Linux - Professsion - Quiz Flashcards

(79 cards)

1
Q

Which one of the following statements concerning Linux passwords is true?
All passwords can be decrypted using the system administrator’s master password
Passwords may never start with a non-letter
Passwords are only stored in encrypted form
Users cannot change their password once it has been set
Passwords may be at most six characters long

A

Passwords are only stored in encrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following commands are used to view real-time memory usage (Choose two correct answers).

Nice
Top
Ps
Free
Memory

A

Top
Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the number called that is used to identify a process?

Proc Num
PIN
Process Entry
PID

A

PID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When typing a long command line at the shell, what single character can be used to split a command across multiple lines?

A

\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a new user is added, where does the user ID get stored?

/etc/realm
/etc/users
/etc/passwd
/etc/shpasswd
/etc/pass

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What permissions are set on a file with the command chmod 654 file.txt?

-rwxrw–x
–wxr-x–x
Drw-r-xr–
D–wxr-x–
-rw-r-xr–

A

-rw-r-xr–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How could one search for the file foo.txt under the directory /home?

Find /home foo.txt
Search /home foo.txt
Find /home -file foo.txt
Search /home -file foo.txt
Find /home -name foo.txt

A

Find /home -name foo.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Given the following directory permissions:

drwxrwxrwt 14 root 36864 2012-03-02 11:17 tmp
What is the letter t at the end of drwxrwxrwt indicate?
It is the sticky bit that causes all commands in this directory to be launched as a root.
It makes the directory accessible for everybody.
It indicates that this directory contains only temporary files that may be deleted.
It means that even though the directory is global writable only the owner can delete their own files.
It is a temporary bit that prevents launching commands in this directory

A

It means that even though the directory is global writable only the owner can delete their own files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following Linux distributions use the dpkg package management system? (Choose two correct answers)

Debian
Mandriva
Suse
Red Hat
Ubuntu

A

Debian
Ubuntu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following file systems is most commonly used for Linux distributions?

Ext4
HFS+
NTFS
FAT32

A

Ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following commands will display a list of all files in the current directory, including those that may be hidden?

Ls -h
Ls –a
Ls –hidden
Ls -a

A

Ls -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following directories is often used to store log files?

/usr
/home
/var
/temp
/dev

A

/var

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following Ubuntu releases is considered most stable and fit to use for business purposes?

LTS
Xubuntu
Kubuntu
Xubuntu Server
Ubuntu Vanilla

A

LTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command shows if /usr/bin is in the current shell search path?

Echo $PATH
Echo %PATH%
Cat PATH
Cat %PATH

A

Echo $PATH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While deleting all files beginning with the letter a there was still the file Access.txt left. Assuming that it had the correct ownership, why was it not deleted?

Rm had to be called with the option -R to delete all files
Files with extensions need a different treatment
Linux file names are case sensitive
The file Access.txt was probably opened by another application
The file Access.txt was hidden

A

Linux file names are case sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following software packages is an email server?

Apache
Thunderbird
Postfix
GIMP
MySQL

A

Postfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is true about open source software?

The freedom to redistribute copies must include binary or executable forms of the software but not the source code.
Open source software is available for commercial use
Open source software can not be copied for free
Open source software is not for sale

A

Open source software is available for commercial use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following commands can be used to extract files from an archive?

Tar -evf
Tar -vf
Tar -e
Tar -v
Tar -xvf

A

Tar -xvf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following will change the group that is associated with a file?

Chown
Chmod -w
Chmod
Ls -g

A

Chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which function does a shell program serve?

It is responsible for logging a user into the system
It provides a graphical environment
It receives user commands and executes them
It is responsible for establishing a connection to another computer

A

It receives user commands and executes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command will display running process information in realtime?

Top
Show current
Ps current
Process

A

Top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following programs is not a graphical web browser?

Opera
Chrome
Firefox
Konqueror
Links

A

Links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which command will archive /home and its content to /mnt/backp? Choose two correct answers.

