Chapt 16 Flashcards

1
Q

Within a Linux terminal, you want to see all the files on your system in long format (using the –l option), including any hidden files (which requires the –a option). Which command should you use?

A) ls –a | ls ‐l
B) ls –s; ls ‐l
C) ls ‐la
D) ls –a\ls ‐l

A

ls -la

C. The command ls ‐la will list all the files in a long format. The command ls ‐a | ls‐l will not work. ls ‐s; ls ‐a will show two listings: one with the size and the other with all the files. The ls ‐a\ls ‐l command will show two listings—one with all the files and the other in a long format—but it will not show all the files in a long format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following allows you to see all running programs in macOS?

A) Keychain
B) Mission Control
C) Finder
D) Force Quit

A

Mission Control

B. Mission Control is a quick way on macOS to view what is currently running. Keychain is a tool that saves credentials so that the user does not need to be prompted. The Finder is the macOS equivalent to Windows File Explorer. Force Quit is a function of the macOS for killing a process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As part of your training program, you’re trying to convince users to make backups on a regular basis. Which Apple app can be used to make backups of various types on a regular basis?

A) Time Machine
B) Finder
C) VSS
D) Keychain

A

Time Machine

A. Time Machine is the Apple application that can be used to create backups on a regular basis. The Finder is the macOS equivalent to Windows File Explorer. VSS is a Windows technology that is used to create snapshots of a volume. Keychain is a tool that saves credentials so that the user does not need to be prompted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following Linux commands/utilities can be used to edit a file?

A) ps
B) nano
C) rm
D) ls

A

nano

B. The nano command is used to edit files. The ps command lists processes running. The rm command removes files or directories. The ls command lists files and folders in the filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following Linux commands/utilities can be used to edit an Ethernet connection’s configuration settings?

A) dd
B) apt‐get
C) ip
D) pwd

A

ip

C. The ip command can be used to edit an Ethernet connection’s configuration settings. The dd command is used to duplicate disks. The apt‐get command is used with the APT package management system for downloading packages. The pwd command shows the current working directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a macOS feature for password management?

A) Spotlight
B) Keychain
C) Dock
D) Gestures

A

Keychain

B. Keychain is a tool that saves credentials so that the user does not need to be prompted. Spotlight is a utility in macOS that allows a search of the operating system and Internet for search terms. The Dock is the macOS application menu that is located on the bottom of the screen. Gestures allow you to use more than one finger on the trackpad to perform different functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The interpreter in Linux between the operating system and the user is known as the _______.

A) Shell
B) Translator
C) Login
D) GUI

A

Shell

A. The shell is the interpreter in Linux between the operating system and the user. The translator is a wrong answer. Login is something you perform to access the shell. The graphical user interface (GUI) does not interpret commands and therefore is not considered an interpreter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of backup is kept on site at the computer center for immediate recovery purposes?

A) On‐path attack
B) Cloud copies
C) Journal copies
D) Working copies

A

Working copies
D. Working copies are backups that are kept on site at the computer center for immediate recovery purposes. An on‐path attack is an attack where an eavesdropper listens between two people or devices. Cloud copies are backups that are sent to cloud storage and cannot be immediately recovered. Journal copies is a wrong answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following utilities can be used in Linux to download patches for installation on a workstation?

A) update
B) Shell/terminal
C) apt
D) patch

A

apt

C. The apt utility can be used to download and apply patches to a Linux installation. The update command is not a utility. Shell/terminal is an interface for interacting with the operating system with the command line. The patch command is not a utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following commands can be used to change the owner of a file to a new owner in Linux?

A) cd
B) chmod
C) chown
D) pwd

A

chown

C. The chown command is used to change ownership of a file. The cd command changes the working directory. The chmod command changes permissions on files. The pwd command displays the current working directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Linux utility can be used to check and repair disks?

A) fsck
B) chkdsk
C) du
D) dumgr

A

fsck
A. The fsck Linux utility is used to check and repair disks. The chkdsk utility is a Windows utility used to check and repair disks. The du utility is used to show the current disk usage. dumgr is not a utility and is a wrong answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your iPad has an application that will not stop running. What feature/tool can you use to stop it?

A) kill
B) Force Quit
C) Task Manager
D) Close Quit

A

Force Quit

B. By pressing the Home button twice on an iPad, you can Force Quit an application that will not stop running. The kill utility can be used only at the command line of Linux/macOS. The Task Manager is a Windows utility. Close Quit is not a feature and therefore a wrong answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the most common shell used with Linux?

A) Tcl/Tk
B) Terminal
C) Bash
D) SSH

A

Bash

C. Bash is the most common command‐line shell used with Linux. Tcl/Tk is a shell used with Linux, but it is very uncommon. Terminal is a utility used to access the command‐line shell. SSH, or Secure Shell, is a secure protocol used to access the shell over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name of the area at the bottom of a macOS screen where, by default, a bar of crucial icons appears?

A) Footer
B) Mission Control
C) Taskbar
D) Dock

A

dock

D. The Dock is the area at the bottom of the macOS screen that is used to launch applications. The footer is not a valid answer. Mission Control is a macOS feature that allows you to see all the applications running. The Taskbar is a Windows Desktop element that is used to track running applications and quickly launch them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which key combination can you use to bring up Spotlight from within an app?

A) Control+Shift
B) Option+Tab
C) Command+spacebar
D) Alt+Home

A

Command+spacebar

C. The Command+spacebar key combination will bring up the Spotlight utility. Control+Shift, Option+Tab, and Alt+Home are wrong answers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Linux command can be used to let you run a single command as another user?

A) sudo
B) su
C) passwd
D) ifconfig

A

sudo

A. The sudo command can be used to run a single command as another user. The su command allows you to change user logins at the command line. The passwd command changes the user’s password. The ifconfig command allows you to view and modify the wired network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following Linux commands will show you a list of running processes?

A) ls
B) cat
C) ps
D) su

A

ps

C. The ps command will display a snapshot of the current running processes on a Linux operating system. The ls command will display a listing of files from the working directory. The cat command will display the contents of a file. The su command allows you to change user logins at the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are currently in a Linux terminal session and in the /home/testuser/documents/mail directory. Which command will take you to /home/testuser/documents?

A) cd .
B) cd ..
C) cd . . .
D) cd ∼

A

cd ..

B. The command cd .. will take you one level back from the current working directory. The command cd . will do nothing, because the period signifies the current working directory. The command cd . . . is not a valid command. The command cd ~ will change directories to the home directory of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If the permissions for a file are rwxrw‐r––, what permissions apply for a user who is a member of the group to which the owner belongs?

A) Read, write, and execute
B) Read and write
C) Read only
D) No access

A

Read and write

B. The effective permissions are read and write. From left to right, the permissions are rwx for the user, rw‐ for the group, and r‐‐ for everyone else. Since the user is only a member of the group applied to the file, they will have read and write permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the –p option with mkdir do?

A) Prompts the user before creating files
B) Prompts the user before creating subfolders
C) Creates subfolders as well as folders
D) None of the above

A

Creates subfolders as well as folders

C. The ‐p option on the mkdir command allows subfolders to be created as well as the target folder. All other answers are incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

frequently used applications can be launched in macOS from the _____

A

Dock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____ is used to store backup media in the event the primary location suffers a catastrophe.

A

offsite storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is a valid reason for keeping firmware updated?

A

to patch security holes that may be found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____ is a password management system from apple

A

keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
the _____ macOS utility allows a user to manage stored credentials.
keychain
26
to edit text files, such as configuration files, _____ can be used for backup and cloud storage on apple operating systems.
iCloud
27
the ____ utility on macOS can be used to search for documents and applications
spotlight
28
which macOS feature allows you to view all running applications?
mission control
29
what is a search feature within macOS?
spotlight is a search feature within macOS, and it is represented by the magnifying glass icon in the upper-right corner of the menu bar
30
the ____ command in linux allows you to view the contents of a text file
cat
31
in linux, the ___ allows you to interact with the system at the command line
terminal or command prompt
32
the ____ command allows you to change a user's password in linux
passwd
33
which linux utility can be used with wildcards to find matches for a regular expression in a text file?
grep
34
_____ is a simple text editor for Linux
pico
35
if you type pwd at a linux command line, what will be the result?
the shell will echo back the present working directory
36
if you type passwd at the command prompt in linux, what will be the result
you will be prompted to change your password
37
what linux command do you use to run one command with elevated privileges?
sudo
38
what command can be used in Linux to change the permissions of an existing file?
chmod
39
the chmod Linux command is used to ____
change permissions
40
the ____ Linux command allows you to copy blocks of data from one device to another.
dd
41
the wireless equivalent to the ifconfig command in a linux environment is _____ command.
iwconfig
42
the linux command chmod a+r filename will assign which permissions?
read permissions to all
43
a file on a Linux workstation has the permissions of rw-r-x--x; what are the permissions the user is assigned?
read / write
44
the ____ linux command allows you to view the current working directory.
pwd
45
how can the users access files on a CD or DVD installed on one remote machine in macOS? A) by using spotlight B) by using finder C) by using dock D) by using remote disc
by using remote disc
46
which of these allows the users to provide full disk encryption to prevent unauthorized access to the information contained on the device during startup? A) macOS disk utility B) force quit C) filevault D) snapshot
FileVault allows the users to provide full disk encryption to prevent unauthorized access to the info contained on the device during startup. filevault uses XTS-AES-128 with a 256-bit key
47
john wants to evaluate, test and deploy software updates. which of the following management techniques will he use? A) patch B) change C) asset D) privilege
patch in patch management, software updates are evaluated for their applicability to an environment and then tested in a safe way on non-production systems.
48
which linux command is used to rename a file at the command line? A) cp B) chown C) rd D) mv
mv rd - remove a directory in DOS cp - will copy a file or directory chown - will change the ownership of a file or directory
49
you need to check which applications on macOS have the right to see your photos. which applet in system preferences will show you the information? A) accessibility B) displays C) networks D) security and privacy
security and privacy
50
which linux utility can be used to check and repair disks? A) dumgr B) du C) chkdsk D) fsck
fsck chkdsk - checks and repairs the disk in windows du - used to show the current disk usage dumgr - is not a utility
51
if the permissions for a file are rwxrw-r--, what permissions apply for a user who is a member of the group to which the owner belongs? A) read and write B) read only C) no access D) read, write and execute
read and write rwx for the user rw- for the group r-- for everyone else since the user is only a member of the group applied to the file, they will have read and write permissions.
52
which of the following linux commands helps the users to find files with specific words or phrases? A) cat B) grep C) vi D) ps
grep - used to search for a pattern of text in files and display the results.
53
in which version of the following macOS X versions was the dark mode introduced? A) 10.11 el capitan B) 10.14 mojave C) 10.13 high sierra D) 10.12 sierra
10.14 mojave
54
what does the -p option with mkdir do? A) creates subfolders as well as folders B) prompts the user before creating subfolders C) prompts the user before creating files D) none of these
creates subfolders as well as folders
55
you need to quickly see all of the running applications in macOS. which key sequence should you use? A) mission control key B) command + T C) command control key D) command + spacebar
mission control key
56
which of the following linux commands displays the contents of a file? A) nano B) grep C) cat D) find
cat - displays the contents of a file. it can also be used to concatenate multiple files grep - searches for regular expressions in a text file. nano - is a text based editor for files
57
the interpreter in linux between the OS and the user is known as the ____ A) translator B) login C) GUI D) shell
shell
58
What is the Mac shortcut for opening the applications folder?
Shift + command + A
59
____ backups, sometimes referred to as _____, are partial or full backups that are kept at the computer center for immediate recovery purposes.
Working copy Shadow copy
60
What type of file system includes a log file of all changes and transactions that have occurred within a set. Of time such as the last few hours?
Journaled file system JFS
61
If the operating system takes an increasing amount of time to retrieve files, what should you do?
Defragment hard drive
62
The _____ vulnerability scanner will query The Local Host to see if a patch for a given vulnerability has been applied
nessus
63
What Mac feature allows you to perform a backup of your data to an external drive
Time machine
64
The macOS ___ can be used to create an image of the macOS operating system
Disk utility
65
macOS or Linux terminal command which shows how much disk space is in use
du
66
macOS or Linux terminal command which shows how much disk space is free
df
67
macOS or Linux terminal command which checks and repairs disks
fsck
68
In mac and Linux you can use the ____ command to learn more about any command line utility
man
69
The most popular shell for Linux is?
Bash = Bourne Again Shell
70
VNC
Virtual Network Computing
71
When an application becomes unresponsive in Mac what can you use to close that application?
Force quit
72
What is the Mac shortcut for: force quit?
Option + Command + Esc
73
___ allows you to configure disk level encryption to protect your files in the event the device is lost (Mac)
FileVault
74
The ___ feature allows you to customize macOS to support requirements such as vision, hearing, or motor skills.
Accessibility
75
What allows you to see all the applications running on one screen on Mac OS?
Mission Control
76
What is the password management system from Apple called?
Keychain
77
The search feature within macOS is called?
Spotlight
78
What lets you browse through files and folders in macOS?
Finder
79
In command line, in Linux, what would you use to search for a name in a password file?
grep ''John Doe'' /etc/passwd
80
What Linux command displays the content of a file?
cat
81
What Linux command changes file permissions?
chmod
82
What Linux command changes the file owner and group?
chown
83
What command deletes a file in Linux terminal?
rm
84
What Linux command displays the current directory?
pwd
85
A Linux text based editor for files is called?
Nano
86
Linux command for the DNS query utility?
dig
87
Linux command to display a list of current running processes
ps
88
Linux terminal command to terminate a process
Kill
89
In Linux a group of packages that are available for download is called a?
Repository
90
What package manager is used to update and install packages for red hat-based Linux distributions, such as red hat Enterprise server, fedora, CentOS?
YUM yellowdog updater modified
91
Linux command to change the current directory to your home directory
cd ~
92
____ Indicates the current directory, whereas ____ indicates the parent directory
. Current .. Parent
93
rwx --- --- Controls the read/wright and execute permissions of the?
Owner
94
--- rwx --- Controls the read/wright and execute permissions of?
Any user belonging to that file's group
95
rwxr--r-- Makes the file readable by?
Everyone
96
chmod a+r * Will do what?
Gives everyone read access to all the files in a directory
97
chmod a+x password.file Will do what?
Permit everyone to execute the specific file
98
To copy the entire contents of a directory, including all subdirectories and their contents, to another directory use the command?
cp - ar sourcedir destdir
99
To view the contents of a file use what command?
Cat
100
To create an entire directory tree use what command?
mkdir -p /usr/src/book/java/examples/applets
101
What command will remove an empty directory tree?
rmdir -p /usr/src/book/java This command removes the empty parent directories of applets. The command stops when it encounters a directory that is not empty
102
What is the Linux command to see the status of the IP configuration?
ifconfig
103
What Linux command can be used to view the state of the wireless network?
iwconfig You can view such important information as the link quality, access point Mac address, data rate, and encryption keys
104
What tools in windows and Linux have become an adopted standard for name resolution testing?
Windows: nslookup Linux: dig ( domain information grouper)