Advertisement
Guest User

Linux Questions

a guest
Feb 16th, 2015
2,996
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 38.38 KB | None | 0 0
  1. CORRECT - See section 1.3.1
  2. One of the jobs of the kernel is to:
  3. Manage the systems resources
  4.  
  5. CORRECT - See section 1.3.3
  6. Linux is written in:
  7. C
  8.  
  9. CORRECT - See section 1.3.5
  10. The Linux platform that runs on mobile phones is called:
  11. Android
  12.  
  13. CORRECT - See section 1.3.4
  14. What does a distribution provide to add and remove software from the system?
  15. Package manager
  16.  
  17. CORRECT - See section 1.3.1
  18. The bootloaders job is to:
  19. Load the kernel after the computer is powered on
  20.  
  21. CORRECT - See section 1.3.4
  22. Ubuntu is derived from which distribution?
  23. Debian
  24.  
  25. CORRECT - See section 1.4
  26. The most important consideration when choosing an operating system is:
  27. What the computer will do
  28.  
  29. CORRECT - See section 1.4.1
  30. Software is backward compatible if:
  31. It still supports old file formats or applications
  32.  
  33. WRONG - See section 1.4.5
  34. Other commercial Unixes:
  35. Are UNIX certified
  36.  
  37. CORRECT - See section 1.4.1
  38. When choosing a distribution of Linux, you should consider:
  39. Which distributions are supported by the software you need to run
  40. If you need support on the distribution itself
  41. The maintenance cycle of the distribution
  42. Whether or not the distribution is under active development
  43. Which management tools are provided by the distribution
  44.  
  45. CORRECT - See section 2.3.2
  46. If you wanted to create and print an invoice, what could you use?
  47. LibreOffice
  48.  
  49. CORRECT - See section 2.3.2
  50. Which application would you use to edit and piece together sound files to make podcast?
  51. Audacity
  52.  
  53. CORRECT - See section 2.3.3
  54. The two main families of Linux shells are:
  55. Bourne Shell
  56. C Shell
  57.  
  58. CORRECT - See section 2.3.1
  59. Which server software would you use to create a company directory that you could search and authenticate against?
  60. OpenLDAP
  61.  
  62. CORRECT - See section 2.3.1
  63. If you wanted to let a Linux machine share files with Windows clients and servers, you would use:
  64. Samba
  65.  
  66. WRONG - See section 2.4.3
  67. Creative Commons licenses allow you to:
  68. Specify whether or not changes must be shared
  69. Allow or disallow commercial use
  70. Get a veto on where the work is used
  71.  
  72. CORRECT - See section 2.4.3
  73. If a podcast is licensed under the CC BY-ND license, you may:
  74. Share it as long as you give credit to the author
  75. Post it to your website
  76.  
  77. CORRECT - See section 2.4.4
  78. How can you make money from open source software?
  79. Provide paid consulting services for users
  80. Take payments for fixing bugs
  81. Sell hardware thats built to work with the software
  82.  
  83. CORRECT - See section 2.4.1
  84. To place software under an open source license, you must give up your copyright.
  85. False
  86.  
  87. CORRECT - See section 2.4.1
  88. The difference between the GPL and LGPL licenses are:
  89. LGPL allows linking to non GPLed softwareCORRECT - See section 3.3
  90. Which of the following is true about graphical mode?
  91. You access this mode by logging into a graphical display
  92. You have menus and tools to help you find what you are looking for
  93. After login, you are provided with a desktop
  94.  
  95. CORRECT - See section 3.3
  96. A server is likely to be running in graphical mode.
  97. False
  98.  
  99. CORRECT - See section 3.4
  100. In graphical mode, you can get to a shell by running which applications?
  101. terminal
  102. xterm
  103.  
  104. CORRECT - See section 3.5
  105. Virtualization means:
  106. A single host can be split up into multiple guests
  107.  
  108. CORRECT - See section 3.6
  109. If you wanted to write a report that was to be printed, you would probably use:
  110. LibreOffice
  111.  
  112. CORRECT - See section 3.7
  113. If you want to store logins and passwords for different websites in a secure manner, you could use:
  114. KeePassX
  115.  
  116. CORRECT - See section 3.7
  117. You can configure your computer to check for updates automatically.
  118. True
  119.  
  120. CORRECT - See section 3.8
  121. Which of the following is a tool that helps you anonymize your Internet browsing?
  122. The onion router
  123.  
  124. CORRECT - See section 3.7
  125. Which of the following are properties of a strong password?
  126. At least 10 characters long
  127. A mix of upper and lower case
  128. Includes symbols
  129.  
  130. CORRECT - See section 3.7
  131. What can be done to prevent remote people from running programs on your computer?
  132. Turn on a firewall
  133. use strong passwords on all user accounts
  134.  
  135. CORRECT - See section 4.4
  136. Select all the applications that provide access to the Command Line Interface (CLI)?
  137. Terminal window
  138. Virtual Terminal
  139.  
  140. CORRECT - See section 4.7
  141. Which environment variable contains a list of directories that is searched for commands to execute?
  142. PATH
  143.  
  144. CORRECT - See section 4.11.2
  145. A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
  146. True
  147.  
  148. CORRECT - See section 4.10
  149. Which of the following are glob characters?
  150. The asterisk "*"
  151. The question mark "?"
  152. The square brackets "[" and "]"
  153.  
  154. CORRECT - See section 4.12.1
  155. The semicolon ";" can be used to separate multiple commands to be executed in order.
  156. True
  157.  
