Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- CORRECT - See section 1.3.1
- One of the jobs of the kernel is to:
- Manage the systems resources
- CORRECT - See section 1.3.3
- Linux is written in:
- C
- CORRECT - See section 1.3.5
- The Linux platform that runs on mobile phones is called:
- Android
- CORRECT - See section 1.3.4
- What does a distribution provide to add and remove software from the system?
- Package manager
- CORRECT - See section 1.3.1
- The bootloaders job is to:
- Load the kernel after the computer is powered on
- CORRECT - See section 1.3.4
- Ubuntu is derived from which distribution?
- Debian
- CORRECT - See section 1.4
- The most important consideration when choosing an operating system is:
- What the computer will do
- CORRECT - See section 1.4.1
- Software is backward compatible if:
- It still supports old file formats or applications
- WRONG - See section 1.4.5
- Other commercial Unixes:
- Are UNIX certified
- CORRECT - See section 1.4.1
- When choosing a distribution of Linux, you should consider:
- Which distributions are supported by the software you need to run
- If you need support on the distribution itself
- The maintenance cycle of the distribution
- Whether or not the distribution is under active development
- Which management tools are provided by the distribution
- CORRECT - See section 2.3.2
- If you wanted to create and print an invoice, what could you use?
- LibreOffice
- CORRECT - See section 2.3.2
- Which application would you use to edit and piece together sound files to make podcast?
- Audacity
- CORRECT - See section 2.3.3
- The two main families of Linux shells are:
- Bourne Shell
- C Shell
- CORRECT - See section 2.3.1
- Which server software would you use to create a company directory that you could search and authenticate against?
- OpenLDAP
- CORRECT - See section 2.3.1
- If you wanted to let a Linux machine share files with Windows clients and servers, you would use:
- Samba
- WRONG - See section 2.4.3
- Creative Commons licenses allow you to:
- Specify whether or not changes must be shared
- Allow or disallow commercial use
- Get a veto on where the work is used
- CORRECT - See section 2.4.3
- If a podcast is licensed under the CC BY-ND license, you may:
- Share it as long as you give credit to the author
- Post it to your website
- CORRECT - See section 2.4.4
- How can you make money from open source software?
- Provide paid consulting services for users
- Take payments for fixing bugs
- Sell hardware thats built to work with the software
- CORRECT - See section 2.4.1
- To place software under an open source license, you must give up your copyright.
- False
- CORRECT - See section 2.4.1
- The difference between the GPL and LGPL licenses are:
- LGPL allows linking to non GPLed softwareCORRECT - See section 3.3
- Which of the following is true about graphical mode?
- You access this mode by logging into a graphical display
- You have menus and tools to help you find what you are looking for
- After login, you are provided with a desktop
- CORRECT - See section 3.3
- A server is likely to be running in graphical mode.
- False
- CORRECT - See section 3.4
- In graphical mode, you can get to a shell by running which applications?
- terminal
- xterm
- CORRECT - See section 3.5
- Virtualization means:
- A single host can be split up into multiple guests
- CORRECT - See section 3.6
- If you wanted to write a report that was to be printed, you would probably use:
- LibreOffice
- CORRECT - See section 3.7
- If you want to store logins and passwords for different websites in a secure manner, you could use:
- KeePassX
- CORRECT - See section 3.7
- You can configure your computer to check for updates automatically.
- True
- CORRECT - See section 3.8
- Which of the following is a tool that helps you anonymize your Internet browsing?
- The onion router
- CORRECT - See section 3.7
- Which of the following are properties of a strong password?
- At least 10 characters long
- A mix of upper and lower case
- Includes symbols
- CORRECT - See section 3.7
- What can be done to prevent remote people from running programs on your computer?
- Turn on a firewall
- use strong passwords on all user accounts
- CORRECT - See section 4.4
- Select all the applications that provide access to the Command Line Interface (CLI)?
- Terminal window
- Virtual Terminal
- CORRECT - See section 4.7
- Which environment variable contains a list of directories that is searched for commands to execute?
- PATH
- CORRECT - See section 4.11.2
- A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
- True
- CORRECT - See section 4.10
- Which of the following are glob characters?
- The asterisk "*"
- The question mark "?"
- The square brackets "[" and "]"
- CORRECT - See section 4.12.1
- The semicolon ";" can be used to separate multiple commands to be executed in order.
