miércoles, 15 de abril de 2015

Linux Chapter1 exam
CORRECT - See section 1.3.3
Source code refers to:
Human readable version of computer software

CORRECT - See section 1.3.5
The Linux platform that runs on mobile phones is called:
Android

CORRECT - See section 1.3.1
The bootloaders job is to:
Load the kernel after the computer is powered on

CORRECT - See section 1.3.3
A license where you dont have access to the source code is called:
Closed source

CORRECT - See section 1.3.4
Which distributions are made by, or clones of, Red Hat?
Fedora
CentOS

CORRECT - See section 1.3.4
Ubuntu is derived from which distribution?
Debian

CORRECT - See section 1.3
Linux is not Unix because:
It hasn't undergone certification

CORRECT - See section 1.4.1
A maintenance cycle:
Describes how long a version of software will be supported

CORRECT - See section 1.4.3
Apples OS X is:
Certified as UNIX compatible
Derived from FreeBSD
Only compatible with Apple hardware

CORRECT - See section 1.4.1
When choosing a distribution of Linux, you should consider:
Which distributions are supported by the software you need to run
If you need support on the distribution itself
The maintenance cycle of the distribution
Whether or not the distribution is under active development
Which management tools are provided by the distribution

CORRECT - See section 1.3.1
One of the jobs of the kernel is to:
Manage the systems resources

CORRECT - See section 1.3.3
Most of the tools that are part of Linux systems come from:
The GNU project

CORRECT - See section 1.3.4
What does a distribution provide to add and remove software from the system?
Package manager
CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
You should have access to the source code of software
You should be able modify the software as you wish

CORRECT - See section 1.3.2
Applications make requests to the kernel and receive resources, such as memory, CPU, and disk in return
True

CORRECT - See section 1.4.1
A release cycle:
Describes how often updates to the software come out

CORRECT - See section 1.4.1
If a software release is in a state in that it has many new features that have not been rigorously tested, it is typically referred to as beta software.
False
CORRECT - See section 1.3.1
One of the jobs of the kernel is to:
Manage the systems resources

CORRECT - See section 1.3.3
Linux is written in:
C
CORRECT - See section 1.3.5
The Linux platform that runs on mobile phones is called:
Android

CORRECT - See section 1.3.3
A license where you dont have access to the source code is called:
Closed source

CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
You should have access to the source code of software
You should be able modify the software as you wish

CORRECT - See section 1.4
The most important consideration when choosing an operating system is:
What the computer will do


CORRECT - See section 1.4.1
Software is backward compatible if:
It still supports old file formats or applications

CORRECT - See section 1.4.3
Apples OS X is:
Certified as UNIX compatible
Derived from FreeBSD
Only compatible with Apple hardware

CORRECT - See section 1.4.2
Microsoft Windows:
Has powerful scripting capabilities
Comes in desktop and server variants
Has built in virtualization

CORRECT - See section 1.4.5
Other commercial Unixes:
Are UNIX certified
Are tied to their vendors hardware


CORRECT - See section 1.3
Unix was originally invented at:
AT&T Bell Labs

CORRECT - See section 1.3.3
Source code refers to:
Human readable version of computer software

CORRECT - See section 1.3.3
Open source means:
You can view the software's source code
You can modify the software's source code

CORRECT - See section 1.3.5
The Linux platform that runs on mobile phones is called:
Android

CORRECT - See section 1.3.4
What does a distribution provide to add and remove software from the system?
Package manager

CORRECT - See section 1.3.1
The bootloaders job is to:
Load the kernel after the computer is powered on

CORRECT - See section 1.3.4
Ubuntu is derived from which distribution?
Debian

WRONG - See section 1.3
Linux is not Unix because:
There are too many distributions

CORRECT - See section 1.4.1
A maintenance cycle:
Describes how long a version of software will be supported

CORRECT - See section 1.4.2
Microsoft Windows:
Has powerful scripting capabilities
Comes in desktop and server variants
Has built in virtualization

CORRECT - See section 1.4.5
Other commercial Unixes:
Are UNIX certified
Are tied to their vendors hardware
WRONG - See section 1.3.3
Source code refers to:
The version of a program that the computer runs on the CPU

WRONG - See section 1.3.3
Open source means:
You can view the software's source code
You must support the software you share

CORRECT - See section 1.3.3
Most of the tools that are part of Linux systems come from:
The GNU project

CORRECT - See section 1.3.4
What does a distribution provide to add and remove software from the system?
Package manager

CORRECT - See section 1.3.4
Which distributions are made by, or clones of, Red Hat?
Fedora
CentOS

CORRECT - See section 1.3.4
Ubuntu is derived from which distribution?
Debian

CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
You should have access to the source code of software
You should be able modify the software as you wish

CORRECT - See section 1.4.1
A release cycle:
Describes how often updates to the software come out

WRONG - See section 1.4.2
Microsoft Windows:
Has powerful scripting capabilities
Comes in desktop and server variants
Has a Linux compatibility mode

CORRECT - See section 1.4.1
When choosing a distribution of Linux, you should consider:
Which distributions are supported by the software you need to run
If you need support on the distribution itself
The maintenance cycle of the distribution
Whether or not the distribution is under active development
Which management tools are provided by the distribution





Linux Chapter2 exam

CORRECT - See section 2.3.1
The Samba application is a:
File Server

CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress

CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity

CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation

CORRECT - See section 2.4.1
A copyleft provision in a software license means:
You must distribute the source to any changes you make

CORRECT - See section 2.4.1
A permissive free software license:
means you can use the software for anything you want
places no restrictions on sharing modifications

CORRECT - See section 2.4
Linux is distributed under which license?
GPLv2

CORRECT - See section 2.4.2
A generic term for Open Source and Free Software is
FLOSS

CORRECT - See section 2.4.3
What is the meaning of a public domain license?
The author has relinquished the copyright on the work

CORRECT - See section 2.4.4
Participating in open source projects can improve your technical skills, even if it is not your day job.
True
[Tuesday, January 20, 2015 1:04 PM] Ali Moayeri,lasalle:
WRONG - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
    Samba
CORRECT - See section 2.3.1
POP and IMAP are related to:
    Email


CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
    DHCP

WRONG - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
    Thunderbird

CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?

    OpenLDAP
[Tuesday, January 20, 2015 1:04 PM] Ali Moayeri,lasalle: CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation


WRONG - See section 2.4.1
A copyleft provision in a software license means:

 You may not link against third party closed source software


CORRECT - See section 2.4.1
Which are examples of permissive software licenses?

    BSD
    MIT
CORRECT - See section 2.4.3
What is the meaning of a public domain license?
    The author has relinquished the copyright on the work


CORRECT - See section 2.4.3
The Creative Commons version of Public Domain licensing is:
No Rights Reserved
CORRECT
If you wanted to create and print an invoice, what could you use?

    LibreOffice


WRONG - See section 2.3.4
An interpreted programming language:

    is converted into machine specific instructions as the program runs
    take fewer resources to run than a compiled language


CORRECT - See section 2.3.4
Which of the following are true about compiled programming languages?
    C is a compiled language

CORRECT - See section 2.3.3
Which package manager is used in Fedora, a Red Hat derived system?
    yum
CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
    Audacity

CORRECT - See section 2.3.3
The two main families of Linux shells are:

    Bourne Shell
    C Shell

CORRECT - See section 2.4.1
Which of the following licenses was made by the FSF?
    GPLv3
 CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
    Bruce Perens
    Eric Raymond


CORRECT - See section 2.4.1
Which are examples of permissive software licenses?

