Linux Chapter1 exam
CORRECT - See section 1.3.3
Source code refers to:
Human readable version of computer software
CORRECT - See section 1.3.5
The Linux platform that runs on mobile phones is called:
Android
CORRECT - See section 1.3.1
The bootloaders job is to:
Load the kernel after the computer is powered on
CORRECT - See section 1.3.3
A license where you dont have access to the source code is called:
Closed source
CORRECT - See section 1.3.4
Which distributions are made by, or clones of, Red Hat?
Fedora
CentOS
CORRECT - See section 1.3.4
Ubuntu is derived from which distribution?
Debian
CORRECT - See section 1.3
Linux is not Unix because:
It hasn't undergone certification
CORRECT - See section 1.4.1
A maintenance cycle:
Describes how long a version of software will be supported
CORRECT - See section 1.4.3
Apples OS X is:
Certified as UNIX compatible
Derived from FreeBSD
Only compatible with Apple hardware
CORRECT - See section 1.4.1
When choosing a distribution of Linux, you should consider:
Which distributions are supported by the software you need to run
If you need support on the distribution itself
The maintenance cycle of the distribution
Whether or not the distribution is under active development
Which management tools are provided by the distribution
CORRECT - See section 1.3.1
One of the jobs of the kernel is to:
Manage the systems resources
CORRECT - See section 1.3.3
Most of the tools that are part of Linux systems come from:
The GNU project
CORRECT - See section 1.3.4
What does a distribution provide to add and remove software from the system?
Package manager
CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
You should have access to the source code of software
You should be able modify the software as you wish
CORRECT - See section 1.3.2
Applications make requests to the kernel and receive resources, such as memory, CPU, and disk in return
True
CORRECT - See section 1.4.1
A release cycle:
Describes how often updates to the software come out
CORRECT - See section 1.4.1
If a software release is in a state in that it has many new features that have not been rigorously tested, it is typically referred to as beta software.
False
CORRECT - See section 1.3.1
One of the jobs of the kernel is to:
Manage the systems resources
CORRECT - See section 1.3.3
Linux is written in:
C
CORRECT - See section 1.3.5
The Linux platform that runs on mobile phones is called:
Android
CORRECT - See section 1.3.3
A license where you dont have access to the source code is called:
Closed source
CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
You should have access to the source code of software
You should be able modify the software as you wish
CORRECT - See section 1.4
The most important consideration when choosing an operating system is:
What the computer will do
CORRECT - See section 1.4.1
Software is backward compatible if:
It still supports old file formats or applications
CORRECT - See section 1.4.3
Apples OS X is:
Certified as UNIX compatible
Derived from FreeBSD
Only compatible with Apple hardware
CORRECT - See section 1.4.2
Microsoft Windows:
Has powerful scripting capabilities
Comes in desktop and server variants
Has built in virtualization
CORRECT - See section 1.4.5
Other commercial Unixes:
Are UNIX certified
Are tied to their vendors hardware
CORRECT - See section 1.3
Unix was originally invented at:
AT&T Bell Labs
CORRECT - See section 1.3.3
Source code refers to:
Human readable version of computer software
CORRECT - See section 1.3.3
Open source means:
You can view the software's source code
You can modify the software's source code
CORRECT - See section 1.3.5
The Linux platform that runs on mobile phones is called:
Android
CORRECT - See section 1.3.4
What does a distribution provide to add and remove software from the system?
Package manager
CORRECT - See section 1.3.1
The bootloaders job is to:
Load the kernel after the computer is powered on
CORRECT - See section 1.3.4
Ubuntu is derived from which distribution?
Debian
WRONG - See section 1.3
Linux is not Unix because:
There are too many distributions
CORRECT - See section 1.4.1
A maintenance cycle:
Describes how long a version of software will be supported
CORRECT - See section 1.4.2
Microsoft Windows:
Has powerful scripting capabilities
Comes in desktop and server variants
Has built in virtualization
CORRECT - See section 1.4.5
Other commercial Unixes:
Are UNIX certified
Are tied to their vendors hardware
WRONG - See section 1.3.3
Source code refers to:
The version of a program that the computer runs on the CPU
WRONG - See section 1.3.3
Open source means:
You can view the software's source code
You must support the software you share
CORRECT - See section 1.3.3
Most of the tools that are part of Linux systems come from:
The GNU project
CORRECT - See section 1.3.4
What does a distribution provide to add and remove software from the system?
Package manager
CORRECT - See section 1.3.4
Which distributions are made by, or clones of, Red Hat?
Fedora
CentOS
CORRECT - See section 1.3.4
Ubuntu is derived from which distribution?
Debian
CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
You should have access to the source code of software
You should be able modify the software as you wish
CORRECT - See section 1.4.1
A release cycle:
Describes how often updates to the software come out
WRONG - See section 1.4.2
Microsoft Windows:
Has powerful scripting capabilities
Comes in desktop and server variants
Has a Linux compatibility mode
CORRECT - See section 1.4.1
When choosing a distribution of Linux, you should consider:
Which distributions are supported by the software you need to run
If you need support on the distribution itself
The maintenance cycle of the distribution
Whether or not the distribution is under active development
Which management tools are provided by the distribution
Linux Chapter2 exam
CORRECT - See section 2.3.1
The Samba application is a:
File Server
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity
CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation
CORRECT - See section 2.4.1
A copyleft provision in a software license means:
You must distribute the source to any changes you make
CORRECT - See section 2.4.1
A permissive free software license:
means you can use the software for anything you want
places no restrictions on sharing modifications
CORRECT - See section 2.4
Linux is distributed under which license?
GPLv2
CORRECT - See section 2.4.2
A generic term for Open Source and Free Software is
FLOSS
CORRECT - See section 2.4.3
What is the meaning of a public domain license?