- True
- CORRECT - See section 4.6
- To be able to output messages to the screen use the _______ command:
- echo
- CORRECT - See section 4.5
- The _______ command will print a list of the commands that you've previously executed.
- history
- CORRECT - See section 4.4.2
- The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
- True
- WRONG - See section 4.4.4
- Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
- LINUX
- CORRECT - See section 4.10
- The main purpose of using glob characters is to be able to provide a command a list of filenames.
- True
- CORRECT - See section 5.5.1
- What is the standard option to provide a command line program to view its documentation?
- --help
- CORRECT - See section 5.3.6.3
- The whatis command is the same as man -w.
- False
- CORRECT - See section 5.3.6
- Commands typically executed by a user are covered in what section of the manual?
- 1
- CORRECT - See section 5.3.7
- To search the man page sections for the keyword example, which of the following command lines could you execute?
- man -k example
- apropos example
- CORRECT - See section 5.3.3
- The following sections commonly appear on a man page:
- NAME
- DESCRIPTION
- SYNOPSIS
- CORRECT - See section 5.3.2
- What key should be used while working in the man command if you want to go to the end of the document?
- G
- CORRECT - See section 5.4.2
- To get help while using the info command press:
- h
- CORRECT - See section 5.4.2
- To exit the info command press:
- q
- CORRECT - See section 5.4.2
- To go to the end of an info page press:
- END
- CORRECT - See section 5.3.5
- To go to the next match of a search on a man page press:
- n
- CORRECT - See section 6.4.2
- Hidden files are files that begin with what character?
- A period (.)
- CORRECT - See section 6.4.2
- What option for the ls command will display all files, including hidden files?
- -a
- CORRECT - See section 6.3
- The top-level directory on a Linux system is represented as:
- /
- CORRECT - See section 6.3.5
- Is the following path absolute or relative?
- sysadmin/Documents
- relative
- CORRECT - See section 6.3.2
- Which of the following commands can be used to access the home directory of the user "bob" while logged in as root?
- cd /home/bob
- cd ~bob
- CORRECT - See section 6.3.5
- The double dot (..) can be used to represent the directory...
- ...above the current directory
- CORRECT - See section 6.4.3.1
- Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
- -h
- CORRECT - See section 6.4.1
- Which of the following commands will prevent any aliased options to the ls command?
- \ls
- CORRECT - See section 6.4.5
- The command ls -S will sort files:
- By size, largest to smallest.
- CORRECT - See section 6.10
- The command rm -r will...
- remove a directory along with any files or subdirectories.
- CORRECT - See section 7.1
- Compression on a file works by:
- Removing redundant information
- CORRECT - See section 7.3
- In general, which of the following would you want to use lossless compression?
- A log file
- CORRECT - See section 7.3
- Lossy compression:
- Usually results better compression than lossless
- Is often used with images
- Sacrifices some quality
- CORRECT - See section 7.3
- How would you obtain output similar to the following?
- compressed uncompressed ratio uncompressed_name
- 278168 1016950 72.6% tags
- gzip l tags
- CORRECT - See section 7.4
- In the command tar cvjf foo.tbz a b c, what are a, b, and c?
- file names to be added to the archive
- CORRECT - See section 7.5
- Which of the following commands will create a zipfile with the contents of your Documents directory?
- zip -r mydocs.zip Documents
- CORRECT - See section 7.3
- You try to compress a file that is already compressed. Which of the following statements is true?
- The file will not be compressed any further than it already was
- WRONG - See section 7.3
- Which of the following commands can be used to compress a file?
- gzip
- zip
- bzip
- CORRECT - See section 7.4
- The three main modes of tar are:
- Create
- Extract
- List
- CORRECT - See section 7.4
- Which two commands do the same thing?
- tar c foo | gzip > foo.tar.gz
- tar czf foo.tar.gz foo
- CORRECT - See section 8.4.5
- Channel 2 is:
- STDERR
- CORRECT - See section 8.7
- Which option of the head command will display only the first five lines of a file?
- -n 5
- CORRECT - See section 8.11
- The grep command...
- ...will display all the lines in a file containing the specified Regular Expression.
- CORRECT - See section 8.13
- Which of the following commands will display only lines that begin with test?
- grep ^test file.txt
- CORRECT - See section 8.13
- Which of the following commands will display lines that contain either start or end?