Sync -r /home /mnt/backp
Mv /home /mnt/backp
Cp -ar /home /mnt/backp
Copy -r /home /mnt/backp
Tar -cf /mnt/backup/archive.tar /home

A

Cp -ar /home /mnt/backp
Tar -cf /mnt/backup/archive.tar /home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following applications are used to play an MP3 file on a Linux system? Choose three answers

Banshee
Audacious
Amarok
Xara Xtreme
LibreOffice Player

A

Banshee
Audacious
Amarok

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which commands provide help for a specific Linux command? (Choose two answers). Whatdoes Info Man Helpme Ask
Info Man
26
What does LAMP mean? Short for Lightweight Access Management Protocol which synchronizes permission in a network The bus ID of an attached USB device that emits light The Linux Advanced Mode Programming Interface which gives advanced capabilities to application developers The combination of Linux, Apache, MySQL, and PHP and other programming languages Short for lamport-clock which is important in distributed network computing
The combination of Linux, Apache, MySQL, and PHP and other programming languages
27
Which network interface always exists in a Linux system? Wlan0 Vlan0 Sit0 Lo Eth0
Lo The network interface "lo" always exists in a Linux system. "lo" stands for loopback and it is a virtual network interface that allows network communication within the same machine. It is used for testing and troubleshooting network configurations, as well as for accessing local services without the need for an external network connection.
28
Which of the following statements may be used to access the second command line argument to a script? "$1" $1 "ARG$2" "$2"
"$2"
29
Which command displays the list of groups to which a user belongs? Whoami Isgroup Who Id
Id
30
What is the usual absolute path of the personal directory for the user foo?
/home/foo
31
Which of the following commands moves the directory ~/summer-vacation and its content to ~/vacation/2011? Move -R ~/summer-vacation ~/vacation/2011 Mv -R ~/summer-vacation ~/vacation/2011 Mv ~/summer-vacation ~/vacation/2011 Mv /home/summer-vacation /home/vacation/2011 Mv ~/vacation/2011 ~/summer-vacation
Mv ~/summer-vacation ~/vacation/2011
32
Which permissions should be given to a file that needs to be opened and edited by the file's owner and opened read-only by the file's group? 0540 0444 0640 0751 0466
0640
33
Which of the following commands will set the variable text to olaf is home? (Select two answers) Text=='olaf is home' Text=="olaf is home" Text='olaf is home' Text=$olaf is home Text="olaf is home"
Text='olaf is home' Text="olaf is home"
34
Which command would you use to get comprehensive documentation about any command in Linux? Echo command Locate command Get command Help command Man command
Man command
35
The output of the program date should be saved in the variable actdat. What is the correct statement? Date > $actdat Set actdat='date' Date | acdat Actdat=$(date) Actdat=date
Actdat=$(date)
36
The following file is found in which system file?root:x:0:0::/root:/bin/bash /usr/bin/shadow /etc/passwd /etc/password /etc/shadow /etc/user.cong
/etc/passwd/ The correct answer is /etc/passwd. This file is found in the system file directory and contains essential information about user accounts on the system, such as usernames, user IDs, group IDs, home directories, and default shells. It is a plain text file that can be accessed by privileged users and some system processes for authentication purposes.
37
What is the output of the following command? tail -n 20 test.txt The last 20 lines of test.txt omitting the blank lines The last 20 lines of test.txt with line numbers The first 20 lines of test.txt The last 20 lines of test.txt including the blank lines
The last 20 lines of test.txt including the blank lines
38
Which statement about the directory /etc/skel are correct? (Choose two answers) The directory contains a default set of configuration files used by the useradd command The directory contains the global settings for the Linux system The personal settings of root are in this directory The files from the directory are copied to the home directory of the new user when the account is created The files from the directory are copied to the home directory of the new user when starting the system
The directory contains a default set of configuration files used by the useradd command The files from the directory are copied to the home directory of the new user when the account is created
39
Which of the following files holds the definition of the local user accounts? /etc/users /etc/id /etc/secret /etc/home /etc/passwd
/etc/passwd
40
Which of the following commands increases the number of elements in a directory (choose two answers) Create newfile Touch newfile Rmdir newdirectory Mkdir newdirectory Ls newfile
Touch newfile Mkdir newdirectory
41
