Chapt 16 Flashcards

1
Q

Within a Linux terminal, you want to see all the files on your system in long format (using the –l option), including any hidden files (which requires the –a option). Which command should you use?

A) ls –a | ls ‐l
B) ls –s; ls ‐l
C) ls ‐la
D) ls –a\ls ‐l

A

ls -la

C. The command ls ‐la will list all the files in a long format. The command ls ‐a | ls‐l will not work. ls ‐s; ls ‐a will show two listings: one with the size and the other with all the files. The ls ‐a\ls ‐l command will show two listings—one with all the files and the other in a long format—but it will not show all the files in a long format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following allows you to see all running programs in macOS?

A) Keychain
B) Mission Control
C) Finder
D) Force Quit

A

Mission Control

B. Mission Control is a quick way on macOS to view what is currently running. Keychain is a tool that saves credentials so that the user does not need to be prompted. The Finder is the macOS equivalent to Windows File Explorer. Force Quit is a function of the macOS for killing a process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As part of your training program, you’re trying to convince users to make backups on a regular basis. Which Apple app can be used to make backups of various types on a regular basis?

A) Time Machine
B) Finder
C) VSS
D) Keychain

A

Time Machine

A. Time Machine is the Apple application that can be used to create backups on a regular basis. The Finder is the macOS equivalent to Windows File Explorer. VSS is a Windows technology that is used to create snapshots of a volume. Keychain is a tool that saves credentials so that the user does not need to be prompted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following Linux commands/utilities can be used to edit a file?

A) ps
B) nano
C) rm
D) ls

A

nano

B. The nano command is used to edit files. The ps command lists processes running. The rm command removes files or directories. The ls command lists files and folders in the filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following Linux commands/utilities can be used to edit an Ethernet connection’s configuration settings?

A) dd
B) apt‐get
C) ip
D) pwd

A

ip

C. The ip command can be used to edit an Ethernet connection’s configuration settings. The dd command is used to duplicate disks. The apt‐get command is used with the APT package management system for downloading packages. The pwd command shows the current working directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a macOS feature for password management?

A) Spotlight
B) Keychain
C) Dock
D) Gestures

A

Keychain

B. Keychain is a tool that saves credentials so that the user does not need to be prompted. Spotlight is a utility in macOS that allows a search of the operating system and Internet for search terms. The Dock is the macOS application menu that is located on the bottom of the screen. Gestures allow you to use more than one finger on the trackpad to perform different functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The interpreter in Linux between the operating system and the user is known as the _______.

A) Shell
B) Translator
C) Login
D) GUI

A

Shell

A. The shell is the interpreter in Linux between the operating system and the user. The translator is a wrong answer. Login is something you perform to access the shell. The graphical user interface (GUI) does not interpret commands and therefore is not considered an interpreter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of backup is kept on site at the computer center for immediate recovery purposes?

A) On‐path attack
B) Cloud copies
C) Journal copies
D) Working copies

A

Working copies
D. Working copies are backups that are kept on site at the computer center for immediate recovery purposes. An on‐path attack is an attack where an eavesdropper listens between two people or devices. Cloud copies are backups that are sent to cloud storage and cannot be immediately recovered. Journal copies is a wrong answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following utilities can be used in Linux to download patches for installation on a workstation?

A) update
B) Shell/terminal
C) apt
D) patch

A

apt

C. The apt utility can be used to download and apply patches to a Linux installation. The update command is not a utility. Shell/terminal is an interface for interacting with the operating system with the command line. The patch command is not a utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following commands can be used to change the owner of a file to a new owner in Linux?

A) cd
B) chmod
C) chown
D) pwd

A

chown

C. The chown command is used to change ownership of a file. The cd command changes the working directory. The chmod command changes permissions on files. The pwd command displays the current working directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Linux utility can be used to check and repair disks?

A) fsck
B) chkdsk
C) du
D) dumgr

A

fsck
A. The fsck Linux utility is used to check and repair disks. The chkdsk utility is a Windows utility used to check and repair disks. The du utility is used to show the current disk usage. dumgr is not a utility and is a wrong answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your iPad has an application that will not stop running. What feature/tool can you use to stop it?

