Linux - Professsion - Quiz Flashcards

1
Q

Which one of the following statements concerning Linux passwords is true?
All passwords can be decrypted using the system administrator’s master password
Passwords may never start with a non-letter
Passwords are only stored in encrypted form
Users cannot change their password once it has been set
Passwords may be at most six characters long

A

Passwords are only stored in encrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following commands are used to view real-time memory usage (Choose two correct answers).

Nice
Top
Ps
Free
Memory

A

Top
Free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the number called that is used to identify a process?

Proc Num
PIN
Process Entry
PID

A

PID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When typing a long command line at the shell, what single character can be used to split a command across multiple lines?

A

\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a new user is added, where does the user ID get stored?

/etc/realm
/etc/users
/etc/passwd
/etc/shpasswd
/etc/pass

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What permissions are set on a file with the command chmod 654 file.txt?

-rwxrw–x
–wxr-x–x
Drw-r-xr–
D–wxr-x–
-rw-r-xr–

A

-rw-r-xr–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How could one search for the file foo.txt under the directory /home?

Find /home foo.txt
Search /home foo.txt
Find /home -file foo.txt
Search /home -file foo.txt
Find /home -name foo.txt

A

Find /home -name foo.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Given the following directory permissions:

drwxrwxrwt 14 root 36864 2012-03-02 11:17 tmp
What is the letter t at the end of drwxrwxrwt indicate?
It is the sticky bit that causes all commands in this directory to be launched as a root.
It makes the directory accessible for everybody.
It indicates that this directory contains only temporary files that may be deleted.
It means that even though the directory is global writable only the owner can delete their own files.
It is a temporary bit that prevents launching commands in this directory

A

It means that even though the directory is global writable only the owner can delete their own files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following Linux distributions use the dpkg package management system? (Choose two correct answers)

Debian
Mandriva
Suse
Red Hat
Ubuntu

A

Debian
Ubuntu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following file systems is most commonly used for Linux distributions?

Ext4
HFS+
NTFS
FAT32

A

Ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following commands will display a list of all files in the current directory, including those that may be hidden?

Ls -h
Ls –a
Ls –hidden
Ls -a

A

Ls -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following directories is often used to store log files?

/usr
/home
/var
/temp
/dev

A

/var

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following Ubuntu releases is considered most stable and fit to use for business purposes?

LTS
Xubuntu
Kubuntu
Xubuntu Server
Ubuntu Vanilla

A

LTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command shows if /usr/bin is in the current shell search path?

Echo $PATH
Echo %PATH%
Cat PATH
Cat %PATH

A

Echo $PATH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While deleting all files beginning with the letter a there was still the file Access.txt left. Assuming that it had the correct ownership, why was it not deleted?

Rm had to be called with the option -R to delete all files
Files with extensions need a different treatment
Linux file names are case sensitive
The file Access.txt was probably opened by another application
The file Access.txt was hidden

A

Linux file names are case sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following software packages is an email server?

Apache
Thunderbird
Postfix
GIMP
MySQL

A

Postfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is true about open source software?

The freedom to redistribute copies must include binary or executable forms of the software but not the source code.
Open source software is available for commercial use
Open source software can not be copied for free
Open source software is not for sale

A

Open source software is available for commercial use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following commands can be used to extract files from an archive?

Tar -evf
Tar -vf
Tar -e
Tar -v
Tar -xvf

A

Tar -xvf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following will change the group that is associated with a file?

Chown
Chmod -w
Chmod
Ls -g

A

Chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which function does a shell program serve?

It is responsible for logging a user into the system
It provides a graphical environment
It receives user commands and executes them
It is responsible for establishing a connection to another computer

A

It receives user commands and executes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command will display running process information in realtime?

Top
Show current
Ps current
Process

A

Top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following programs is not a graphical web browser?

Opera
Chrome
Firefox
Konqueror
Links

A

Links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which command will archive /home and its content to /mnt/backp? Choose two correct answers.

Sync -r /home /mnt/backp
Mv /home /mnt/backp
Cp -ar /home /mnt/backp
Copy -r /home /mnt/backp
Tar -cf /mnt/backup/archive.tar /home

A

Cp -ar /home /mnt/backp
Tar -cf /mnt/backup/archive.tar /home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following applications are used to play an MP3 file on a Linux system? Choose three answers

Banshee
Audacious
Amarok
Xara Xtreme
LibreOffice Player

A

Banshee
Audacious
Amarok

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which commands provide help for a specific Linux command? (Choose two answers).

