific text information are called _________________________.

Regular expressions (regexp)

nohup

Running background processes using what command allows you to exit your command-line shell without ending any background processes?

What two disk systems allow for the use of more than four hard drives or SSDs in a single system?​

SATA, SCSI

What two BASH environment variables represent the current working directory, and the absolute pathname of the current shell, respectively?

SHELL and PWD

State the three special permissions.

SUID (Set User ID) SGID (Set Group ID) Sticky bit

/etc/named.conf

Select below the configuration file that is used to configure the BIND / DNS server:

DROP DATABASE

Select the SQL statement below that can be used to delete a database:

ls -l

Select the command below that can be used to provide a long listing for each file in a directory:

du

Select the command below that shows the size of a directory and its contents in kilobytes:

​du

Select the command below that shows the size of a directory and its contents in kilobytes:​

chroot

Select the command that can be used to change the root filesystem to a different directory, such as when in a rescue environment

mke2fs

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:

e2fsck

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:​

fdisk

Select the command that can be used to create partitions that will be stored in an MBR after installation:

ping

Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:

\f

Select the escape sequence that is used for a form feed:

\n

Select the escape sequence that starts a new line when used with echo:

​\n

Select the escape sequence that starts a new line when used with echo:

loadavg

Select the file in the /proc directory that contains statistics on the performance of the processor

-d

Select the iptables option that specifies the destination address of packets for a rule:

|

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

5

Select the mode below that corresponds to setting r-x:

-p

Select the option that can be used with the lpstat command to display a list of printers that are enabled:

-l

Select the option that, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed:

-B

Select the option that, when used with the sar command, displays swap statistics:

*

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

d. *

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

[ A gt B ]

Select the test statement that can be used to determine if A is numerically greater than B

[ A -gt B ]

Select the test statement that can be used to determine if A is numerically greater than B:

memtest86

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:

​memtest86

Select the utility below that when run will start and perform a thorough check of RAM for hardware errors:​

____ are files that are typically used to create custom programs that perform administrative tasks on Linux systems.

Shell scripts

_____ is a file that allows a process on another computer to write to a file on the local computer while another process reads from that file.

Socket file

live media image

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?

​live media image

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?​

_____ is a file that represents a device on the system, such as a hard disk or serial port.

Special device file

A file descriptor that represents any error messages generated by a command.

Standard Error (stderr)​

A file descriptor that represents information input to a command during execution.

Standard Input (stdin)

A file descriptor that represents the desired output from a command.

Standard Output

What option can be used in the journald configuration file to specify a file size limit to the event log?​

SystemMaxUse

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Tab b. Ctrl c. Alt d. Esc

Tab

If you type enough unique letters of a directory and press _____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.

Tab

To display a text file in reverse order, what command should be used?

Tac command

What command can be used to display the last five lines of a text file?

Tail -5

Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives are called ____.

Tarball

40-50

The Adaptive Lempel-Ziv compression algorithm used by the compress utility is capable of an average compression ratio of what percent?

TCP 80

The Apache daemon listens for HTTP requests on what port by default?

631

The CUPS Web administration tool can be accessed via web browser by accessing what TCP port below?

/boot

The Filesystem Hierarchy Standard specifies what directory as containing the Linux kernel and the boot loader configuration files?

/root

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

Free Software Foundation (FSF)

The GNU General Public License (GPL) was developed by which organization?

4GB

The GUI components and related software take up how much space on a typical Linux installation?

Emacs editor

The LISP artificial intelligence programming language can be used with which text editor below?

vmlinuz

The Linux kernel exists as a file named:

vmlinuz

The Linux kernel exists as a file named:​

Linus Torvalds

The Linux kernel was developed and released in 1991 by:

KDE

The QT toolkit is utilized by which GUI environment?

514

The System Log Daemon uses what TCP and UDP port to accept incoming requests from another System Log Daemon on a remote system?

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

man -k list

The apropos list command produces the same results as which command below?

$

The contents of a certain variable in memory can be viewed using which metacharacter below in combination with the echo command?

echo $PS1

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

nine

The dump/restore utility is limited to a maximum of how many different incremental backups?

set

The environment variables that are set by default and their current values can be viewed with what command?

There are several different ways to identify a symbolic link. State them

The file type character (before the permission) is l. ls -F The output from this command will have @ after the file name, i.e., file4@. ls -li The output from this command will be file4 -> file3.

127

The first software RAID volume on a system will use a multiple disk device file that starts with what number?

Firewall

The iptables software on Linux is an example of what kind of software?

-t

The mkfs command can be issued with what switch in order to specify a filesystem type?

Total cost of ownership (TCO)

The overall cost of using a particular operating system is known as?

edquota

The quotas for certain users can be edited by using which command?

the mode of the file

The section of an inode that stores permissions is referred to as what?

/etc/ssh/sshd_config

The sshd daemon is configured by editing what configuration file?

>

The standard output and standard error from a terminal screen within the BASH shell can be redirected to a file on the filesystem using what shell metacharacter, followed by the absolute or relative pathname of the file?

State the three main structural sections of a filesystem.

The superblock The inode table Data blocks

chmod u=rw,g=r,o=r file2

The user is given the read & write permission, the primary group is given read permission and all others are given the read permission.

chmod u+w,g+r-w,o+r-x file1

The user is given the write permission, the primary group is given read permission and loses write permission and all others add the read permission and loses the execute permission.

locate inittab

The user will be able to view all files with the word inittab in the filename.

chmod 644 file*

This command changes the permissions of all files that have the format filex to rw-r--r--.

chmod 540 file1

This command changes the permissions of file1 to r-xr-----.

chmod -R 755 Desktop

This command changes the permissions of the Desktop directory and all of the files in the Desktop directory to rwxr-xr-x.

find /boot -type d

This command will find all directories underneath the /boot directory only.

find /var -size +4096

This command will find files that are larger than 4096 K (Kilobytes) underneath the /var directory.

find /etc -name "host*"

This command will find files that start with the letters "host" underneath the /etc directory.

groups

This command will let the user view his/her current group memberships.

rm -Rf proj_files

This command will remove the proj_files directory along with the files within the directory and the user will not be prompted about the deletion of these files.

newgrp

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

tac

To display a text file in reverse order, what command should be used?

tac

To display a text file in reverse order, what command should be used?​

cat data

To display the contents of a text file called data, what command should be used?

