Final Comprehensive Exam Flashcards

1
Q

Ambedded system means:

a) Businesses cannot charge anything for the software, only the hardware

b) Systems designed to do a specific task on hardware optimized for only that purpose

c) Users must support the systems themselves

d) You can view software’s source code

e) Companies must share their changes

A

b) Systems designed to do a specific task on hardware optimized for only that purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Linux originally only ran on:

a) Specialized processor chips

b) Raspberry Pi computers

c) Xerox copy machines

d) Intel 386 Pcs

e) Macintosh

A

d) Intel 386 PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Building utilities, management tools, and application software with a Linux kernel is called a:

a) A text editor

b) A type of hardware

c) A distribution of Linux

d) A trademark

A

c) A distribution of Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A software release cycle describes:

a) How often the software’s memory is released back to the operating system

b) How often the computer must be rebooted

c) How often upgrades come out for software

d) How often security fixer are implemented

f) How often the computer must be upgraded to support new software

A

c) How often upgrades come out of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Apple’s OS X is [3]:

a) Tightly integrated with Apple hardware

b) A fully certified UNIX distribution

c) Primarily used to manage network devices

d) Able to natively run Windows binaries

e) Derived from Linux

f) Partially based on code from the FreeBSD

A

a) Tightly integrated with Apple hardware

b) A fully certified UNIX distribution

f) Partially based on code from the FreeBSD project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microsoft Windows [3]:

a) Offers both desktop and server products

b) Has a short maintenance cycle

c) Has a Linux compatibility mode

d) Is generally backwards compatible with previous versions

e) Has a scripting environment called PowerShell

f) Has a new desktop version every year

A

a) Offers both desktop and server products

d) Is generally backwards compatible with previous versions

e) Has a scripting environment called PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An interpreted programming language [2]:
a) Takes fewer resources to run than a compiled langauge
b) Requires a compilation step but no linking step
c) Tends to offer more features than compiled langauges
d) Is converted into machine specific instructions as the program runs
e) Requires a linking step but no compilation step

A

c) Tends to offer more features than compiled langauges
d) Is converted into machine specific instructions as the program runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The two main families of Linux shells are [2]:
a) Emacs
b) Korn Shell
c) Bourne Shell
d) C Shell
e) Python Shell

A

c) Bourne Shell
d) C Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In virtualization, what are the host and guest? [2]
a) The guest is the machine that runs the virtual machine
b) The terms can be used interchangeably
c) The host is the machine that runs the virtual machines
d) A guest is a virtual machine
e) A host is a virtual machine

A

c) The host is the machine that runs the virtual machines
d) A guest is a virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud computing is:
a) Is made possible by faster internet speeds
b) Is useful for both business and home users
c) All are correct
d) Requires fewer resources because systems are shared among many users
e) Allows users in different geographical regions to work together in real time

A

c) All are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are properties of a strong password? [3]
a) Includes symbols
b) At least 10 characters long
c) A mix of upper and lower case
d) Based on easy to remember items like birthdays
e) Long so that it can be on multiple lines

A

a) Inlcudes symbols
b) At leasst 10 characters long
c) A mix of upper and lower case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A license where you don’t have acces to the source code is called:
a) Closed source
b) Sourceless
c) Impaired source
d) Open source

A

a) Closed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A copyleft provision in a software license means:
a) You must provide support for your modifications
b) You must provide free copies of the software if you use it
c) You may not link against third party closed source software
d) You give up your copyright to the software
e) If you redistribute the software, you must distribute the source to any changes you make

A

e) If you redistribute the software, you must distribute the source to any changes you make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Free Software Foundation believes that [2]:
a) Software should be free to modify
b) Software should be free to share
c) No money should ever change hands
d) People should write software with no expectation of making money
e) Software should not have copyright

A

a) Software should be free to modify
b) Software should be free to share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does it mean when a work is placed in the public domain?
a) The author rellinquished the copyright on the work
b) The author has died
c) You must redistribute changes to the software
d) You may not use the work for commercial purposes
e) The work was done by a goverment agency

A

a) The author rellinquished the copyright on the work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The semicolon (;) can be used to separate multiple commands to be executed in order.
True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To be able to output messages to the screen, use the ____ command:
a) type
b) print
c) display
d) echo

A

d) echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ____ command will print a list of the commands that you’ve previously executed
a) history
b) exec
c) eval
d) list

A

a) history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HOME is an example of ____.
a) An internal command
b) An alias
c) A path variable
d) A local variable
e) An evnironment variable

A

e) An environment variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The directory where additional documentation for software packages most likely can be found is:
a) /usr/share/doc
b) /var/share/doc
c) /var/lib/doc
d) /usr/software/doc

A

a) /usr/share/doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To start searching a man page, the first key you press is:
a) s
b) !
c) /
d) f

A

c) /

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To get help on using the info comamnd, execute [2]:
a) help info
b) man info
c) info -q
d) info info

A

b) man info
d) info info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ____ command can be used to find any file, not just commands or man pages.
a) whatis
b) whereis
c) aprops
d) locate

A

d) locate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hidden files are files that begin with what character?
a) A dash (-)
b) A plus (+)
c) A period (.)
d) An asrerisk (*)

A

c) A period (.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The top-level directory on a Linux system is represented as:
a) C:
b) /home
c) /
d) /root

A

c) /

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The ls command without options or arguments…
a) …lists the contents of the current directory.
b) …prompts for a directory to list.
c) …generates an error as this command requires arguments.
e) …lists the contents of a user’s home directory.

A

a) …lists the contents of the current directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The command ls -S will sort files:
a) By size, smallest to largest
b) By size, largest to smallest
c) By number of symlinks, largest to smallest
d) By modification date, newest to oldest

A

b) By size, largest to smallest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When using the cp command, you must provide both a source and a destination.
True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which option can be used with the rm command to prompt before deleting?
a) l
b) -i
c) A
d) -P

A

b) -i

30
Q

Which command would list files that do not begin with a T or a W?
a) echo /etc/{asteriks})[TW!]
b) echo /etc/[!TW]{asteriks}
c) echo /etc/!TW
d) echo /etc/[{asteriks}TW]!

A

b) echo /etc/[!TW]{asteriks}

31
Q

In general, for which of the following would you want to use lossles compression?
a) An mp3 audio file
b) A movie
c) A JPEG image
d) A log file
e) An encrypted email

A

d) A log file

32
Q

You type ‘gzip myfile.tar’. What happens? [2]
a) myfile.tar is removed
b) An error; you forgot to pass the name of the output file
c) myfile.tar is unarchived into the current directory
d) myfile.tar.gz holds a compressed version of myfile.tar
e) An error; you forgot to specify the file with -f

A

a) myfile.tar is removed
d) myfile.tar.gz holds a compressed version of myfile.tar

33
Q

Which command will show what is inside the compressed tarball with a name of foo.tar.gz?
a) tar -tf foo.tar.gz
b) tar -lf foo.tar.gt
c) tar -tzf foo.tar.gz
d) tar -tjf foo.tar.gz
e) tar -xf foo.tar.gz

A

c) tar -tzf foo.tar.gz

34
Q

By default, the zip command replaces uncompressed files with compressed files.
True or False?

A

False

35
Q

Error messages generated by commands are sent where by defailt?
a) STDOUT
b) Log files
c) STDERR
d) STDIN

A

c) STDERR

36
Q

Which of the following commands will display only lines that begin with test?
a) grep $test{asteriks} file.txt
b) grep ^test file.txt
c) grep &test file.txt
d) grep {asteriks}test file.txt

A

b) grep ^test file.txt

37
Q

Which of the following commands will display lines that contain either start or end?
a) egrep start end file.txt
b) egrep (start|end) file.txt
c) egrep start&end file.txt
d) egrep ‘start|end’ file.txt

A

d) egrep ‘start|end’ file.txt

38
Q

A file begins with #!/bing/csh. This means:
a) Nothing, this is a comment
b) This is a Peri script
c) Running the script will invoke /bin/csh to interpret the rest of the file
d) The operator should not be using /bin/csh
c) C Shell compatibility mode is enabled

A

c) Running the script will invoke /bin/csh to interpret the rest of the file

39
Q

Most of nano’s commands take the form of:
a) Alt and another character
b) Control and another character
c) The F1 through F12 function keys
d) Mouse clicks
e) Escape followed by another character

A

b) Control and another character

40
Q

The if command looks for what exit code to consider a condition to be true?
a) 0
b) 10
c) 255
d) 2
e) 1

A

a) 0

41
Q

The number of users logged in is in a variable called USERS. How would you test to see if there are 5 users logged in?
a) test -f USERS=5
b) test $USERS -eq 5
c) test $USERS =5
d) test $USERS -a 4
e) test $USERS,5

A

b) test $USERS -eq 5

42
Q

Which of the following are valid partitioning types? [2]:
a) GPT
b) PC
c) MBR
d) BIOS

A

a) GTP
c) MBR

43
Q

Software that allows hardware devices to communicate with the installed operating system is called?
a) Packages
b) Drivers
c) Instructions
d) Programs

A

b) Drivers

44
Q

Which of the following commands will check hard disk GPT partitions? [3]
a) gdisk
b) sfdisk
c) gfdisk
d) sgdisk
e) cgdisk

A

a) gdisk
d) sgdiks
e) cgdisk

45
Q

The process (ps) command shows only processes running in the current shell by default.
True or False?

A

True

46
Q

The free command outputs statistics about:
a) Disk usage
b) Memory usage
c) Software usage
d) CPU usage

A

b) Memory usage

47
Q

Which file contains the information passed to the kernel at boot time?
a) /proc/kernel
b) /proc/kargs
c) /proc/kopts
d) /proc/cmdline

A

d) /proc/cmdline

48
Q

To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
a) /etc/sysinfo.conf
b) /etc/sysctl.conf
c) /etc/procctl.conf
d) /etc/procsys.conf

A

b) /etc/sysctl.conf

49
Q

Which of the following commands will display the IP address on a Linux system?
a) dig
b) ifconfig
c) route
d) ipconfig

A

b) ifconfig

50
Q

The RSA key fingerprint allows the dig command to connect to remote systems.
True or False?

A

False

51
Q

When issuing the service network restart command, which of the following occurs?
a) …the networking for the system is stopped and then started back up
b) …brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.
c) …takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted

A

c) …takes down all network interfaces, re-reads all related configuration files and then the netwroking for the system is restarted.

52
Q

Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?
a) route
b) ss
c) top
d) ifconfig

A

b) ss

53
Q

Which of the following commands will display the groups that the user bob belongs to?
a) groups -a
b) group bob
c) all bob
d) id bob

A

d) id bob

54
Q

Traditional UNIX systems allowed users to belong to how many groups?
a) 256
b) 65000
c) 1
d) 10 000
e) 16

A

e) 16

55
Q

A value of 0 in the “minimum” password aging field means the user cannot change their password.
True or False?

A

False

56
Q

Sudo privileges allow users to execute commands as another user.
True or False?

A

True

57
Q

The first line of this command displays how long the system has been running since being rebooted.
a) getent
b) id
c) w
d) su
e) who

A

c) w

58
Q

Which option for the usermod command can be used to specify a user’s group ID (either primary or secondary)? [2]
a) -G
b) -s
c) -S
d) -g

A

a) -G
d) -g

59
Q

The groupmod command can be used to add users to a group.
True or False?

A

False

60
Q

Which of the following files conatins user IDs?
a) /etc/usr
b) /etc/shadow
c) /etc/group
d) /etc/passwd

A

d) /etc/passwd

61
Q

Which of the following commands, run as root, will prevent the user bob from logging in?
a) usermod -D bob
b) usermod -d bob
c) usermod -L bob
d) usermod -l bob

A

c) usermod -L bob

62
Q

What directory contains a user’s home directory?
a) rootfs
b) /
c) /home
d) /user

A

c) /home

63
Q

GIDs under 500 (or 1000) are usually reserved for what kind of groups?
a) Administrators
b) System use
c) User private groups (UPG)
d) Are not used for groups, but for user accounts

A

b) System use

64
Q

A user cannot delete a file if they do not own it.
True or False?

A

False

65
Q

The chown command permits changing group ownership done by root only.
True or False?

A

False

66
Q

Which of the following commands will list hidden files as well as their ownership?
a) ls -l
b) ls-z
c) ls -a
d) ls -la

A

d) ls -la

67
Q

Which of the following commands will set setuid for the /usr/bin/ program?
a) chmod 1755 /usr/bin/program
b) None of the aboce
c) chmod 2755 /usr/bin/program
d) chmod 4755 /usr/bin/program

A

d) chmod 4755 /usr/bin/program

68
Q

Setting setgid on a directory…
a) …will set the group owner of all files created in the directory to the group owner of the directory.
b) …will allow scripts in the directory to be executed as the group owner of the directory
c) …does nothing.
d) …is not allowed by the system.

A

a) …will set the group owner of all files created in the directory to the group owner of the directory

69
Q

Deleting a source file will break an associated hard link.
True or False

A

False

70
Q

Which of the following commands would create a hard link to file?
a) ln link file
b) ln -s file link
c) ln -s link file
d) ln file link

A

d) ln file link