The author has relinquished the copyright on the work
CORRECT - See section 2.4.4
Participating in open source projects can improve your technical skills, even if it is not your day job.
True
[Tuesday, January 20, 2015 1:04 PM] Ali Moayeri,lasalle:
WRONG - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
Samba
CORRECT - See section 2.3.1
POP and IMAP are related to:
Email
CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
DHCP
WRONG - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Thunderbird
CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP
[Tuesday, January 20, 2015 1:04 PM] Ali Moayeri,lasalle: CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation
WRONG - See section 2.4.1
A copyleft provision in a software license means:
You may not link against third party closed source software
CORRECT - See section 2.4.1
Which are examples of permissive software licenses?
BSD
MIT
CORRECT - See section 2.4.3
What is the meaning of a public domain license?
The author has relinquished the copyright on the work
CORRECT - See section 2.4.3
The Creative Commons version of Public Domain licensing is:
No Rights Reserved
CORRECT
If you wanted to create and print an invoice, what could you use?
LibreOffice
WRONG - See section 2.3.4
An interpreted programming language:
is converted into machine specific instructions as the program runs
take fewer resources to run than a compiled language
CORRECT - See section 2.3.4
Which of the following are true about compiled programming languages?
C is a compiled language
CORRECT - See section 2.3.3
Which package manager is used in Fedora, a Red Hat derived system?
yum
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity
CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell
CORRECT - See section 2.4.1
Which of the following licenses was made by the FSF?
GPLv3
CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
Bruce Perens
Eric Raymond
CORRECT - See section 2.4.1
Which are examples of permissive software licenses?
BSD
MIT
CORRECT - See section 2.4.1
To place software under an open source license, you must give up your copyright.
False
CORRECT - See section 2.3.1
The Samba application is a:
• File Server
CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
• DHCP
CORRECT - See section 2.3.3
A package manager:
• downloads software from the Internet
• keeps track of which files belong to which packages
CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
• OpenLDAP
CORRECT - See section 2.3.1
Which of the following are examples of a web server?
• Apache
• Nginx
WRONG - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
• GPLv2 requires assigning copyright to the FSF
CORRECT - See section 2.4.1
A permissive free software license:
• means you can use the software for anything you want
• places no restrictions on sharing modifications
CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
• Bruce Perens
• Eric Raymond
CORRECT - See section 2.4.4
How can you make money from open source software?
• Provide paid consulting services for users
• Take payments for fixing bugs
• Sell hardware thats built to work with the software
CORRECT - See section 2.4.1
Permissive free software licenses:
• Dont have a copyleft provision
• Are not approved by the FSF
• Can allow software to be used inside closed source software
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress
CORRECT - See section 2.3.2
If you wanted to create and print an invoice, what could you use?
LibreOffice
CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation
CORRECT - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
BSD has no copyleft provision
CORRECT - See section 2.4.1
Which of the following licenses was made by the FSF?
GPLv3
CORRECT - See section 2.4
Linux is distributed under which license?
GPLv2
CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
Bruce Perens
Eric Raymond
CORRECT - See section 2.4.2
A generic term for Open Source and Free Software is
FLOSS
CORRECT - See section 2.4.1
Which are examples of permissive software licenses?
BSD
MIT
WRONG - See section 2.4.3
Creative Commons licenses allow you to:
Specify whether or not people may distribute changes
Allow or disallow commercial use
Get a veto on where the work is used
CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
DHCP
CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano
CORRECT - See section 2.3.3
A package manager:
downloads software from the Internet
keeps track of which files belong to which packages
CORRECT - See section 2.3.4
Which of the following are true about compiled programming languages?
C is a compiled language
WRONG - See section 2.3.3
The Linux shell:
Has a scripting language
Is customizable
Is responsible for tracking the location of configuration files
CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell
CORRECT - See section 2.4.1
A permissive free software license:
means you can use the software for anything you want
places no restrictions on sharing modifications
CORRECT - See section 2.4.4
How can you make money from open source software?
Provide paid consulting services for users
Take payments for fixing bugs
Sell hardware thats built to work with the software
CORRECT - See section 2.4.3
The Creative Commons version of Public Domain licensing is:
No Rights Reserved
WRONG - See section 2.4.1
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
You must make your hardware designs available
CORRECT - See section 2.3
Which of the following are examples of desktop software?
Web browser
Music player
CORRECT - See section 2.3.4
Which of the following are true about compiled programming languages?
C is a compiled language
CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP
CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify
CORRECT - See section 2.4.1
Which of the following licenses was made by the FSF?
GPLv3
CORRECT - See section 2.4.1
A permissive free software license:
means you can use the software for anything you want
places no restrictions on sharing modifications
CORRECT - See section 2.4
Linux is distributed under which license?
GPLv2
CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
Bruce Perens
Eric Raymond
CORRECT - See section 2.4.3
Creative Commons licenses allow you to:
Specify whether or not changes must be shared
Specify whether or not people may distribute changes
Allow or disallow commercial use
CORRECT - See section 2.4.1
Permissive free software licenses:
Dont have a copyleft provision
Are not approved by the FSF
Can allow software to be used inside closed source software
CORRECT - See section 2.3.1
Which of the following pieces of software deal with file sharing?
Samba
Netatalk
NFS
CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano
CORRECT - See section 2.3.3
Which package manager is used in Fedora, a Red Hat derived system?
yum
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity
CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP
CORRECT - See section 2.3.1
A Mail Transfer Agents primary purpose is to:
Deliver mail between servers
CORRECT - See section 2.3.1
Which of the following are examples of a web server?
Apache
Nginx
WRONG - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
Only BSD allows commercial use
CORRECT - See section 2.4.3
What is the meaning of a public domain license?
The author has relinquished the copyright on the work
CORRECT - See section 2.4.4
Participating in open source projects can improve your technical skills, even if it is not your day job.