/proc/meminfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

mount -a

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used?

16. Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?

True

At minimum, Linux typically requires only two partitions to be created: a partition that is mounted to the root directory, and a partition for virtual memory.​

True

By default, Fedora 20 allows the root user to log into the GNOME desktop.​

True

T/F - Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.

True

T/F - Any command that can be executed on the command line can also be placed inside any environment file.

True

T/F - Because its primary use is to back up files in case of system failure, cpio uses absolute pathnames by default when archiving.

True

T/F - It is good form to read the Makefile after you run the configure script.

True

T/F - Linux uses a logical directory tree to organize files into different folders.

True

T/F - The BASH shell assumes stdout in the absence of a numeric file descriptor.

True

T/F - The ENV environment variable represents the location of the BASH run-time configuration file.

True

T/F - The compress utility preserves the original ownership, modification, and access time for each file that it compresses.

True

T/F - The dump/restore utility can only work with files on ext2 and ext3 filesystems.

True

T/F - The more command should not be used on binary files.

True

T/F - The most common way to search for information using regular expressions is the grep command.

True

T/F - The tar utility cannot back up device files or files with filenames longer than 255 characters.

True

T/F - The three characters following a period in a file name are referred to as the filename extension.

True

T/F - You can use the sed command to remove unwanted lines of text.

True

T/F - You can use wildcard metacharacters with the find command.

True

T/F. A file that is hard-linked to another file shares two inodes, and thus has a link count of two.

True

T/F. A quick way to deny a user from accessing a directory and all of its contents in Linux is to take away the execute permission on that directory.

True

T/F. A user who does not have the execute permission to a directory is prevented from listing the directory's contents, adding and removing files, and working with files and subdirectories inside that directory, regardless of what permissions has to them.

True

T/F. A user with write permission to a directory has the ability to delete all files and subdirectories within it.

True

T/F. Access to resources depends on username and group membership. The user must have the required permissions.

True

T/F. All of these linked files have the same size, and when one file is modified, the other hard-linked files are updated as well.

True

T/F. All permissions are stored in the inode of a file or directory as binary powers of two.

True

T/F. All users must login with a username and password to gain access to a Linux system.

True

T/F. Although hard links share the same inode, deleting a hard-linked file does not delete all the other hard-linked files.

True

T/F. During file or directory creation, the user's name and primary group become the owner and group owner of the file, respectively.

True

T/F. Each file and directory must have an inode.

True

T/F. If the information returned does not fit on the screen, the user can use the more or less commands with the locate command.

True

T/F. If you want to override the interactive option, use the mv -f or cp -f. The -f (force) option will override the interactive mode of the alias.

True

T/F. In filesystem-neutral terminology, blocks are also known as allocation units because they are the unit by which disk space is allocated for storage.

True

T/F. New files are given rw-rw-rw- permissions and new directories are given rwxrwxrwx by default.

True

T/F. Note the special permissions have no meaning since the execute permissions are denied.

True

T/F. Permissions are not additive.

True

T/F. Removing a hard link can be achieved by removing one of its files, which then lowers the link count.

True

T/F. Shell scripts are text files containing instructions for the shell to execute. The user must have execute permission to run these scripts.

True

T/F. Since special permissions require execute permission, they mask the execute permission when displayed by the ls -l command.

True

T/F. Some implications of these permissions are a user with read only permission for a file can open the file and make changes to it but cannot save the changes in the file.

True

T/F. Special permissions may be set even if file or directory does not have execute permission. This is done via the chmod command and an extra digit is added to the front of the permissions argument.

True

T/F. Symbolic links do not need to reside on the same filesystem as the target.

True

T/F. Symbolic links do not share the same inode and inode number with their target file. One file is simply a pointer to another file and thus both files have different sizes.

True

T/F. The data blocks in a symbolically linked file contain only the pathname to the target file.

True

T/F. The file can not be recovered once it is deleted.

True

T/F. The hard linked files must reside on the same filesystem. The inode numbers are unique only on the same filesystem and hard links are recognized by ignoring this unique inode number rule.

True

T/F. The inode table consists of several inodes (information nodes).

True

T/F. The last three digits of the number displayed are the current umask.

True

T/F. The most common umask is 022. This umask is saying that nothing is taken away from the user, write permission is taken away from the group and write permission is also taken away from everyone else.

True

T/F. The mv (move) command can also be used to rename files.

True

T/F. The owner of the file or directory and the root user are the only two users on a Linux system who can modify permissions on a file or directory or change its ownership.

True

T/F. The primary group is the user's default group.

True

T/F. The recursive option refers to itself and its own contents. A recursive search includes all subdirectories in a directory and their contents.

True

T/F. The rmdir (remove directory) command only removes a directory if it contains no files. The -R and -f options are helpful.

True

T/F. The root user supersedes all file and directory permissions. The root user has all permissions to every file and directory regardless of what the mode of the file or directory indicates.

True

T/F. The user can copy a directory full of files in Linux by using the -R option (recursive option) with the cp command.

True

T/F. The user might choose to use numeric criteria with the chmod command to change permissions.

True

T/F. To add or remove a file from a directory, the user must have write permission to that directory.

True

T/F. To change the umask, the user can use a new umask as an argument to the umask command, i.e., umask 007.

True

T/F. Users are identified by a username and group memberships.