  158. CORRECT - See section 4.6
  159. To be able to output messages to the screen use the _______ command:
  160. echo
  161.  
  162. CORRECT - See section 4.5
  163. The _______ command will print a list of the commands that you've previously executed.
  164. history
  165.  
  166. CORRECT - See section 4.4.2
  167. The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
  168. True
  169.  
  170. WRONG - See section 4.4.4
  171. Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
  172. LINUX
  173.  
  174. CORRECT - See section 4.10
  175. The main purpose of using glob characters is to be able to provide a command a list of filenames.
  176. True
  177.  
  178. CORRECT - See section 5.5.1
  179. What is the standard option to provide a command line program to view its documentation?
  180. --help
  181.  
  182. CORRECT - See section 5.3.6.3
  183. The whatis command is the same as man -w.
  184. False
  185.  
  186. CORRECT - See section 5.3.6
  187. Commands typically executed by a user are covered in what section of the manual?
  188. 1
  189.  
  190. CORRECT - See section 5.3.7
  191. To search the man page sections for the keyword example, which of the following command lines could you execute?
  192. man -k example
  193. apropos example
  194.  
  195. CORRECT - See section 5.3.3
  196. The following sections commonly appear on a man page:
  197. NAME
  198. DESCRIPTION
  199. SYNOPSIS
  200.  
  201. CORRECT - See section 5.3.2
  202. What key should be used while working in the man command if you want to go to the end of the document?
  203. G
  204.  
  205. CORRECT - See section 5.4.2
  206. To get help while using the info command press:
  207. h
  208.  
  209. CORRECT - See section 5.4.2
  210. To exit the info command press:
  211. q
  212.  
  213. CORRECT - See section 5.4.2
  214. To go to the end of an info page press:
  215. END
  216.  
  217. CORRECT - See section 5.3.5
  218. To go to the next match of a search on a man page press:
  219. n
  220.  
  221. CORRECT - See section 6.4.2
  222. Hidden files are files that begin with what character?
  223. A period (.)
  224.  
  225. CORRECT - See section 6.4.2
  226. What option for the ls command will display all files, including hidden files?
  227. -a
  228.  
  229. CORRECT - See section 6.3
  230. The top-level directory on a Linux system is represented as:
  231. /
  232.  
  233. CORRECT - See section 6.3.5
  234. Is the following path absolute or relative?
  235. sysadmin/Documents
  236. relative
  237.  
  238. CORRECT - See section 6.3.2
  239. Which of the following commands can be used to access the home directory of the user "bob" while logged in as root?
  240. cd /home/bob
  241. cd ~bob
  242.  
  243. CORRECT - See section 6.3.5
  244. The double dot (..) can be used to represent the directory...
  245. ...above the current directory
  246.  
  247. CORRECT - See section 6.4.3.1
  248. Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
  249. -h
  250.  
  251. CORRECT - See section 6.4.1
  252. Which of the following commands will prevent any aliased options to the ls command?
  253. \ls
  254.  
  255. CORRECT - See section 6.4.5
  256. The command ls -S will sort files:
  257. By size, largest to smallest.
  258.  
  259. CORRECT - See section 6.10
  260. The command rm -r will...
  261. remove a directory along with any files or subdirectories.
  262.  
  263. CORRECT - See section 7.1
  264. Compression on a file works by:
  265. Removing redundant information
  266.  
  267. CORRECT - See section 7.3
  268. In general, which of the following would you want to use lossless compression?
  269. A log file
  270.  
  271. CORRECT - See section 7.3
  272. Lossy compression:
  273. Usually results better compression than lossless
  274. Is often used with images
  275. Sacrifices some quality
  276.  
  277. CORRECT - See section 7.3
  278. How would you obtain output similar to the following?
  279. compressed uncompressed ratio uncompressed_name
  280. 278168 1016950 72.6% tags
  281. gzip l tags
  282.  
  283. CORRECT - See section 7.4
  284. In the command tar cvjf foo.tbz a b c, what are a, b, and c?
  285. file names to be added to the archive
  286.  
  287. CORRECT - See section 7.5
  288. Which of the following commands will create a zipfile with the contents of your Documents directory?
  289. zip -r mydocs.zip Documents
  290.  
  291. CORRECT - See section 7.3
  292. You try to compress a file that is already compressed. Which of the following statements is true?
  293. The file will not be compressed any further than it already was
  294.  
  295. WRONG - See section 7.3
  296. Which of the following commands can be used to compress a file?
  297. gzip
  298. zip
  299. bzip
  300.  
  301. CORRECT - See section 7.4
  302. The three main modes of tar are:
  303. Create
  304. Extract
  305. List
  306.  
  307. CORRECT - See section 7.4
  308. Which two commands do the same thing?
  309. tar c foo | gzip > foo.tar.gz
  310. tar czf foo.tar.gz foo
  311.  
  312. CORRECT - See section 8.4.5
  313. Channel 2 is:
  314. STDERR
  315.  
  316. CORRECT - See section 8.7
  317. Which option of the head command will display only the first five lines of a file?
  318. -n 5
  319.  
  320. CORRECT - See section 8.11
  321. The grep command...
  322. ...will display all the lines in a file containing the specified Regular Expression.
  323.  
  324. CORRECT - See section 8.13
  325. Which of the following commands will display only lines that begin with test?
  326. grep ^test file.txt
  327.  
  328. CORRECT - See section 8.13
  329. Which of the following commands will display lines that contain either start or end?
  330. egrep 'start|end' file.txt
  331.  
  332. CORRECT - See section 8.6
  333. Which of the following commands can be used to scroll through a text file?
  334. more
  335. less
  336.  