A) kill
B) Force Quit
C) Task Manager
D) Close Quit

A

Force Quit

B. By pressing the Home button twice on an iPad, you can Force Quit an application that will not stop running. The kill utility can be used only at the command line of Linux/macOS. The Task Manager is a Windows utility. Close Quit is not a feature and therefore a wrong answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the most common shell used with Linux?

A) Tcl/Tk
B) Terminal
C) Bash
D) SSH

A

Bash

C. Bash is the most common command‐line shell used with Linux. Tcl/Tk is a shell used with Linux, but it is very uncommon. Terminal is a utility used to access the command‐line shell. SSH, or Secure Shell, is a secure protocol used to access the shell over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name of the area at the bottom of a macOS screen where, by default, a bar of crucial icons appears?

A) Footer
B) Mission Control
C) Taskbar
D) Dock

A

dock

D. The Dock is the area at the bottom of the macOS screen that is used to launch applications. The footer is not a valid answer. Mission Control is a macOS feature that allows you to see all the applications running. The Taskbar is a Windows Desktop element that is used to track running applications and quickly launch them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which key combination can you use to bring up Spotlight from within an app?

A) Control+Shift
B) Option+Tab
C) Command+spacebar
D) Alt+Home

A

Command+spacebar

C. The Command+spacebar key combination will bring up the Spotlight utility. Control+Shift, Option+Tab, and Alt+Home are wrong answers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Linux command can be used to let you run a single command as another user?

A) sudo
B) su
C) passwd
D) ifconfig

A

sudo

A. The sudo command can be used to run a single command as another user. The su command allows you to change user logins at the command line. The passwd command changes the user’s password. The ifconfig command allows you to view and modify the wired network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following Linux commands will show you a list of running processes?

A) ls
B) cat
C) ps
D) su

A

ps

C. The ps command will display a snapshot of the current running processes on a Linux operating system. The ls command will display a listing of files from the working directory. The cat command will display the contents of a file. The su command allows you to change user logins at the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are currently in a Linux terminal session and in the /home/testuser/documents/mail directory. Which command will take you to /home/testuser/documents?

A) cd .
B) cd ..
C) cd . . .
D) cd ∼

A

cd ..

B. The command cd .. will take you one level back from the current working directory. The command cd . will do nothing, because the period signifies the current working directory. The command cd . . . is not a valid command. The command cd ~ will change directories to the home directory of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If the permissions for a file are rwxrw‐r––, what permissions apply for a user who is a member of the group to which the owner belongs?

A) Read, write, and execute
B) Read and write
C) Read only
D) No access

A

Read and write

B. The effective permissions are read and write. From left to right, the permissions are rwx for the user, rw‐ for the group, and r‐‐ for everyone else. Since the user is only a member of the group applied to the file, they will have read and write permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the –p option with mkdir do?

A) Prompts the user before creating files
B) Prompts the user before creating subfolders
C) Creates subfolders as well as folders
D) None of the above

A

Creates subfolders as well as folders

C. The ‐p option on the mkdir command allows subfolders to be created as well as the target folder. All other answers are incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

frequently used applications can be launched in macOS from the _____

A

Dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____ is used to store backup media in the event the primary location suffers a catastrophe.

A

offsite storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is a valid reason for keeping firmware updated?

A

to patch security holes that may be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____ is a password management system from apple

A

keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the _____ macOS utility allows a user to manage stored credentials.

A

keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

to edit text files, such as configuration files, _____ can be used for backup and cloud storage on apple operating systems.

A

iCloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

the ____ utility on macOS can be used to search for documents and applications

A

spotlight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

which macOS feature allows you to view all running applications?

A

mission control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is a search feature within macOS?

A

spotlight is a search feature within macOS, and it is represented by the magnifying glass icon in the upper-right corner of the menu bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

the ____ command in linux allows you to view the contents of a text file

A

cat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

in linux, the ___ allows you to interact with the system at the command line

A

terminal or command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

the ____ command allows you to change a user’s password in linux

A

passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

which linux utility can be used with wildcards to find matches for a regular expression in a text file?

A

grep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

_____ is a simple text editor for Linux

A

pico

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

if you type pwd at a linux command line, what will be the result?

A

the shell will echo back the present working directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

if you type passwd at the command prompt in linux, what will be the result

A

you will be prompted to change your password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what linux command do you use to run one command with elevated privileges?

A

sudo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what command can be used in Linux to change the permissions of an existing file?

A

chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

the chmod Linux command is used to ____

A

change permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

the ____ Linux command allows you to copy blocks of data from one device to another.

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

the wireless equivalent to the ifconfig command in a linux environment is _____ command.

A

iwconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

the linux command chmod a+r filename will assign which permissions?

A

read permissions to all

43
Q

a file on a Linux workstation has the permissions of rw-r-x–x; what are the permissions the user is assigned?

A

read / write

44
Q

the ____ linux command allows you to view the current working directory.

A

pwd

45
Q

how can the users access files on a CD or DVD installed on one remote machine in macOS?

A) by using spotlight
B) by using finder
C) by using dock
D) by using remote disc

A

by using remote disc

46
Q

which of these allows the users to provide full disk encryption to prevent unauthorized access to the information contained on the device during startup?

A) macOS disk utility
B) force quit
C) filevault
D) snapshot

A

FileVault

allows the users to provide full disk encryption to prevent unauthorized access to the info contained on the device during startup. filevault uses XTS-AES-128 with a 256-bit key

47
Q

john wants to evaluate, test and deploy software updates. which of the following management techniques will he use?

A) patch
B) change
C) asset
D) privilege

A

patch

in patch management, software updates are evaluated for their applicability to an environment and then tested in a safe way on non-production systems.

48
Q

which linux command is used to rename a file at the command line?

A) cp
B) chown
C) rd
D) mv

A

mv

rd - remove a directory in DOS
cp - will copy a file or directory
chown - will change the ownership of a file or directory

49
Q

you need to check which applications on macOS have the right to see your photos. which applet in system preferences will show you the information?

A) accessibility
B) displays
C) networks
D) security and privacy

A

security and privacy

50
Q

which linux utility can be used to check and repair disks?

A) dumgr
B) du
C) chkdsk
D) fsck

A

fsck

chkdsk - checks and repairs the disk in windows
du - used to show the current disk usage
dumgr - is not a utility

51
Q

if the permissions for a file are rwxrw-r–, what permissions apply for a user who is a member of the group to which the owner belongs?

A) read and write
B) read only
C) no access
D) read, write and execute

A

read and write

rwx for the user
rw- for the group
r– for everyone else

since the user is only a member of the group applied to the file, they will have read and write permissions.

52
Q

which of the following linux commands helps the users to find files with specific words or phrases?

A) cat
B) grep
C) vi
D) ps

A

grep - used to search for a pattern of text in files and display the results.

53
Q

in which version of the following macOS X versions was the dark mode introduced?

A) 10.11 el capitan
B) 10.14 mojave
C) 10.13 high sierra
D) 10.12 sierra

A

10.14 mojave

54
Q

what does the -p option with mkdir do?

A) creates subfolders as well as folders
B) prompts the user before creating subfolders
C) prompts the user before creating files
D) none of these

A

creates subfolders as well as folders

55
Q

you need to quickly see all of the running applications in macOS. which key sequence should you use?

A) mission control key
B) command + T
C) command control key
D) command + spacebar

A

mission control key

56
Q

which of the following linux commands displays the contents of a file?

A) nano
B) grep
C) cat
D) find

A

cat - displays the contents of a file. it can also be used to concatenate multiple files

grep - searches for regular expressions in a text file.
nano - is a text based editor for files

57
Q

the interpreter in linux between the OS and the user is known as the ____

A) translator
B) login
C) GUI
D) shell

A

shell

58
Q

What is the Mac shortcut for opening the applications folder?

A

Shift + command + A

59
Q

____ backups, sometimes referred to as _____, are partial or full backups that are kept at the computer center for immediate recovery purposes.

A

Working copy
Shadow copy

60
Q

What type of file system includes a log file of all changes and transactions that have occurred within a set. Of time such as the last few hours?

A

Journaled file system JFS

61
Q

If the operating system takes an increasing amount of time to retrieve files, what should you do?

A

Defragment hard drive

62
Q

The _____ vulnerability scanner will query The Local Host to see if a patch for a given vulnerability has been applied

A

nessus

63
Q

What Mac feature allows you to perform a backup of your data to an external drive

A

Time machine

64
Q

The macOS ___ can be used to create an image of the macOS operating system

A

Disk utility

65
Q

macOS or Linux terminal command which shows how much disk space is in use

A

du

66
Q

macOS or Linux terminal command which shows how much disk space is free

A

df

67
Q

macOS or Linux terminal command which checks and repairs disks

A

fsck

68
Q

In mac and Linux you can use the ____ command to learn more about any command line utility

A

man

69
Q

The most popular shell for Linux is?

A

Bash = Bourne Again Shell

70
Q

VNC

A

Virtual Network Computing

71
Q

When an application becomes unresponsive in Mac what can you use to close that application?

A

Force quit

72
Q

What is the Mac shortcut for:
force quit?

A

Option + Command + Esc

73
Q

___ allows you to configure disk level encryption to protect your files in the event the device is lost (Mac)

A

FileVault

74
Q

The ___ feature allows you to customize macOS to support requirements such as vision, hearing, or motor skills.

A

Accessibility

75
Q

What allows you to see all the applications running on one screen on Mac OS?

A

Mission Control

76
Q

What is the password management system from Apple called?

A

Keychain

77
Q

The search feature within macOS is called?

A

Spotlight

78
Q

What lets you browse through files and folders in macOS?

A

Finder

79
Q

In command line, in Linux, what would you use to search for a name in a password file?

A

grep ‘‘John Doe’’ /etc/passwd

80
Q

What Linux command displays the content of a file?

A

cat

81
Q

What Linux command changes file permissions?

A

chmod

82
Q

What Linux command changes the file owner and group?

A

chown

83
Q

What command deletes a file in Linux terminal?

A

rm

84
Q

What Linux command displays the current directory?

A

pwd

85
Q

A Linux text based editor for files is called?

A

Nano

86
Q

Linux command for the DNS query utility?

A

dig

87
Q

Linux command to display a list of current running processes

A

ps

88
Q

Linux terminal command to terminate a process

A

Kill

89
Q

In Linux a group of packages that are available for download is called a?

A

Repository

90
Q

What package manager is used to update and install packages for red hat-based Linux distributions, such as red hat Enterprise server, fedora, CentOS?

A

YUM
yellowdog updater modified

91
Q

Linux command to change the current directory to your home directory

A

cd ~

92
Q

____ Indicates the current directory, whereas ____ indicates the parent directory

A

. Current
.. Parent

93
Q

rwx — —
Controls the read/wright and execute permissions of the?

A

Owner

94
Q

— rwx —
Controls the read/wright and execute permissions of?

A

Any user belonging to that file’s group

95
Q

rwxr–r–
Makes the file readable by?

A

Everyone

96
Q

chmod a+r *
Will do what?

A

Gives everyone read access to all the files in a directory

97
Q

chmod a+x password.file
Will do what?

A

Permit everyone to execute the specific file

98
Q

To copy the entire contents of a directory, including all subdirectories and their contents, to another directory use the command?

A

cp - ar sourcedir destdir

99
Q

To view the contents of a file use what command?

A

Cat

100
Q

To create an entire directory tree use what command?

A

mkdir -p /usr/src/book/java/examples/applets

101
Q

What command will remove an empty directory tree?

A

rmdir -p /usr/src/book/java

This command removes the empty parent directories of applets. The command stops when it encounters a directory that is not empty

102
Q

What is the Linux command to see the status of the IP configuration?

A

ifconfig

103
Q

What Linux command can be used to view the state of the wireless network?

A

iwconfig

You can view such important information as the link quality, access point Mac address, data rate, and encryption keys

104
Q

What tools in windows and Linux have become an adopted standard for name resolution testing?

A

Windows: nslookup
Linux: dig ( domain information grouper)