    BSD
    MIT


CORRECT - See section 2.4.1
To place software under an open source license, you must give up your copyright.
    False
CORRECT - See section 2.3.1
The Samba application is a:
• File Server

CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
• DHCP

CORRECT - See section 2.3.3
A package manager:
• downloads software from the Internet
• keeps track of which files belong to which packages

CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
• OpenLDAP

CORRECT - See section 2.3.1
Which of the following are examples of a web server?
• Apache
• Nginx

WRONG - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
• GPLv2 requires assigning copyright to the FSF

CORRECT - See section 2.4.1
A permissive free software license:
• means you can use the software for anything you want
• places no restrictions on sharing modifications

CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
• Bruce Perens
• Eric Raymond

CORRECT - See section 2.4.4
How can you make money from open source software?
• Provide paid consulting services for users
• Take payments for fixing bugs
• Sell hardware thats built to work with the software

CORRECT - See section 2.4.1
Permissive free software licenses:
• Dont have a copyleft provision
• Are not approved by the FSF
• Can allow software to be used inside closed source software
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress

CORRECT - See section 2.3.2
If you wanted to create and print an invoice, what could you use?
LibreOffice

CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation

CORRECT - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
BSD has no copyleft provision

CORRECT - See section 2.4.1
Which of the following licenses was made by the FSF?
GPLv3

CORRECT - See section 2.4
Linux is distributed under which license?
GPLv2

CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
Bruce Perens
Eric Raymond

CORRECT - See section 2.4.2
A generic term for Open Source and Free Software is
FLOSS

CORRECT - See section 2.4.1
Which are examples of permissive software licenses?
BSD
MIT

WRONG - See section 2.4.3
Creative Commons licenses allow you to:
Specify whether or not people may distribute changes
Allow or disallow commercial use
Get a veto on where the work is used

CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
DHCP

CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano

CORRECT - See section 2.3.3
A package manager:
downloads software from the Internet
keeps track of which files belong to which packages

CORRECT - See section 2.3.4
Which of the following are true about compiled programming languages?
C is a compiled language

WRONG - See section 2.3.3
The Linux shell:
Has a scripting language
Is customizable
Is responsible for tracking the location of configuration files

CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell

CORRECT - See section 2.4.1
A permissive free software license:
means you can use the software for anything you want
places no restrictions on sharing modifications

CORRECT - See section 2.4.4
How can you make money from open source software?
Provide paid consulting services for users
Take payments for fixing bugs
Sell hardware thats built to work with the software

CORRECT - See section 2.4.3
The Creative Commons version of Public Domain licensing is:
No Rights Reserved

WRONG - See section 2.4.1
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
You must make your hardware designs available

CORRECT - See section 2.3
Which of the following are examples of desktop software?
Web browser
Music player

CORRECT - See section 2.3.4
Which of the following are true about compiled programming languages?
C is a compiled language

CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP

CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify

CORRECT - See section 2.4.1
Which of the following licenses was made by the FSF?
GPLv3

CORRECT - See section 2.4.1
A permissive free software license:
means you can use the software for anything you want
places no restrictions on sharing modifications

CORRECT - See section 2.4
Linux is distributed under which license?
GPLv2

CORRECT - See section 2.4.1
Who founded the Open Source Initiative?
Bruce Perens
Eric Raymond

CORRECT - See section 2.4.3
Creative Commons licenses allow you to:
Specify whether or not changes must be shared
Specify whether or not people may distribute changes
Allow or disallow commercial use

CORRECT - See section 2.4.1
Permissive free software licenses:
Dont have a copyleft provision
Are not approved by the FSF
Can allow software to be used inside closed source software
CORRECT - See section 2.3.1
Which of the following pieces of software deal with file sharing?
Samba
Netatalk
NFS

CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano

CORRECT - See section 2.3.3
Which package manager is used in Fedora, a Red Hat derived system?
yum

CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity

CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP

CORRECT - See section 2.3.1
A Mail Transfer Agents primary purpose is to:
Deliver mail between servers

CORRECT - See section 2.3.1
Which of the following are examples of a web server?
Apache
Nginx

WRONG - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
Only BSD allows commercial use

CORRECT - See section 2.4.3
What is the meaning of a public domain license?
The author has relinquished the copyright on the work

CORRECT - See section 2.4.4
Participating in open source projects can improve your technical skills, even if it is not your day job.
True

WRONG - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
Korn shell

CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify
CORRECT - See section 2.4.1
The difference between the GPL and LGPL licenses are:
LGPL allows linking to non GPLed software

CORRECT - See section 2.3.1
When a computer boots, it can get its network information through:
DHCP

CORRECT - See section 2.3.4
An interpreted programming language:
is converted into machine specific instructions as the program runs
tend to offer more features than compiled languages

CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity

CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell

CORRECT - See section 2.3.1
If you wanted to let a Linux machine share files with Windows clients and servers, you would use:
Samba

WRONG - See section 2.4.1
A copyleft provision in a software license means:
You must provide free copies of the software if you use it

CORRECT - See section 2.4.1
The largest difference between the GPLv2 and BSD licenses is:
BSD has no copyleft provision

CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify

CORRECT - See section 2.4.4
How can you make money from open source software?
Provide paid consulting services for users
Take payments for fixing bugs
Sell hardware thats built to work with the software

CORRECT - See section 2.4.1
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
You must make the source to your kernel available


CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress

CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano

WRONG - See section 2.3.4
Which of the following are true about compiled programming languages?
Ruby is a compiled language

WRONG - See section 2.3.3
The Linux shell:
Has a scripting language
Is customizable
Has a built in text editor

CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity

CORRECT - See section 2.3.1
Which server software would you use to create a company directory that you could search and authenticate against?
OpenLDAP

CORRECT - See section 2.3.1
A Mail Transfer Agents primary purpose is to:
Deliver mail between servers

CORRECT - See section 2.4.1
The Free Software Foundation believes that:
Software should be free to share
Software should be free to modify

WRONG - See section 2.4.3
What is the meaning of a public domain license?
The work was done by a government agency

WRONG - See section 2.4.1
Permissive free software licenses:
Are not approved by the FSF
Can allow software to be used inside closed source software
Include the GPLv2 and BSD
CORRECT - See section 2.3
Which of the following are examples of desktop software?
Web browser
Music player

CORRECT - See section 2.3.3
Which of the following are examples of text editors?
vim
emacs
pico
nano

WRONG - See section 2.3.3
A package manager:
keeps track of which files belong to which packages
performs a fresh install of Linux

CORRECT - See section 2.3.2
Which application would you use to edit and piece together sound files to make podcast?
Audacity

CORRECT - See section 2.3.3
The two main families of Linux shells are:
Bourne Shell
C Shell

CORRECT - See section 2.4.1
Richard Stallman is associated with:
The Free Software Foundation

CORRECT - See section 2.4.1
A copyleft provision in a software license means:
You must distribute the source to any changes you make

CORRECT - See section 2.4.1
Permissive free software licenses:
Dont have a copyleft provision
Are not approved by the FSF
Can allow software to be used inside closed source software

WRONG - See section 2.4.1
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
You must make the source to your custom web interface available

CORRECT - See section 2.4.4
Participating in open source projects can improve your technical skills, even if it is not your day job.
True



LINUX  CHAPTER 3 exam
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop

CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False

CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm

CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests






CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False

CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users

CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine

CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice

CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX

CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved

CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router

CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols

CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop

CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False

CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm

WRONG - See section 3.5
Virtualization means:
Many users can share one hard drive

CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine

CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice

CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True

WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
Uncomplicated Firewall

CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False

CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users

CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests

CORRECT - See section 3.5
Which of the following are traits of cloud computing?
The resources are virtualized
You pay for what you use

CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX

CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True

CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved

CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router

CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts

CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop

CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users

CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests

CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine

CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX

CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True

WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
Gufw
iptables

CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved

CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router

CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
popups
desktop

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False

CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm

CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users

CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine

CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice

CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved

CORRECT - See section 3.8
Which of the following is a tool that helps you anonymize your Internet browsing?
The onion router

CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols

CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts

CORRECT - See section 3.7
You can configure your computer to check for updates automatically.

    True


WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:

    gufw


CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?

    Sites may not work properly
    You may have to explicitly permit some cookies to be saved


CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.

    True


CORRECT - See section 3.7
Which of the following are properties of a strong password?

    At least 10 characters long
    A mix of upper and lower case
    Includes symbols
WRONG - See section 3.3
Which of the following is true about graphical mode?