- egrep 'start|end' file.txt
- CORRECT - See section 8.6
- Which of the following commands can be used to scroll through a text file?
- more
- less
- CORRECT - See section 8.5
- Which of the following commands scans the file to determine file locations?
- find
- CORRECT - See section 8.9
- Which option for the wc command will print the number of lines in a file?
- -l
- CORRECT - See section 8.4.4
- The command echo "text" > file.txt will create file.txt if it does not already exist.
- True
- CORRECT - See section 8.4.4
- The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
- True
- CORRECT - See section 9.3
- The echo command:
- Is used to output text to the console
- CORRECT - See section 9.3
- A file begins with #!/bin/csh. This means:
- Running the script will invoke /bin/csh to interpret the rest of the file
- CORRECT - See section 9.5.2
- What does this shell script do?
- FOO=/tmp/foo
- if [ ! d $FOO ]; then
- mkdir $FOO
- fi
- Creates /tmp/foo if it does not exist
- CORRECT - See section 9.5.3
- Which of the following are correct about for and while loops?
- for loops operate over a fixed list of items
- while loops have a test each cycle to determine if it should run again
- CORRECT - See section 9.5.1
- Given the following script that is run through ./test.sh hello goodbye:
- if [ -f $2 ]; then
- echo "I am here"
- fi
- When will I am here be printed?
- If a file called "goodbye" exists in the current directory
- CORRECT - See section 9.5.2
- The if command looks for what exit code to consider a condition to be true?
- 0
- CORRECT - See section 9.5.2
- Given the following script:
- while [ ! f /tmp/foo ]; do
- echo n .
- process_data > /tmp/foo
- done
- Which of the following are true?
- If a file called /tmp/foo exists, process_data wont be run
- process_data will be called at most once
- CORRECT - See section 9.5.2
- A conditional that lets you make multiple comparisons with a pattern is called:
- case
- CORRECT - See section 9.5.3
- What is the meaning of $(( $i + 1)) ?
- 1 will be added to the i variable
- CORRECT - See section 9.5.2
- How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
- test -d /tmp/foo -o $USERS -gt 5
- CORRECT - See section 10.3
- Which of the following are valid CPU types for Intel-based platforms?
- 32 bit
- 64 bit
- CORRECT - See section 10.3
- 64 bit platforms can access more memory than 32 bit platforms.
- True
- CORRECT - See section 10.3
- A CPU flag...
- ...defines the features that the CPU supports
- CORRECT - See section 10.4
- Which command displays information from SMBIOS?
- dmidecode
- CORRECT - See section 10.4.2
- Choose all of the following statements that are true in regard to virtual RAM:
- Virtual RAM is used when available physical RAM is low.
- Virtual RAM is also called swap space
- Virtual RAM is stored on a hard drive
- CORRECT - See section 10.4.3
- Which of the following are common busing systems?
- USB
- PCI
- CORRECT - See section 10.6
- A division of a hard drive may be referred to as a _______ . (Choose 2)
- partition
- slice
- CORRECT - See section 10.6
- Which of the following are valid partitioning types?
- MBR
- GPT
- CORRECT - See section 10.6
- Which of the following is the valid device file name for the first IDE hard drive on the system?
- /dev/hda
- CORRECT - See section 10.7
- Which of the following are valid video cable connector types?
- VGA
- DVI
- CORRECT - See section 11.3.2
- What does the acronym RPM mean?
- RPM Package Management
- CORRECT - See section 11.3
- One way to install new software on a Linux system is to use a package management system.
- True
- CORRECT - See section 11.10
- When you execute the dmesg command, the system displays messages that are generated by the kernel.
- True
- CORRECT - See section 11.4
- The /proc directory contains a subdirectory for each process present on the system.
- True
- CORRECT - See section 11.4
- The Process ID (PID) of the init process is
- 1
- CORRECT - See section 11.8
- The free command outputs statistics about:
- Memory usage
- CORRECT - See section 11.7
- A command that will continuously update statistics about running processes:
- top
- CORRECT - See section 11.6
- The following are valid Linux option styles:
- Traditional Unix with a single dash (-)
- BSD Unix without a dash
- GNU long options with two dashes (--)
- CORRECT - See section 11.4
- To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
- /etc/sysctl.conf
- CORRECT - See section 11.3.2.4
- To get a list of all packages installed on a system using RPM Package Management you can execute:
- rpm -qa
- CORRECT - See section 12.3
- Which of the following would be considered a host?