Whatdoes
Info
Man
Helpme
Ask

A

Info
Man

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does LAMP mean?

Short for Lightweight Access Management Protocol which synchronizes permission in a network
The bus ID of an attached USB device that emits light
The Linux Advanced Mode Programming Interface which gives advanced capabilities to application developers
The combination of Linux, Apache, MySQL, and PHP and other programming languages
Short for lamport-clock which is important in distributed network computing

A

The combination of Linux, Apache, MySQL, and PHP and other programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which network interface always exists in a Linux system?

Wlan0
Vlan0
Sit0
Lo
Eth0

A

Lo

The network interface “lo” always exists in a Linux system. “lo” stands for loopback and it is a virtual network interface that allows network communication within the same machine. It is used for testing and troubleshooting network configurations, as well as for accessing local services without the need for an external network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following statements may be used to access the second command line argument to a script?

“$1”
$1
“ARG$2”
“$2”

A

“$2”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which command displays the list of groups to which a user belongs?

Whoami
Isgroup
Who
Id

A

Id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the usual absolute path of the personal directory for the user foo?

A

/home/foo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following commands moves the directory ~/summer-vacation and its content to ~/vacation/2011?

Move -R ~/summer-vacation ~/vacation/2011
Mv -R ~/summer-vacation ~/vacation/2011
Mv ~/summer-vacation ~/vacation/2011
Mv /home/summer-vacation /home/vacation/2011
Mv ~/vacation/2011 ~/summer-vacation

A

Mv ~/summer-vacation ~/vacation/2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which permissions should be given to a file that needs to be opened and edited by the file’s owner and opened read-only by the file’s group?

0540
0444
0640
0751
0466

A

0640

33
Q

Which of the following commands will set the variable text to olaf is home? (Select two answers)

Text==’olaf is home’
Text==”olaf is home”
Text=’olaf is home’
Text=$olaf is home
Text=”olaf is home”

A

Text=’olaf is home’
Text=”olaf is home”

34
Q

Which command would you use to get comprehensive documentation about any command in Linux?

Echo command
Locate command
Get command
Help command
Man command

A

Man command

35
Q

The output of the program date should be saved in the variable actdat. What is the correct statement?

Date > $actdat
Set actdat=’date’
Date | acdat
Actdat=$(date)
Actdat=date

A

Actdat=$(date)

36
Q

The following file is found in which system file?root:x:0:0::/root:/bin/bash

/usr/bin/shadow
/etc/passwd
/etc/password
/etc/shadow
/etc/user.cong

A

/etc/passwd/

The correct answer is /etc/passwd. This file is found in the system file directory and contains essential information about user accounts on the system, such as usernames, user IDs, group IDs, home directories, and default shells. It is a plain text file that can be accessed by privileged users and some system processes for authentication purposes.

37
Q

What is the output of the following command? tail -n 20 test.txt

The last 20 lines of test.txt omitting the blank lines
The last 20 lines of test.txt with line numbers
The first 20 lines of test.txt
The last 20 lines of test.txt including the blank lines

A

The last 20 lines of test.txt including the blank lines

38
Q

Which statement about the directory /etc/skel are correct? (Choose two answers)

The directory contains a default set of configuration files used by the useradd command
The directory contains the global settings for the Linux system
The personal settings of root are in this directory
The files from the directory are copied to the home directory of the new user when the account is created
The files from the directory are copied to the home directory of the new user when starting the system

A

The directory contains a default set of configuration files used by the useradd command

The files from the directory are copied to the home directory of the new user when the account is created

39
Q

Which of the following files holds the definition of the local user accounts?

/etc/users
/etc/id
/etc/secret
/etc/home
/etc/passwd

A

/etc/passwd

40
Q

Which of the following commands increases the number of elements in a directory (choose two answers)

Create newfile
Touch newfile
Rmdir newdirectory
Mkdir newdirectory
Ls newfile

A

Touch newfile
Mkdir newdirectory

41
Q

Why is the file data.txt empty after executing sort data.txt > data.txt?

Because sort detects that both files are the same
Because sort cannot sort text files, only binary files
Because the file gets truncated before the sort is executed
Because, if data.txt is empty now, it must have been empty before

A

Because the file gets truncated before the sort is executed

42
Q

What keyword is missing from the following segment of the shell script?
for i in*;—-cat $idone

Endo
Fi
Do
Then
Run

A

Do

43
Q

Which command is used to make a shell variable known to subsequently executed programs?

Env
Transfer
Announce
Export
Mv

A

Export

44
Q

Which of the following answers are true for cloud computing? (Choose two correct answers)

Cloud Computing provides new tools to manage IT resources
Cloud Computing implies sharing all information with everyone else in ‘the cloud’
Cloud Computing is the opposite of the Green IT; i.e., the use of fossil non-regenerative energy for computing
From the business perspective, Cloud Computing means outsourcing or centralization of IT operations

A

Cloud Computing provides new tools to manage IT resources

From the business perspective, Cloud Computing means outsourcing or centralization of IT operations

45
Q

Which of the following is a requirement of the GPL license but not the BSD license?

The GPL license forbids the removal of the copyright and license notices from the source code files that are distributed.
The GPL license contains a disclaimer of warranty requiring users not to hold the software authors liable to any damage.
The GPL license requires that any legal disputes be settled with the modification of Free Software Foundation.
Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license

A

Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license

46
Q

Which of the following hardware devices links a number of computers together to form an Ethernet LAN?

Switch
Connector
Server
Access point
Terminal

A

Switch

A switch is a hardware device that is used to connect multiple computers together to form an Ethernet LAN. It acts as a central hub, allowing the computers to communicate with each other by sending and receiving data packets. Switches are commonly used in both small and large networks to provide efficient and reliable connectivity. They are designed to handle high data traffic and can intelligently route data to the appro
A switch is a hardware device that is used to connect multiple computers together to form an Ethernet LAN. It acts as a central hub, allowing the computers to communicate with each other by sending and receiving data packets. Switches are commonly used in both small and large networks to provide efficient and reliable connectivity. They are designed to handle high data traffic and can intelligently route data to the appropriate destination, improving network performance. Therefore, a switch is the correct hardware device for linking computers together in an Ethernet LAN.

47
Q

Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system.

/dev/hdc1d2p3
Dev/hdc1a3
Dev/hdc1b3
/dev/hd1b3
/dev/hdb3

A

/dev/hdb3

48
Q

Which of the following statements concerning the General Public License (GPL) is true?

The GPL is designed to ensure that the source code of a software remains freely available
If you changed a program you received under the GPL, you must send your changes to the original author for approval
GPL software may never be sold for money
GPL software may not be used to run nuclear reactors or air traffic control systems
The GPL is identical to the BSD license

A

The GPL is designed to ensure that the source code of a software remains freely available

49
Q

Which of the following commands can be used to determine the time of the last login of a given user?

History
Showlog
Login
Recent
Last

A

Last

50
Q

Which of the following commands can be used to extract content from a tar file?

Tar -v
Tar -c
Tar -xvf
Tar -e
Tar -vf

A

Tar -xvf

51
Q

Which criteria are useful when deciding which operating system to use? (Choose three correct answers).

License costs
Availability of mandatory applications and tools
Linux can do everything, there is no need for further evaluation
Ideological preferences of the system administrator
Skills of the administrators and staff

A

License costs
Availability of mandatory applications and tools
Skills of the administrators and staff

52
Q

How can the current directory and its subdirectories be searched for the file name MyFile.xml?

Grep MyFile.xml | find
Search MyFile.xml ./
Grep -r MyFile.xml
Find . -name MyFile.xml
Less MyFile.xml

A

Find . -name MyFile.xml

53
Q

Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home?

Tar -xf backup.tar /home
Tar /home backup.tar
Tar -cf backup.tar /home
Tar -cf /home backup.tar
Tar -xf /home backup.tar

A

Tar -cf backup.tar /home

54
Q

Which of the following is a Linux-based operating system for use on mobile devices?

CentOS
Debian
Android
IOS

A

Android

55
Q

Which of the following commands can be used to create a file?

Build
Touch
Nico
Mkfile
Create

A

Touch

56
Q

Which statement about users and user groups is correct?

Users do not have to belong to a user group
Every user belongs at least to one user group
A group can only have one main user
There can be only one user group on a system

A

Every user belongs at least to one user group

57
Q

Which of the following commands can be used to view a file and do search operations within it while viewing the contents?

See
Less
Grep
Report
Find

A

Less

58
Q

What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested?

. (dot)
_ (underscore)
- (minus)
\ (backslash)

A

. (dot)

Feedback
In Unix-based systems, the dot (.) is used as the first character for file or directory names that should not be displayed by commands like ls unless specifically requested. This convention is commonly used for hidden files or directories, which typically contain configuration files or sensitive data that should not be easily accessible or accidentally modified. By starting the name with a dot, the file or directory is effectively “hidden” from regular directory listings, providing a level of privacy or organization.
In Unix-based systems, the dot (.) is used as the first character for file or directory names that should not be displaye

59
Q

After installing a new package, in which directory are you most likely find its configuration file?

/opt
/etc
/conf
/usr
/lib

A

/etc

60
Q

Which command line can be used to search help files that mention the word “copy”?

Man copy
Copy help
Man -k copy
Copy -help
Whatis copy

A

Man -k copy

61
Q

Which of the following is NOT a core component of the Linux operating system kernel?

Process scheduler
System call interface
Memory management
Graphical user interface (GUI)

A

Graphical user interface (GUI)

62
Q

Which command will display the last line of the file foo.txt?

Head -n foo.txt
Tail foo.txt
Tail -n 1 foo.txt
Last -n 1 foo.txt

A

Tail -n 1 foo.txt

63
Q

Which option will cause the echo command NOT to output a trailing newline?

-n
-p
-s
-e

A

-n

64
Q

Which is a suitable command to find the next appearance of the word hidden in a man page being viewed from the command line?

/? hidden
/hidden
CTRL-F hidden
Find hidden

A

/hidden

65
Q

What two-character sequence is present at the beginning of an interpreted script? Please specify two characters only.

A

!

66
Q

Which of the following are correct commands for changing the current directory to the user’s home? (Select all that applies)

Cd
Cd /
Cd /home
Cd ~
Cd ..

A

Cd
Cd ~

67
Q

Which of the following commands is used to lookup the current IP address of a system?

Less/proc/net/ipconfig
Ifconfig
Ipconfig
Showip
Sysinfo | grep ipaddress

A

Ifconfig

68
Q

Which command lists all files in the current directory that starts with a capital letter?

Ls -uppercase-files
Ls A-Z*
Ls A-Z
Ls [A-Z]*
Ls –upercasefiles

A

Ls [A-Z]*

69
Q

How can the normal output of a command be written to a file while discarding the error output?

Command>2>file &1>/dev/null
Command /dev/null
Command>2>discard-error>file
Command > output.txt 2>/dev/null
Command> /dev/null 2&>1 output

A

Command > output.txt 2>/dev/null

70
Q

What is the command that will show system boot time messages?

Dmesg
Display system boot
Echo
Lspci
Messages

A

Dmesg

71
Q

Which Linux distribution is used as a basis for the creation of Ubuntu Linux?

Debian Linux
SUSE Linux
Gentoo Linux
Red Hat Linux
Arch Linux

A

Debian Linux

72
Q

What is the output of the following command? for token in a b c; do echo -n ${token} done

Anbncn
$token$token$token
A b c
Abc
{a}{b}{c}

A

Abc

73
Q

How is it possible to determine if an executable file is a shell script that is ready by Bash?

/bin/bash has to be run in debug mode
The r bit is set
The file must end with .sh
The file line starts with #!/bin/bash
Scripts are never executable files

A

The file line starts with #!/bin/bash

74
Q

You have a program called /user/bin/foo. You wish to create a symbolic link, /home/user/bin/foo, that points to it. Which command will do this task?

Ln -sys /home/user/foo /user/bin/foo
Ln -s /user/bin/foo /home/user/bin/foo
Ln /home/user/foo /user/bin/foo
Ln /user/bin/foo /home/user/foo
Ln –symlink /home/user/foo /user/bin/foo

A

Ln -s /user/bin/foo /home/user/bin/foo

75
Q

Which of the following commands will output all of the lines that contain either the string Fred or fred? (Select all that apply)

Grep -i fred data_file
Grep ‘[f]red’ data_file
Grep ‘[Ff]red’ data_file
Egrep fred data_file
Grep -v fred data_file

A

Grep -i fred data_file
Grep ‘[Ff]red’ data_file

76
Q

What are the three sets of permission for a file?

Administrator, group, others
User, standard user, others
User, group, others
Administrator, standard user, others

A

User, group, others

77
Q

A Linux computer has no access to the Internet. Which command displays information about the network gateway for the system?

Traceroute
Ifconfig
Gateway
Route
Ipconfig

A

Route

78
Q
A
79
Q
A