Final exam meerkeuze Flashcards

1
Q

One of the jobs of the kernel is to:

Manage the system’s resources
Turn source code into machine code
Load the operating system after the computer is turned on
Transfer mail from one machine to another
A

Manage the system’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unix is:
(choose two)

    An operating system
    A type of hardware
    A trademark
    A distribution of Linux
    A text editor
A

An operating system

A trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Linux is written in:

    C
    .NET
    C++
    Java
    Perl
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Source code refers to:

The version of a program that the computer runs on the CPU
The license that dictates how you may use and share the software
The interface that software uses to talk to the kernel
A human readable version of computer software
A

A human readable version of computer software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the standard option to provide a command line program to view its documentation?

–info
–doc
–help
-h
A

–help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The command man -k is the same as the command apropos.
True or False?

True
False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The whatis command is the same as man -w.

True
False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The directory where additional documentation for software packages most likely can be found is:

/var/lib/doc
/usr/software/doc
/usr/share/doc
/var/share/doc
A

/usr/share/doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hidden files are files that begin with what character?

    A plus (+)
    A dash (-)
    A period (.)
    An asterisk (*)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What option for the ls command will display all files, including hidden files?

- w
- H
- L
- a
A

-a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The top-level directory on a Linux system is represented as:

/
/root
/home
C:
A

/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the following path absolute or relative?
/etc/ppp

Relative
Absolute
A

Absolute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is the following path absolute or relative?
sysadmin/Documents

Relative
Absolute
A

Relative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compression on a file works by:

Removing the high order bit from each byte
Consolidating multiple files into one
Removing redundant information
Storing most of the data on removable media and just leaving a pointer
Eliminating gaps within the file
A

Removing redundant information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In general, for which of the following would you want to use lossless compression?

    An mp3 audio file
    A movie
    A log file
    A JPEG image
    An encrypted email
A

A log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lossy compression:
(choose three)

Is often used with documents
Decompresses to an identical version as the original
Sacrifices some quality
Usually results better compression than lossless
Is often used with images
A

Sacrifices some quality
Usually results better compression than lossless
Is often used with images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You type gzip myfile.tar. What happens?
(choose two)

myfile.tar.gz holds a compressed version of myfile.tar
An error; you forgot to pass the name of the output file
An error; you forgot to specify the file with –f
myfile.tar is unarchived into the current directory
myfile.tar is removed
A

myfile. tar.gz holds a compressed version of myfile.tar

myfile. tar is removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Error messages generated by commands are sent where by default?

STDIN
Log files
STDERR
STDOUT
A

STDERR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A successful command will print output to STDOUT.
True or False?

True
False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following commands will direct error messages to the file, error.log?
(choose one)

ls /root > error.log
ls /root >> error.log
ls /root 2> error.log
ls /root $> error.log
A

ls /root 2> error.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A pipe allows you to…

…send the same input to multiple commands.
…send the output of one command to another.
…send the output of a command to a file.
…type multiple commands at one prompt.
A

…send the output of one command to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Channel 2 is:

STDERR
STDIN
STDALL
STDOUT
A

STDERR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The echo command:

Tests a variable for duplication
Duplicates the input stream to the output stream
Is used for variable assignment
Is used to output text to the console
Copies variables from one to another
A

Is used to output text to the console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A file begins with #!/bin/csh. This means:

C Shell compatibility mode is enabled
Running the script will invoke /bin/csh to interpret the rest of the file
The operator should not be using /bin/csh
This is a Perl script
Nothing, this is a comment
A

Running the script will invoke /bin/csh to interpret the rest of the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which are appropriate editors for writing shell scripts?
(choose two)

    nano
    LibreOffice Writer
    /bin/bash
    vi
    Firefox
A

nano

vi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Most of nano’s commands take the form of:

    Escape followed by another character
    Mouse clicks
    The F1 through F12 function keys
    Alt and another character
    Control and another character
A

Control and another character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
What does this shell script do?
FOO=/tmp/foo
if [ ! –d $FOO ]; then
mkdir $FOO
fi
Nothing, since there is a problem with the conditions in the if statement
Makes the /tmp/foo directory if a file by that name exists
Creates /tmp/foo if it does not exist
Creates /tmp/foo and raises an error if there is a problem
Outputs a message to the screen
A

Creates /tmp/foo if it does not exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following are valid CPU types for Intel-based platforms?
(choose two)

48 bit
24 bit
64 bit
32 bit
A

64 bit

32 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

64 bit platforms can access more memory than 32 bit platforms.
True or False?

True
False
A

True

30
Q

What does the acronym RPM mean?

Relocate Package Manager
Return Package Management
RPM Package Management
Recursive Package Manager
A

RPM Package Management

31
Q

One way to install new software on a Linux system is to use a package management system.
True or False?

True
False
A

True

32
Q

When you execute the dmesg command, the system displays messages that are generated by the kernel.
True or False?

True
False
A

True

33
Q

Which of the following are package management commands for distributions with software distributed in files ending in .deb?
(choose three)

rpm
apt-get
dpkg
aptitude
A

apt-get
dpkg
aptitude

34
Q

Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
(choose three)

yum
apt-get
rpm
yumex
A

yum
rpm
yumex

35
Q

Which of the following would be considered a host?

A printer attached to the network via an IP address
A CDROM
The computer’s hard drive
A network cable
A

A printer attached to the network via an IP address

36
Q

A service is…

…a file that contains configuration information.
…another name for a computer’s hostname.
…a feature provided by one computer to another.
…like an IP address.
A

…a feature provided by one computer to another.