True

T/F. When a file is deleted, only its inode (which serves as a pointer to the actual data) is deleted.

True

T/F. With special permissions, rw-rw-rw- will become rwSrwSrwT.

True

T/F. With special permissions, rwxrwxrwx will become rwsrwsrwt.

True

T/F. You can use the alias command to see all of the defaults. An alias is a shortcut for a command.

True

T/F. rw-r--r-- can be represented as 644.

True

T/F. rwxr-x--- can be represented as 750.

True

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.

True

The database for the locate command can be updated manually by using the updatedb command.

True

When a user interacts with his computer, he interacts directly with the kernel of the computer's operating system.

True

When you insert a DVD while in a GUI environment, it is automatically mounted by the system to a directory underneath the /media directory that is named for the label on the DVD.

True

You can modify the PS1 variable to customize the shell prompt layout.

True

/var

Under the root directory in Linux, which directory contains system commands and utilities?

usr

Under the root directory in Linux, which directory contains system commands and utilities?

/boot

Under what directory is the Linux kernel stored?

The mode is divided into three sections, based on the user(s) that receives the permission to that file or directory. State them.

User (owner) permissions Group (group owner) permissions Other (everyone else on the Linux System) permissions

[1-4]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4 (shortest form)?

[1-4]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

MX

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?

!

What FTP command runs a shell on the local computer?

Red Hat

What Linux distribution is the most commonly used distribution within organizations today?

pg_dump

What PostgreSQL command-line utility backs up PostgreSQL database settings?

RAID5

What RAID level is commonly referred to as disk striping with parity?

SCSI-3 Ultra2 Wide

What SCSI type supports speeds of up to 80 MB/second?

alert

What System Log Daemon priority indicates an error that should be rectified immediately, such as a corrupt system database?

g+r-w

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

parent process ID

What can be used on a Linux system to trace the lineage of each child process?

#!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

​#!

What character combination at the start of a shell script are referred to as a hashpling, and allow for the specification of the shell that interprets the contents of the script?

/dev/ttyS1

What character device file represents the second serial port on a system (COM2)?

colon

What character is used to delimit most Linux configuration files?

&

What character, when appended to a command, causes the command to be run in the background?

pvcreate

What command below can be used to create a new physical volume?

grub2-install

What command below can be used to re-install GRUB2 in the event that the boot loader becomes corrupted?

lilo -U

What command below can be used to uninstall the LILO bootloader from an active partition?

pstree

What command below is used to display the lineage of a process by tracing its PPIDs until the init daemon?

rm

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

pwd

What command can be issued to confirm what directory you are in at a command line prompt?

ifconfig

What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?

ulimit

What command can be used to change the maximum number of file handles that can be used by a program?

fsck

What command can be used to check different kinds of filesystems on Linux for errors?

grubby

What command can be used to configure the LILO, ELILO, GRUB, and GRUB2 bootloaders?

cp

What command can be used to copy files?

zcat

What command can be used to display the contents of a file that was compressed with the compress utility?

pwd

What command can be used to display the last five lines of a text file?

tail -5

What command can be used to display the last five lines of a text file?

tr

What command can be used to replace characters in a file sent via Standard Input?

dpkg-query

What command can be used to search for DPM package information?

ntp_query

What command can be used to see what actual time servers are being used for synchronization?

traceroute

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

hwclock

What command can be used to view and modify the date and time within the BIOS?

ldd

What command can be used to view what shared libraries are required by a certain program?

stat

What command is most effective at identifying different types of files?

​file

What command is most effective at identifying different types of files?​

mdadm

What command is used to manage a software RAID configuration after installation?

make

What command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture?

DEC PDP-7

What computer system was the first to run the UNIX operating system?

login.defs

What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of UIDs and GIDs available for use?

for

What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

/dev/nht0

What device file below indicates the first ATAPI IDE tape device (nonrewinding)?

DirectoryIndex index.html

What directive below in Apache's httpd.conf file specifies that the index.html file in the document root directory will be sent to clients who request an HTML document?

​/var

What directory under / contains the log files and spools for a Linux system?​

It removes all extra ACL assignments on a given file.

What does the setfacl -b command do?

/etc/profile

What environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH?

ssh_host_dsa_key. pub

What file contains the DSA public key in the /etc/ssh directory?

/etc/systemd/system/default.target

What file controls the default runlevel when using Systemd?

ioports

What file in the /proc directory contains a list of memory address ranges reserved for device use?

/proc/cpuinfo

What file in the /proc directory contains information about a computer's CPU?

udf

What file system below is used by software programs that write to a CD-RW or DVD-RW drive?

modules

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

mput filename

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.

82

What hex code is associated with a Linux swap type partition?

82

What hex code is associated with a Linux swap type partition?​

DVD

What installation media source is the most common source for Linux packages?

256-bit

What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?

60%-70%

What is the average compression ratio for the gzip utility using the LZ77 compression algorithm?

50

What is the default print job priority for all print jobs created by the lp command?

graphical.target

What is the default target on a system with a GUI installed?

15

What is the maximum number of characters that can be used in a NetBIOS name?

2

What is the minimum number of user accounts that must be created at install time?

two

What is the minimum number of user accounts that must be created at install time?

Hard DIsk

What is the most common hardware component to fail on a Linux system?

TCP/IP

What is the most commonly used LAN protocol?

200 MB

What is the recommended size for the /home directory (per user)?

255.255.0.0

What is the subnet mask for a Class B IP address?

255.255.255.0

What is the subnet mask for a Class C IP address?

ZFS volume

What is the term for a ZFS managed filesystem that is created from ZFS pools?

quiet

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?

SIGHUP

What kill signal stops a process, then restarts it with the same PID?

DNS

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

secure

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

;

What metacharacter can be used to issue tw term-31o commands to be run in consecutive order, without piping or redirecting output?

d ;

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?

c. ~

What metacharacter can be used to refer to the current user's home directory?