Why is the file data.txt empty after executing sort data.txt > data.txt? Because sort detects that both files are the same Because sort cannot sort text files, only binary files Because the file gets truncated before the sort is executed Because, if data.txt is empty now, it must have been empty before
Because the file gets truncated before the sort is executed
42
What keyword is missing from the following segment of the shell script? for i in*;----cat $idone Endo Fi Do Then Run
Do
43
Which command is used to make a shell variable known to subsequently executed programs? Env Transfer Announce Export Mv
Export
44
Which of the following answers are true for cloud computing? (Choose two correct answers) Cloud Computing provides new tools to manage IT resources Cloud Computing implies sharing all information with everyone else in 'the cloud' Cloud Computing is the opposite of the Green IT; i.e., the use of fossil non-regenerative energy for computing From the business perspective, Cloud Computing means outsourcing or centralization of IT operations
Cloud Computing provides new tools to manage IT resources From the business perspective, Cloud Computing means outsourcing or centralization of IT operations
45
Which of the following is a requirement of the GPL license but not the BSD license? The GPL license forbids the removal of the copyright and license notices from the source code files that are distributed. The GPL license contains a disclaimer of warranty requiring users not to hold the software authors liable to any damage. The GPL license requires that any legal disputes be settled with the modification of Free Software Foundation. Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license
Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license
46
Which of the following hardware devices links a number of computers together to form an Ethernet LAN? Switch Connector Server Access point Terminal
Switch A switch is a hardware device that is used to connect multiple computers together to form an Ethernet LAN. It acts as a central hub, allowing the computers to communicate with each other by sending and receiving data packets. Switches are commonly used in both small and large networks to provide efficient and reliable connectivity. They are designed to handle high data traffic and can intelligently route data to the appro A switch is a hardware device that is used to connect multiple computers together to form an Ethernet LAN. It acts as a central hub, allowing the computers to communicate with each other by sending and receiving data packets. Switches are commonly used in both small and large networks to provide efficient and reliable connectivity. They are designed to handle high data traffic and can intelligently route data to the appropriate destination, improving network performance. Therefore, a switch is the correct hardware device for linking computers together in an Ethernet LAN.
47
Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system. /dev/hdc1d2p3 Dev/hdc1a3 Dev/hdc1b3 /dev/hd1b3 /dev/hdb3
/dev/hdb3
48
Which of the following statements concerning the General Public License (GPL) is true? The GPL is designed to ensure that the source code of a software remains freely available If you changed a program you received under the GPL, you must send your changes to the original author for approval GPL software may never be sold for money GPL software may not be used to run nuclear reactors or air traffic control systems The GPL is identical to the BSD license
The GPL is designed to ensure that the source code of a software remains freely available
49
Which of the following commands can be used to determine the time of the last login of a given user? History Showlog Login Recent Last
Last
50
Which of the following commands can be used to extract content from a tar file? Tar -v Tar -c Tar -xvf Tar -e Tar -vf
Tar -xvf
51
Which criteria are useful when deciding which operating system to use? (Choose three correct answers). License costs Availability of mandatory applications and tools Linux can do everything, there is no need for further evaluation Ideological preferences of the system administrator Skills of the administrators and staff
License costs Availability of mandatory applications and tools Skills of the administrators and staff
52
How can the current directory and its subdirectories be searched for the file name MyFile.xml? Grep MyFile.xml | find Search MyFile.xml ./ Grep -r MyFile.xml Find . -name MyFile.xml Less MyFile.xml
Find . -name MyFile.xml
53
Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home? Tar -xf backup.tar /home Tar /home backup.tar Tar -cf backup.tar /home Tar -cf /home backup.tar Tar -xf /home backup.tar
Tar -cf backup.tar /home
54
Which of the following is a Linux-based operating system for use on mobile devices? CentOS Debian Android IOS
