Linux Essentials Final 2-18 Flashcards

1
Q

Embedded Systems means:

-Businesses cannot charge anything for the software, only the hardware
-Systems designed to do a specific task on hardware optimized for only that purpose
-Users must support the systems themselves
-You can view the software’s source code
-Companies must share their changes

A

Systems designed to do a specific task on hardware optimized for only that purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Linux originally only ran on:

Specialized processor chips
Raspberry Pi computers
Xerox copy machines
Intel 386 PCs
Macintosh

A

Intel 386 PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bundling utilities, management tools, and application software with a Linux kernel is called a:

A text editor
A type of hardware
A distribution of Linux
A trademark

A

A distribution of Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A software release cycle describes:

♦How often the software’s memory is released back to the operating system
♦How often the computer must be rebooted
♦How often upgrades come out for software
♦How often security fixes are implemented
♦How often the computer must be upgraded to support new software

A

How often upgrades come out for software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Apple’s OS X is:
(choose three)

♦Tightly integrated with Apple hardware
♦A fully certified UNIX distribution
♦Primarily used to manage network services
♦Able to natively run Windows binaries
♦Derived from Linux
♦Partially based on code from the FreeBSD project

A

Tightly integrated with Apple hardware

A fully certified UNIX distribution

Partially based on code from the FreeBSD project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microsoft Windows:
(choose three)

♦Offers both desktop and server products
♦Has a short maintenance cycle
♦Has a Linux compatibility mode
♦Is generally backwards compatible with previous versions
♦Has a scripting environment called PowerShell
♦Has a new desktop version every year.

A

Offers both desktop and server products

Is generally backwards compatible with previous versions

Has a scripting environment called PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An interpreted programming language:
(choose two)

♦Takes fewer resources to run than a compiled language
♦Requires a compilation step but no linking step
♦Tends to offer more features than compiled languages
♦Is converted into machine specific instructions as the program runs
Requires a linking step but no compilation step

A

Tends to offer more features than compiled languages

Is converted into machine specific instructions as the program runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The two main families of Linux shells are:
(choose two)

Emacs
Korn shell
Bourne Shell
C Shell
Python Shell

A

Bourne Shell
C Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In virtualization, what are the host and guest?
(choose two)

♦The guest is the machine that runs the virtual machines
♦The terms can be used interchangeably
♦The host is the machine that runs the virtual machines
♦A guest is a virtual machine
♦A host is a virtual machine

A

The host is the machine that runs the virtual machines

A guest is a virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud computing is:

♦Is made possible by faster internet speeds
♦Is useful for both business and home users
♦All are correct
♦Requires fewer resources because systems are shared among many users
♦Allows users in different geographical regions to work together in real time

A

All are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are properties of a strong password?
(choose three)

♦Includes symbols
♦At least 10 characters long
♦A mix of upper and lower case
♦Based on easy to remember items like birthdays
♦Long so that it can be reused on multiple sites

A

Includes symbols
At least 10 characters long
A mix of upper and lower case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A license where you don’t have access to the source code is called:

Closed source
Sourceless
Impaired source
Open source

A

Closed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A copyleft provision in a software license means:

♦You must provide support for your modifications
♦You must provide free copies of the software if you use it
♦You may not link against third party closed source software
♦You give up your copyright to the software
♦If you redistribute the software, you must distribute the source to any changes you make

A

If you redistribute the software, you must distribute the source to any changes you make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Free Software Foundation believes that:
(choose two)

♦Software should be free to modify
♦Software should be free to share
♦No money should ever change hands
♦People should write software with no expectation of making money
♦Software should not have copyright

A

Software should be free to modify
Software should be free to share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does it mean when a work is placed in the public domain?

♦The author has relinquished the copyright on the work
♦The author has died
♦You must redistribute changes to the software
♦You may not use the work for commercial purposes
♦The work was done by a government agency

A

The author has relinquished the copyright on the work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The semicolon (;) can be used to separate multiple commands to be executed in order.
True or False?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To be able to output messages to the screen, use the _______ command:

type
print
display
echo

A

Echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _______ command will print a list of the commands that you’ve previously executed.

history
exec
eval
list

A

history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HOME is an example of _________.

An internal command
An alias
A path variable
A local variable
An environment variable

A

An environment variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The directory where additional documentation for software packages most likely can be found is:

/usr/share/doc
/var/share/doc
/var/lib/doc
/usr/software/doc

A

/usr/share/doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To start searching a man page, the first key you press is:

s
!
/
f

A

/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To get help on using the info command, execute:
(choose two)

help info
man info
info -q
info info

A

man info
info info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _____ command can be used to find any file, not just commands or man pages.

whatis
whereis
apropos
locate

A

locate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hidden files are files that begin with what character?

A dash (-)
A plus (+)
A period (.)
An asterisk (*)

A

A period (.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

he top-level directory on a Linux system is represented as:

C:
/home
/
/root

A

/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ls command without options or arguments…

…lists the contents of the current directory.
…prompts for a directory to list.
…generates an error as this command requires arguments.
…lists the contents of a user’s home directory.

A

…lists the contents of the current directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The command ls -S will sort files:

By size, smallest to largest
By size, largest to smallest
By number of symlinks, largest to smallest
By modification date, newest to oldest

A

By size, largest to smallest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When using the cp command, you must provide both a source and a destination.
True or False?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which option can be used with the rm command to prompt before deleting?

l
-i
A
-P

A

-i

22
Q

Which command would list files that do not begin with a T or a W?

echo /etc/[TW!]
echo /etc/[!TW]

echo /etc/!TW
echo /etc/[*TW]!

A

echo /etc/[!TW]*

22
Q

In general, for which of the following would you want to use lossless compression?

An mp3 audio file
A movie
A JPEG image
A log file
An encrypted email

A

A log file

23
Q

You type gzip myfile.tar. What happens?
(choose two)

♦myfile.tar is removed
♦An error; you forgot to pass the name of the output file
♦myfile.tar is unarchived into the current directory
♦myfile.tar.gz holds a compressed version of myfile.tar
♦An error; you forgot to specify the file with -f

A

myfile.tar is removed

myfile.tar.gz holds a compressed version of myfile.tar

24
Q

Which command will show what is inside the compressed tarball with a name of foo.tar.gz?

tar –tf foo.tar.gz
tar –lf foo.tar.gz
tar –tzf foo.tar.gz
tar –tjf foo.tar.gz
tar –xf foo.tar.gz

A

tar –tzf foo.tar.gz

24
Q

By default, the zip command replaces uncompressed files with compressed files.
True or False?

True
False

A

False

25
Q

Error messages generated by commands are sent where by default?

STDOUT
Log files
STDERR
STDIN

A

STDERR

25
Q

Which of the following commands will display only lines that begin with test?

grep $test* file.txt
grep ^test file.txt
grep &test file.txt
grep *test file.txt

A

grep ^test file.txt

26
Q

Which of the following commands will display lines that contain either start or end?

egrep start end file.txt
egrep (start|end) file.txt
egrep start&end file.txt
egrep ‘start|end’ file.txt

A

egrep ‘start|end’ file.txt

27
Q

A file begins with #!/bin/csh. This means:

♦Nothing, this is a comment
♦This is a Perl script
♦Running the script will invoke /bin/csh to interpret the rest of the file
♦The operator should not be using /bin/csh
♦C Shell compatibility mode is enabled

A

Running the script will invoke /bin/csh to interpret the rest of the file

28
Q

Most of nano’s commands take the form of:

Alt and another character
Control and another character
The F1 through F12 function keys
Mouse clicks
Escape followed by another character

A

Control and another character

29
Q

The if command looks for what exit code to consider a condition to be true?

0
10
255
2
1

A

0

30
Q

The number of users logged in is in a variable called USERS. How would you test to see if there are 5 users logged in?

test –f USERS=5
test $USERS –eq 5
test $USERS = 5
test $USERS –a 5
test $USERS,5

A

test $USERS –eq 5

31
Q

Which of the following are valid partitioning types?
(choose two)

GPT
PC
MBR
BIOS

A

GPT
MBR

32
Q

Software that allows hardware devices to communicate with the installed operating system is called?

Packages
Drivers
Instructions
Programs

A

Drivers

33
Q

Which of the following commands will check hard disk GPT partitions?(choose three)

gdisk
sfdisk
gfdisk
sgdisk
cgdisk

A

gdisk
sgdisk
cgdisk

33
Q

The process (ps) command shows only processes running in the current shell by default.
True or False?

True
False

A

True

34
Q

The free command outputs statistics about:

Disk usage
Memory usage
Software usage
CPU usage

A

Memory usage

34
Q

Which file contains the information passed to the kernel at boot time?

/proc/kernel
/proc/kargs
/proc/kopts
/proc/cmdline

A

/proc/cmdline

34
Q

To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:

/etc/sysinfo.conf
/etc/sysctl.conf
/etc/procctl.conf
/etc/procsys.conf

A

/etc/sysctl.conf

35
Q

Which of the following commands will display the IP address on a Linux system?

dig
ifconfig
route
ipconfig

A

ifconfig

36
Q

The RSA key fingerprint allows the dig command to connect to remote systems.
True or False?

True
False

A

False

36
Q

When issuing the service network restart command, which of the following occurs?

…the networking for the system is stopped and then started back up.
…brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.
…takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.

A

…takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.

37
Q

Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?

route
ss
top
ifconfig

A

ss

37
Q

Which of the following commands will display the groups that the user bob belongs to?

groups -a
group bob
all bob
id bob

A

id bob

37
Q

Traditional UNIX systems allowed users to belong to how many groups?

256
65,000
1
10,000
16

A

16

38
Q

A value of 0 in the “minimum” password aging field means the user cannot change their password.
True or False?

True
False

A

False

39
Q

Sudo privileges allow users to execute commands as another user.
True or False?

True
False

A

True

40
Q

The first line of this command displays how long the system has been running since being rebooted.

getent
id
w
su
who

A

w

40
Q

Which option for the usermod command can be used to specify a user’s group ID (either primary or secondary)?
(choose two)

-G
-s
-S
-g

A

-G
-g

41
Q

The groupmod command can be used to add users to a group.
True or False?

True
False

A

false

41
Q

Which of the following files contains user IDs?

/etc/usr
/etc/shadow
/etc/group
/etc/passwd

A

/etc/passwd

42
Q

Which of the following commands, run as root, will prevent the user bob from logging in?

usermod -D bob
usermod -d bob
usermod -L bob
usermod -l bob

A

usermod -L bob

42
Q

What directory contains a user’s home directory?

/rootfs
/
/home
/user

A

/home

43
Q

GIDs under 500 (or 1000) are usually reserved for what kind of groups?

Administrators
System use
User private groups (UPG)
Are not used for groups, but for user accounts

A

System use

44
Q

A user cannot delete a file if they do not own it. True or False?
True
False

A

False

44
Q

The chown command permits changing group ownership done by root only. True or False?
True
False

A

False

44
Q

Which of the following commands will list hidden files as well as their ownership?

ls -l
ls -z
ls -a
ls -la

A

ls -la

44
Q

Which of the following commands will set setuid for the /usr/bin/program?

chmod 1755 /usr/bin/program
None of the above
chmod 2755 /usr/bin/program
chmod 4755 /usr/bin/program

A

chmod 4755 /usr/bin/program

44
Q

Setting setgid on a directory…

…will set the group owner of all files created in the directory to the group owner of the directory.
…will allow scripts in the directory to be executed as the group owner of the directory.
…does nothing.
…is not allowed by the system.

A

…will set the group owner of all files created in the directory to the group owner of the directory.

44
Q

Deleting a source file will break an associated hard link. True or False?
True
False

A

False

44
Q

Which of the following commands would create a hard link, link to file?

ln link file
ln -s file link
ln -s link file
ln file link

A

ln file link