Linux_book Flashcards
What is the distinction between free software and open source software given by Richard
Stallman, the founder of the free software movement?
Open source is a development methodology; free software is a social movement. Free software refers to
freedom rather than to software that has no cost associated with it.
What is one of the main advantages of Linux that has enabled it to be applied to many
different computing roles?
Linux is highly extensible, which makes it an excellent choice for computing roles as diverse as servers,
workstations, mainframes, and mobile devices.
True or false? There is a single Linux master distribution from which all other Linux distributions
are derived.
False. There is no single master Linux distribution. There are several top-level (not derived from another
distribution) distributions from which others are derived. Slackware, Debian, and Red Hat Enterprise Linux
are examples of top-level distributions.
Which Unix philosophy states that developers should create software that is limited in
functionality because it’s easier to use and to maintain?
Worse is better. The assumption is that limited functionality is worse than creating software that does
everything.
Linux incorporates software tools from which of the following sources?
Unix
The GNU Project
Berkeley Software Distribution (BSD)
macOS
The GNU Project
Which of the following statements about free and open source
software (FOSS) are true? (Choose two.)
Anyone can access the source code.
The author cannot charge a price for the source code.
Anyone can modify the source code.
The source code can only be distributed to a public developer community.
Anyone can access the source code.
Anyone can modify the source code.
Which of the following FOSS licenses is the Linux kernel released
under?
GNU General Public License (GPL) version 2
GNU GPL version 3
MIT License
Apache License 2.0
GNU General Public License (GPL) version 2
True or false? Linux distributions can include proprietary software by
default.
True
False
True
Which of the following Linux distributions is the no-cost version of Red Hat Enterprise Linux (RHEL)? Ubuntu Fedora openSUSE CentOS
CentOS
Which of the following characteristics are emphasized by the Unix design philosophy? (Choose two.) Modularity Stability Complexity Simplicity
Modularity
Simplicity
True or false? Linux is Unix-like in its design.
True
False
True
Which of the following computing roles does Linux dominate in market share? (Choose three.) Workstations Web servers Mobile devices Supercomputers
Web servers
Mobile devices
Supercomputers
True or false? In Linux,
Equipment.txt and equipment.txt refer to the
same file.
False. Linux file names are case-sensitive. These are two different files.
Which command enables a user to log in to a system with their own credentials, and then to become the root user to perform administrative tasks?
Su - The su command enables an authorized user to become the root user.
A fellow administrator calls you and needs you to check the /etc/shadow file for a new user’s entry, confirming that it indeed exists. How would you look at the contents of the /etc/shadow file without the possibility of changing the file?
1) su – 2) cat /etc/shadow —You first have to become the root user because
the /etc/shadow file can only be read as root. To look at the file without the possibility of
altering its contents, use the cat command to list its contents to the screen.
You need to quickly create an empty file (log.txt ) so that an application can copy data into it. Which command can you use to create the file?
touch log.txt
You recall that a few days ago, you ran a command that helped you find a filtered list of files on the file system. You don’t remember the command’s somewhat complex syntax. How can you reproduce the command without searching the Internet for the correct syntax again?
Use the Up Arrow key until you find it and then press Enter to execute it. The Up
Arrow key scrolls back, one command at a time, through your command history.
Since Linux is generally community (user) supported, name three sources of Linux documentation.
Any three of the following: Manual pages, built-in help commands, online
documentation projects, Usenet newsgroups, Internet mailing lists, question and
answer websites, forums and social media, and books and other print resources.
To access complete local documentation, which command can you enter at the command-line to access extensive usage information on the cp (copy) command?
man cp
A coworker sends you an instant message and asks you how to appropriately format a manual page for the mv command so that she can send it to the printer and get readable output. What command can she enter?
man –t mv
Which online documentation site provides a comprehensive resource for Linux documentation including manual pages, FAQs, HOWTOs, and
other types of documentation?
The Linux Documentation Project (https://www.tldp.org)
If you know the name of a command and want to know what its function is, which command would you use to find out?
Whatis
Given what you’ve read in the man page for grep so far, answer what you think the following command does: grep -i hello myfile
This command will return any lines in the file myfile that contain the text “hello”,
no matter what case the text is in (case insensitive).
Name the three types of Linux user accounts.
Root user (superuser), standard user, and service.
You need to add an administrator to the /etc/sudoers file to give them the ability to use the sudo command. Which command must you use to add users to the /etc/sudoers file?
You must use visudo since you cannot edit the /etc/sudoers file directly with Vim or
other text editors.
Why is it a security best practice to log onto a Linux system with a regular user account rather than with the root user account?
The primary reason is to prevent harmful mistakes from happening to the system through errant
commands such as rm (remove). Users who can use the sudo command should do so on an
individual command basis to perform necessary tasks with elevated privileges, while remaining in
their user shells for other functions.
Why is it important to put the principle of least privilege into practice?
System security is greatly enhanced by only granting users the minimum amount of rights and
permissions they require to perform a task.
Describe the difference between using the su command and using the sudo
command to perform administrative tasks.
The su command enables an authorized user to become the root user by switching to the root
user account in a complete root-owned shell. This is handy for the administrator but very dangerous because of the potential for human error. The sudo command enables an authorized user to issue individual commands as the root (or other user), limiting potential damage to the system.