Android
55
Which of the following commands can be used to create a file? Build Touch Nico Mkfile Create
Touch
56
Which statement about users and user groups is correct? Users do not have to belong to a user group Every user belongs at least to one user group A group can only have one main user There can be only one user group on a system
Every user belongs at least to one user group
57
Which of the following commands can be used to view a file and do search operations within it while viewing the contents? See Less Grep Report Find
Less
58
What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested? . (dot) _ (underscore) - (minus) \ (backslash)
. (dot) Feedback In Unix-based systems, the dot (.) is used as the first character for file or directory names that should not be displayed by commands like ls unless specifically requested. This convention is commonly used for hidden files or directories, which typically contain configuration files or sensitive data that should not be easily accessible or accidentally modified. By starting the name with a dot, the file or directory is effectively "hidden" from regular directory listings, providing a level of privacy or organization. In Unix-based systems, the dot (.) is used as the first character for file or directory names that should not be displaye
59
After installing a new package, in which directory are you most likely find its configuration file? /opt /etc /conf /usr /lib
/etc
60
Which command line can be used to search help files that mention the word "copy"? Man copy Copy help Man -k copy Copy -help Whatis copy
Man -k copy
61
Which of the following is NOT a core component of the Linux operating system kernel? Process scheduler System call interface Memory management Graphical user interface (GUI)
Graphical user interface (GUI)
62
Which command will display the last line of the file foo.txt? Head -n foo.txt Tail foo.txt Tail -n 1 foo.txt Last -n 1 foo.txt
Tail -n 1 foo.txt
63
Which option will cause the echo command NOT to output a trailing newline? -n -p -s -e
-n
64
Which is a suitable command to find the next appearance of the word hidden in a man page being viewed from the command line? /? hidden /hidden CTRL-F hidden Find hidden
/hidden
65
What two-character sequence is present at the beginning of an interpreted script? Please specify two characters only.
#!
66
Which of the following are correct commands for changing the current directory to the user's home? (Select all that applies) Cd Cd / Cd /home Cd ~ Cd ..
Cd Cd ~
67
Which of the following commands is used to lookup the current IP address of a system? Less/proc/net/ipconfig Ifconfig Ipconfig Showip Sysinfo | grep ipaddress
Ifconfig
68
Which command lists all files in the current directory that starts with a capital letter? Ls -uppercase-files Ls A-Z* Ls A-Z Ls [A-Z]* Ls --upercasefiles
Ls [A-Z]*
69
How can the normal output of a command be written to a file while discarding the error output? Command>2>file &1>/dev/null Command /dev/null Command>2>discard-error>file Command > output.txt 2>/dev/null Command> /dev/null 2&>1 output
Command > output.txt 2>/dev/null
70
What is the command that will show system boot time messages? Dmesg Display system boot Echo Lspci Messages
Dmesg
71
Which Linux distribution is used as a basis for the creation of Ubuntu Linux? Debian Linux SUSE Linux Gentoo Linux Red Hat Linux Arch Linux
Debian Linux
72
What is the output of the following command? for token in a b c; do echo -n ${token} done Anbncn $token$token$token A b c Abc {a}{b}{c}
Abc
73
How is it possible to determine if an executable file is a shell script that is ready by Bash? /bin/bash has to be run in debug mode The r bit is set The file must end with .sh The file line starts with #!/bin/bash Scripts are never executable files
The file line starts with #!/bin/bash
74
You have a program called /user/bin/foo. You wish to create a symbolic link, /home/user/bin/foo, that points to it. Which command will do this task? Ln -sys /home/user/foo /user/bin/foo Ln -s /user/bin/foo /home/user/bin/foo Ln /home/user/foo /user/bin/foo Ln /user/bin/foo /home/user/foo Ln --symlink /home/user/foo /user/bin/foo
Ln -s /user/bin/foo /home/user/bin/foo
75
Which of the following commands will output all of the lines that contain either the string Fred or fred? (Select all that apply) Grep -i fred data_file Grep '[f]red' data_file Grep '[Ff]red' data_file Egrep fred data_file Grep -v fred data_file
Grep -i fred data_file Grep '[Ff]red' data_file
76
What are the three sets of permission for a file? Administrator, group, others User, standard user, others User, group, others Administrator, standard user, others
User, group, others
77
A Linux computer has no access to the Internet. Which command displays information about the network gateway for the system? Traceroute Ifconfig Gateway Route Ipconfig
Route
78
79