Module 4 Test (Practice): Linux installation and configuration

Ace your homework & exams now with Quizwiz!

Which of the following permissions would show for a symbolic link when displayed with the ls -l command?

-rw-r--r--

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search. Which of the following files could Lynn modify so that the locate command no longer includes those results?

/etc/updatedb.conf

Which of the following umask settings will result in new files receiving the default permissions -rw-------?

0177

What would be the result of running the command chown :root file1.txt

This would set the group ownership of file1 to root.

Which of the following commands will create a symbolic link named foo.txt to an original file named bar.txt

ln bar.txt foo.txt

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist?

mkdir -p ~/2019projects/project/projectplans

Which of the following commands will delete a directory and all of the files contained within it? (Choose all that apply.)

rm -rf olddir

Which of the following commands can be used to update the last modified timestamp on a file, or if the file specified does not exist will create the file?

touch file.txt


Related study sets

Chapter 28: Structure and Function of the Gastrointestinal System ( Questions)

View Set

Nursing Process - Acid/Base Balance: Lec 9

View Set

Global Business final ( ch 8, 9, 10)

View Set

SY0-601 SEC+ Social Engineering Techniques & Attack Types

View Set

Chapter 19- Lower Respiratory Disorders

View Set

Chapter 10: Infrastructure Security

View Set

BCOM 3113 Verbs, Adverbs, and Adjectives

View Set

Chapter 43: Assessment and Management of Patients with Hepatic Disorders

View Set

Chapter 5: Networking and Server Attacks

View Set