Midterm exam meerkeuze Flashcards
To go to the end of an info page, press:
END n N ]
END
To go to the next match of a search on a man page, press:
] n N }
n
When interpreting the SYNOPSIS of a command found on a man page, the “|” means:
The items it separates can be used together The items it separates cannot be used together
The items it separates cannot be used together
After performing a search, you can use the ____ key to return to a previously found match:
n N D U
N
To move a page forward one at a time while viewing a man page, press the following:
Spacebar m a Enter
Spacebar
The ls command without options or arguments…
…lists the contents of the current directory. …prompts for a directory to list. …lists the contents of a user’s home directory. …generates an error as this command requires arguments.
…lists the contents of the current directory.
Which option can be used with the rm command to prompt before deleting?
I -i -P A
-i
The rm command can delete multiple files at once.
True or False?
True False
True
Which of the following commands can be used to rename a file?
name rn mv cp
mv
The touch command can be used to:
(choose two)
Update the time stamp of existing files Create new files Change a file’s name Change ownership of a file
Update the time stamp of existing files
Create new files
You try to compress a file that is already compressed. Which of the following statements is true?
The file will not be compressed any further than it already was The file changed while you were compressing it The file will actually be uncompressed The compression algorithm needs to be set to the “currently compressed” mode for it to be compressed further The file will be deleted
The file will not be compressed any further than it already was
Which of the following commands can be used to compress a file?
(choose three)
bunzip2 zip bzip2 cat gzip
zip
bzip2
gzip
The three main modes of tar are:
(choose three)
Extract Copy Compress List Create
Extract
List
Create
In the command tar –czf foo.tar.gz bar, what is the purpose of the f flag?
Tells tar to copy only files, and not directories Tells tar to read from the file that follows the flag Tells tar to print the name of each file as it is processed Specifies extra compression is to be used Tells tar to write to the file that follows the flag
Tells tar to write to the file that follows the flag
Which two commands do the same thing?
(choose two)
tar –xzf foo.tar.gz tar –x foo | gzip tar –c foo | gzip > foo.tar.gz tar –tzf foo.tar.gz tar –czf foo.tar.gz foo
tar –c foo | gzip > foo.tar.gz
tar –czf foo.tar.gz foo
Which option for the wc command will print the total number of words in a file?
- l - L - w - C
-w
Which command can be used to print line numbers?
num ln nl sort
nl
The command echo “text” > file.txt will create file.txt if it does not already exist.
True or False?
True False
True
The command echo “text” > file.txt will not overwrite file.txt if it already exists.
True or False?
True False
False
The command echo “text”»_space; file.txt will not overwrite file.txt if it already exists.
True or False?
True False
True
Software is backward compatible if:
It still supports old file formats or applications If the next version still works the same way People still use old versions It works across Linux/Mac/Windows It can be upgraded without downtime
It still supports old file formats or applications
Apple’s OS X is:
(choose three)
Derived from Linux Only compatible with Apple hardware Able to natively run Windows binaries Derived from FreeBSD Certified as UNIX compatible Primarily used to manage network services
Only compatible with Apple hardware
Derived from FreeBSD
Certified as UNIX compatible
Microsoft Windows:
(choose three)
Has a short maintenance cycle Comes in desktop and server variants Has built in virtualization Has a new desktop version every year. Has a Linux compatibility mode Has powerful scripting capabilities
Comes in desktop and server variants
Has built in virtualization
Has powerful scripting capabilities
Other commercial Unixes:
(choose two)
Are almost obsolete Are tied to their vendor’s hardware Use completely different commands than Linux Are UNIX certified Do not run the GNU tools
Are tied to their vendor’s hardware
Are UNIX certified
When choosing a distribution of Linux, you should consider:
(choose five)
Which management tools are provided by the distribution Which distributions are supported by the software you need to run Popularity on social media. The maintenance cycle of the distribution If you need support on the distribution itself Whether or not the distribution is under active development
Which management tools are provided by the distribution
Which distributions are supported by the software you need to run
The maintenance cycle of the distribution
If you need support on the distribution itself
Whether or not the distribution is under active development
The difference between the GPL and LGPL licenses are:
LGPL allows you to distribute the software in binary-only form LGPL is shorter than GPL LGPL allows linking to non GPLed software LGPL applies to web services LGPL was made by the OSI while GPL was made by the FSF
LGPL allows linking to non GPLed software
Permissive free software licenses:
(choose three)
Can allow software to be used inside closed source software Are not approved by the OSI Are not approved by the FSF Include the GPLv2 and BSD Don’t have a copyleft provision
Can allow software to be used inside closed source software
Are not approved by the FSF
Don’t have a copyleft provision
The Creative Commons version of Public Domain licensing is:
Attribution-NonCommercial-ShareAlike Attribution-NonCommercial NoAttribution-ShareAlike No Rights Reserved Attribution
No Rights Reserved
Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?
There are no requirements You must make the source to your custom web interface available You must make your hardware designs available You must make the source to your kernel available You must ensure your custom kernel runs on a regular Intel machine
You must make the source to your kernel available
Participating in open source projects can improve your technical skills, even if it is not your day job.
True or False?
True False
True
What are tradeoffs of increasing the level of privacy you have in your web browser?
(choose two)
You may get viruses Sites may not work properly Websites may load slower Images won’t load properly You may have to explicitly permit some cookies to be saved
Sites may not work properly
You may have to explicitly permit some cookies to be saved
Which of the following is a tool that helps you anonymize your Internet browsing?
CookieCleaner Web proxy The onion router AnonFirefox iptables
The onion router
Social network “like” buttons can track your activity across the Internet.
True or False?
True False
True
Which of the following are properties of a strong password?
(choose three)
A mix of upper and lower case Long so that it can be reused on multiple sites Includes symbols At least 10 characters long Based on easy to remember items like birthdays
A mix of upper and lower case
Includes symbols
At least 10 characters long
What can be done to prevent remote people from running programs on your computer?
(choose two)
Don’t use wireless networks – only wired Use strong passwords on all user accounts Turn on a firewall Block third party cookies Block all cookies
Use strong passwords on all user accounts
Turn on a firewall
The acronym CLI stands for:
Computer Link Interpreter Command Line Interpreter Computer Line Interface Command Line Interface
Command Line Interface
Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like –all.
LINUX Kernel GNU shell
GNU
The acronym GNU stands for:
Gnu’s Not Unix Go Next Unit Gnu’s Nearly Unix Good News Unix
Gnu’s Not Unix
What one character treats the character that follows it as if it was surrounded by single quotes?
/ % # \
\
The main purpose of using glob characters is to be able to provide a command a list of filenames.
True or False?
True False
True