  337. CORRECT - See section 8.5
  338. Which of the following commands scans the file to determine file locations?
  339. find
  340.  
  341. CORRECT - See section 8.9
  342. Which option for the wc command will print the number of lines in a file?
  343. -l
  344.  
  345. CORRECT - See section 8.4.4
  346. The command echo "text" > file.txt will create file.txt if it does not already exist.
  347. True
  348.  
  349. CORRECT - See section 8.4.4
  350. The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
  351. True
  352.  
  353. CORRECT - See section 9.3
  354. The echo command:
  355. Is used to output text to the console
  356.  
  357. CORRECT - See section 9.3
  358. A file begins with #!/bin/csh. This means:
  359. Running the script will invoke /bin/csh to interpret the rest of the file
  360.  
  361. CORRECT - See section 9.5.2
  362. What does this shell script do?
  363. FOO=/tmp/foo
  364. if [ ! d $FOO ]; then
  365. mkdir $FOO
  366. fi
  367. Creates /tmp/foo if it does not exist
  368.  
  369. CORRECT - See section 9.5.3
  370. Which of the following are correct about for and while loops?
  371. for loops operate over a fixed list of items
  372. while loops have a test each cycle to determine if it should run again
  373.  
  374. CORRECT - See section 9.5.1
  375. Given the following script that is run through ./test.sh hello goodbye:
  376. if [ -f $2 ]; then
  377. echo "I am here"
  378. fi
  379. When will I am here be printed?
  380. If a file called "goodbye" exists in the current directory
  381.  
  382. CORRECT - See section 9.5.2
  383. The if command looks for what exit code to consider a condition to be true?
  384. 0
  385.  
  386. CORRECT - See section 9.5.2
  387. Given the following script:
  388. while [ ! f /tmp/foo ]; do
  389. echo n .
  390. process_data > /tmp/foo
  391. done
  392. Which of the following are true?
  393. If a file called /tmp/foo exists, process_data wont be run
  394. process_data will be called at most once
  395.  
  396. CORRECT - See section 9.5.2
  397. A conditional that lets you make multiple comparisons with a pattern is called:
  398. case
  399.  
  400. CORRECT - See section 9.5.3
  401. What is the meaning of $(( $i + 1)) ?
  402. 1 will be added to the i variable
  403.  
  404. CORRECT - See section 9.5.2
  405. How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
  406. test -d /tmp/foo -o $USERS -gt 5
  407.  
  408. CORRECT - See section 10.3
  409. Which of the following are valid CPU types for Intel-based platforms?
  410. 32 bit
  411. 64 bit
  412.  
  413. CORRECT - See section 10.3
  414. 64 bit platforms can access more memory than 32 bit platforms.
  415. True
  416.  
  417. CORRECT - See section 10.3
  418. A CPU flag...
  419. ...defines the features that the CPU supports
  420.  
  421. CORRECT - See section 10.4
  422. Which command displays information from SMBIOS?
  423. dmidecode
  424.  
  425. CORRECT - See section 10.4.2
  426. Choose all of the following statements that are true in regard to virtual RAM:
  427. Virtual RAM is used when available physical RAM is low.
  428. Virtual RAM is also called swap space
  429. Virtual RAM is stored on a hard drive
  430.  
  431. CORRECT - See section 10.4.3
  432. Which of the following are common busing systems?
  433. USB
  434. PCI
  435.  
  436. CORRECT - See section 10.6
  437. A division of a hard drive may be referred to as a _______ . (Choose 2)
  438. partition
  439. slice
  440.  
  441. CORRECT - See section 10.6
  442. Which of the following are valid partitioning types?
  443. MBR
  444. GPT
  445.  
  446. CORRECT - See section 10.6
  447. Which of the following is the valid device file name for the first IDE hard drive on the system?
  448. /dev/hda
  449.  
  450. CORRECT - See section 10.7
  451. Which of the following are valid video cable connector types?
  452. VGA
  453. DVI
  454.  
  455. CORRECT - See section 11.3.2
  456. What does the acronym RPM mean?
  457. RPM Package Management
  458.  
  459. CORRECT - See section 11.3
  460. One way to install new software on a Linux system is to use a package management system.
  461. True
  462.  
  463. CORRECT - See section 11.10
  464. When you execute the dmesg command, the system displays messages that are generated by the kernel.
  465. True
  466.  
  467. CORRECT - See section 11.4
  468. The /proc directory contains a subdirectory for each process present on the system.
  469. True
  470.  
  471. CORRECT - See section 11.4
  472. The Process ID (PID) of the init process is
  473. 1
  474.  
  475. CORRECT - See section 11.8
  476. The free command outputs statistics about:
  477. Memory usage
  478.  
  479. CORRECT - See section 11.7
  480. A command that will continuously update statistics about running processes:
  481. top
  482.  
  483. CORRECT - See section 11.6
  484. The following are valid Linux option styles:
  485. Traditional Unix with a single dash (-)
  486. BSD Unix without a dash
  487. GNU long options with two dashes (--)
  488.  
  489. CORRECT - See section 11.4
  490. To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
  491. /etc/sysctl.conf
  492.  
  493. CORRECT - See section 11.3.2.4
  494. To get a list of all packages installed on a system using RPM Package Management you can execute:
  495. rpm -qa
  496.  
  497. CORRECT - See section 12.3
  498. Which of the following would be considered a host?
  499. A printer attached to the network via an IP address
  500.  
  501. CORRECT - See section 12.5
  502. A network packet contains ...
  503. ...the IP address of the destination machine
  504. ...the IP address of the source machine
  505.  