- A printer attached to the network via an IP address
- CORRECT - See section 12.5
- A network packet contains ...
- ...the IP address of the destination machine
- ...the IP address of the source machine
- CORRECT - See section 12.5
- Which of the following are valid IPv4 addresses?
- 192.105.10.10
- 10.33.55.77
- CORRECT - See section 12.7.1
- The name of the primary wired network devices is ether0.
- False
- CORRECT - See section 12.7.1
- Which of the following commands will display your machine's IP address?
- ifconfig
- CORRECT - See section 12.7.2
- Which of the following commands will display the routing table?
- route
- netstat -r
- CORRECT - See section 12.7.6
- Which of the following commands will allow you to log into a remote machine?
- ssh
- CORRECT - See section 12.7.4
- What option to the netstat command has information shown as numbers rather than names?
- -n
- CORRECT - See section 12.7.6
- Which of the following commands will allow you to log into the machine server1 with the account name nick?
- ssh nick@server1
- CORRECT - See section 12.7.6.1
- The RSA key fingerprint allows the dig command to connect to remote systems.
- False
- CORRECT - See section 13.3
- Which files contain user account information?
- /etc/passwd
- /etc/shadow
- CORRECT - See section 13.1
- Each user is a member of their own private group, of which they are the only member.
- True
- CORRECT - See section 13.8
- Which command will display the users that are currently logged in to the system?
- who
- CORRECT - See section 13.7.1
- The sudo command allows regular users to...
- ...run certain commands as the root user.
- CORRECT - See section 13.7.1
- The /etc/sudoers file should be edited directly by root using the visudo command.
- True
- CORRECT - See section 13.4.1
- A GID is associated with a group name.
- True
- CORRECT - See section 13.4
- A user can belong to...
- At least 16 groups
- CORRECT - See section 13.7.1
- Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
- True
- CORRECT - See section 13.9
- Which of the following commands will display how long the system has been running since the last boot?
- w
- uptime
- CORRECT - See section 13.3.3
- Which command can be used to view the /etc/passwd file entries?
- getent
- CORRECT - See section 14.8.1
- Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
- -u
- CORRECT - See section 14.8.1
- The useradd command will create a home directory by default for a user.
- True
- CORRECT - See section 14.12.1
- The usermod command can be used to do all of the following except...
- ...change the user's MAX and MIN password settings
- CORRECT - See section 14.12.1
- Which of the following commands will add the group "extra" to the user bob's secondary groups in addition to bob's current secondary groups?
- usermod -aG extra bob
- CORRECT - See section 14.10
- For non-root users, the passwd command can only be used to change the password of the user running the command.
- True
- CORRECT - See section 14.13
- The userdel command will...
- delete the user account, but leave the user's files by default
- CORRECT - See section 14.4
- The groupmod command can be used to change a group name.
- True
- CORRECT - See section 14.7
- Which of the following files contains encrypted user password information?
- /etc/shadow
- CORRECT - See section 14.3
- Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
- /etc/group
- CORRECT - See section 19.4
- What directory contains user's home directories?
- /home
- CORRECT
- Which of the following commands sets "other" permissions on "file" to r-x?
- chmod 775 file
- CORRECT
- The chgrp command can be used to change the owner and group of a file. True or False?
- False
- CORRECT
- The user "sysadmin" will be able to read the "file" because they own it.
- ----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
- True or False?
- False
- CORRECT
- The "execute" permission on a directory allows you to: (choose three)
- Change to that directory or use it as part of a path
- Along with read permission to successfully perform "ls -l"
- Along with write permission to successfully create new files
- CORRECT
- The "execute" permission on a file allows you to:
- Run the file as a script
- CORRECT
- The chgrp command can be used on a file by:
- The file owner and root
- CORRECT
- The chmod command can be used on a file by:
- The file owner and root
- CORRECT
- The "execute" permission is never set on files by default. True or False?
- True
- CORRECT
- The user owner of a file will always have the same or higher permissions as "other". True or False?
- False
- CORRECT - See section 15.2
- The chgrp command can be used to change the owner and group of a file.
- False
- CORRECT - See section 15.7.2
- The user "sysadmin" will be able to change the permissions of the "file" because they own it.