37
Q

A network packet contains …
(choose two)

…the IP address of the destination machine.
…a hard drive partition.
…the name of the router.
…the IP address of the source machine.
A

…the IP address of the destination machine.

…the IP address of the source machine.

38
Q

Only servers have hostnames.
True or False?

True
False
A

False

39
Q

Which files contain user account information?
(choose two)

/etc/passwd
/etc/shadow
/etc/group
A

/etc/passwd

/etc/shadow

40
Q

Which user can view the /etc/shadow file?

The root user
No users
Any member of the password group
All users
A

The root user

41
Q

Which command will display the UID, GID and groups your current user belongs to?

id
whoami
who
about
A

id

42
Q

Each user belongs to at least one group.
True or False?

True
False
A

True

43
Q

Which command will display the users that are currently logged in to the system?

who
about
whoami
id
A

who

44
Q

UIDs 1-500 are usually reserved for what kind of users?

Are not used for user accounts, but for group accounts
System accounts, such as server processes
Remote log-in accounts
Log-in (human) users
A

System accounts, such as server processes

45
Q

If a user is deleted, the files and directories that the user owned…

…are deleted as well.
…will have no UID owner.
…will show a UID as the owner, but not user name.
…will have no user owner.
A

…will show a UID as the owner, but not user name.

46
Q

Which of the following options for the useradd command allows root to specify the UID to be associated with the account?

- g
- u
- U
- G
A

-u

47
Q

Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?

-u
U
-g
-G
A

-G

48
Q

On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
True or False?

True
False
A

False

49
Q

Which of the following commands set “other” permissions on file to r-x?

chmod o+rx file
chmod o-r-w file
chmod o=r+x file
chmod o=rx file
A

chmod o=rx file

50
Q

Which of the following commands sets “other” permissions on file to r-x?

chmod 774 file
chmod 776 file
chmod 775 file
chmod 777 file
A

chmod 775 file

51
Q

Only one set (user, group, other) of permission can be changed at once using the symbolic method.
True or False?

True
False
A

False

52
Q

Which of the following are methods for setting permissions using the chmod command?
(choose two)

letter
octal
symbolic
binary
A

octal

symbolic

53
Q

The chown command can be used to change the owner and group of a file.
True or False?

True
False
A

True

54
Q

The Samba application is a:

Mail Server
Security Server
File Server
Web Server
A

File Server

55
Q

Which of the following are examples of desktop software?
(choose two)

    Web server
    Web browser
    File share
    Compiler
    Music player
A

Web browser

Music player

56
Q

If you wanted to set up a blog, which software would be most helpful?

    MySQL
    Postfix
    WordPress
    Dovecot
    Samba
A

WordPress

57
Q

Which of the following pieces of software deal with file sharing?
(choose three)

    NFS
    X-Windows
    Netatalk
    Samba
    PostgreSQL
A

NFS
Netatalk
Samba

58
Q

If you wanted to create and print an invoice, which software could you use?

    GNOME
    Compiz
    Firefox
    LibreOffice
    Evolution
A

LibreOffice

59
Q

Which of the following is true about graphical mode?
(choose three)

You have menus and tools to help you find what you are looking for
You access this mode by logging into a graphical display
After login, you are provided with a command prompt
After login, you are provided with a desktop
You cannot use your mouse
A

You have menus and tools to help you find what you are looking for
You access this mode by logging into a graphical display
After login, you are provided with a desktop

60
Q

Which of the following is provided by a graphical interface that isn’t normally provided to a non graphical interface?
(choose four)

    Desktop
    Shell
    Windows
    Popups
    Menus
A

Desktop
Windows
Popups
Menus

61
Q

In graphical mode, you can get to a shell by running which applications?
(choose two)

    guiterm
    gbash
    terminal
    xconsole
    xterm
A

terminal

xterm

62
Q

Which of the following are traits of a multiuser operating system?
(choose three)

An administrative user gets a dedicated CPU
Users can protect their information from other users
Resources are shared between users
Many users can log in simultaneously with a unique account
Each user can only log in once per day
A

Users can protect their information from other users
Resources are shared between users
Many users can log in simultaneously with a unique account

63
Q

Select all the applications that provide access to the Command Line Interface (CLI)?
(choose two)

Virtual Terminal
firefox
opera
Terminal window
A

Virtual Terminal

Terminal window

64
Q

Which environment variable contains a list of directories that is searched for commands to execute?

PATH
EXEC
PS1
PS2
A

PATH

65
Q

Select the command that can report the location of a command:

where
what
which
A

which

66
Q

A pair of single quotes ( ‘ ) will prevent the shell from interpreting any metacharacter.
True or False?

True
False
A

True

67
Q

The /tmp directory is a temporary directory and will not exist on a system at all times.
True or False?

True
False
A

False

68
Q

The /var directory has files that change over time.
True or False?

True
False
A

True

69
Q

The “sticky bit” permission…

…prevents others from removing files they don’t own from a common directory.
…changes the group ownership of existing files in a directory.
…prevents others from overwriting files they don’t own in common directories.
…sets the group ownership of any new file created in a directory.
A

…prevents others from removing files they don’t own from a common directory.

70
Q

Which of the following commands will set the “sticky bit” on /shared ?

chmod 4777 /shared
chmod 2777 /shared
chmod 7777 /shared
chmod 1777 /shared
A

chmod 1777 /shared

71
Q

The “setuid” permission…

…allows a command to be run as the file owner.
…allows files in a directory to be manipulated as by the directory owner.
…prevents the owner of a file from being changed.
…reports the output of a script to the owner.
A

…allows a command to be run as the file owner.