    You have menus and tools to help you find what you are looking for
    You cannot use your mouse


CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?

    menus
    windows
    popups
    desktop


CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?

    terminal
    xterm


CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:

    LibreOffice


CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:

    KeePassX
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop

WRONG - See section 3.3
Which of the following is provided by a graphical interface that isnt normally provided to a non graphical interface?
menus
windows
desktop
shell

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False

CORRECT - See section 3.5
Virtualization means:
A single host can be split up into multiple guests

CORRECT - See section 3.5
In virtualization, what are the host and guest?
The host is the machine that runs the virtual machines
A guest is a virtual machine

CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice

CORRECT - See section 3.7
If you want to store logins and passwords for different websites in a secure manner, you could use:
KeePassX

CORRECT - See section 3.7
You can configure your computer to check for updates automatically.
True

CORRECT - See section 3.7
Which of the following are properties of a strong password?
At least 10 characters long
A mix of upper and lower case
Includes symbols

CORRECT - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
use strong passwords on all user accounts
WRONG - See section 3.3
Which of the following is true about graphical mode?
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
After login, you are provided with a command prompt

CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm

CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users

WRONG - See section 3.5
In virtualization, what are the host and guest?
A guest is a virtual machine
The guest is the machine that runs the virtual machines

CORRECT - See section 3.6
If you wanted to write a report that was to be printed, you would probably use:
LibreOffice

WRONG - See section 3.7
You can configure your computer to check for updates automatically.
False

WRONG - See section 3.7
Two components that provide the ability to implement a firewall include:
iptables

CORRECT - See section 3.8
What are tradeoffs of increasing the level of privacy you have in your web browser?
Sites may not work properly
You may have to explicitly permit some cookies to be saved

CORRECT - See section 3.8
Social network like buttons can track your activity across the Internet.
True

WRONG - See section 3.7
What can be done to prevent remote people from running programs on your computer?
Turn on a firewall
block all cookies





Linux Chapter 4 exam



CORRECT - See section 4.11.1
A pair of double quotes ( " ) will prevent the shell from interpreting any metacharacter.
False

CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True

CORRECT - See section 4.10
Which of the following are glob characters?
The asterisk "*"
The question mark "?"
The square brackets "[" and "]"

CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True

CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo

CORRECT - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!-5

CORRECT - See section 4.4.2
The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
True

CORRECT - See section 4.3
The acronym CLI stands for:
Command Line Interface

CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU

CORRECT - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
True
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH

CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True

CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True

CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True

CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo

CORRECT - See section 4.5
The _______ command will print a list of the commands that you've previously executed.
history

CORRECT - See section 4.3
The acronym CLI stands for:
Command Line Interface

CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU

CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH

CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True

CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True

CORRECT - See section 4.12.2
The double ampersand characters ( && ) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed.
False

CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo

WRONG - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!5

CORRECT - See section 4.3
The acronym CLI stands for:
Command Line Interface

CORRECT - See section 4.11.3
What one character treats the character that follows it as if it was surrounded by single quotes?
\

CORRECT - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
TRUE

CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH

CORRECT - See section 4.8
Select from the following commands those which can report the location of a command:
which

CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True

CORRECT - See section 4.10
Which of the following are glob characters?
The asterisk "*"
The question mark "?"
The square brackets "[" and "]"

CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True

CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo

CORRECT - See section 4.5
The _______ command will print a list of the commands that you've previously executed.
history

CORRECT - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!-5

CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True


CORRECT - See section 4.12.2
The double ampersand characters ( && ) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed.
False

WRONG - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!5


CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU

CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix


CORRECT - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
True

CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo

CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix
What one character treats the character that follows it as if it was surrounded by

CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.11.1
A pair of double quotes ( " ) will prevent the shell from interpreting any metacharacter.
False

CORRECT - See section 4.12.1
The semicolon ";" can be used to separate multiple commands to be executed in order.
True

CORRECT - See section 4.12.2
The double ampersand characters ( && ) are used to separate commands to be executed conditionally, where if the command to the left of the ampersands fails, then the command to the right of the ampersands will be executed.
False

CORRECT - See section 4.6
To be able to output messages to the screen use the _______ command:
echo

CORRECT - See section 4.5
To execute the same command as previously executed five commands ago, you would type:
!-5

CORRECT - See section 4.4.2
The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
True

CORRECT - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
GNU

CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix

CORRECT - See section 4.11.3
What one character treats the character that follows it as if it was surrounded by single quotes?
\
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (CLI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
PATH

CORRECT - See section 4.8
Select from the following commands those which can report the location of a command:
which

CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
True

CORRECT - See section 4.11.4
Using a pair of back quotes ( ` ) will cause a shell to execute the back-quoted text as a command and substitute the output back into the original command.
True

CORRECT - See section 4.10
Which of the following are glob characters?
The asterisk "*"
The question mark "?"
The square brackets "[" and "]"

CORRECT - See section 4.4.2
The shell program is what interprets the commands you type into the terminal into instructions that the Linux Operating System can execute.
True

WRONG - See section 4.4.4
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like --all.
LINUX

CORRECT - See section 4.4.4
The acronym GNU stands for:
Gnu's Not Unix

WRONG - See section 4.10
The main purpose of using glob characters is to be able to provide a command a list of filenames.
False



Linux Chapter 5 exam


CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True

CORRECT - See section 5.5.2
The directory where additional documentation for software packages most likely can be found is:
/usr/share/doc

CORRECT - See section 5.3.7
To search the man page sections for the keyword example, which of the following command lines could you execute?
man -k example
apropos example

CORRECT - See section 5.4
The statement that describes the difference between a man page and an info page is:
The info page is like a guide; a man page is a more concise reference.

CORRECT - See section 5.3.4
If you are reading the synopsis of a command from a man page, then items in square brackets are:
Optional

CORRECT - See section 5.3.6
Section 5 of the manual pages covers:
File Formats

CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G

CORRECT - See section 5.3.1
To get help on using the info command, execute:
man info
info info

CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s

CORRECT - See section 5.3.4
When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
The items it separates cannot be used together
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True


CORRECT - See section 5.3.3
The following sections commonly appear on a man page:
NAME
DESCRIPTION
SYNOPSIS

CORRECT - See section 5.3.2
Which option for the man command should you use if you intend to send the output of the command to a printer?
-t


CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s

CORRECT - See section 5.4.2
To go to the end of an info page press:
END

CORRECT - See section 5.3.5
To go to the next match of a search on a man page press:
n

CORRECT - See section 5.3.5
After performing a search, you can use the ____ key to return to a previously found match:
N
CORRECT - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
--help
CORRECT - See section 5.4.2
To exit the info command press:
q
CORRECT - See section 5.3.2
To move a page forward one at a time while viewing a man page, press the following:
Spacebar
CORRECT - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
--help

CORRECT - See section 5.3.2
Which two pager commands are used by the man command to control movement within the document?
more
less

CORRECT - See section 5.3.6
Commands typically executed by a user are covered in what section of the manual?
1

WRONG - See section 5.4
The statement that describes the difference between a man page and an info page is:
There is very little difference between them.

CORRECT - See section 5.3.6
Section 5 of the manual pages covers:
File Formats

CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G

CORRECT - See section 5.4.2
To get help while using the info command press:
h
WRONG - See section 5.3.5
To go to the next match of a search on a man page press:
]

CORRECT - See section 5.3.4
When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
The items it separates cannot be used together
CORRECT - See section 5.3.6.3
The whatis command is the same as man -w.
False

CORRECT - See section 5.3.6
Commands typically executed by a user are covered in what section of the manual?
1


CORRECT - See section 5.3.5
To start searching a man page, the first key you press is:
/


CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G

CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s

CORRECT - See section 5.3.5
After performing a search, you can use the ____ key to return to a previously found match:
N
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True

CORRECT - See section 5.3.6.3
The whatis command is the same as man -w.
False

CORRECT - See section 5.5.2
The directory where additional documentation for software packages most likely can be found is:
/usr/share/doc

CORRECT - See section 5.3.4
If you are reading the synopsis of a command from a man page, then items in square brackets are:
Optional

CORRECT - See section 5.3.5
To start searching a man page, the first key you press is:
/

CORRECT - See section 5.3.2
In order to exit viewing a man page, press:
q

CORRECT - See section 5.3.1
To get help on using the info command, execute:
man info
info info

CORRECT - See section 5.4.2
To exit the info command press:
q

CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s

CORRECT - See section 5.3.5
To go to the next match of a search on a man page press:
n

CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True

CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
S

CORRECT - See section 5.4.2
To go to the end of an info page press:
END

WRONG - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?

CORRECT - See section 5.3.6
Commands typically executed by a user are covered in what section of the manual?
1

CORRECT - See section 5.3.6
Section 5 of the manual pages covers:
File Formats

CORRECT - See section 5.3.2
In order to exit viewing a man page, press:
q

CORRECT - See section 5.3.2
Which option for the man command should you use if you intend to send the output of the command to a printer?
-t

CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G

CORRECT - See section 5.4.2
To get help while using the info command press:
h

CORRECT - See section 5.4.2
To exit the info command press:
q

CORRECT - See section 5.4.2
To go to the end of an info page press:
END

CORRECT - See section 5.3.2
To move a page forward one at a time while viewing a man page, press the following:
Spacebar
WRONG - See section 5.5.1
What is the standard option to provide a command line program to view its documentation?
--info

CORRECT - See section 5.3.7
To search the man page sections for the keyword example, which of the following command lines could you execute?
man -k example
apropos example

WRONG - See section 5.4
The statement that describes the difference between a man page and an info page is:
The man page is like a guide; the info page is a more concise reference.

CORRECT - See section 5.3.4
If you are reading the synopsis of a command from a man page, then items in square brackets are:
Optional

CORRECT - See section 5.3.2
In order to exit viewing a man page, press:
q

CORRECT - See section 5.3.2
What key should be used while working in the man command if you want to go to the end of the document?
G

CORRECT - See section 5.4.2
To get help while using the info command press:
h

CORRECT - See section 5.4.2
To exit the info command press:
q

CORRECT - See section 5.4.2
In order to search an info page, the first key to press is:
s

CORRECT - See section 5.3.4
When interpreting the SYNOPSIS of a command found on a man page, the "|" means:
The items it separates cannot be used together



Linux Chapter 6 exam


CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a

CORRECT - See section 6.3.5
Is the following path absolute or relative?
../../home/sysadmin
relative

CORRECT - See section 6.3.2
The tilde (~) is used to represent:
A user's home directory.

CORRECT - See section 6.3.4
The cd command by itself will take you to what directory?
Your home directory

CORRECT - See section 6.3.4
What command will allow you to change your current working directory?
cd


CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h

CORRECT - See section 6.4.1
Which of the following commands will prevent any aliased options to the ls command?
\ls

CORRECT - See section 6.4.1
The ls command color codes results by default.
False

CORRECT - See section 6.8
The touch command can be used to:
create new files
update the time stamp of existing files
CORRECT - See section 6.3.5
Is the following path absolute or relative?
/etc/ppp
absolute

CORRECT - See section 6.3.2
The tilde (~) is used to represent:
A user's home directory.

CORRECT - See section 6.3.4
The cd command by itself will take you to what directory?
Your home directory
CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h
CORRECT - See section 6.4.5
The command ls -S will sort files:
By size, largest to smallest.
WRONG - See section 6.5.2
Which option(s) can be used to prevent cp from overwriting an existing file?
-n

CORRECT - See section 6.10
The command rm -r will...
remove a directory along with any files or subdirectories.

CORRECT - See section 6.9
Which option can be used with the rm command to prompt before deleting?
-i

CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv
CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.
CORRECT - See section 6.5
When using the cp command, you must provide both a source and a destination.
True
CORRECT - See section 6.9
The rm command can delete multiple files at once.
True
CORRECT - See section 6.4.2
Hidden files are files that begin with what character?
A period (.)

CORRECT - See section 6.3
The top-level directory on a Linux system is represented as:
/

CORRECT - See section 6.3.5
Is the following path absolute or relative?
../../home/sysadmin
relative

CORRECT - See section 6.3.5
The double dot (..) can be used to represent the directory...
...above the current directory.

CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.

CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h

CORRECT - See section 6.4.5
The command ls -S will sort files:
By size, largest to smallest.

CORRECT - See section 6.10
The command rm -r will...
remove a directory along with any files or subdirectories.

CORRECT - See section 6.9
The rm command can delete multiple files at once.
True

CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
Mv
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a

CORRECT - See section 6.3.5
Is the following path absolute or relative?
/etc/ppp
absolute

CORRECT - See section 6.3.4
The cd command by itself will take you to what directory?
Your home directory

CORRECT - See section 6.3.4
What command will allow you to change your current working directory?
cd

CORRECT - See section 6.4.3
The first character in a long listing (ls -l) indicates:
If something is a file, directory, or symbolic link

CORRECT - See section 6.4.3.1
Which option for the ls command, when used in conjunction with the -l option, will display human-readable sizes?
-h

CORRECT - See section 6.4.1
The ls command color codes results by default.
False

CORRECT - See section 6.5
When using the cp command, you must provide both a source and a destination.
False

CORRECT - See section 6.10
The command rm -r will...
remove a directory along with any files or subdirectories.

CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv
CORRECT - See section 6.3.5
The double dot (..) can be used with the cd command to represent:
The directory above the current working directory

CORRECT - See section 6.3.2
Which of the following commands can be used to access the home directory of the user "bob" while logged in as root?
cd /home/bob
cd ~bob
CORRECT - See section 6.3
The top-level directory on a Linux system is represented as:
/

CORRECT - See section 6.3.2
The tilde (~) is used to represent:
A user's home directory.

CORRECT - See section 6.3.2
Which of the following commands can be used to access the home directory of the user "bob" while logged in as root?
cd /home/bob
cd ~bob

WRONG - See section 6.3.5
The double dot (..) can be used to represent the directory...
...any directory below the current directory

CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.

CORRECT - See section 6.4.3
The first character in a long listing (ls -l) indicates:
If something is a file, directory, or symbolic link

CORRECT - See section 6.4.1
Which of the following commands will prevent any aliased options to the ls command?
\ls

CORRECT - See section 6.5.2
Which option(s) can be used to prevent cp from overwriting an existing file?
-i
-n

CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv

CORRECT - See section 6.8
The touch command can be used to:
create new files
update the time stamp of existing files
CORRECT - See section 6.4.2
What option for the ls command will display all files, including hidden files?
-a

WRONG - See section 6.3
The top-level directory on a Linux system is represented as:
/root

CORRECT - See section 6.3.5
Is the following path absolute or relative?
sysadmin/Documents
relative

CORRECT - See section 6.3.5
The double dot (..) can be used to represent the directory...
...above the current directory

CORRECT - See section 6.4
The ls command without options or arguments...
...lists the contents of the current directory.

CORRECT - See section 6.4.1
Which of the following commands will prevent any aliased options to the ls command?
\ls

CORRECT - See section 6.4.5
The command ls -S will sort files:
By size, largest to smallest.

CORRECT - See section 6.5.2
Which option(s) can be used to prevent cp from overwriting an existing file?
-i
-n

CORRECT - See section 6.7.1
Which of the following commands can be used to rename a file?
mv

CORRECT - See section 6.8
The touch command can be used to:
create new files
update the time stamp of existing files



Linux Chapter 7 exam




CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information

CORRECT - See section 7.3
In general, for which of the following would you want to use lossless compression?
A log file

CORRECT - See section 7.3
Lossy compression:
Usually results better compression than lossless
Is often used with images
Sacrifices some quality

CORRECT - See section 7.3
You type gzip myfile.tar. What happens?
myfile.tar is removed
myfile.tar.gz holds a compressed version of myfile.tar

CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents

CORRECT - See section 7.4
Which command will show what is inside the compressed tarball with a name of foo.tar.gz?
tar tzf foo.tar.gz

CORRECT - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip -r mydocs.zip Documents

CORRECT - See section 7.3
Which of the following commands can be used to compress a file?
gzip
bzip2
zip

CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo

CORRECT - See section 7.5
Given a file called documents.zip, how can you extract just the files under ProjectX?

    unzip documents.zip ProjectX/*


CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?

    The file will not be compressed any further than it already was


CORRECT - See section 7.4
Which two commands do the same thing?

    tar c foo | gzip > foo.tar.gz
    tar czf foo.tar.gz foo


CORRECT - See section 7.1
The _____ command is normally executed daily to update the database of all files that are on the system.

    updatedb

CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?

    tar cjf documents.tbz Documents


CORRECT - See section 7.4
Which flag would you pass to tar in order to have it make a new archive?

    -c


CORRECT - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?

    File names to be added to the archive



How will you extract just the files for the user called fred?

    tar xzf backup.tar.gz home/fred/
CORRECT - See section 7.3
In general, which of the following would you want to use lossless compression?
A log file


CORRECT - See section 7.3
How would you obtain output similar to the following?

compressed    uncompressed    ratio        uncompressed_name
278168          1016950           72.6%      tags
gzip l tags

CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents

WRONG - See section 7.4
Which command will show whats inside the compressed tarball with a name of foo.tar.gz?
tar tjf foo.tar.gz

WRONG - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
nothing; -cvjf only expects one parameter

CORRECT - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:

home/username/somefile
How will you extract just the files for the user called fred?

tar xzf backup.tar.gz home/fred/

WRONG - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip mydocs.zip Documents

CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was

CORRECT - See section 7.4
The three main modes of tar are:
Create
Extract
List

CORRECT - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
unzip l documents.zip

CORRECT - See section 7.4
In the command tar czf foo.tar.gz bar, what is the purpose of the f flag?
Tells tar to write to the file that follows the flag

CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo

CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information

WRONG - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz fred

CORRECT - See section 7.5
Given a file called documents.zip, how can you extract just the files under ProjectX?
unzip documents.zip ProjectX/*
Decompresses to an identical version as the original

CORRECT - See section 7.3
How would you obtain output similar to the following?

compressed    uncompressed    ratio        uncompressed_name
278168          1016950           72.6%      tags
gzip l tags

CORRECT - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar cjf documents.tbz Documents

WRONG - See section 7.4
Which command will show whats inside the compressed tarball with a name of foo.tar.gz?
tar tjf foo.tar.gz

WRONG - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
nothing; -cvjf only expects one parameter

CORRECT - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:

home/username/somefile
How will you extract just the files for the user called fred?

tar xzf backup.tar.gz home/fred/

WRONG - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip mydocs.zip Documents

CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was

CORRECT - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
unzip l documents.zip

CORRECT - See section 7.4
In the command tar czf foo.tar.gz bar, what is the purpose of the f flag?
Tells tar to write to the file that follows the flag

CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo

CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information

WRONG - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz fred

CORRECT - See section 7.5
Given a file called documents.zip, how can you extract just the files under ProjectX?
unzip documents.zip ProjectX/*
CORRECT - See section 7.4
Given the command tar cvjf homedirs.tbz /home, which of the following are true?
The command will print out each filename as it is processed
The output file will be compressed

CORRECT - See section 7.3
In general, for which of the following would you want to use lossless compression?
A log file

CORRECT - See section 7.3
How would you obtain output similar to the following?
compressed    uncompressed    ratio        uncompressed_name
278168          1016950           72.6%      tags
gzip l tags

CORRECT - See section 7.4
In the command tar cvjf foo.tbz a b c, what are a, b, and c?
File names to be added to the archive

CORRECT - See section 7.4
Given the command tar cvjf homedirs.tbz /home, which of the following are true?
The command will print out each filename as it is processed
The output file will be compressed

CORRECT - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz home/fred/

CORRECT - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip -r mydocs.zip Documents

CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo

CORRECT - See section 7.1
The _____ command is normally executed daily to update the database of all files that are on the system.
Updated

CORRECT - See section 7.3
You type gzip myfile.tar. What happens?
myfile.tar is removed
myfile.tar.gz holds a compressed version of myfile.tar

CORRECT - See section 7.4
Which flag would you pass to tar in order to have it make a new archive?
-c

CORRECT - See section 7.4
Which command will show whats inside the compressed tarball with a name of foo.tar.gz?
tar tzf foo.tar.gz

WRONG - See section 7.4
Given the command tar cvjf homedirs.tbz /home, which of the following are true?
Files that are present in the archive might overwrite files in /home
The /home directory will be restored with the contents of homedirs.tbz

CORRECT - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip -r mydocs.zip Documents

CORRECT - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
unzip l documents.zip

CORRECT - See section 7.3
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was

WRONG - See section 7.4
The three main modes of tar are:
Create
Extract

CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo

CORRECT - See section 7.1
The _____ command is normally executed daily to update the database of all files that are on the system.
Updated
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information

WRONG - See section 7.3
You type gzip myfile.tar. What happens?
myfile.tar is unarchived into the current directory

CORRECT - See section 7.3
How would you obtain output similar to the following?
compressed    uncompressed    ratio        uncompressed_name
278168          1016950           72.6%      tags
gzip l tags

WRONG - See section 7.4
Which command would you use to archive the Documents directory and compress it with bzip2 compression?
tar czf documents.tbz Documents

CORRECT - See section 7.4
Which command will show what is inside the compressed tarball with a name of foo.tar.gz?
tar tzf foo.tar.gz

WRONG - See section 7.4
You archived your users directories into a file called backup.tar.gz. You then view the archive and see the filenames follow this convention:
home/username/somefile
How will you extract just the files for the user called fred?
tar xzf backup.tar.gz fred

WRONG - See section 7.5
Which of the following commands will create a zipfile with the contents of your Documents directory?
zip mydocs.zip Documents

WRONG - See section 7.5
Given a file called documents.zip, how can you see whats in it without extracting the files?
zip l documents.zip

CORRECT - See section 7.3
Which of the following commands can be used to compress a file?
gzip
zip
bzip

CORRECT - See section 7.4
Which two commands do the same thing?
tar c foo | gzip > foo.tar.gz
tar czf foo.tar.gz foo

Linux Chapter 8 exam

CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR

CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True

CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another

CORRECT - See section 8.11
The grep command can be used with glob characters.
True

CORRECT - See section 8.5
The find command can search for files based on the size of the file.
True

WRONG - See section 8.5
Which of the following commands scans the file to determine file locations?
locate

CORRECT - See section 8.10
Which option for the cut command is used to specify a delimiter?
-d

CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f

CORRECT - See section 8.9
Which option for the wc command will print the number of lines in a file?
-l

CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
False



CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR

CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True

WRONG - See section 8.11
The grep command...
...is not case sensitive.

CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
grep ^test file.txt

CORRECT - See section 8.5
The find command can search for files based on the size of the file.
True

CORRECT - See section 8.5
Which of the following commands scans the file to determine file locations?
find

CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f

CORRECT - See section 8.9
Which option for the wc command will print the total number of words in a file?
-w

CORRECT - See section 8.3
Which command can be used to print line numbers?
nl

CORRECT - See section 8.4.4
The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
True
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR

CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.

CORRECT - See section 8.4.5
Channel 2 is:
STDERR

WRONG - See section 8.8
Which command(s) can be used to sort the lines of list.file alphabetically and display it on the screen?
cat list.file | sort

CORRECT - See section 8.7
Which option of the head command will display only the first five lines of a file?
-n 5

WRONG - See section 8.11
The grep command...
...will display the line numbers in a file that contain a specified Regular Expression.

CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
grep ^test file.txt

WRONG - See section 8.5
Which of the following commands scans the file to determine file locations?
where

CORRECT - See section 8.9
Which option for the wc command will print the number of lines in a file?
-l

CORRECT - See section 8.3
Which command can be used to print line numbers?
Nl
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
STDERR

CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True

CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.

CORRECT - See section 8.4.4
Which of the following commands will append its output to output.file?
echo Testing >> output.file

CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
more
less

WRONG - See section 8.5
Which of the following commands scans the file to determine file locations?
locate

CORRECT - See section 8.10
Which option for the cut command is used to specify a delimiter?
-d

CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f

CORRECT - See section 8.3
Which command can be used to print line numbers?
nl

CORRECT - See section 8.4.4
The command echo "text" >> file.txt will not overwrite file.txt if it already exists.
True
CORRECT - See section 8.4.4
The command echo "text" > file.txt will create file.txt if it does not already exist.
True

CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
True
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.

CORRECT - See section 8.4.5
Channel 2 is:
STDERR

CORRECT - See section 8.11
The grep command...
...will display all the lines in a file containing the specified Regular Expression.

CORRECT - See section 8.11
The grep command can be used with glob characters.
True

CORRECT - See section 8.13
Which of the following commands will display lines that contain either start or end?
egrep 'start|end' file.txt

CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
more
less

CORRECT - See section 8.9
Which option for the wc command will print the number of lines in a file?
-l

CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
False
CORRECT - See section 8.8
Which command(s) can be used to sort the lines of list.file alphabetically and display it on the screen?
sort
cat list.file | sort
CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
more
less
CORRECT - See section 8.5
The find command can search for files based on the size of the file.
True
CORRECT - See section 8.3
Which command can be used to print line numbers?
Nl
CORRECT - See section 8.4.5
Which of the following commands will direct error messages to the file, error.log?
ls /root 2> error.log
ls /root &> error.log

CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another.

CORRECT - See section 8.4.5
Channel 2 is:
STDERR

CORRECT - See section 8.7
Which option of the head command will display only the first five lines of a file?
-n 5

CORRECT - See section 8.12.4
Which of the following commands will display only lines that begin with start?
grep ^start file.txt

CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
grep ^test file.txt

CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
More
less

CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
-f

CORRECT - See section 8.4.4
The command echo "text" > file.txt will create file.txt if it does not already exist.
True

CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
False
CORRECT - See section 8.4.3
Error messages generated by commands are sent where by default?
· STDERR

CORRECT - See section 8.4.5
Channel 2 is:
· STDERR

CORRECT - See section 8.4.4
Which of the following commands will append its output to output.file?
· echo Testing >> output.file

WRONG - See section 8.11
The grep command can be used with glob characters.
· False

CORRECT - See section 8.13
Which of the following commands will display only lines that begin with test?
· grep ^test file.txt

CORRECT - See section 8.6
Which of the following commands can be used to scroll through a text file?
· more
· less

CORRECT - See section 8.10
Which option for the cut command is used to specify a delimiter?
· -d

CORRECT - See section 8.10
Which option for the cut command is used to specify the field?
· -f

CORRECT - See section 8.3
Which command can be used to print line numbers?
· nl

CORRECT - See section 8.4.4
The command echo "text" > file.txt will not overwrite file.txt if it already exists.
· False

CORRECT - See section 8.7
Which option of the head command will display only the first five lines of a file?
-n 5
Correct - See section 8.4.5
Which of the following commands will direct error messages to the file, error.log?
ls /root 2> error.log
ls /root &> error.log      

Linux Chapter 9 exam

CORRECT - See section 9.3
The echo command:
Is used to output text to the console

CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file

CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character

CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again

CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
    echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory

CORRECT - See section 9.5.1
Which shell command accepts input from the users keyboard?
read

CORRECT - See section 9.5.1
What information is held inside $? ?
The previous commands exit code

CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0

CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5

CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable

CORRECT - See section 9.3
The echo command:
Is used to output text to the console

CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file

CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi

CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again

CORRECT - See section 9.5.1
Given the following part of a script:
if [ -f $1 ]; then
    echo I am here
fi
What is the meaning of $1?
It is the first argument passed to the script

CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
    echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory

CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello

CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`

CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0

CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
    echo n .
    process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once

CORRECT - See section 9.3
The echo command:
Is used to output text to the console

CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file

CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again





CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
    echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory

CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`

CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0

CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5

CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
    echo n .
    process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once

CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable

CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
test d /tmp/foo o $USERS gt 5

CORRECT - See section 9.3
The echo command:

Is used to output text to the console


CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:

Running the script will invoke /bin/csh to interpret the rest of the file


CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?

for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again


CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?

A=`pwd`


CORRECT - See section 9.5.1
How would you finish your script with an exit code of 42?

exit 42


CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?

0


CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?

test $USERS eq 5


CORRECT - See section 9.5.2

Given the following script:

while [ ! f /tmp/foo ]; do
echo n .
process_data > /tmp/foo
done

Which of the following are true?

If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once


CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:

case


CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?

1 will be added to the i variable
CORRECT - See section 9.3
The echo command:
Is used to output text to the console

CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi

CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character

CORRECT - See section 9.5.2
What does this shell script do?
FOO=/tmp/foo
if [ ! d $FOO ]; then
    mkdir $FOO
fi
Creates /tmp/foo if it does not exist

CORRECT - See section 9.5.3
Which of the following are correct about for and while loops?
for loops operate over a fixed list of items
while loops have a test each cycle to determine if it should run again

CORRECT - See section 9.5.1
Given the following part of a script:
if [ -f $1 ]; then
    echo I am here
fi
What is the meaning of $1?
It is the first argument passed to the script

CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello

CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0

CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS eq 5

CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
case

CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
Running the script will invoke /bin/csh to interpret the rest of the file

CORRECT - See section 9.4
Most of nanos commands take the form of:
Control and another character

CORRECT - See section 9.5.1
Given the following script that is run through ./test.sh hello goodbye:
if [ -f $2 ]; then
    echo "I am here"
fi
When will I am here be printed?
If a file called "goodbye" exists in the current directory

CORRECT - See section 9.5.1
What is the correct way to assign the word "Hello" to a variable?
A=Hello

CORRECT - See section 9.5.1
What is the correct way to save the current directory to a variable?
A=`pwd`

CORRECT - See section 9.5.2
The if command looks for what exit code to consider a condition to be true?
0

CORRECT - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
    echo n .
    process_data > /tmp/foo
done
Which of the following are true?
If a file called /tmp/foo exists, process_data wont be run
process_data will be called at most once

CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
case

CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
1 will be added to the i variable

CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
test d /tmp/foo o $USERS gt 5


Linux Chapter 10 exam
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit

CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True

CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo

CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.

CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode

CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice

CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda

CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI

CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?

32 bit
64 bit


CORRECT - See section 10.3
Which of the following commands will display CPU information?

arch
lscpu
cat /proc/cpuinfo


CORRECT - See section 10.3
A CPU flag...

...defines the features that the CPU supports.


CORRECT - See section 10.4
Which command displays information from SMBIOS?

dmidecode


CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:

Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive


CORRECT - See section 10.4.3
Which of the following are common busing systems?

USB
PCI


CORRECT - See section 10.6
Which of the following are valid partitioning types?

MBR
GPT


CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.

True


CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?

/dev/hda


CORRECT - See section 10.7
Which of the following are valid video cable connector types?

VGA
DVI
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit

CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo

CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.

CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode

CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive

CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice

CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
True

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda

CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit

CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True

CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo

CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode

CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive

CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice

CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda

CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI

CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit
64 bit

CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True

CORRECT - See section 10.3
Which of the following commands will display CPU information?
arch
lscpu
cat /proc/cpuinfo

CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.

CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode

CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
slice

CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda

CORRECT - See section 10.7
Which of the following are valid video cable connector types?
VGA
DVI
CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
True


CORRECT - See section 10.3
A CPU flag...
...defines the features that the CPU supports.

CORRECT - See section 10.4
Which command displays information from SMBIOS?
dmidecode

CORRECT - See section 10.4.2
Choose all of the following statements that are true in regard to virtual RAM:
Virtual RAM is used when available physical RAM is low.
Virtual RAM is also called swap space
Virtual RAM is stored on a hard drive

CORRECT - See section 10.4.3
Which of the following are common busing systems?
USB
PCI

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
partition
Slice

CORRECT - See section 10.6
Which of the following are valid partitioning types?
MBR
GPT

CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
True

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
/dev/hda

Linux Chapter 11 Exam

CORRECT - See section 11.3
One way to install new software on a Linux system is to use a package management system.
True

CORRECT - See section 11.4
The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system:
/sys
/proc

CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True

CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True

CORRECT - See section 11.9
What directory typically contains log files?
/var/log

CORRECT - See section 11.9
All log files contain only text data.
False

CORRECT - See section 11.7
A load average of 1.0 always means the system is fully loaded.
False

CORRECT - See section 11.7
A command that will continuously update statistics about running processes:
top

CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline

CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
dpkg
aptitude
apt-get

CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex

CORRECT - See section 11.4
The Process ID (PID) of the init process is
1

CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True

CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute

CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage

CORRECT - See section 11.9
What directory typically contains log files?
/var/log

CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
secure

CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline
CORRECT - See section 11.3
One way to install new software on a Linux system is to use a package management system.
True

CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
dpkg
aptitude
apt-get

CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex

CORRECT - See section 11.4
The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system:
/sys
/proc

CORRECT - See section 11.4
The Process ID (PID) of the init process is
1

CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True

CORRECT - See section 11.9
What directory typically contains log files?
/var/log

CORRECT - See section 11.7
A load average of 1.0 always means the system is fully loaded.
False

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline

CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management

CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex

CORRECT - See section 11.4
The Linux kernel mounts the following pseudo-filesystems to provide access to information about hardware devices connected to the system:
/sys
/proc

CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True

CORRECT - See section 11.4
The Process ID (PID) of the init process is
1

CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute

CORRECT- See section 11.7
A load average of 1.0 always means the system is fully loaded.
False

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline

CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf

CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa
CORRECT - See section 11.3.2
What does the acronym RPM mean?

RPM Package Management


CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?

rpm
yum
yumex


CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.

True


CORRECT - See section 11.4
The Process ID (PID) of the init process is

1


CORRECT - See section 11.7
The following system load averages are displayed by the top command:

1 minute
5 minute
15 minute


CORRECT - See section 11.9
What directory typically contains log files?

/var/log


CORRECT - See section 11.6
The following are valid Linux option styles:

Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)


CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?

/proc/cmdline


CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:

/etc/sysctl.conf


CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:

rpm -qa                

CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
dpkg
aptitude
apt-get

CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex

CORRECT - See section 11.4
The Process ID (PID) of the init process is
1

CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True

CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute

CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage

CORRECT - See section 11.9
What directory typically contains log files?
/var/log

CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
secure

CORRECT - See section 11.6
The following are valid Linux option styles:
Traditional Unix with a single dash (-)
BSD Unix without a dash
GNU long options with two dashes (--)

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline      
CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management

CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
rpm
yum
yumex

CORRECT - See section 11.4
The /proc directory contains a subdirectory for each process present on the system.
True

CORRECT - See section 11.4
The Process ID (PID) of the init process is
1

CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True

CORRECT - See section 11.9
What directory typically contains log files?
/var/log
CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
         
       Secure

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline

CORRECT - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
/etc/sysctl.conf

CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm –qa

CORRECT - See section 11.3.2
What does the acronym RPM mean?
RPM Package Management

CORRECT - See section 11.10
When you execute the dmesg command, the system displays messages that are generated by the kernel.
True

CORRECT - See section 11.4
The Process ID (PID) of the init process is
1

CORRECT - See section 11.6
The process (ps) command shows only processes running in the current shell by default.
True

CORRECT - See section 11.7
The following system load averages are displayed by the top command:
1 minute
5 minute
15 minute

CORRECT - See section 11.8
The free command outputs statistics about:
Memory usage

CORRECT - See section 11.9
Which log file contains messages regarding authentication and authorization?
secure

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
/proc/cmdline

CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
rpm -qa

  Linux Chapter 12 Exam

CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address

CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.

CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.

CORRECT - See section 12.4
Only servers have hostnames.
False

CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP

CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?
192.105.10.10
10.33.55.77

CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False

CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh

CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False

CORRECT - See section 12.3
Which of the following would be considered a host?

A printer attached to the network via an IP address


CORRECT - See section 12.3
A service is...

...a feature provided by one computer to another.


CORRECT - See section 12.5
A network packet contains ...

...the IP address of the destination machine.
...the IP address of the source machine.


CORRECT - See section 12.4
Only servers have hostnames.

False


CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?

TCP/IP


CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?

192.105.10.10
10.33.55.77


CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?

ifconfig


CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?

ssh


CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?

-n


CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.

False

CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address

CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.

CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.

CORRECT - See section 12.4
Only servers have hostnames.
False

CORRECT - See section 12.5
Which of the following are valid IPv4 addresses?
192.105.10.10
10.33.55.77

CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False

CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig

CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1

CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address

CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.

CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.

CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP

CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False

CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh

CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
-n

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1

CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address

CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.

CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.

CORRECT - See section 12.4
Only servers have hostnames.
False

CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig

CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh

CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
-n

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into the machine server1 with the account name nick?
ssh nick@server1

CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False

CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address

CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another.

CORRECT - See section 12.5
A network packet contains ...
...the IP address of the destination machine.
...the IP address of the source machine.

CORRECT - See section 12.4
Only servers have hostnames.
False

CORRECT - See section 12.4
Which of the following protocols defines how network communication functions?
TCP/IP

CORRECT - See section 12.7.1
The name of the primary wired network devices is ether0.
False

CORRECT - See section 12.7.1
Which of the following commands will display your machine's IP address?
ifconfig
CORRECT - See section 12.7.2
Which of the following commands will display the routing table?
route
netstat -r

CORRECT - See section 12.7.6
Which of the following commands will allow you to log into a remote machine?
ssh

CORRECT - See section 12.7.6.1
The RSA key fingerprint allows the dig command to connect to remote systems.
False

Linux Chapter 13 Exam
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user

CORRECT - See section 13.1
Each user belongs to at least one group.
True

CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who

CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.


CORRECT - See section 13.7.1
The visudo command uses which text editor by default?
vi

CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id

CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob

CORRECT - See section 13.4.1
A GID is associated with a group name.
True

CORRECT - See section 13.4
A user can belong to...
At least 16 groups

CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True

CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
 id

CORRECT - See section 13.1
Each user belongs to at least one group.
 True

CORRECT - See section 13.7.1
The visudo command uses which text editor by default?
 vi

CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
 id

CORRECT - See section 13.4.1
The /etc/group file follows what structure?
 group_name:password_placeholder:GID:user_list

CORRECT - See section 13.4.1
A GID is associated with a group name.
 True

CORRECT - See section 13.4
A user can belong to...
 At least 16 groups

CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
 True

CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
 False

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
 Getent
CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow

CORRECT - See section 13.1
Each user belongs to at least one group.
True

CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who

CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch

CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id

CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list

CORRECT - See section 13.4
A user can belong to...
At least 16 groups

CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True

CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
Getent
CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow

CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user

CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id

CORRECT - See section 13.1
Each user belongs to at least one group.
True

CORRECT - See section 13.7.1
The /etc/sudoers file should be edited directly by root using the visudo command.
True

CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch

CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id

CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list

CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
w
uptime

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
getent
CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.

CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob
CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user

CORRECT - See section 13.1
Each user belongs to at least one group.
True

CORRECT - See section 13.7.1
The sudo command allows regular users to...
  ...run certain commands as the root user.

CORRECT - See section 13.7.1
The /etc/sudoers file should be edited directly by root using the visudo command.
True

CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch

CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob

CORRECT - See section 13.4
A user can belong to...
At least 16 groups

CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
True

CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
getent

CORRECT - See section 13.1
Each user belongs to at least one group.
True

CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.

CORRECT - See section 13.7.1
The /etc/sudoers file should be edited directly by root using the visudo command.
True

CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch

CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id

CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob

CORRECT - See section 13.4.1
A GID is associated with a group name.
True

CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True

CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
Getent

CORRECT - See section 13.3
Which files contain user account information?
/etc/passwd
/etc/shadow

CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id

CORRECT - See section 13.1
Each user belongs to at least one group.
True

CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who

CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.

CORRECT - See section 13.6
Which of the following commands will allow you to switch to the user, branch?
su branch
su -l branch
su - branch

CORRECT - See section 13.3.4
Which of the following commands will display the groups that the user bob belongs to?
id bob

CORRECT - See section 13.4.1
The /etc/group file follows what structure?
group_name:password_placeholder:GID:user_list

CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
True

CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
w
uptime

CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id

CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who

CORRECT - See section 13.7.1
The sudo command allows regular users to...
...run certain commands as the root user.

CORRECT - See section 13.7.1
The visudo command uses which text editor by default?
vi

CORRECT - See section 13.3.4
Which of the following commands will display the group(s) a user belongs to?
id

CORRECT - See section 13.4.1
A GID is associated with a group name.
True

CORRECT - See section 13.4
A user can belong to...
At least 16 groups

CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
w
uptime

CORRECT - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
False

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
getent



Linux Chapter 14 Exam
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes

CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name.

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u

CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False

CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.


CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True

CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
 -u

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
 -G

CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
 ...change the user's MAX and MIN password settings.

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
 True

CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
 False

CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
 groupmod

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
 last

CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
 /etc/shadow

CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
 /etc/group

CORRECT - See section 14.4
What directory contains user's home directories?
 /home

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G

CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True

CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True

CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob

CORRECT - See section 14.19.4
What directory contains user's home directories?
/home
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G

CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False

CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True

CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
...change the user's MAX and MIN password settings.

CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob

CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G

CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last

CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G

CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True

CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last

CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow

CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd

CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u

CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob

CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True

CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False

CORRECT - See section 13.3.4
Which of the following commands can be used to modify a group?
groupmod

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob

CORRECT - See section 19.4
What directory contains user's home directories?
/home

CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False

CORRECT - See section 14.12.1
Which of the following commands will add the group extra to the user bob's secondary groups in addition to bob's current secondary groups?
usermod -aG extra bob

CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True

CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last

CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
/etc/shadow

CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob

CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes

CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name.

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u

CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False

CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True

CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob

 CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes

CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name.

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
-G

CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
False

CORRECT - See section 14.12.1
Which option for the usermod command can be used to specify a user's group ID (either primary or secondary)?
-g
-G

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 14.4
The groupmod command can be used to change a group GID.
True

CORRECT - See section 14.8.2
Which of the following files contains user IDs?
/etc/passwd

CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
-u

CORRECT - See section 14.8.1
The useradd command will create a home directory by default for a user.
True

CORRECT - See section 14.12.1
The usermod command can be used to do all of the following except...
...change the user's MAX and MIN password settings.

CORRECT - See section 14.10
For non-root users, the passwd command can only be used to change the password of the user running the command.
True

CORRECT - See section 14.13
The userdel command will...
...delete the user account, but leave the user's files by default.

CORRECT - See section 14.4
The groupmod command can be used to change a group name.
True

CORRECT - See section 14.4
The groupmod command can be used to add users to a group.
False

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
last

CORRECT - See section 14.3
Which of the following files does the groupadd command use to determine the new GUI when a GUI isn't specified?
/etc/group
                                        Linux Chapter 15 exam

CORRECT- See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file

CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file

CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic

CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True

CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777

CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script

CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root

CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
-R

CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True

CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False

CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
 chmod o=rx file

CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
 chmod 775 file

CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
 False

CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
 octal
 symbolic

CORRECT - See section 15.2
The chgrp command can be used to change the owner and group of a file.
 False

CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:
 r = 4, w = 2, x = 1

CORRECT - See section 15.7
A user cannot delete a file if they do not own it.
 False

CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
 Along with read permission to successfully perform ls -l
 Along with write permission to successfully create new files
 Change to that directory or use it as part of a path

CORRECT - See section 15.7
The "execute" permission on a file allows you to:
 Run the file as a script

CORRECT - See section 15.6
The chmod command can be used on a file by:
 The file owner and root
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?

chmod o=rx file


CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?

chmod 775 file


CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.

False


CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?

octal
symbolic


CORRECT - See section 15.2
The chgrp command can be used to change the owner and group of a file.

False


CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:

r = 4, w = 2, x = 1


CORRECT - See section 15.7
A user cannot delete a file if they do not own it.

False


CORRECT - See section 15.7
The "execute" permission on a directory allows you to:

Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path


CORRECT - See section 15.7
The "execute" permission on a file allows you to:

Run the file as a script


CORRECT - See section 15.6
The chmod command can be used on a file by:

The file owner and root

CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file

CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic

CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True

CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.
----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
True

CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777

CORRECT - See section 15.7
A user cannot delete a file if they do not own it.
False

CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path

CORRECT- See section 15.5
The chgrp command can be used on a file by:
The file owner and root

CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
-R

CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file

CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic

CORRECT - See section 15.7
The user sysadmin will be able to read the file because they own it.
----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
False

CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.
----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
True

CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777

CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script

CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root

CORRECT - See section 15.6
The chown command can be used to change the user owner on a file by:
Only root

CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root

CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
False

CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file

CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False

CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True

CORRECT - See section 15.2
The chgrp command can be used to change the owner and group of a file.
False

CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777

CORRECT - See section 15.7
The "execute" permission on a file allows you to:
Run the file as a script

CORRECT - See section 15.5
The chgrp command can be used on a file by:
The file owner and root

CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
False

CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True


CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False

CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file

CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
octal
symbolic

CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True

CORRECT - See section 15.7
The user sysadmin will be able to read the file because they own it.

----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
False

CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.

----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
True

CORRECT - See section 15.7.3
Octal notation uses the following values for the permissions granted:
r = 4, w = 2, x = 1

CORRECT - See section 15.7
Which of the following permissions would allow all users to add, view, and delete files in a directory?
777

CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
False

CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True

CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False

CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
chmod o=rx file

CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
False

CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True

CORRECT - See section 15.7
The user sysadmin will be able to read the file because they own it.

----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
False

CORRECT - See section 15.7.2
The user sysadmin will be able to change the permissions of the file because they own it.

----r--r--  1  sysadmin  group  38270  Sep 2 18:49  file
True

CORRECT - See section 15.7
The "execute" permission on a directory allows you to:
Along with read permission to successfully perform ls -l
Along with write permission to successfully create new files
Change to that directory or use it as part of a path

CORRECT - See section 15.6
The chown command can be used to change the user owner on a file by:
Only root

CORRECT - See section 15.6
The chmod command can be used on a file by:
The file owner and root

CORRECT - See section 15.9
The "execute" permission is never set on files by default.
True

CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
False

Linux Chapter 16 Exam
CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False

CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared

CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.

CORRECT - See section 16.3
Which of the following commands will set setuid for /usr/bin/program?
chmod 4755 /usr/bin/program

CORRECT - See section 16.5
Setting setgid on a directory...
...will set the group owner of all files created in the directory to the group owner of the directory.

CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True

CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False

CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link

CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
 False
CORRECT - See section 16.9
The /var directory has files that change over time.
 True

CORRECT - See section 16.7
The "sticky bit" permission...
 ...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
 chmod 1777 /shared

CORRECT - See section 16.4
The setgid permission...
 ...allows a command to be run as the group owner of the file.
 ...allows files created in a directory to be owned by the group that owns the directory.

CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
 chmod 2777 /shared

CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
 False

CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
 True

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
 True

CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
 ln file link


CORRECT - See section 16.9
The /var directory has files that change over time.
True

CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.

CORRECT - See section 16.3
Which of the following commands will set setuid for /usr/bin/program?
chmod 4755 /usr/bin/program

CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.

CORRECT - See section 16.5
Setting setgid on a directory...
...will set the group owner of all files created in the directory to the group owner of the directory.

CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True

CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False

CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
ln -s file link

CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared

CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.

CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
chmod 2777 /shared

CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False

CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True

CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False

CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link

CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
ln -s file link



CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False

CORRECT - See section 16.9
The /var directory has files that change over time.
True

CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.

CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.

CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False



CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True

CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
False

CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
ln file link

CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
ln -s file link

CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
False

CORRECT - See section 16.7
The "sticky bit" permission...
...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared

CORRECT - See section 16.3
The "setuid" permission...
...allows a command to be run as the file owner.

CORRECT - See section 16.4
The setgid permission...
...allows a command to be run as the group owner of the file.
...allows files created in a directory to be owned by the group that owns the directory.

CORRECT - See section 16.6
Which of the following commands will set setgid on /shared ?
chmod 2777 /shared

CORRECT - See section 16.5
Setting setgid on a directory...
...will set the group owner of all files created in the directory to the group owner of the directory.

CORRECT - See section 16.8.3
Deleting a source file will break an associated hard link.
False

CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
True

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
True

No hay comentarios:

Publicar un comentario