True
WRONG - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
Korn shell
CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify
CORRECT - See section 2.4.1
The difference between the GPL and LGPL licenses are:
LGPL allows linking to non GPLed software
CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
DHCP
CORRECT - See section 2.3.4
An interpreted programming language:
is converted into machine specific instructions as the program runs
tend to offer more features than compiled languages
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity
CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell
CORRECT - See section 2.3.1
If you wanted to let a Linux machine share files with Windows clients and servers, you would use:
Samba
WRONG - See section 2.4.1
A copyleft provision in a software license means:
You must provide free copies of the software if you use it
CORRECT - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
BSD has no copyleft provision
CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify
CORRECT - See section 2.4.4
How can you make money from open source software?
Provide paid consulting services for users
Take payments for fixing bugs
Sell hardware thats built to work with the software
CORRECT - See section 2.4.1
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
You must make the source to your kernel available
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress
CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano
WRONG - See section 2.3.4
Which of the following are true about compiled programming languages?
Ruby is a compiled language
WRONG - See section 2.3.3
The Linux shell:
Has a scripting language
Is customizable
Has a built in text editor
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity
CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP
CORRECT - See section 2.3.1
A Mail Transfer Agents primary purpose is to:
Deliver mail between servers
CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify
WRONG - See section 2.4.3
What is the meaning of a public domain license?
The work was done by a government agency
WRONG - See section 2.4.1
Permissive free software licenses:
Are not approved by the FSF
Can allow software to be used inside closed source software
Include the GPLv2 and BSD
CORRECT - See section 2.3
Which of the following are examples of desktop software?
Web browser
Music player
CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano
WRONG - See section 2.3.3
A package manager:
keeps track of which files belong to which packages
performs a fresh install of Linux
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity
CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell
CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation
CORRECT - See section 2.4.1
A copyleft provision in a software license means:
You must distribute the source to any changes you make
CORRECT - See section 2.4.1
Permissive free software licenses:
Dont have a copyleft provision
Are not approved by the FSF
Can allow software to be used inside closed source software
WRONG - See section 2.4.1
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
You must make the source to your custom web interface available
CORRECT - See section 2.4.4
Participating in open source projects can improve your technical skills, even if it is not your day job.
True
LINUX CHAPTER 3 exam
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine
CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice
CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX
CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved
CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router
CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols
CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
WRONG - See section 3.5
Virtualization means:
Many users can share one hard drive
CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine
CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice
CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True
WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
Uncomplicated Firewall
CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests
CORRECT - See section 3.5
Which of the following are traits of cloud computing?
The resources are virtualized
You pay for what you use
CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX
CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True
CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved
CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router
CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests
CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine
CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX
CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True
WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
Gufw
iptables
CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved
CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router
CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine
CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice
CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved
CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router
CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols
CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts
CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True
WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
gufw
CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved
CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True
CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols
WRONG - See section 3.3
Which of the following is true about graphical mode?
You have menus and tools to help you find what you are looking for
You cannot use your mouse
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice
CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
WRONG - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
desktop
shell
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests
CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine
CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice
CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX
CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True
CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols
CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts
WRONG - See section 3.3
Which of the following is true about graphical mode?
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
After login, you are provided with a command prompt
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
WRONG - See section 3.5
In virtualization, what are the host and guest?
A guest is a virtual machine
The guest is the machine that runs the virtual machines
CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice
WRONG - See section 3.7
You can configure your computer to check for updates automatically.
False
WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
iptables
CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved
CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True
WRONG - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
block all cookies
Linux Chapter 4 exam
CORRECT - See section 4.11.1
A pair of double quotes ( " ) will prevent the shell from interpreting any metacharacter.
False
CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True
CORRECT - See section 4.10
Which of the following are glob characters?
The asterisk "*"
The question mark "?"
The square brackets "[" and "]"
CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True
CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo
CORRECT - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!-5
CORRECT - See section 4.4.2
The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
True
CORRECT - See section 4.3
The acronym CLI stands for:
Command Line Interface
CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU
CORRECT - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
True
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal
CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH
CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True
CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True
CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True
CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo
CORRECT - See section 4.5
The _______ command will print a list of the commands that you've previously executed.
history
CORRECT - See section 4.3
The acronym CLI stands for:
Command Line Interface
CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU
CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal
CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH
CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True
CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True
CORRECT - See section 4.12.2
The double ampersand characters ( && ) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed.
False
CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo
WRONG - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!5
CORRECT - See section 4.3
The acronym CLI stands for:
Command Line Interface
CORRECT - See section 4.11.3
What one character treats the character that follows it as if it was surrounded by single quotes?
\
CORRECT - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
TRUE
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal
CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH
CORRECT - See section 4.8
Select from the following commands those which can report the location of a command:
which
CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True
CORRECT - See section 4.10
Which of the following are glob characters?
The asterisk "*"
The question mark "?"
The square brackets "[" and "]"
CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True
CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo
CORRECT - See section 4.5
The _______ command will print a list of the commands that you've previously executed.
history
CORRECT - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!-5
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal
CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True
CORRECT - See section 4.12.2
The double ampersand characters ( && ) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed.
False
WRONG - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!5
CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU
CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
CORRECT - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
True
CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo
CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
What one character treats the character that follows it as if it was surrounded by
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal
CORRECT - See section 4.11.1
A pair of double quotes ( " ) will prevent the shell from interpreting any metacharacter.
False
CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True
CORRECT - See section 4.12.2
The double ampersand characters ( && ) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed.
False
CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo
CORRECT - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!-5
CORRECT - See section 4.4.2
The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
True
CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU
CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
CORRECT - See section 4.11.3
What one character treats the character that follows it as if it was surrounded by single quotes?
\
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal
CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH
CORRECT - See section 4.8
Select from the following commands those which can report the location of a command:
which
CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True
CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True
CORRECT - See section 4.10
Which of the following are glob characters?
The asterisk "*"
The question mark "?"
The square brackets "[" and "]"
CORRECT - See section 4.4.2
The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
True
WRONG - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
LINUX
CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
WRONG - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
False
Linux Chapter 5 exam
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True
CORRECT - See section 5.5.2
The directory where additional documentation for software packages most likely can be found is:
/usr/share/doc
CORRECT - See section 5.3.7
To search the man page sections for the keyword example, which of the following command lines could you execute?
man -k example
apropos example
CORRECT - See section 5.4
The statement that describes the difference between a man page and an info page is:
The info page is like a guide; a man page is a more concise reference.
CORRECT - See section 5.3.4
If you are reading the synopsis of a command from a man page, then items in square brackets are:
Optional
CORRECT - See section 5.3.6
Section 5 of the manual pages covers:
File Formats
CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G
CORRECT - See section 5.3.1
To get help on using the info command, execute:
man info
info info
CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s
CORRECT - See section 5.3.4
When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
The items it separates cannot be used together
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True
CORRECT - See section 5.3.3
The following sections commonly appear on a man page:
NAME
DESCRIPTION
SYNOPSIS
CORRECT - See section 5.3.2
Which option for the man command should you use if you intend to send the output of the command to a printer?
-t
CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s
CORRECT - See section 5.4.2
To go to the end of an info page press:
END
CORRECT - See section 5.3.5
To go to the next match of a search on a man page press:
n
CORRECT - See section 5.3.5
After performing a search, you can use the ____ key to return to a previously found match:
N
CORRECT - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
--help
CORRECT - See section 5.4.2
To exit the info command press:
q
CORRECT - See section 5.3.2
To move a page forward one at a time while viewing a man page, press the following:
Spacebar
CORRECT - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
--help
CORRECT - See section 5.3.2
Which two pager commands are used by the man command to control movement within the document?
more
less
CORRECT - See section 5.3.6
Commands typically executed by a user are covered in what section of the manual?
1
WRONG - See section 5.4
The statement that describes the difference between a man page and an info page is:
There is very little difference between them.
CORRECT - See section 5.3.6
Section 5 of the manual pages covers:
File Formats
CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G
CORRECT - See section 5.4.2
To get help while using the info command press:
h
WRONG - See section 5.3.5
To go to the next match of a search on a man page press:
]
CORRECT - See section 5.3.4
When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
The items it separates cannot be used together
CORRECT - See section 5.3.6.3
The whatis command is the same as man -w.
False
CORRECT - See section 5.3.6
Commands typically executed by a user are covered in what section of the manual?
1
CORRECT - See section 5.3.5
To start searching a man page, the first key you press is:
/
CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G
CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s
CORRECT - See section 5.3.5
After performing a search, you can use the ____ key to return to a previously found match:
N
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True
CORRECT - See section 5.3.6.3
The whatis command is the same as man -w.
False
CORRECT - See section 5.5.2
The directory where additional documentation for software packages most likely can be found is:
/usr/share/doc
CORRECT - See section 5.3.4
If you are reading the synopsis of a command from a man page, then items in square brackets are:
Optional
CORRECT - See section 5.3.5
To start searching a man page, the first key you press is:
/
CORRECT - See section 5.3.2
In order to exit viewing a man page, press:
q
CORRECT - See section 5.3.1
To get help on using the info command, execute:
man info
info info
CORRECT - See section 5.4.2
To exit the info command press:
q
CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s
CORRECT - See section 5.3.5
To go to the next match of a search on a man page press:
n
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True
CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
S
CORRECT - See section 5.4.2
To go to the end of an info page press:
END
WRONG - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
CORRECT - See section 5.3.6
Commands typically executed by a user are covered in what section of the manual?
1
CORRECT - See section 5.3.6
Section 5 of the manual pages covers:
File Formats
CORRECT - See section 5.3.2
In order to exit viewing a man page, press:
q
CORRECT - See section 5.3.2
Which option for the man command should you use if you intend to send the output of the command to a printer?
-t
CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G
CORRECT - See section 5.4.2
To get help while using the info command press:
h
CORRECT - See section 5.4.2
To exit the info command press:
q
CORRECT - See section 5.4.2
To go to the end of an info page press:
END
CORRECT - See section 5.3.2
To move a page forward one at a time while viewing a man page, press the following:
Spacebar
WRONG - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
--info
CORRECT - See section 5.3.7
To search the man page sections for the keyword example, which of the following command lines could you execute?
man -k example
apropos example
WRONG - See section 5.4
The statement that describes the difference between a man page and an info page is:
The man page is like a guide; the info page is a more concise reference.
CORRECT - See section 5.3.4
If you are reading the synopsis of a command from a man page, then items in square brackets are:
Optional
CORRECT - See section 5.3.2
In order to exit viewing a man page, press:
q
CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G
CORRECT - See section 5.4.2
To get help while using the info command press:
h
CORRECT - See section 5.4.2
To exit the info command press:
q
CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s
CORRECT - See section 5.3.4
When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
The items it separates cannot be used together
Linux Chapter 6 exam
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a
CORRECT - See section 6.3.5
Is the following path absolute or relative?
../../home/sysadmin
relative
CORRECT - See section 6.3.2
The tilde (~) is used to represent:
A user's home directory.
CORRECT - See section 6.3.4
The cd command by itself will take you to what directory?
Your home directory
CORRECT - See section 6.3.4
What command will allow you to change your current working directory?
cd
CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h
CORRECT - See section 6.4.1
Which of the following commands will prevent any aliased options to the ls command?
\ls
CORRECT - See section 6.4.1
The ls command color codes results by default.
False
CORRECT - See section 6.8
The touch command can be used to:
create new files
update the time stamp of existing files
CORRECT - See section 6.3.5
Is the following path absolute or relative?
/etc/ppp
absolute
CORRECT - See section 6.3.2
The tilde (~) is used to represent:
A user's home directory.
CORRECT - See section 6.3.4
The cd command by itself will take you to what directory?
Your home directory
CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h
CORRECT - See section 6.4.5
The command ls -S will sort files:
By size, largest to smallest.
WRONG - See section 6.5.2
Which option(s) can be used to prevent cp from overwriting an existing file?
-n
CORRECT - See section 6.10
The command rm -r will...
remove a directory along with any files or subdirectories.
CORRECT - See section 6.9
Which option can be used with the rm command to prompt before deleting?
-i
CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv
CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.
CORRECT - See section 6.5
When using the cp command, you must provide both a source and a destination.
True
CORRECT - See section 6.9
The rm command can delete multiple files at once.
True
CORRECT - See section 6.4.2
Hidden files are files that begin with what character?
A period (.)
CORRECT - See section 6.3
The top-level directory on a Linux system is represented as:
/
CORRECT - See section 6.3.5
Is the following path absolute or relative?
../../home/sysadmin
relative
CORRECT - See section 6.3.5
The double dot (..) can be used to represent the directory...
...above the current directory.
CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.
CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h
CORRECT - See section 6.4.5
The command ls -S will sort files:
By size, largest to smallest.
CORRECT - See section 6.10
The command rm -r will...
remove a directory along with any files or subdirectories.
CORRECT - See section 6.9
The rm command can delete multiple files at once.
True
CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
Mv
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a
CORRECT - See section 6.3.5
Is the following path absolute or relative?
/etc/ppp
absolute
CORRECT - See section 6.3.4
The cd command by itself will take you to what directory?
Your home directory
CORRECT - See section 6.3.4
What command will allow you to change your current working directory?
cd
CORRECT - See section 6.4.3
The first character in a long listing (ls -l) indicates:
If something is a file, directory, or symbolic link
CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h
CORRECT - See section 6.4.1
The ls command color codes results by default.
False
CORRECT - See section 6.5
When using the cp command, you must provide both a source and a destination.
False
CORRECT - See section 6.10
The command rm -r will...
remove a directory along with any files or subdirectories.
CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv
CORRECT - See section 6.3.5
The double dot (..) can be used with the cd command to represent:
The directory above the current working directory
CORRECT - See section 6.3.2
Which of the following commands can be used to access the home directory of the user "bob" while logged in as root?
cd /home/bob
cd ~bob
CORRECT - See section 6.3
The top-level directory on a Linux system is represented as:
/
CORRECT - See section 6.3.2
The tilde (~) is used to represent:
A user's home directory.
CORRECT - See section 6.3.2
Which of the following commands can be used to access the home directory of the user "bob" while logged in as root?
cd /home/bob
cd ~bob
WRONG - See section 6.3.5
The double dot (..) can be used to represent the directory...
...any directory below the current directory
CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.
CORRECT - See section 6.4.3
The first character in a long listing (ls -l) indicates:
If something is a file, directory, or symbolic link
CORRECT - See section 6.4.1
Which of the following commands will prevent any aliased options to the ls command?
\ls
CORRECT - See section 6.5.2
Which option(s) can be used to prevent cp from overwriting an existing file?
-i
-n
CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv
CORRECT - See section 6.8
The touch command can be used to:
create new files
update the time stamp of existing files
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a
WRONG - See section 6.3
The top-level directory on a Linux system is represented as:
/root
CORRECT - See section 6.3.5
Is the following path absolute or relative?
sysadmin/Documents
relative
CORRECT - See section 6.3.5
The double dot (..) can be used to represent the directory...
...above the current directory
CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.
CORRECT - See section 6.4.1
Which of the following commands will prevent any aliased options to the ls command?
\ls
CORRECT - See section 6.4.5
The command ls -S will sort files:
By size, largest to smallest.
CORRECT - See section 6.5.2
Which option(s) can be used to prevent cp from overwriting an existing file?
-i
-n
CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv
CORRECT - See section 6.8
The touch command can be used to:
create new files
update the time stamp of existing files
Linux Chapter 7 exam
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information
CORRECT - See section 7.3
In general, for which of the following would you want to use lossless compression?
A log file
CORRECT - See section 7.3
Lossy compression:
Usually results better compression than lossless
Is often used with images
Sacrifices some quality
CORRECT - See section 7.3
You type gzip myfile.tar. What happens?
myfile.tar is removed
myfile.tar.gz holds a compressed version of myfile.tar
CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents
CORRECT - See section 7.4
Which command will show what is inside the compressed tarball with a name of foo.tar.gz?
tar tzf foo.tar.gz
CORRECT - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip -r mydocs.zip Documents
CORRECT - See section 7.3
Which of the following commands can be used to compress a file?
gzip
bzip2
zip
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
CORRECT - See section 7.5
Given a file called documents.zip, how can you extract just the files under ProjectX?
unzip documents.zip ProjectX/*
CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
CORRECT - See section 7.1
The _____ command is normally executed daily to update the database of all files that are on the system.
updatedb
CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents
CORRECT - See section 7.4
Which flag would you pass to tar in order to have it make a new archive?
-c
CORRECT - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
File names to be added to the archive
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz home/fred/
CORRECT - See section 7.3
In general, which of the following would you want to use lossless compression?
A log file
CORRECT - See section 7.3
How would you obtain output similar to the following?
compressed uncompressed ratio uncompressed_name
278168 1016950 72.6% tags
gzip l tags
CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents
WRONG - See section 7.4
Which command will show whats inside the compressed tarball with a name of foo.tar.gz?
tar tjf foo.tar.gz
WRONG - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
nothing; -cvjf only expects one parameter
CORRECT - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz home/fred/
WRONG - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip mydocs.zip Documents
CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was
CORRECT - See section 7.4
The three main modes of tar are:
Create
Extract
List
CORRECT - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
unzip l documents.zip
CORRECT - See section 7.4
In the command tar czf foo.tar.gz bar, what is the purpose of the f flag?
Tells tar to write to the file that follows the flag
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information
WRONG - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz fred
CORRECT - See section 7.5
Given a file called documents.zip, how can you extract just the files under ProjectX?
unzip documents.zip ProjectX/*
Decompresses to an identical version as the original
CORRECT - See section 7.3
How would you obtain output similar to the following?
compressed uncompressed ratio uncompressed_name
278168 1016950 72.6% tags
gzip l tags
CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents
WRONG - See section 7.4
Which command will show whats inside the compressed tarball with a name of foo.tar.gz?
tar tjf foo.tar.gz
WRONG - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
nothing; -cvjf only expects one parameter
CORRECT - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz home/fred/
WRONG - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip mydocs.zip Documents
CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was
CORRECT - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
unzip l documents.zip
CORRECT - See section 7.4
In the command tar czf foo.tar.gz bar, what is the purpose of the f flag?
Tells tar to write to the file that follows the flag
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information
WRONG - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz fred
CORRECT - See section 7.5
Given a file called documents.zip, how can you extract just the files under ProjectX?
unzip documents.zip ProjectX/*
CORRECT - See section 7.4
Given the command tar cvjf homedirs.tbz /home, which of the following are true?
The command will print out each filename as it is processed
The output file will be compressed
CORRECT - See section 7.3
In general, for which of the following would you want to use lossless compression?
A log file
CORRECT - See section 7.3
How would you obtain output similar to the following?
compressed uncompressed ratio uncompressed_name
278168 1016950 72.6% tags
gzip l tags
CORRECT - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
File names to be added to the archive
CORRECT - See section 7.4
Given the command tar cvjf homedirs.tbz /home, which of the following are true?
The command will print out each filename as it is processed
The output file will be compressed
CORRECT - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz home/fred/
CORRECT - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip -r mydocs.zip Documents
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
CORRECT - See section 7.1
The _____ command is normally executed daily to update the database of all files that are on the system.
Updated
CORRECT - See section 7.3
You type gzip myfile.tar. What happens?
myfile.tar is removed
myfile.tar.gz holds a compressed version of myfile.tar
CORRECT - See section 7.4
Which flag would you pass to tar in order to have it make a new archive?
-c
CORRECT - See section 7.4
Which command will show whats inside the compressed tarball with a name of foo.tar.gz?
tar tzf foo.tar.gz
WRONG - See section 7.4
Given the command tar cvjf homedirs.tbz /home, which of the following are true?
Files that are present in the archive might overwrite files in /home
The /home directory will be restored with the contents of homedirs.tbz
CORRECT - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip -r mydocs.zip Documents
CORRECT - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
unzip l documents.zip
CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was
WRONG - See section 7.4
The three main modes of tar are:
Create
Extract
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
CORRECT - See section 7.1
The _____ command is normally executed daily to update the database of all files that are on the system.
Updated
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information
WRONG - See section 7.3
You type gzip myfile.tar. What happens?
myfile.tar is unarchived into the current directory
CORRECT - See section 7.3
How would you obtain output similar to the following?
compressed uncompressed ratio uncompressed_name
278168 1016950 72.6% tags
gzip l tags
WRONG - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar czf documents.tbz Documents
CORRECT - See section 7.4
Which command will show what is inside the compressed tarball with a name of foo.tar.gz?
tar tzf foo.tar.gz
WRONG - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz fred
WRONG - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip mydocs.zip Documents
WRONG - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
zip l documents.zip
CORRECT - See section 7.3
Which of the following commands can be used to compress a file?
gzip
zip
bzip
CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo
Linux Chapter 8 exam
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR
CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another
CORRECT - See section 8.11
The grep command can be used with glob characters.
True
CORRECT - See section 8.5
The find command can search for files based on the size of the file.
True
WRONG - See section 8.5
Which of the following commands scans the file to determine file locations?
locate
CORRECT - See section 8.10
Which option for the cut command is used to specify a delimiter?
-d
CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f
CORRECT - See section 8.9
Which option for the wc command will print the number of lines in a file?
-l
CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
False
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR
CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True
WRONG - See section 8.11
The grep command...
...is not case sensitive.
CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
grep ^test file.txt
CORRECT - See section 8.5
The find command can search for files based on the size of the file.
True
CORRECT - See section 8.5
Which of the following commands scans the file to determine file locations?
find
CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f
CORRECT - See section 8.9
Which option for the wc command will print the total number of words in a file?
-w
CORRECT - See section 8.3
Which command can be used to print line numbers?
nl
CORRECT - See section 8.4.4
The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
True
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.
CORRECT - See section 8.4.5
Channel 2 is:
STDERR
WRONG - See section 8.8
Which command(s) can be used to sort the lines of list.file alphabetically and display it on the screen?
cat list.file | sort
CORRECT - See section 8.7
Which option of the head command will display only the first five lines of a file?
-n 5
WRONG - See section 8.11
The grep command...
...will display the line numbers in a file that contain a specified Regular Expression.
CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
grep ^test file.txt
WRONG - See section 8.5
Which of the following commands scans the file to determine file locations?
where
CORRECT - See section 8.9
Which option for the wc command will print the number of lines in a file?
-l
CORRECT - See section 8.3
Which command can be used to print line numbers?
Nl
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR
CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.
CORRECT - See section 8.4.4
Which of the following commands will append its output to output.file?
echo Testing >> output.file
CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
more
less
WRONG - See section 8.5
Which of the following commands scans the file to determine file locations?
locate
CORRECT - See section 8.10
Which option for the cut command is used to specify a delimiter?
-d
CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f
CORRECT - See section 8.3
Which command can be used to print line numbers?
nl
CORRECT - See section 8.4.4
The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
True
CORRECT - See section 8.4.4
The command echo "text" > file.txt will create file.txt if it does not already exist.
True
CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.
CORRECT - See section 8.4.5
Channel 2 is:
STDERR
CORRECT - See section 8.11
The grep command...
...will display all the lines in a file containing the specified Regular Expression.
CORRECT - See section 8.11
The grep command can be used with glob characters.
True
CORRECT - See section 8.13
Which of the following commands will display lines that contain either start or end?
egrep 'start|end' file.txt
CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
more
less
CORRECT - See section 8.9
Which option for the wc command will print the number of lines in a file?
-l
CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
False
CORRECT - See section 8.8
Which command(s) can be used to sort the lines of list.file alphabetically and display it on the screen?
sort
cat list.file | sort
CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
more
less
CORRECT - See section 8.5
The find command can search for files based on the size of the file.
True
CORRECT - See section 8.3
Which command can be used to print line numbers?
Nl
CORRECT - See section 8.4.5
Which of the following commands will direct error messages to the file, error.log?
ls /root 2> error.log
ls /root &> error.log
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.
CORRECT - See section 8.4.5
Channel 2 is:
STDERR
CORRECT - See section 8.7
Which option of the head command will display only the first five lines of a file?
-n 5
CORRECT - See section 8.12.4
Which of the following commands will display only lines that begin with start?
grep ^start file.txt
CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
grep ^test file.txt
CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
More
less
CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f
CORRECT - See section 8.4.4
The command echo "text" > file.txt will create file.txt if it does not already exist.
True
CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
False
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
· STDERR
CORRECT - See section 8.4.5
Channel 2 is:
· STDERR
CORRECT - See section 8.4.4
Which of the following commands will append its output to output.file?
· echo Testing >> output.file
WRONG - See section 8.11
The grep command can be used with glob characters.
· False
CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
· grep ^test file.txt
CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
· more
· less
CORRECT - See section 8.10
Which option for the cut command is used to specify a delimiter?
· -d
CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
· -f
CORRECT - See section 8.3
Which command can be used to print line numbers?
· nl
CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
· False
CORRECT - See section 8.7
Which option of the head command will display only the first five lines of a file?
-n 5
Correct - See section 8.4.5
Which of the following commands will direct error messages to the file, error.log?
ls /root 2> error.log
ls /root &> error.log
Linux Chapter 9 exam
CORRECT - See section 9.3
The echo command:
Is used to output text to the console
CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character
CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again
CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory
CORRECT - See section 9.5.1
Which shell command accepts input from the users keyboard?
read
CORRECT - See section 9.5.1
What information is held inside $? ?
The previous commands exit code
CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0
CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5
CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable
CORRECT - See section 9.3
The echo command:
Is used to output text to the console
CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi
CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again
CORRECT - See section 9.5.1
Given the following part of a script:
if [ -f $1 ]; then
echo I am here
fi
What is the meaning of $1?
It is the first argument passed to the script
CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory
CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello
CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`
CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0
CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
echo n .
process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once
CORRECT - See section 9.3
The echo command:
Is used to output text to the console
CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again
CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory
CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`
CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0
CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5
CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
echo n .
process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once
CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable
CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
test d /tmp/foo o $USERS gt 5
CORRECT - See section 9.3
The echo command:
Is used to output text to the console
CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again
CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`
CORRECT - See section 9.5.1
How would you finish your script with an exit code of 42?
exit 42
CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0
CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5
CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
echo n .
process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once
CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
case
CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable
CORRECT - See section 9.3
The echo command:
Is used to output text to the console
CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi
CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character
CORRECT - See section 9.5.2
What does this shell script do?
FOO=/tmp/foo
if [ ! d $FOO ]; then
mkdir $FOO
fi
Creates /tmp/foo if it does not exist
CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again
CORRECT - See section 9.5.1
Given the following part of a script:
if [ -f $1 ]; then
echo I am here
fi
What is the meaning of $1?
It is the first argument passed to the script
CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello
CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0
CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5
CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
case
CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character
CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory
CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello
CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`
CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0
CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
echo n .
process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once
CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
case
CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable
CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
test d /tmp/foo o $USERS gt 5
Linux Chapter 10 exam
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit
CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True
CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo
CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice
CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit
CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo
CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive
CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI
CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT
CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
True
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit
CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo
CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive
CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice
CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
True
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit
CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True
CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive
CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice
CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit
CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True
CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo
CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice
CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True
CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.
CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode
CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive
CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
Slice
CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT
CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
True
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda
Linux Chapter 11 Exam
CORRECT - See section 11.3
One way to install new software on a Linux system is to use a package management system.
True
CORRECT - See section 11.4
The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system:
/sys
/proc
CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True
CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.9
All log files contain only text data.
False
CORRECT - See section 11.7
A load average of 1.0 always means the system is fully loaded.
False
CORRECT - See section 11.7
A command that will continuously update statistics about running processes:
top
CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
dpkg
aptitude
apt-get
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True
CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute
CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
secure
CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.3
One way to install new software on a Linux system is to use a package management system.
True
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
dpkg
aptitude
apt-get
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex
CORRECT - See section 11.4
The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system:
/sys
/proc
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.7
A load average of 1.0 always means the system is fully loaded.
False
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex
CORRECT - See section 11.4
The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system:
/sys
/proc
CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute
CORRECT- See section 11.7
A load average of 1.0 always means the system is fully loaded.
False
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex
CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
dpkg
aptitude
apt-get
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True
CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute
CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
secure
CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex
CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True
CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
Secure
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm –qa
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management
CORRECT - See section 11.10
When you execute the dmesg command, the system displays messages that are generated by the kernel.
True
CORRECT - See section 11.4
The Process ID (PID) of the init process is
1
CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True
CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute
CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage
CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
secure
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa
Linux Chapter 12 Exam
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.
CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP
CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?
192.105.10.10
10.33.55.77
CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False
CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.
CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP
CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?
192.105.10.10
10.33.55.77
CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
-n
CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.
CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?
192.105.10.10
10.33.55.77
CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False
CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.
CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.
CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP
CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False
CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
-n
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1
CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.
CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
-n
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1
CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.
CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP
CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False
CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r
CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh
CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False
Linux Chapter 13 Exam
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.7.1
The visudo command uses which text editor by default?
vi
CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.4.1
A GID is associated with a group name.
True
CORRECT - See section 13.4
A user can belong to...
At least 16 groups
CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.7.1
The visudo command uses which text editor by default?
vi
CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id
CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list
CORRECT - See section 13.4.1
A GID is associated with a group name.
True
CORRECT - See section 13.4
A user can belong to...
At least 16 groups
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True
CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
Getent
CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who
CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch
CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id
CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list
CORRECT - See section 13.4
A user can belong to...
At least 16 groups
CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
Getent
CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.7.1
The /etc/sudoers file should be edited directly by root using the visudo command.
True
CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch
CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id
CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list
CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
w
uptime
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
getent
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.7.1
The /etc/sudoers file should be edited directly by root using the visudo command.
True
CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.4
A user can belong to...
At least 16 groups
CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True
CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
getent
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.7.1
The /etc/sudoers file should be edited directly by root using the visudo command.
True
CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch
CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.4.1
A GID is associated with a group name.
True
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True
CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
Getent
CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id
CORRECT - See section 13.1
Each user belongs to at least one group.
True
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True
CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
w
uptime
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.7.1
The visudo command uses which text editor by default?
vi
CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id
CORRECT - See section 13.4.1
A GID is associated with a group name.
True
CORRECT - See section 13.4
A user can belong to...
At least 16 groups
CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
w
uptime
CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
getent
Linux Chapter 14 Exam
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name.
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G
CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
...change the user's MAX and MIN password settings.
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False
CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow
CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
CORRECT - See section 14.4
What directory contains user's home directories?
/home
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G
CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
CORRECT - See section 14.19.4
What directory contains user's home directories?
/home
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False
CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True
CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
...change the user's MAX and MIN password settings.
CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G
CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True
CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow
CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd
CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u
CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False
CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
CORRECT - See section 19.4
What directory contains user's home directories?
/home
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False
CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow
CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name.
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name.
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False
CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True
CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd
CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u
CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True
CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
...change the user's MAX and MIN password settings.
CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True
CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.
CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True
CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last
CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
Linux Chapter 15 exam
CORRECT- See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777
CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script
CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
-R
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic
CORRECT - See section 15.2
The chgrp command can be used to change the owner and group of a file.
False
CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:
r = 4, w = 2, x = 1
CORRECT - See section 15.7
A user cannot delete a file if they do not own it.
False
CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path
CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script
CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic
CORRECT - See section 15.2
The chgrp command can be used to change the owner and group of a file.
False
CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:
r = 4, w = 2, x = 1
CORRECT - See section 15.7
A user cannot delete a file if they do not own it.
False
CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path
CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script
CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
True
CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777
CORRECT - See section 15.7
A user cannot delete a file if they do not own it.
False
CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path
CORRECT- See section 15.5
The chgrp command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
-R
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic
CORRECT - See section 15.7
The user sysadmin will be able to read the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
False
CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
True
CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777
CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script
CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
The chown command can be used to change the user owner on a file by:
Only root
CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
False
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 15.2
The chgrp command can be used to change the owner and group of a file.
False
CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777
CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script
CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root
CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
False
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 15.7
The user sysadmin will be able to read the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
False
CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
True
CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:
r = 4, w = 2, x = 1
CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777
CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
False
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 15.7
The user sysadmin will be able to read the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
False
CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.
----r--r-- 1 sysadmin group 38270 Sep 2 18:49 file
True
CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path
CORRECT - See section 15.6
The chown command can be used to change the user owner on a file by:
Only root
CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False
Linux Chapter 16 Exam
CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False
CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.
CORRECT - See section 16.3
Which of the following commands will set setuid for /usr/bin/program?
chmod 4755 /usr/bin/program
CORRECT - See section 16.5
Setting setgid on a directory...
...will set the group owner of all files created in the directory to the group owner of the directory.
CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False
CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link
CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False
CORRECT - See section 16.9
The /var directory has files that change over time.
True
CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.
CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
chmod 2777 /shared
CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False
CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True
CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link
CORRECT - See section 16.9
The /var directory has files that change over time.
True
CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.
CORRECT - See section 16.3
Which of the following commands will set setuid for /usr/bin/program?
chmod 4755 /usr/bin/program
CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.
CORRECT - See section 16.5
Setting setgid on a directory...
...will set the group owner of all files created in the directory to the group owner of the directory.
CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False
CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
ln -s file link
CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.
CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
chmod 2777 /shared
CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False
CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False
CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link
CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
ln -s file link
CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False
CORRECT - See section 16.9
The /var directory has files that change over time.
True
CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.
CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.
CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False
CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False
CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link
CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
ln -s file link
CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False
CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.
CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.
CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
chmod 2777 /shared
CORRECT - See section 16.5
Setting setgid on a directory...
...will set the group owner of all files created in the directory to the group owner of the directory.
CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False
CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True
No hay comentarios:
Publicar un comentario