~

What metacharacter can be used to refer to the current user's home directory?

&

What metacharacter indicates background command execution?

127

What number indicates the lowest kernel priority (PRI) of a process possible?

2

What number represents the stderr file descriptor?

0

What number represents the stdin file descriptor?

!

What operator below is known as the NOT operator?

-P

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?

-i

What option can be added to the netstat command in order to display network statistics?

-q

What option can be added to the rpm command in order to query packages?

-F

What option can be added to the rpm command to upgrade a specified package only if an older version exists on the system?

-r

What option can be added to the userdel command to remove the home directory of the target user?

-V

What option can be specified with the rpm command to identify any missing files in a package or package dependency?

SystemMaxUse

What option can be used in the journald configuration file to specify a file size limit to the event log?

-X

What option can be used with ssh to enable tunneling of X Windows information?

-e

What option can be used with the ps command to display an entire list of processes across all terminals and including daemons?

-P

What option for the iptables command can be used to specify the default policy for a certain chain type?

-d

What option should be used in conjunction with the lp command in order to specify the destination printer name?

-e

What option, when added to the crontab command, opens the vi editor with a user's cron table?

-r

What option, when added to the rm command, is commonly referred to as the -resume option?

execute

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?

write

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

write

What permission grants a user the ability to open, read, and edit the contents of a file?

read and execute

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

device driver

What piece of software tells the operating system how to use a specific hardware device?

UDP 123

What port is used by the Network Time Protocol (NTP) for communication?

panic

What priority used by the System Log Daemon indicates a very serious system condition that would normally be broadcast to all users?

0-1023

What range of ports is considered to be "well-known"?

superblock

What section of a filesystem contains information about the filesystem in general?

Freeware

What software type is software that is distributed free of charge, but the source code is not available?

Stage1

What stage of the GRUB boot loader typically resides on the MBR / GPT?

GNU Public License

What stipulates that the source code of any software published under its license must be freely available.

virtual host

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?

​virtual host

What term describes the physical hardware and the underlying operating system upon which a virtual machine runs?​

Secure Shell (SSH)

What tool below was designed as a secure remote access utility that encrypts information that passes across the network?

iostat

What utility in the sysstat package measures the flow of information to and from disk devices?

25

What well-known TCP port is utilized by the SMTP service?

yum grouplist

What yum command below can display a list of package group names?

/var/named/named.local

What zone configuration file contains a PTR record used to identify the loopback adapter?

@

When issuing the ls -F command, what special character indicates a linked file?

%

When killing a background job with the kill command, the background job ID must be prefixed by what character below?

+

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with which symbol?

-f

When used with the compress command, what option below can be used to compress symbolic links?

-c

When used with the uncompress command, what option displays the contents of the compress file to Standard Output?

systemctl

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts?

Options

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

whoami

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

7

When using the chmod command, the mode rwx can be represented by which number?

.Z

When using the compress utility, each file specified for compression is renamed with what extension?

The process is high priority.

When viewing the output of the ps ax command, what does a < symbol in the STAT column indicate for a process?

minor number

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

HELO

When working with Sendmail, what command can be used to test SMTP support?

/var/log/samba

Where are the log files for the Samba daemon located?

/var/www/html

Where is the default document root directory for the Apache web server?

/etc/skel

Where is the skeleton directory located on most Linux systems?

whoami

Which Linux command can be utilized to display your current login name?

{}

Which character(s) below represent extended regular expression metacharacter(s)?

curl

Which command below can be used at a BASH command prompt to obtain a web page?

service

Which command below can be used to start, stop, or restart any daemons in the /etc/init.d directory?

df

Which command below provides the easiest method for monitoring free space on mounted filesystems?

wc

Which command can be used to count the number lines, words, and characters in a file?

nmap

Which command can be used to see what network services are running on your network?

lpadmin

Which command should be used to restrict access to printers?

/dev/hdb1

Which device file below represents the first primary partition on the second PATA hard disk drive?

SIGQUIT

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?

device calls

Which of the following is not one of the three main types of Linux commands?

Hiring people to maintain the Linux system

Which of the following is the greatest expense for companies using Linux?

Ctrl+g

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

--loop

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?

​-o loop

Which option, when used with the mount command, enables loopback mode so that an iso image can be mounted onto a directory?​

-q

Which sar command option is used to display statistics for the processor queue?

-F

Which switch below can be added to the ls command to show a list of files and their type?

Artistic

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?

Due to the fact that the * character can be used to match all ​characters in a filename, or all files in a directory, it is referred to as a ____________ metacharacter.

Wildcard

In Linux, the core component of the GUI is known as:

X Windows

The component of X Windows that requests graphics to be drawn from the X server and displays them on the terminal screen.

X client

The component of X Windows that draws graphics to windows on the terminal screen.

X server

Is vim the Linux equivalent of vi?

Yes

To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?

Yes

When using the less command, can you use the cursor keys on the keyboard to scroll up and down the contents of the file?

Yes

/var/log/boot.log

You are troubleshooting an issue that occurs on a Linux system during the boot process. What file can be viewed on most Linux systems to see processes that started successfully or unsuccessfully specifically during the boot process?

Select the test statement that can be used to determine if A is numerically greater than B.

[ A -gt B ]

The test statement ____ would be used to determine if A is numerically greater than B.

[ A -gt B ]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1234]

The ____ escape sequence represents a form feed.

\f

The ____ regular expression metacharacter matches 0 or more occurrences of the previous character. a. * c. + b. ? d. ^

a. *

The ____ symbol indicates a linked file. a. @ c. & b. * d. =

a. @

7. After typing the ls -F command, you see the following line in the output: -rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1. What does this mean? a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.

a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

17. When applied to a directory, the SGID special permission____________________. a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them b. cannot be done as it is only applied to files c. allows users the ability to use more than two groups for files that they create within the directory d. causes users to have their permissions checked before they are allowed to access files in the directory

a. causes all new files created in the directory to have the same group membership as the directory and not the entity that created them

The ____ metacharacter can also be used to refer to the current user's home directory. a. ~ c. & b. @ d. #

a. ~

Hard Linked files

are direct copies of one another, as they share the same inode and inode number.

added to a ch or ls command for attributes?

attr

The ____ command can be used to extract, manipulate, and format text using pattern-action statements.

awk

The ability to extract, manipulate, and format text using pattern action statements belongs to which command below?

awk

10. The command chmod 317 file1 would produce which of the following lines in the ls command? a. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1 b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1 c. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1 d. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1

b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1

If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information. a. Alt c. Ctrl b. Tab d. Esc

b. Tab

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4? a. 1-4 c. [1234] b. [1-4] d. [1,2,3,4]

b. [1-4]

To move from the /home/joe/test/data to the /home/joe directory, use the ____ command. a. cd .. c. /home/joe b. cd ../.. d. cd ./..

b. cd ../..

18. Which command do you use to rename files and directories? a. cp b. mv c. rn d. rename

b. mv

The ____ command will confirm the system directory that you are currently in. a. dir c. whereami b. pwd d. ld

b. pwd

12. What does the /var directory contain? a. various additional programs b. spools and log files c. temporary files d. files that are architecture independent e. local variance devices

b. spools and log files

20. Given the following output from the ls command, how many files are linked with file1? drwxr-xr-x 3 root root 4096 Apr 8 07:12 Desktop -rw-r--r-- 3 root root 282 Apr 29 22:06 file1 -rw-r--r-- 1 root root 282 Apr 29 22:06 file2 -rw-r--r-- 4 root root 282 Apr 29 22:06 file3 -rw-r--r-- 2 root root 282 Apr 29 22:06 file4 -rw-r--r-- 1 root root 282 Apr 29 22:06 file5 -rw-r--r-- 1 user1 sys 282 Apr 29 22:06 file6 a. one b. two c. three d. four

b. two

The TCP/IP communication destined for all computers on a network.

broadcast

​A command used to decompress files compressed by the bzip2 command

bunzip2

8. After typing the command umask 731, the permissions on all subsequently created files and directories will be effected. In this case, what will the permissions on all new files be? a. rw-rw-rw- b. rwxrw-r-- b. rwxrw-r-- d. ----wx--x

c. ---r--rw-

To view a list of files and their type, use the ____ switch to the ls command. a. -T c. -F b. -L d. -l

c. -F

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? a. $ c. Ctrl+g b. x d. P

c. Ctrl+g

The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor. a. Kedit editor c. Emacs editor b. Mcedit editor d. Nedit editor

c. Emacs editor

2. What was created to define a standard directory structure and common file location for Linux? a. FSH b. X.500 c. FHS d. root directory

c. FHS

6. A user utilizes the chgrp command to give ownership of a file to another user. What must the user do to regain ownership of the file? a. Run chgrp again listing himself as the new owner. b. Nothing as this is a one-way, one-time action. c. Have the new owner run chgrp and list the original owner as the new owner. d. Run chown and list himself as the new owner.

c. Have the new owner run chgrp and list the original owner as the new owner.

13. What does the mv command do? (Choose all that apply.) a. It makes a volume. b. It makes a directory. c. It moves a directory. d. It moves a file.

c. It moves a directory. d. It moves a file.

19. What are the three standard Linux permissions? a. full control, read-execute, write b. read, write, modify c. execute, read, write d. read, write, examine

c. execute, read, write

Most files on a Linux system that contain configuration information are ____ files. a. system c. text b. directory d. program

c. text

The chown command

can be used to change both the file owner and the group owner of a file or directory at the same time.

The rm -R command

can be used to remove a directory along with the files inside of the directory.

To display the contents of a file called data, use the command _____.

cat data

To display the contents of a text file called data, what command should be used?

cat data

In order to move from the /home/joe/test/data to the /home/joe directory, what command below should be issued? a. cd .. b. /home/joe c. cd ./.. d. cd ../..

cd ../..

To move from the /home/joe/test/data to the /home/joe directory, use the _____ command.

cd ../..

The chgrp (change group) command

changes the group owner of a file or directory.

The chmod (change mode) command

changes the mode (permissions) of files or directories.

The chown (change owner) command

changes the ownership of a file or directory.

A device that transfers data in a character-by-character fashion is referred to as what type of device? a. text b. binary c. block d. character

character

​A calculated value that is unique to a file's size and contents.

checksum

The command used to change the GECOS for a user.​

chfn

On Linux systems that use the traditional ​UNIX SysV init, what command below can be used to list and modify the runlevels that a daemon is started in?

chkconfig

In order to set all of the special permissions on a certain file or directory, which command below should be used on a file named filename?

chmod 7777 filenam

In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename?

chmod 7777 filename

In what mode does the vi editor open by default?

command

The cp (copy)

command copies files. It requires two arguments at a minimum: the source file/directory (may specify multiple sources) and the target file/directory. The target file/directory is always listed last. The original file is still in tact. .

The mkdir (make directory)

command creates directories or folders using the arguments specifying the absolute or relative pathname of these directories. mkdir proj_files

In what mode does the vi editor open by default?​ a. ​command mode b. ​overview mode c. ​insert mode d. append mode

command mode

The mv (move)

command moves files from one directory to another. It requires two arguments at a minimum: the source file/directory (may specify multiple sources) and the target file/directory. The target file and/or directory is always listed last. mv project* proj_files

The rm (remove)

command removes files in a directory and requires a list of arguments specifying the absolute or relative pathnames of the files.

What command can be used to copy files?

cp

The ln (link) command

creates a hard link between two files. The two required arguments are the existing file to hard-link and the target file to create as a link to the existing file.

In the GNU Emacs editor, what key combination can be used to delete all characters between the cursor and the end of the line?

ctrl + K

9. When you change the data in a file that is hard-linked to three others, __________. a. Only the data in the file you modified is affected. b. Only the data in the file you modified and any hard linked files in the same directory are affected. c. The data in the file you modified and the data in all hard linked files are modified as they have different inodes. c. The data in the file you modified and the data in all hard linked files are modified as they have different inodes.

d. The data in the file you modified as well as the data in all hard linked files are modified as they share the same data and all have the same inode and file size.

To display the contents of a file called data, use the command ____. a. disp data c. ls -l data b. ls data d. cat data

d. cat data

14. A file has the following permissions r----x-w-. The command chmod 143 would have the same effect as the command _________. a. chmod u+x-r,g+r-x,o+w file1 b. chmod u=w,g=rw,o=rx file1 c. chmod u-r-w,g+r-w,o+r-x file1 d. chmod u=x,g=r,o=wx file1 e. chmod u+w,g+r-w,o+r-x file1 f. chmod u=rw,g=r,o=r file1

d. chmod u=x,g=r,o=wx file1

The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors. a. XEmacs c. Emacs b. vi d. gedit

d. gedit

The ____ command can be used to provide a long listing for each file in a certain directory. a. ls -T c. ls -F b. ls -L d. ls -l

d. ls -l

4. The default permissions given by the system prior to analyzing the umask are ___________for directories, and __________ for files. a. rw-rw-rw- and rw-rw-rw- b. rw-rw-rw- and r--r--r-- c. rw-rw-rw- and rwxrwxrwx d. rwxrwxrwx and rw-rw-rw- e. rwxrw-rw- and rwx-rw-rw-

d. rwxrwxrwx and rw-rw-rw-

15. The which command _________________? a. can only be used to search for executables b. searches for a file in all directories starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

d. searches for a file only in directories that are in the PATH variable

The ____ command displays the last five lines of a text file. a. end -5 c. stop -5 b. head -5 d. tail -5

d. tail -5

Which is an extended regular expression metacharacter? a. . c. ^ b. [...] d. {}

d. {}

​A system process that is not associated with a terminal.

daemon process

In vi, using command mode, what series of key presses will cause the line on which the cursor is on to be deleted?

dd

In vi, using command mode, what ​series of key presses below will cause the line on which the cursor is on to be deleted? a. ​yw b. ​dd c. ​d d. ​X

dd

Filesystem Hierarchy Standard (FHS)

defines a standard set of directories for all Linux and UNIX systems, as well as the file and subdirectory contents of each directory. It gives Linux software developers the ability to locate files on a Linux system regardless of the distribution, allowing them to create software that is not distribution-specific

Each inode

describes one file or directory on the filesystem and contains a unique number for identification. It also stores information such as file size, data block locations, last date modified, permissions and ownership.

Which command below provides the easiest method for monitoring free space on mounted filesystems? - du - df - fs - fd

df

The umask command

displays the umask of a file.

The find command

does not use a premade index of files, but instead searches the directory tree recursively starting from a certain directory for files that meet a certain criterion

Select the command below that shows the size of a directory and its contents in kilobytes:​ - du - sizeof - df - dir

du

The default BASH shell prompt is set by an environment variable. What command can be used to view this variable?

echo $PS1

The quotas for certain users can be edited by using which command? - chquota - usrquota - repquota - edquota

edquota

The _____ displays lines of text that match extended regular expressions.

egrep command

In an if construct, what statements are optional?​

else and elif

A list of all exported environment and user-defined variables in a shell can be viewed with what command below?

env

To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.

env

What permission (when applied to a directory) allows a user to enter the directory and work with directory contents?

excecute

After a shell is no longer needed, what command can be given to exit the shell?

exit

Which command allows user-defined variables to be accessed by subshells?

export

​Which two filesystems below do not perform journaling?

ext2, VFAT

It is acceptable to use shell metacharacters when naming files.

f

Pressing the Esc key at the prompt while using the more command displays a help screen.

f

The command strings /bin/echo displays the raw binary characters inside the /bin/echo binary executable program.

f

​The area of the system from which information is gathered when logging system events.

facility

It is acceptable to use shell metacharacters when naming files. (true/false)

false

Pressing the Esc key at the prompt while using the more command displays a help screen. (true/false)

false

The command "strings /bin/echo" displays the binary characters inside the /bin/echo binary executable program. (true/false)

false

Select the command that can be used to create partitions that will be stored in an MBR after installation: - fdisk - formatdisk - partition - format

fdisk

Errors on a filesystem are common on most filesystems. What do these errors indicate? a. filesystem corruption b. raid degradation c. hard drive failures d. filesystem breaks

filesystem corruption

The act of creating a new BASH shell child process from a parent BASH shell process.

forking

What command can be used to check different kinds of filesystems on Linux for errors? - chkdsk. - errorchk - fs_check - fsck

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

g+r-w

​What two commands below can be used to edit a GPT based hard disk's partitions? (Select 2 answers) - gdisk - parted - fdisk - gtpedit

gdisk, parted

The _____ editor is functionally analogous to the Windows Wordpad and Notepad editors.

gedit

What is the default target on a system with a GUI installed?​

graphical.target

What yum command below can display a list of package group names?

grouplist

The command used to modify the name or GID of a group on the system.​

groupmod

After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?

grub-mkconfig

A command used to decompress files compressed by the gzip command.

gunzip

The first line in a shell script, which specifies the pathname to the shell that interprets the contents of the shell script, is ____.

hashpling

The _____ displays the first ten lines of a text file.

head command

Filenames that start with a period, such as .file, are referred to as ______ files.

hidden

The file .file.dat is an example of a _____ file.

hidden

When a user logs into their Linux system, he is placed in the _____ directory.

home

In the /etc/lilo.conf file, what keyword should be specified in order to provide the absolute pathname to the Linux kernel?

image=

A link count

indicates how many files share the inode number.

/dev

is a Linux directory defined by the FHS that contains device files.

/var

is a Linux directory defined by the FHS that contains log files and spools.

/usr

is a Linux directory defined by the FHS that contains most system commands and utilities.

/proc

is a Linux directory defined by the FHS that contains process and kernel information.

/lib

is a Linux directory defined by the FHS that contains shared program libraries (used by the commands in /bin and /sbin) as well as kernel modules.

/sbin

is a Linux directory defined by the FHS that contains system binary commands (used for administration).

/etc

is a Linux directory defined by the FHS that contains system-specific configuration files.

/boot

is a Linux directory defined by the FHS that contains the Linux kernel and files used by the boot loader.

/bin

is a Linux directory defined by the FHS that contains the binary commands for use by all users.

/tmp

is a Linux directory defined by the FHS that holds temporary files created by programs.

/home

is a Linux directory defined by the FHS that is the default location for user home directories.

The SGID (Set Group ID)

is applicable to both files and directories. If it is set on a file, the user who executes the file becomes a member of the group that is attached to that file during execution. If it is set on a directory, the user's name becomes the owner of the file and the directory's group becomes the group owner of the file.

If SUID (Set User ID)

is set on a file, the user who executes the file temporarily becomes the owner of the file during execution. It has no functionality when it is set on a directory. It is only applicable to binary compiled programs. Any user can test network connectivity with the ping command.

The locate command

is the fastest method to search for files in the Linux directory tree.

The superblock

is the section of the filesystem that contains information about the filesystem in general such as the number of inodes and data blocks, as well as how much data a data block stores in Kilobytes.

The mode

is the section of the inode that stores permissions for a file.

The ln -s option

is used to create a symbolic link between two files.

The touch command

is used to create an empty file.

An interactive mode

is used to prompt the user before overwriting files. In some distributions, typing mv or cp is the same as mv -i and cp -i. This is the default for the BASH shell in Fedora Core Linux.

A Symbolic Link (Symlink)

is where one file is simply a pointer or shortcut to another file.

A Hard Link

is where two files share the same data.

​Select the two commands in fdisk's interactive mode that can be used to show known partition types and view the current partition table: (Select 2 answers) a. l b. a c. p d. v

l, p

The PATH variable

lists the directories on the system where the executable files are located. It allows executable files to be run without specifying the absolute or relative path of the file.

Some Linux distributions have the ability to boot an image from install media and run entirely from RAM. What is the name for this kind of image?​

live media image

In order to create a hard link, what command must be used?

ln

Select the command below that utilizes a premade database that contains a list of all the files on a system:

locate

What command utilizes a premade database that contains a list of all the files on a system:

locate command

The locate command

looks in a premade indexed database that contains a list of all of the files on the system. This database is updated each day automatically or the user can type the updatedb command at the command prompt.

Which command should be used to restrict access to printers?

lpadmin

The _____ command can be used to provide a long listing for each file in a certain directory.

ls -l

What command can be used to provide a long listing for each file in a directory

ls -l

​Select the commands that can be used to extend a volume group and logical volume respectively: (Select 2 answers) a. lvextend b. vgextend c. lvm_extend d. pgextend

lvextend, vgextend

The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

____ is a command that can be used to copy files to the appropriate location on the filesystem.

make install

The apropos list command produces the same results as which command below?

man -k list

Select the command that can be used to check an ext2, ext3, or ext4 filesystem:​ a. mke2fs b. ext2fsck c. fdisk d. e2fsck

mke2fs

​Select the two commands below that can be used to prepare a swap partition and then enable it for use: (Select 2 answers) a. swapit b. mkswap c. ​swapon d. mkfs.swap

mkswap, swapon

The section of an inode that stores permissions is referred to as what?

mode

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, what command can be used? a. mount -f b. mount -u c. mount -o d. mount -a

mount -a

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use which command below?

newgrp

The which command

only searches for executable files in directories that are listed in a special variable called the PATH variable in the current BASH shell.

In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's _______.

permissions

In a file listing, the 9 characters following the file type (ie. -rwxr-xr-x) refer to the file's _____.

permissions

When a user creates a file or directory, that user's name and ______ becomes the owner and group owner of the file, respectively.

primary group

When a user creates a file or directory, that user's name and ____________________ becomes the owner and group owner of the file, respectively.

primary group

​What command below can be used to create a new physical volume? a. lvcreate b. pvdisk c. pvcreate d. new_pv

pvcreate

The _____ command will confirm the system directory that you are currently in.

pwd

What command can be issued to confirm what directory you are in at a command line prompt?

pwd

What keyword tells the Linux kernel to avoid printing errors to the screen during system startup?

quiet

What permissions are required to execute a shell script in a manner similar to any other executable program on the system?

read and execute

To copy a directory full of files in Linux, you must tell the cp command that the copy will be _____(involve files and subdirectories too) by using the -r option

recursive

To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -r option

recursive

Other

refers to all of the other users on the Linux system.

The User

refers to the owner of a file or directory.

The Group Owner

refers to the users with the ability to change permissions on a file or directory.

Text wildcards used to ease the searching of specific text information are called _____.

regular expressions

Text wildcards used to ease the searching of specific text information are called _______.

regular expressions

What does the setfacl -b command do?

removes all extra ACL assignments

​A command used to extract archives created with the dump command.

restore

What command below takes a list of arguments specifying the absolute or relative pathnames of files to remove?

rm

What command takes a list of arguments specifying the absolute or relative pathnames of files to remove?

rm

In what filesystem are most of the operating system files contained? a. boot b. data c. root d. mnt

root

What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?

secure

The environment variables that are set by default and their current values can be viewed with what command?

set

To see a list of the environment variables and their current values on a system, you can use the ____ command.

set

After logging into a terminal, a user will receive an interface known as which option below?

shell

Any error messages generated by a command is ____.

stderr

The information that is processed by the command during execution is ____.

stdin

____ is the normal output of a command.

stdout

The data blocks

store the data that makes up the contents of the file as well as the filename.

____ is a command that can be used to ensure that a file was received in its entirety after you download it.

sum

What section of a filesystem contains information about the filesystem in general?

superblock

In the event that you wish to disable a swap partition, what command must be used?​ a. umount b. ​swapoff c. ​swapdrop d. ​delete_swap

swapoff

To create a(n) _____ link, you use the -s option to the ln command.

symbolic

To create a(n) ____________________ link, you use the -s option to the ln command.

symbolic

In order to change keyboard layout if X Windows can't detect the layout, you should use what CLI command?

system-config-keyboard

Linux uses a logical directory tree to organize files into different folders.

t

The more command should not be used on binary files.

t

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

tab

To display a text file in reverse order, what command should be used?

tac

To display a text file in reverse order, what command should be used?​ a. tee b. ​tac c. ​cat d. ​sed

tac

The _____ displays a file in reverse order.

tac command

The _____ command displays the last five lines of a text file.

tail -5

What command can be used to display the last five lines of a text file?

tail -5

What command can be used to display the last five lines of a text file?

tail-5

____ is a filter command that takes information from standard input and sends that information to a file, as well as to standard output.

tee

Most files on a Linux system that contain configuration information are _____ files.

text

The section of an inode that stores permissions is referred to as what?

the mode of the file

​The amount of time a process is given on a CPU in a multiprocessing operating system.

time slice

In order to quickly create an empty file, what command can be used?

touch command

The ____ command can be used to replace characters in a file sent via Standard Input.

tr

What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?

traceroute

Data is read from physical hard drives in concentric circles known as which of the following? a. blocks b. tracks c. sectors d. cylinders

tracks

The process of ignoring a kill signal.​

trapping

The more command should not be used on binary files. (true/false)

true

The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.

true

What is the minimum number of user accounts that must be created at install time?

two

What file system below is used by software programs that write to a CD-RW or DVD-RW drive? - udf - ntfs - hpfs - ext2

udf

A special variable used to alter permissions by taking away select defaults?

unmask command

What mode corresponds to setting r-x:

user

What two commands can be used to show information about physical volumes and logical volumes respectively?​ (Select 2 answers) a. showvg b. showlv c. lvdisplay d. vgdisplay

vgdisplay, lvdisplay

The Linux kernel exists as a file named:​

vmlinuz

​In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit? - w - s - q - d

w

The Sticky bit

was previously used on files in the past to lock them in memory. However, they are currently applicable to directories. This ensures that a user can only delete his/her own files in a directory.

The ____ command counts the number of lines, words, and characters in a file.

wc

FTP

what service provides a method for the efficient transfer of files over the Internet?

The _____ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which

The ____________________ command only searches directories that are listed in a special variable called the PATH variable in the current BASH shell.

which command

Which Linux command can be utilized to display your current login name?

whoami

Due to the fact that the * character can be used to match all characters in a filename, or all files in a directory, it is referred to as a_______ metacharacter.

wildcard

What permission (when assigned to a file) grants a user the ability to open, read, and edit the contents of a file?

write

What permission grants a user the ability to open, read, and edit the contents of a file?

write

Once X Windows is configured, what command can be used to fine tune the vertical and horizontal refresh rate?

xvidtune

The ____ command can be used to display the contents of a compressed file.

zcat

A command used to view the contents of an archive created with compress or gzip to Standard Output in a page-by-page fashion

zmore

Which character(s) below represent extended regular expression metacharacter(s)?

{}

Which character(s) represent extended regular expression metacharacter(s)?

{}

Which is an extended regular expression metacharacter?

{}

Select the metacharacter that can be used to send the standard output of one command to another command as standard input:

|

You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.

|

The _____ metacharacter can also be used to refer to the current user's home directory.

~

What metacharacter can be used to refer to the current user's home directory?

~

What are two local environment files that you can modify for use with aliases, functions, exporting of user-defined variables?

~/.bash_profile ~/.bashrc

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​

​Artistic

:q!

​At the vi command mode prompt, what key combination below will force a quit from the vi editor without saving changes?

The GNU General Public License (GPL) was developed by which organization?

​Free Software Foundation (FSF)

Prior to performing an installation of Linux, the hardware components of the target system should be checked against what known compatible list below?​

​Hardware Compatibility List (HCL)

w

​In the fdisk interactive mode, what letter can be used to save changes to the partition table and exit?

The channel that allows a certain user to log in and communicate with the kernel via a user interface​

​Terminal

pvcreate

​What command below can be used to create a new physical volume?

for

​What construct is intended for use in processing a list of objects, such as files, directories, users, printers, and so on?

!

​What operator below is known as the NOT operator?

​A variable that is altered by loop constructs to ensure that commands are not executed indefinitely.

​counter variable

The numeric labels used to define command input and command output.

​file descriptors

The first line in a shell script, which defines the shell that will be used to interpret the commands in the script file.

​hashpling

The group that is specified for a user in the /etc/passwd file and that is specified as a group owner for all files created by a user.

​primary group

​What two commands below will halt a Linux system immediately?

​shutdown -H now, halt

When using Systemd, what command can be used to start, stop, and configure daemons to start automatically when the system starts

​systemctl


Related study sets

Landing gear systems Asa questions

View Set

Residential & Commercial Financing - 5

View Set

Final Exam Business true/false 2,5,

View Set

Psych 200: Research Methods and Statistics Chapter 9 Review

View Set

Jean Piaget: Cognitive Development

View Set

Federal Tax Considerations for Life Insurance

View Set