- ----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
- TRUE
- CORRECT - See section 15.7
- Which of the following permissions would allow all users to add, view, and delete files in a directory?
- 777
- CORRECT - See section 15.7
- A user cannot delete a file if they do not own it.
- False
- CORRECT - See section 15.5
- The chgrp command can be used on a file by:
- The file owner and root
- CORRECT - See section 15.6
- The chown command can be used to change the user owner on a file by:
- Only root
- CORRECT - See section 15.6
- The chmod command can be used on a file by:
- The file owner and root
- CORRECT - See section 15.6
- Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
- -R
- CORRECT - See section 15.6
- The chown command will only accept one file at a time as an argument.
- False
- CORRECT - See section 15.9
- The "execute" permission is never set on files by default.
- True
- CORRECT - See section 15.7.3
- Which of the following commands sets "other" permissions on "file" to r-x?
- chmod 775 file
- CORRECT - See section 15.7.2
- Which of the following are methods for setting permissions using the chmod command?
- octal
- symbolic
- CORRECT - See section 15.6
- The chown command can be used to change the owner and group of a file.
- True
- CORRECT - See section 15.7
- The user "sysadmin" will be able to read the "file" because they own it.
- ----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
- False
- CORRECT - See section 15.7
- Which of the following permissions would allow all users to add, view, and delete files in a directory?
- 777
- CORRECT - See section 15.7
- A user cannot delete a file if they do not own it.
- False
- CORRECT - See section 15.7
- The "execute" permission on a file allows you to:
- Run the file as a script
- CORRECT - See section 15.5
- The chgrp command can be used on a file by:
- The file owner and root
- CORRECT - See section 15.6
- The chown command will only accept one file at a time as an argument.
- False
- CORRECT - See section 15.9
- The "execute" permission is never set on files by default.
- TrueCORRECT - See section 5.4.2
- To go to the end of an info page press:
- END
- CORRECT - See section 16.9
- The /tmp directory is a temporary directory and will not exist on a system at all times.
- False
- CORRECT - See section 16.9
- The /var directory has files that change over time.
- True
- CORRECT - See section 16.7
- The "sticky bit" permission...
- prevents others from removing files they don't own from a common directory
- CORRECT - See section 16.4
- The setgid permission...
- allows a command to be run as the group owner of the file.
- allows files created in a directory to be owned by the group that owns the directory
- CORRECT - See section 16.6
- Which of the following commands will set setgid on /shared ?
- chmod 2777 /shared
- CORRECT - See section 16.8.3
- Deleting a source file will break an associated hard link.
- False
- CORRECT - See section 16.8.3
- A source and a hard link must be part of the same filesystem.
- True
- CORRECT - See section 16.8.3
- Deleting a source file will break an associated symbolic link.
- True
- CORRECT - See section 16.8.3
- A source file and a symbolic link must be part of the same file system.
- False
- CORRECT - See section 16.8.2
- Which of the following commands would create a symbolic link, "link" to "file"?
- ln -s file link
- CORRECT - See section 16.3
- Which of the following commands will set setuid for /usr/bin/program?
- chmod 4755 /usr/bin/program
- CORRECT - See section 16.5
- Setting setgid on a directory...
- will set the group owner of all files created in the directory to the group owner of the directory
- CORRECT - See section 5.3.5
- To go to the next match of a search on a man page press:
- n
- CORRECT - See section 5.3.4
- When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
- The items it separates cannot be used together
- CORRECT - See section 5.3.5
- After performing a search, you can use the ____ key to return to a previously found match:
- N
- CORRECT - See section 5.3.2
- To move a page forward one at a time while viewing a man page, press the following:
- Spacebar
- CORRECT - See section 6.4
- The ls command without options or arguments...
- ...lists the contents of the current directory.
- CORRECT - See section 6.9
- Which option can be used with the rm command to prompt before deleting?
- -i
- CORRECT - See section 6.9
- The rm command can delete multiple files at once.
- True
- CORRECT - See section 6.7.1
- Which of the following commands can be used to rename a file?
- mv
- CORRECT - See section 6.8
- The touch command can be used to:
- create new files
- update the time stamp of existing files
- WRONG - See section 7.3
- You try to compress a file that is already compressed. Which of the following statements is true?
- The file changed while you were compressing it
- CORRECT - See section 7.3
- Which of the following commands can be used to compress a file?
- gzip
- bunzip2
- zip
- CORRECT - See section 7.4
- The three main modes of tar are:
- Create
- Extract
- List
- WRONG - See section 7.4
- In the command tar czf foo.tar.gz bar, what is the purpose of the f flag?
- Tells tar to read from the file that follows the flag
- CORRECT - See section 7.4
- Which two commands do the same thing?
- tar c foo | gzip > foo.tar.gz
- tar czf foo.tar.gz foo
- CORRECT - See section 8.9
- Which option for the wc command will print the total number of words in a file?
- -w
- CORRECT - See section 8.3
- Which command can be used to print line numbers?
- nl
- WRONG - See section 8.4.4
- The command echo "text" > file.txt will create file.txt if it does not already exist.
- False
- CORRECT - See section 8.4.4
- The command echo "text" > file.txt will not overwrite file.txt if it already exists.
- False
- CORRECT - See section 8.4.4
- The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
- True
- CORRECT - See section 1.4.1
- Software is backward compatible if:
- It still supports old file formats or applications
- CORRECT - See section 1.4.3
- Apples OS X is:
- Certified as UNIX compatible
- Derived from FreeBSD
- Only compatible with Apple hardware
- WRONG - See section 1.4.2
- Microsoft Windows:
- Has powerful scripting capabilities
- Comes in desktop and server variants
- Has a short maintenance cycle
- WRONG - See section 1.4.5
- Other commercial Unixes:
- Use completely different commands than Linux
- CORRECT - See section 1.4.1
- When choosing a distribution of Linux, you should consider:
- Which distributions are supported by the software you need to run
- If you need support on the distribution itself
- The maintenance cycle of the distribution
- Whether or not the distribution is under active development
- Which management tools are provided by the distribution
- CORRECT - See section 2.4.1
- The difference between the GPL and LGPL licenses are:
- LGPL allows linking to non GPLed software
- CORRECT - See section 2.4.1
- Permissive free software licenses:
- Dont have a copyleft provision
- Are not approved by the FSF
- Can allow software to be used inside closed source software
- CORRECT - See section 2.4.3
- The Creative Commons version of Public Domain licensing is:
- No Rights Reserved
- CORRECT - See section 2.4.1
- Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
- You must make the source to your kernel available
- CORRECT - See section 2.4.4
- Participating in open source projects can improve your technical skills, even if it is not your day job.
- True
- CORRECT - See section 3.8
- What are tradeoffs of increasing the level of privacy you have in your web browser?
- Sites may not work properly
- You may have to explicitly permit some cookies to be saved
- CORRECT - See section 3.8
- Which of the following is a tool that helps you anonymize your Internet browsing?
- The onion router
- CORRECT - See section 3.8
- Social network like buttons can track your activity across the Internet.
- True
- CORRECT - See section 3.7
- Which of the following are properties of a strong password?
- At least 10 characters long
- A mix of upper and lower case
- Includes symbols
- CORRECT - See section 3.7
- What can be done to prevent remote people from running programs on your computer?
- Turn on a firewall
- use strong passwords on all user accounts
- CORRECT - See section 4.3
- The acronym CLI stands for:
- Command Line Interface
- WRONG - See section 4.4.4
- Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
- LINUX
- CORRECT - See section 4.4.4
- The acronym GNU stands for:
- Gnu's Not Unix
- CORRECT - See section 4.11.3
- What one character treats the character that follows it as if it was surrounded by single quotes?
- \
- CORRECT - See section 4.10
- The main purpose of using glob characters is to be able to provide a command a list of filenames.
- True
- CORRECT - See section 9.5.2
- The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
- test $USERS eq 5
- CORRECT - See section 9.5.2
- Given the following script:
- while [ ! f /tmp/foo ]; do
- echo n .
- process_data > /tmp/foo
- done
- Which of the following are true?
- If a file called /tmp/foo exists, process_data wont be run
- process_data will be called at most once
- CORRECT - See section 9.5.2
- A conditional that lets you make multiple comparisons with a pattern is called:
- case
- CORRECT - See section 9.5.3
- What is the meaning of $(( $i + 1)) ?
- 1 will be added to the i variable
- CORRECT - See section 9.5.2
- How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
- test d /tmp/foo o $USERS gt 5
- CORRECT - See section 10.6
- A division of a hard drive may be referred to as a _______ . (Choose 2)
- partition
- slice
- CORRECT - See section 10.6
- Which of the following are valid partitioning types?
- MBR
- GPT
- CORRECT - See section 10.6
- The fdisk command is a tool used for working with the MBR partitioned disks.
- True
- CORRECT - See section 10.6
- Which of the following is the valid device file name for the first IDE hard drive on the system?
- /dev/hda
- CORRECT - See section 10.7
- Which of the following are valid video cable connector types?
- VGA
- DVI
- CORRECT - See section 11.7
- A command that will continuously update statistics about running processes:
- top
- CORRECT - See section 11.6
- The following are valid Linux option styles:
- Traditional Unix with a single dash (-)
- BSD Unix without a dash
- GNU long options with two dashes (--)
- CORRECT - See section 11.4
- Which file contains the information passed to the kernel at boot time?
- /proc/cmdline
- CORRECT - See section 11.4
- To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
- /etc/sysctl.conf
- CORRECT - See section 11.3.2.4
- To get a list of all packages installed on a system using RPM Package Management you can execute:
- rpm -qa
- CORRECT - See section 12.3
- Which of the following would be considered a host?
- A printer attached to the network via an IP address
- CORRECT - See section 12.7.4
- What option to the netstat command has information shown as numbers rather than names?
- -n
- CORRECT - See section 12.7.6
- Which of the following commands will allow you to log into the machine server1 with the account name nick?
- ssh nick@server1
- CORRECT - See section 12.7.6.1
- The RSA key fingerprint allows the dig command to connect to remote systems.
- False
- CORRECT - See section 13.3
- Which files contain user account information?
- /etc/passwd
- /etc/shadow
- CORRECT - See section 13.7.1
- Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
- True
- CORRECT - See section 13.7.1
- In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
- True
- CORRECT - See section 13.9
- Which of the following commands will display how long the system has been running since the last boot?
- w
- uptime
- CORRECT - See section 13.3.2
- The /etc/shadow file contains plain-text passwords.
- False
- CORRECT - See section 13.3.3
- Which command can be used to view the /etc/passwd file entries?
- getent
- CORRECT - See section 14.12
- Which command can be used to determine a user's most recent log in?
- last
- CORRECT - See section 14.7
- Which of the following files contains encrypted user password information?
- /etc/shadow
- CORRECT - See section 14.8.2
- Which of the following files contains user IDs?
- /etc/passwd
- CORRECT - See section 14.3
- Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
- /etc/group
- CORRECT - See section 14.12.1
- Which of the following commands, run as root, will prevent the user "bob" from logging in?
- usermod -L bob
- CORRECT - See section 15.6
- The chmod command can be used on a file by:
- The file owner and root
- CORRECT - See section 15.6
- Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
- -R
- CORRECT - See section 15.7
- The user owner of a file will always have the same or higher permissions as "other".
- False
- CORRECT - See section 16.8.3
- A source and a hard link must be part of the same filesystem.
- True
- CORRECT - See section 16.8.3
- Deleting a source file will break an associated symbolic link.
- True
- CORRECT - See section 16.8.3
- A source file and a symbolic link must be part of the same file system.
- False
- CORRECT - See section 16.8.1
- Which of the following commands would create a hard link, "link" to "file"?
- ln file link
- CORRECT - See section 16.8.2
- Which of the following commands would create a symbolic link, "link" to "file"?
- ln -s file link
- CORRECT - See section 1.3
- Unix is:
- An operating system
- A trademark
- CORRECT - See section 1.3.3
- Linux is written in:
- C
- CORRECT - See section 1.3.3
- Source code refers to:
- A human readable version of computer software
- CORRECT - See section 5.3.7
- The command man -k is the same as the command apropos.
- True
- CORRECT - See section 5.5.2
- The directory where additional documentation for software packages most likely can be found is:
- /usr/share/doc
- CORRECT - See section 6.4.2
- What option for the ls command will display all files, including hidden files?
- -a
- CORRECT - See section 6.3
- The top-level directory on a Linux system is represented as:
- /
- CORRECT - See section 7.1
- Compression on a file works by:
- Removing redundant information
- CORRECT - See section 7.3
- In general, for which of the following would you want to use lossless compression?
- A log file
- CORRECT - See section 8.4.3
- Error messages generated by commands are sent where by default?
- STDERR
- CORRECT - See section 8.4.2
- A successful command will print output to STDOUT.
- True
- CORRECT - See section 8.4.5
- Channel 2 is:
- STDERR
- CORRECT - See section 9.3
- A file begins with #!/bin/csh. This means:
- Running the script will invoke /bin/csh to interpret the rest of the file
- CORRECT - See section 9.4
- Which are appropriate editors for writing shell scripts?
- nano
- vi
- CORRECT - See section 9.4
- Most of nanos commands take the form of:
- Control and another character
- CORRECT - See section 10.3
- Which of the following are valid CPU types for Intel-based platforms?
- 32 bit
- 64 bit
- CORRECT - See section 10.3
- 64 bit platforms can access more memory than 32 bit platforms.
- True
- CORRECT - See section 11.3.2
- What does the acronym RPM mean?
- RPM Package Management
- CORRECT - See section 11.3
- One way to install new software on a Linux system is to use a package management system.
- True
- CORRECT - See section 11.10
- When you execute the dmesg command, the system displays messages that are generated by the kernel.
- True
- CORRECT - See section 11.3.1
- Which of the following are package management commands for distributions with software distributed in files ending in .deb?
- dpkg
- aptitude
- apt-get
- CORRECT - See section 12.3
- Which of the following would be considered a host?
- A printer attached to the network via an IP address
- CORRECT - See section 12.3
- A service is...
- ...a feature provided by one computer to another.
- CORRECT - See section 13.3
- Which files contain user account information?
- /etc/passwd
- /etc/shadow
- CORRECT - See section 13.3.2
- Which user can view the /etc/shadow file?
- The root user
- CORRECT - See section 13.3.4
- Which command will display the UID, GID and groups your current user belongs to?
- id
- CORRECT - See section 13.1
- Each user belongs to at least one group.
- True
- CORRECT - See section 14.8.1
- Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
- -G
- CORRECT - See section 15.7.2
- Which of the following commands set "other" permissions on file to r-x?
- chmod o=rx file
- CORRECT - See section 15.7.3
- Which of the following commands sets "other" permissions on file to r-x?
- chmod 775 file
- CORRECT - See section 15.7.2
- Which of the following are methods for setting permissions using the chmod command?
- octal
- symbolic
- CORRECT - See section 15.6
- The chown command can be used to change the owner and group of a file.
- True
- CORRECT - See section 2.3.1
- The Samba application is a:
- File Server
- CORRECT - See section 2.3
- Which of the following are examples of desktop software?
- Web browser
- Music player
- CORRECT - See section 2.3.1
- If you wanted to set up a blog, which software would be most helpful?
- WordPress
- CORRECT - See section 2.3.1
- Which of the following pieces of software deal with file sharing?
- Samba
- Netatalk
- NFS
- CORRECT - See section 2.3.2
- If you wanted to create and print an invoice, which software could you use?
- LibreOffice
- CORRECT - See section 3.3
- Which of the following is true about graphical mode?
- You access this mode by logging into a graphical display
- You have menus and tools to help you find what you are looking for
- After login, you are provided with a desktop
- CORRECT - See section 3.3
- Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
- Menus
- Windows
- Popups
- Desktop
- CORRECT - See section 3.3
- A server is likely to be running in graphical mode.
- False
- CORRECT - See section 3.4
- In graphical mode, you can get to a shell by running which applications?
- terminal
- xterm
- CORRECT - See section 3.5
- Which of the following are traits of a multiuser operating system?
- Many users can log in simultaneously with a unique account
- Users can protect their information from other users
- Resources are shared between users
- CORRECT - See section 4.7
- Which environment variable contains a list of directories that is searched for commands to execute?
- PATH
- CORRECT - See section 4.8
- Select the command that can report the location of a command:
- which
- CORRECT - See section 4.11.2
- A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
- True
- CORRECT - See section 16.9
- The /tmp directory is a temporary directory and will not exist on a system at all times.
- False
- CORRECT - See section 16.9
- The /var directory has files that change over time.
- True
- CORRECT - See section 16.7
- The "sticky bit" permission...
- ...prevents others from removing files they don't own from a common directory.
- CORRECT - See section 16.7
- Which of the following commands will set the "sticky bit" on /shared ?
- chmod 1777 /shared
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement