CH 1 - 18 Comprehensive Final Flashcards
Embedded Systems means?
Companies must share their changes
You can view the software source code
Business cannot change anything for the software, only the hardware
Systems designed to do a specific task on hardware optimized for only that purpose
Users must support the system themselves.
Systems designed to do a specific task on hardware optimized for only that purpose.
Linux originally only ran on?
Xerox Copy Machines Specialized processor chips Intel 386 PCs Raspberry Pi Computers Macintosh
Intel 386 PCs
Building utilities, management tools, and application software with a Linux Kernel is called a?
A Trademark
A Distribution of Linux
A Type of Hardware
A Text Editor
A Distribution of Linux
A Software Release cycle describes?
How often security fixes are implemented
How often the software’s memory is released back to the operating system
How often upgrades come out for software
How often the computer must be rebooted
How often the computer must be upgraded to support new software.
How often upgrades come out for software.
Apple’s OS X is? (Choose Three)
A fully certified UNIX distro
Tightly integrated with Apple hardware
Partially based on code from the FreeBSD Project
Primarily used to manage network services
Derived from Linux
Able to natively run Windows binaries
A fully certified UNIX distro
Tightly integrated with Apple hardware
Partially based on code from the FreeBSD Project
Microsoft Windows? (Choose Three)
Is generally backwards compatible with previous versions.
Offers both desktop and server products
Has a Linux compatibility mode
Has a short maintenance cycle.
Has a scripting environment called PowerShell
Has a new desktop version every year.
Is generally backwards compatible with previous versions.
Offers both desktop and server products
Has a scripting environment called PowerShell
An Interpreted programming language? (Choose Two)
Requires a compilation step but no linking step.
Is converted into Machine Specific instructions as the program runs.
Tends to offer more features than compiled languages.
Requires a linking step but no compilation step.
Takes fewer resources to run than a compiled language.
Is converted into Machine Specific instructions as the program runs.
Tends to offer more features than compiled languages.
The two main families of Linux shells are? (Choose Two)
Bourne Shell Python Shell Korn Shell Emacs C Shell
Bourne Shell
C Shell
In Virtualization, what are the host and guest? (Choose Two)
The host is the machine that runs the virtual machines.
The guest is the machine that runs the Virtual machines.
The terms can be used interchangeably
A host is a Virtual Machine
A Guest is a Virtual Machine
The host is the machine that runs the Virtual Machines.
A Guest IS the Virtual Machine
Cloud Computing is?
Requires fewer resources because systems are shared among many users.
Allows users in different geographical regions to work together in real time.
Is made possible by faster internet speeds.
Is useful for both business and home users.
All of the Above
All of the Above
Which of the following are properties of a Strong Password? (Choose Three)
Based on easy to remember items like birthdays.
Long so that it can be reused on multiple sites.
Includes Symbols
At least 10 characters long.
A Mix of Upper and Lower Case.
Includes Symbols
At least 10 characters long.
A Mix of Upper and Lower Case.
A license where you don’t have access to the source code is called?
Sourceless
Impaired Source
Open Source
Closed Source
Closed Source
A Copy left provision in a software license means?
You must provide support for your modifications.
You may not link against third party closed source software
If you redistribute the software, you must distribute the source to any changes you make.
You must provide free copies of the software if you use it.
You give up your copyright to the software.
If you redistribute the software, you must distribute the source to any changes you make.
The Free Software Foundation believes that? (Choose Two)
Software should be free to modify. People should write software with no expectation of making money. Software should not have a Copyright. Software should be free to Share. No money should ever change hands.
Software should be free to Modify.
Software should be free to Share.
What does it mean when a work is placed in the public domain?
The work was done by a government agency.
You may not use the work for commercial purposes.
The author has died.
The author has relinquished the Copyright on the work.
You may redistribute changes to the software.
The author has relinquished the Copyright on the work.
The semicolon (;) can be used to separate multiple commands to be executed in order.
True
False
True
To be able to output messages to the screen, use the _______ Command?
Print
Echo
Display
Type
Echo
The ______ command will print a list of the commands that you’ve previously executed?
list
eval
exec
history
history
Home is an Example of?
A path variable A local variable An environment variable An Alias An internal command
An environment variable.
The directory where additional documentation for software packages most likely can be found is?
/var/share/doc
/var/lib/doc
/usr/software/doc
/usr/share/doc
/usr/share/doc
To start searching a man page, the first key you press is?
f
s
/
!
/
To get help using the info command, execute? (Choose Two)
man info
help info
info -q
info info
man info
info info
The ______ command can be used to find any file not just commands or man pages?
whatis
locate
whereis
apropos
locate
Hidden files are files that begin with what character?
An Asterisk (*) A Period (.) A Plus (+) A Dash (-)
A Period (.)
The Top-Level directory on a Linux system is represented as?
/home
/root
/
C:
/
The Is command without options or arguments?
prompts for a directory to list
lists the contents of the current directory
lists the contents of the user’s home directory.
generates an error as this command requires arguments.
lists the contents of the current directory
The command Is -S will sort files?
By size, smallest to largest
By modification date, newest to oldest
By number of symlinks, largest to smallest
By size, largest to smallest
By size, largest to smallest.
When using the cp command, you must provide both a source and a destination?
True
False
True
Which option can be used with the rm command to prompt before deleting?
I
A
-P
-j
-j
Which command list files that do not begin with a “T” or a “W”?
echo /etc/[!TW]*
echo /etc/[TW]!
echo /etc/!TW
echo /etc/[TW!]
echo /etc[!TW]*
In general, for which of the following would you want to use lossless compression?
A JPEG Image A Log File An Encrypted Email A Movie An MP3 Audio File
A Log File
You type gzip myfile.tar - What happens? (Choose Two)
An error, you forgot to specify the file with -f
myfile.tar is unarchived into the current directory
myfile.tar is removed
An error; you forgot to pass the name of the output file.
myfile.tar.gz holds a compression version of myfile.tar
myfile. tar is removed
myfile. tar.gz holds a compression version of myfile.tar
Which command will show what is inside the compressed tarball with a name of foo.tar.gz?
tar -tf foo.tar.gz tar -tzf foo.tar.gz tar -xf foo.tar.gz tar -If foo.tar.gz tar -tif foo.tar.gz
tar -tzf foo.tar.gz
By default, the zip command replaces compressed files with compressed files?
True
False
True
Error messages generated by commands are sent where by default?
STDIN
Log Files
STDOUT
STDERR
STDERR
Which of the following commands will display only lines that begin with Test?
grep test file.txt
grep &test file.txt
grep $test file.txt
grep ^test file.txt
grep ^test file.txt
Which of the following commands will display lines that contain either start or end?
egrep ‘start|end’ file.txt
egrep start end file.txt
egrep start&end file.txt
egrep (start|end) file.txt
egrep ‘start|end’ file.txt
A file begins with #!/bin/csh means?
This is a Perl script
The operator should not be using /bin/csh
C Shell compatibility mode is enabled
Running the script will invoke /bin/csh to interpret the rest of the file.
Nothing, this is a comment
Running the script will invoke /bin/csh to interpret the rest of the file.
Most of nano’s commands take the form of?
Alt and another character Escape followed by another character The F1 through F12 function keys Mouse clicks Control and another Character
Control and another Character.
The if command looks for what exit code to consider a condition to be true?
255 0 2 1 10
0
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
test $USERS -eq 5 test $USERS,5 test -f USERS=5 test $USERS = 5 test $USERS -a5
test $USERS -eq 5
Which of the following are valid partitioning types? (Choose Two)
PC
MBR
BIOS
GPT
MBR
GPT
Software that allows hardware devices to communicate with the installed operating system is called?
Instructions
Drivers
Packages
Programs
Drivers
Which of the following commands will check hard disk GPT partitions? (Choose Three)
sfdisk sgdisk gfdisk gdisk cgdisk
sgdisk
gdisk
cgdisk
The process (ps) command shows only processes running in the current shell by default?
True
False
True
The free command outputs statistics about?
Memory Usage
Disk Usage
Software Usage
CPU Usage
Memory Usage
Which file contains the information passed to the kernal at boot time?
/proc/kernel
/proc/kopts
/proc/kargs
/proc/cmdline
/proc/cmdline
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it?
/etc/sysinfo.conf
/etc/sysctl.conf
/etc/procctl.conf
/etc/procsys.conf
/etc/sysctl.conf
Which of the following commands will display the IP address on a Linux System?
ifconfig
route
ipconfig
dig
ifconfig
The RSA key fingerprint allows the dig command to connect to remote systems?
True
False
False
When issuing the Service Network Restart command, which of the following occurs?
Takes down all network interfaces, re-reads all related configuration files, and then the network for the system is restarted.
The networking for the system is stopped and then started back up.
Brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.
Takes down all network interfaces, re-reads all related configuration files, and then the network for the system is restarted.
Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?
route
ss
ifconfig
top
ss
Which of the following commands will display the groups that the user bob belongs to?
group bob
all bob
id bob
groups -a
id bob
Traditional UNIX systems allowed users to belong to how many groups?
65,000 10,000 1 256 16
16
A Value of 0 in the minimum password aging field means the user cannot change their password?
True
False
False
SUDO privileges allow users to execute commands as another user?
True
False
True
The first line of this command displays how long the system has been running since being rebooted?
id getent who w su
w
Which option for the usermod command can be used to specify a user’s group ID? (Either Primary or Secondary)? (Choose Two)
- g
- S
- s
- G
- g
- G
The groupmod command can be used to add users to a group?
True
False
False
Which of the following files contains user IDs?
/etc/passwd
/etc/shadow
/etc/group
/etc/usr
/etc/passwd
Which of the following commands, run as root, will prevent the user bob from logging in?
usermod -L bob
usermod -D bob
usermod -d bob
usermod -I bob
usermod -L bob
What directory contains a user’s home directory?
/rootfs
/user
/
/home
/home
GIDs under 500 (or 1000) are usually reserved for what kind of groups?
Are not used for groups, but for user accounts.
Admins
User private groups (UPG)
System Use
System Use
A user cannot delete a file if they do not own it?
True
False
False
The chown command permits changing group ownership done by root only?
True
False
False
Which of the following commands will list hidden files as well as their ownership?
ls -a
ls -z
ls -l
ls -la
ls -la
Which of the following commands will set setuid for /user/bin/program?
chmod 1755 /user/bin/program
chmod 4755 /usr/bin/program
chmod 2755 /usr/bin/program
None of these.
chmod 4755 /usr/bin/program
Setting setgid on a directory?
will allow scripts in the directory to be executed as the group owner of the directory.
will set the group owner of all files created in the directory to the group owner of the directory.
is not allowed by the system
does nothing
will set the group owner of all files created in the directory to the group owner of the directory.
Deleting a source file will break an associated hard link?
True
False
False
Which of the following commands would create a hard link, link to file?
In file link
In -s link file
In link file
In -s file link
In file link