  506. CORRECT - See section 12.5
  507. Which of the following are valid IPv4 addresses?
  508. 192.105.10.10
  509. 10.33.55.77
  510.  
  511. CORRECT - See section 12.7.1
  512. The name of the primary wired network devices is ether0.
  513. False
  514.  
  515. CORRECT - See section 12.7.1
  516. Which of the following commands will display your machine's IP address?
  517. ifconfig
  518.  
  519. CORRECT - See section 12.7.2
  520. Which of the following commands will display the routing table?
  521. route
  522. netstat -r
  523.  
  524. CORRECT - See section 12.7.6
  525. Which of the following commands will allow you to log into a remote machine?
  526. ssh
  527.  
  528. CORRECT - See section 12.7.4
  529. What option to the netstat command has information shown as numbers rather than names?
  530. -n
  531.  
  532. CORRECT - See section 12.7.6
  533. Which of the following commands will allow you to log into the machine server1 with the account name nick?
  534. ssh nick@server1
  535.  
  536. CORRECT - See section 12.7.6.1
  537. The RSA key fingerprint allows the dig command to connect to remote systems.
  538. False
  539.  
  540. CORRECT - See section 13.3
  541. Which files contain user account information?
  542. /etc/passwd
  543. /etc/shadow
  544.  
  545. CORRECT - See section 13.1
  546. Each user is a member of their own private group, of which they are the only member.
  547. True
  548.  
  549. CORRECT - See section 13.8
  550. Which command will display the users that are currently logged in to the system?
  551. who
  552.  
  553. CORRECT - See section 13.7.1
  554. The sudo command allows regular users to...
  555. ...run certain commands as the root user.
  556.  
  557. CORRECT - See section 13.7.1
  558. The /etc/sudoers file should be edited directly by root using the visudo command.
  559. True
  560.  
  561. CORRECT - See section 13.4.1
  562. A GID is associated with a group name.
  563. True
  564.  
  565. CORRECT - See section 13.4
  566. A user can belong to...
  567. At least 16 groups
  568.  
  569. CORRECT - See section 13.7.1
  570. Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
  571. True
  572.  
  573. CORRECT - See section 13.9
  574. Which of the following commands will display how long the system has been running since the last boot?
  575. w
  576. uptime
  577.  
  578. CORRECT - See section 13.3.3
  579. Which command can be used to view the /etc/passwd file entries?
  580. getent
  581.  
  582. CORRECT - See section 14.8.1
  583. Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
  584. -u
  585.  
  586. CORRECT - See section 14.8.1
  587. The useradd command will create a home directory by default for a user.
  588. True
  589.  
  590. CORRECT - See section 14.12.1
  591. The usermod command can be used to do all of the following except...
  592. ...change the user's MAX and MIN password settings
  593.  
  594. CORRECT - See section 14.12.1
  595. Which of the following commands will add the group "extra" to the user bob's secondary groups in addition to bob's current secondary groups?
  596. usermod -aG extra bob
  597.  
  598. CORRECT - See section 14.10
  599. For non-root users, the passwd command can only be used to change the password of the user running the command.
  600. True
  601.  
  602. CORRECT - See section 14.13
  603. The userdel command will...
  604. delete the user account, but leave the user's files by default
  605.  
  606. CORRECT - See section 14.4
  607. The groupmod command can be used to change a group name.
  608. True
  609.  
  610. CORRECT - See section 14.7
  611. Which of the following files contains encrypted user password information?
  612. /etc/shadow
  613.  
  614. CORRECT - See section 14.3
  615. Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
  616. /etc/group
  617.  
  618. CORRECT - See section 19.4
  619. What directory contains user's home directories?
  620. /home
  621.  
  622. CORRECT
  623. Which of the following commands sets "other" permissions on "file" to r-x?
  624. chmod 775 file
  625.  
  626. CORRECT
  627. The chgrp command can be used to change the owner and group of a file. True or False?
  628. False
  629.  
  630. CORRECT
  631. The user "sysadmin" will be able to read the "file" because they own it.
  632. ----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
  633. True or False?
  634. False
  635.  
  636. CORRECT
  637. The "execute" permission on a directory allows you to: (choose three)
  638. Change to that directory or use it as part of a path
  639. Along with read permission to successfully perform "ls -l"
  640. Along with write permission to successfully create new files
  641.  
  642. CORRECT
  643. The "execute" permission on a file allows you to:
  644. Run the file as a script
  645.  
  646. CORRECT
  647. The chgrp command can be used on a file by:
  648. The file owner and root
  649.  
  650. CORRECT
  651. The chmod command can be used on a file by:
  652. The file owner and root
  653.  
  654. CORRECT
  655. The "execute" permission is never set on files by default. True or False?
  656. True
  657.  
  658. CORRECT
  659. The user owner of a file will always have the same or higher permissions as "other". True or False?
  660. False
  661.  
  662. CORRECT - See section 15.2
  663. The chgrp command can be used to change the owner and group of a file.
  664. False
  665.  
  666. CORRECT - See section 15.7.2
  667. The user "sysadmin" will be able to change the permissions of the "file" because they own it.
  668. ----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
  669. TRUE
  670.  
  671. CORRECT - See section 15.7
  672. Which of the following permissions would allow all users to add, view, and delete files in a directory?
  673. 777
  674.  
  675. CORRECT - See section 15.7
  676. A user cannot delete a file if they do not own it.
  677. False
  678.  
  679. CORRECT - See section 15.5
  680. The chgrp command can be used on a file by:
  681. The file owner and root
  682.  
  683. CORRECT - See section 15.6
  684. The chown command can be used to change the user owner on a file by:
  685. Only root
  686.  
  687. CORRECT - See section 15.6
  688. The chmod command can be used on a file by:
  689. The file owner and root
  690.  
  691. CORRECT - See section 15.6
  692. Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
  693. -R
  694.  
  695. CORRECT - See section 15.6
  696. The chown command will only accept one file at a time as an argument.
  697. False
  698.  
  699. CORRECT - See section 15.9
  700. The "execute" permission is never set on files by default.
  701. True
  702.  
  703. CORRECT - See section 15.7.3
  704. Which of the following commands sets "other" permissions on "file" to r-x?
  705. chmod 775 file
  706.  
  707. CORRECT - See section 15.7.2
  708. Which of the following are methods for setting permissions using the chmod command?
  709. octal
  710. symbolic
  711.  
  712. CORRECT - See section 15.6
  713. The chown command can be used to change the owner and group of a file.
  714. True
  715.  
  716. CORRECT - See section 15.7
  717. The user "sysadmin" will be able to read the "file" because they own it.
  718. ----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
  719. False
  720.  
  721. CORRECT - See section 15.7
  722. Which of the following permissions would allow all users to add, view, and delete files in a directory?
  723. 777
  724.  
  725. CORRECT - See section 15.7
  726. A user cannot delete a file if they do not own it.
  727. False
  728.  
  729. CORRECT - See section 15.7
  730. The "execute" permission on a file allows you to:
  731. Run the file as a script
  732.  
  733. CORRECT - See section 15.5
  734. The chgrp command can be used on a file by:
  735. The file owner and root
  736.  
  737. CORRECT - See section 15.6
  738. The chown command will only accept one file at a time as an argument.
  739. False
  740.  
  741. CORRECT - See section 15.9
  742. The "execute" permission is never set on files by default.
  743. TrueCORRECT - See section 5.4.2
  744. To go to the end of an info page press:
  745. END
  746.  
  747.  
  748. CORRECT - See section 16.9
  749. The /tmp directory is a temporary directory and will not exist on a system at all times.
  750. False
  751.  
  752. CORRECT - See section 16.9
  753. The /var directory has files that change over time.
  754. True
  755.  
  756. CORRECT - See section 16.7
  757. The "sticky bit" permission...
  758. prevents others from removing files they don't own from a common directory
  759.  
  760. CORRECT - See section 16.4
  761. The setgid permission...
  762. allows a command to be run as the group owner of the file.
  763. allows files created in a directory to be owned by the group that owns the directory
  764.  
  765. CORRECT - See section 16.6
  766. Which of the following commands will set setgid on /shared ?
  767. chmod 2777 /shared
  768.  
  769. CORRECT - See section 16.8.3
  770. Deleting a source file will break an associated hard link.
  771. False
  772.  
  773. CORRECT - See section 16.8.3
  774. A source and a hard link must be part of the same filesystem.
  775. True
  776.  
  777. CORRECT - See section 16.8.3
  778. Deleting a source file will break an associated symbolic link.
  779. True
  780.  
  781. CORRECT - See section 16.8.3
  782. A source file and a symbolic link must be part of the same file system.
  783. False
  784.  
  785. CORRECT - See section 16.8.2
  786. Which of the following commands would create a symbolic link, "link" to "file"?
  787. ln -s file link
  788.  
  789. CORRECT - See section 16.3
  790. Which of the following commands will set setuid for /usr/bin/program?
  791. chmod 4755 /usr/bin/program
  792.  
  793. CORRECT - See section 16.5
  794. Setting setgid on a directory...
  795. will set the group owner of all files created in the directory to the group owner of the directory
  796.  
  797. CORRECT - See section 5.3.5
  798. To go to the next match of a search on a man page press:
  799. n
  800.  
  801. CORRECT - See section 5.3.4
  802. When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
  803. The items it separates cannot be used together
  804.  
  805. CORRECT - See section 5.3.5
  806. After performing a search, you can use the ____ key to return to a previously found match:
  807. N
  808.  
  809. CORRECT - See section 5.3.2
  810. To move a page forward one at a time while viewing a man page, press the following:
  811. Spacebar
  812.  
  813. CORRECT - See section 6.4
  814. The ls command without options or arguments...
  815. ...lists the contents of the current directory.
  816.  
  817. CORRECT - See section 6.9
  818. Which option can be used with the rm command to prompt before deleting?
  819. -i
  820.  
  821. CORRECT - See section 6.9
  822. The rm command can delete multiple files at once.
  823. True
  824.  
  825. CORRECT - See section 6.7.1
  826. Which of the following commands can be used to rename a file?
  827. mv
  828.  
  829. CORRECT - See section 6.8
  830. The touch command can be used to:
  831. create new files
  832. update the time stamp of existing files
  833.  
  834. WRONG - See section 7.3
  835. You try to compress a file that is already compressed. Which of the following statements is true?
  836. The file changed while you were compressing it
  837.  
  838. CORRECT - See section 7.3
  839. Which of the following commands can be used to compress a file?
  840. gzip
  841. bunzip2
  842. zip
  843.  
  844. CORRECT - See section 7.4
  845. The three main modes of tar are:
  846. Create
  847. Extract
  848. List
  849.  
  850. WRONG - See section 7.4
  851. In the command tar czf foo.tar.gz bar, what is the purpose of the f flag?
  852. Tells tar to read from the file that follows the flag
  853.  
  854. CORRECT - See section 7.4
  855. Which two commands do the same thing?
  856. tar c foo | gzip > foo.tar.gz
  857. tar czf foo.tar.gz foo
  858.  
  859. CORRECT - See section 8.9
  860. Which option for the wc command will print the total number of words in a file?
  861. -w
  862.  
  863. CORRECT - See section 8.3
  864. Which command can be used to print line numbers?
  865. nl
  866.  
  867. WRONG - See section 8.4.4
  868. The command echo "text" > file.txt will create file.txt if it does not already exist.
  869. False
  870.  
  871. CORRECT - See section 8.4.4
  872. The command echo "text" > file.txt will not overwrite file.txt if it already exists.
  873. False
  874.  
  875. CORRECT - See section 8.4.4
  876. The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
  877. True
  878.  
  879. CORRECT - See section 1.4.1
  880. Software is backward compatible if:
  881. It still supports old file formats or applications
  882.  
  883. CORRECT - See section 1.4.3
  884. Apples OS X is:
  885. Certified as UNIX compatible
  886. Derived from FreeBSD
  887. Only compatible with Apple hardware
  888.  
  889. WRONG - See section 1.4.2
  890. Microsoft Windows:
  891. Has powerful scripting capabilities
  892. Comes in desktop and server variants
  893. Has a short maintenance cycle
  894.  
  895. WRONG - See section 1.4.5
  896. Other commercial Unixes:
  897. Use completely different commands than Linux
  898.  
  899. CORRECT - See section 1.4.1
  900. When choosing a distribution of Linux, you should consider:
  901. Which distributions are supported by the software you need to run
  902. If you need support on the distribution itself
  903. The maintenance cycle of the distribution
  904. Whether or not the distribution is under active development
  905. Which management tools are provided by the distribution
  906.  
  907. CORRECT - See section 2.4.1
  908. The difference between the GPL and LGPL licenses are:
  909. LGPL allows linking to non GPLed software
  910.  
  911. CORRECT - See section 2.4.1
  912. Permissive free software licenses:
  913. Dont have a copyleft provision
  914. Are not approved by the FSF
  915. Can allow software to be used inside closed source software
  916.  
  917. CORRECT - See section 2.4.3
  918. The Creative Commons version of Public Domain licensing is:
  919. No Rights Reserved
  920.  
  921. CORRECT - See section 2.4.1
  922. Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
  923. You must make the source to your kernel available
  924.  
  925. CORRECT - See section 2.4.4
  926. Participating in open source projects can improve your technical skills, even if it is not your day job.
  927. True
  928.  
  929. CORRECT - See section 3.8
  930. What are tradeoffs of increasing the level of privacy you have in your web browser?
  931. Sites may not work properly
  932. You may have to explicitly permit some cookies to be saved
  933.  
  934. CORRECT - See section 3.8
  935. Which of the following is a tool that helps you anonymize your Internet browsing?
  936. The onion router
  937.  
  938. CORRECT - See section 3.8
  939. Social network like buttons can track your activity across the Internet.
  940. True
  941.  
  942. CORRECT - See section 3.7
  943. Which of the following are properties of a strong password?
  944. At least 10 characters long
  945. A mix of upper and lower case
  946. Includes symbols
  947.  
  948. CORRECT - See section 3.7
  949. What can be done to prevent remote people from running programs on your computer?
  950. Turn on a firewall
  951. use strong passwords on all user accounts
  952.  
  953. CORRECT - See section 4.3
  954. The acronym CLI stands for:
  955. Command Line Interface
  956.  
  957. WRONG - See section 4.4.4
  958. Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
  959. LINUX
  960.  
  961. CORRECT - See section 4.4.4
  962. The acronym GNU stands for:
  963. Gnu's Not Unix
  964.  
  965. CORRECT - See section 4.11.3
  966. What one character treats the character that follows it as if it was surrounded by single quotes?
  967. \
  968.  
  969. CORRECT - See section 4.10
  970. The main purpose of using glob characters is to be able to provide a command a list of filenames.
  971. True
  972.  
  973. CORRECT - See section 9.5.2
  974. The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
  975. test $USERS eq 5
  976.  
  977. CORRECT - See section 9.5.2
  978. Given the following script:
  979. while [ ! f /tmp/foo ]; do
  980. echo n .
  981. process_data > /tmp/foo
  982. done
  983. Which of the following are true?
  984. If a file called /tmp/foo exists, process_data wont be run
  985. process_data will be called at most once
  986.  
  987. CORRECT - See section 9.5.2
  988. A conditional that lets you make multiple comparisons with a pattern is called:
  989. case
  990.  
  991. CORRECT - See section 9.5.3
  992. What is the meaning of $(( $i + 1)) ?
  993. 1 will be added to the i variable
  994.  
  995. CORRECT - See section 9.5.2
  996. How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
  997. test d /tmp/foo o $USERS gt 5
  998.  
  999. CORRECT - See section 10.6
  1000. A division of a hard drive may be referred to as a _______ . (Choose 2)
  1001. partition
  1002. slice
  1003.  
  1004. CORRECT - See section 10.6
  1005. Which of the following are valid partitioning types?
  1006. MBR
  1007. GPT
  1008.  
  1009. CORRECT - See section 10.6
  1010. The fdisk command is a tool used for working with the MBR partitioned disks.
  1011. True
  1012.  
  1013. CORRECT - See section 10.6
  1014. Which of the following is the valid device file name for the first IDE hard drive on the system?
  1015. /dev/hda
  1016.  
  1017. CORRECT - See section 10.7
  1018. Which of the following are valid video cable connector types?
  1019. VGA
  1020. DVI
  1021.  
  1022. CORRECT - See section 11.7
  1023. A command that will continuously update statistics about running processes:
  1024. top
  1025.  
  1026. CORRECT - See section 11.6
  1027. The following are valid Linux option styles:
  1028. Traditional Unix with a single dash (-)
  1029. BSD Unix without a dash
  1030. GNU long options with two dashes (--)
  1031.  
  1032. CORRECT - See section 11.4
  1033. Which file contains the information passed to the kernel at boot time?
  1034. /proc/cmdline
  1035.  
  1036. CORRECT - See section 11.4
  1037. To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
  1038. /etc/sysctl.conf
  1039.  
  1040. CORRECT - See section 11.3.2.4
  1041. To get a list of all packages installed on a system using RPM Package Management you can execute:
  1042. rpm -qa
  1043.  
  1044. CORRECT - See section 12.3
  1045. Which of the following would be considered a host?
  1046. A printer attached to the network via an IP address
  1047.  
  1048. CORRECT - See section 12.7.4
  1049. What option to the netstat command has information shown as numbers rather than names?
  1050. -n
  1051.  
  1052. CORRECT - See section 12.7.6
  1053. Which of the following commands will allow you to log into the machine server1 with the account name nick?
  1054. ssh nick@server1
  1055.  
  1056. CORRECT - See section 12.7.6.1
  1057. The RSA key fingerprint allows the dig command to connect to remote systems.
  1058. False
  1059.  
  1060. CORRECT - See section 13.3
  1061. Which files contain user account information?
  1062. /etc/passwd
  1063. /etc/shadow
  1064.  
  1065. CORRECT - See section 13.7.1
  1066. Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
  1067. True
  1068.  
  1069. CORRECT - See section 13.7.1
  1070. In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
  1071. True
  1072.  
  1073. CORRECT - See section 13.9
  1074. Which of the following commands will display how long the system has been running since the last boot?
  1075. w
  1076. uptime
  1077.  
  1078. CORRECT - See section 13.3.2
  1079. The /etc/shadow file contains plain-text passwords.
  1080. False
  1081.  
  1082. CORRECT - See section 13.3.3
  1083. Which command can be used to view the /etc/passwd file entries?
  1084. getent
  1085.  
  1086. CORRECT - See section 14.12
  1087. Which command can be used to determine a user's most recent log in?
  1088. last
  1089.  
  1090. CORRECT - See section 14.7
  1091. Which of the following files contains encrypted user password information?
  1092. /etc/shadow
  1093.  
  1094. CORRECT - See section 14.8.2
  1095. Which of the following files contains user IDs?
  1096. /etc/passwd
  1097.  
  1098. CORRECT - See section 14.3
  1099. Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
  1100. /etc/group
  1101.  
  1102. CORRECT - See section 14.12.1
  1103. Which of the following commands, run as root, will prevent the user "bob" from logging in?
  1104. usermod -L bob
  1105.  
  1106. CORRECT - See section 15.6
  1107. The chmod command can be used on a file by:
  1108. The file owner and root
  1109.  
  1110. CORRECT - See section 15.6
  1111. Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
  1112. -R
  1113.  
  1114. CORRECT - See section 15.7
  1115. The user owner of a file will always have the same or higher permissions as "other".
  1116. False
  1117.  
  1118. CORRECT - See section 16.8.3
  1119. A source and a hard link must be part of the same filesystem.
  1120. True
  1121.  
  1122. CORRECT - See section 16.8.3
  1123. Deleting a source file will break an associated symbolic link.
  1124. True
  1125.  
  1126. CORRECT - See section 16.8.3
  1127. A source file and a symbolic link must be part of the same file system.
  1128. False
  1129.  
  1130. CORRECT - See section 16.8.1
  1131. Which of the following commands would create a hard link, "link" to "file"?
  1132. ln file link
  1133.  
  1134. CORRECT - See section 16.8.2
  1135. Which of the following commands would create a symbolic link, "link" to "file"?
  1136. ln -s file link
  1137.  
  1138. CORRECT - See section 1.3
  1139. Unix is:
  1140. An operating system
  1141. A trademark
  1142.  
  1143. CORRECT - See section 1.3.3
  1144. Linux is written in:
  1145. C
  1146.  
  1147. CORRECT - See section 1.3.3
  1148. Source code refers to:
  1149. A human readable version of computer software
  1150.  
  1151. CORRECT - See section 5.3.7
  1152. The command man -k is the same as the command apropos.
  1153. True
  1154.  
  1155. CORRECT - See section 5.5.2
  1156. The directory where additional documentation for software packages most likely can be found is:
  1157. /usr/share/doc
  1158.  
  1159. CORRECT - See section 6.4.2
  1160. What option for the ls command will display all files, including hidden files?
  1161. -a
  1162.  
  1163. CORRECT - See section 6.3
  1164. The top-level directory on a Linux system is represented as:
  1165. /
  1166.  
  1167. CORRECT - See section 7.1
  1168. Compression on a file works by:
  1169. Removing redundant information
  1170.  
  1171. CORRECT - See section 7.3
  1172. In general, for which of the following would you want to use lossless compression?
  1173. A log file
  1174.  
  1175. CORRECT - See section 8.4.3
  1176. Error messages generated by commands are sent where by default?
  1177. STDERR
  1178.  
  1179. CORRECT - See section 8.4.2
  1180. A successful command will print output to STDOUT.
  1181. True
  1182.  
  1183. CORRECT - See section 8.4.5
  1184. Channel 2 is:
  1185. STDERR
  1186.  
  1187. CORRECT - See section 9.3
  1188. A file begins with #!/bin/csh. This means:
  1189. Running the script will invoke /bin/csh to interpret the rest of the file
  1190.  
  1191. CORRECT - See section 9.4
  1192. Which are appropriate editors for writing shell scripts?
  1193. nano
  1194. vi
  1195.  
  1196. CORRECT - See section 9.4
  1197. Most of nanos commands take the form of:
  1198. Control and another character
  1199.  
  1200. CORRECT - See section 10.3
  1201. Which of the following are valid CPU types for Intel-based platforms?
  1202. 32 bit
  1203. 64 bit
  1204.  
  1205. CORRECT - See section 10.3
  1206. 64 bit platforms can access more memory than 32 bit platforms.
  1207. True
  1208.  
  1209. CORRECT - See section 11.3.2
  1210. What does the acronym RPM mean?
  1211. RPM Package Management
  1212.  
  1213. CORRECT - See section 11.3
  1214. One way to install new software on a Linux system is to use a package management system.
  1215. True
  1216.  
  1217. CORRECT - See section 11.10
  1218. When you execute the dmesg command, the system displays messages that are generated by the kernel.
  1219. True
  1220.  
  1221. CORRECT - See section 11.3.1
  1222. Which of the following are package management commands for distributions with software distributed in files ending in .deb?
  1223. dpkg
  1224. aptitude
  1225. apt-get
  1226.  
  1227. CORRECT - See section 12.3
  1228. Which of the following would be considered a host?
  1229. A printer attached to the network via an IP address
  1230.  
  1231. CORRECT - See section 12.3
  1232. A service is...
  1233. ...a feature provided by one computer to another.
  1234.  
  1235. CORRECT - See section 13.3
  1236. Which files contain user account information?
  1237. /etc/passwd
  1238. /etc/shadow
  1239.  
  1240. CORRECT - See section 13.3.2
  1241. Which user can view the /etc/shadow file?
  1242. The root user
  1243.  
  1244. CORRECT - See section 13.3.4
  1245. Which command will display the UID, GID and groups your current user belongs to?
  1246. id
  1247.  
  1248. CORRECT - See section 13.1
  1249. Each user belongs to at least one group.
  1250. True
  1251.  
  1252. CORRECT - See section 14.8.1
  1253. Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
  1254. -G
  1255.  
  1256. CORRECT - See section 15.7.2
  1257. Which of the following commands set "other" permissions on file to r-x?
  1258. chmod o=rx file
  1259.  
  1260. CORRECT - See section 15.7.3
  1261. Which of the following commands sets "other" permissions on file to r-x?
  1262. chmod 775 file
  1263.  
  1264. CORRECT - See section 15.7.2
  1265. Which of the following are methods for setting permissions using the chmod command?
  1266. octal
  1267. symbolic
  1268.  
  1269. CORRECT - See section 15.6
  1270. The chown command can be used to change the owner and group of a file.
  1271. True
  1272.  
  1273. CORRECT - See section 2.3.1
  1274. The Samba application is a:
  1275. File Server
  1276.  
  1277. CORRECT - See section 2.3
  1278. Which of the following are examples of desktop software?
  1279. Web browser
  1280. Music player
  1281.  
  1282. CORRECT - See section 2.3.1
  1283. If you wanted to set up a blog, which software would be most helpful?
  1284. WordPress
  1285.  
  1286. CORRECT - See section 2.3.1
  1287. Which of the following pieces of software deal with file sharing?
  1288. Samba
  1289. Netatalk
  1290. NFS
  1291.  
  1292. CORRECT - See section 2.3.2
  1293. If you wanted to create and print an invoice, which software could you use?
  1294. LibreOffice
  1295.  
  1296. CORRECT - See section 3.3
  1297. Which of the following is true about graphical mode?
  1298. You access this mode by logging into a graphical display
  1299. You have menus and tools to help you find what you are looking for
  1300. After login, you are provided with a desktop
  1301.  
  1302. CORRECT - See section 3.3
  1303. Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
  1304. Menus
  1305. Windows
  1306. Popups
  1307. Desktop
  1308.  
  1309. CORRECT - See section 3.3
  1310. A server is likely to be running in graphical mode.
  1311. False
  1312.  
  1313. CORRECT - See section 3.4
  1314. In graphical mode, you can get to a shell by running which applications?
  1315. terminal
  1316. xterm
  1317.  
  1318. CORRECT - See section 3.5
  1319. Which of the following are traits of a multiuser operating system?
  1320. Many users can log in simultaneously with a unique account
  1321. Users can protect their information from other users
  1322. Resources are shared between users
  1323.  
  1324. CORRECT - See section 4.7
  1325. Which environment variable contains a list of directories that is searched for commands to execute?
  1326. PATH
  1327.  
  1328. CORRECT - See section 4.8
  1329. Select the command that can report the location of a command:
  1330. which
  1331.  
  1332. CORRECT - See section 4.11.2
  1333. A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
  1334. True
  1335.  
  1336. CORRECT - See section 16.9
  1337. The /tmp directory is a temporary directory and will not exist on a system at all times.
  1338. False
  1339.  
  1340. CORRECT - See section 16.9
  1341. The /var directory has files that change over time.
  1342. True
  1343.  
  1344. CORRECT - See section 16.7
  1345. The "sticky bit" permission...
  1346. ...prevents others from removing files they don't own from a common directory.
  1347.  
  1348. CORRECT - See section 16.7
  1349. Which of the following commands will set the "sticky bit" on /shared ?
  1350. chmod 1777 /shared
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement