Test3 Flashcards
Which of the following is a Debian-based computer operating system for Raspberry Pi?
Raspbian
Raspbian is a Debian-based computer operating system for Raspberry Pi. It is highly optimized for the Raspberry Pi line’s low-performance ARM CPUs.
Which of the following is an open-source relational database management system?
MySQL
MySQL is an open-source relational database management system.
What command would you use to get comprehensive documentation about any command in Linux?
man command
The man command in Linux is used to display the user manual of any command that we can run on the terminal.
What key do you press to quit reading a man page?
Q
When done reading through the man page, use the letter q to quit.
Which command searches manual page names and descriptions for a user-supplied keyword?
apropos
The command apropos searches manual page names and descriptions for a user-supplied keyword.
What command should be used to display the permissions for every file in the current directory?
ls -la
The command ls -la will provide the long view of the directory listing with all of the information, including the file permissions.
Which keyboard shortcut allows pasting a previously copied highlighted text while working in the command line terminal?
CTRL + SHIFT + V
Holding down the CTRL and SHIFT keys and pressing V allows any previously copied highlighted text in the terminal to be pasted. Pressing CTRL + V within the terminal waits for a character press after the V. So pressing CTRL + V + R inserts the letter R to the terminal.
To see all the variables that are in the user’s environment, use the _______ command.
printenv
The printenv command displays the values of environment variables.
Which software handles the installation and removal of software on Debian and Ubuntu?
apt
Advanced Package Tool, or APT, is a free software user interface that works with core libraries to handle the installation and removal of software on Debian, Ubuntu, and related Linux distributions.
In order to rename the directory ~/documents/letters to ~/documents/archive, which of the following commands should be used?
mv ~/documents/letters ~/documents/archive
To rename a file in Linux, you utilize the move (mv) command. The command should use the syntax of mv <original_filename> <new_filename). Rename and copy are not valid Linux commands but instead are used in Windows. The cp (copy) command will make a new file with the name “archive”; therefore, it is not the correct answer.</original_filename>
What is a pre-integrated, self-contained system made by combining a software application (e.g., server software) with just enough operating system to run optimally on industry-standard hardware or a virtual machine?
Virtual appliance
A virtual appliance is a pre-integrated, self-contained system that is made by combining a software application (e.g., server software) with just enough operating system for it to run optimally on industry-standard hardware or a virtual machine. This offers companies several benefits over traditional software applications installed on top of a full operating system.
Which of the following is TRUE about open source software?
Open source software is a prominent example of open collaboration
Open-source software is usually developed in a collaborative public manner and is a good example of open collaboration.
Which of the following can you NOT install Linux on?
Smartcard
Linux can be installed on just about anything, including desktops/laptops, servers, the cloud, smartphones/tablets, the IoTs, and even a Smart TV. But, Linux cannot be installed on a smartcard since it is a device with extremely limited storage space and no processing power. A smartcard is used as a form of two-factor authentication in corporate networks.
Which command shows all of the directories that the shell searches for programs?
echo $PATH
The echo $PATH command shows all the directories used by the shell during a search for a program. By default, anything listed in the $PATH will be looked at by the shell before returning an error that states it cannot find a file’s location.
Where does Linux stores most of its log files in the directory tree?
/var/log
Most of the Linux log files are stored in /var/log portion of the directory tree. This is the common log directory for all programs, but some programs keep their log files within their own specialized directories, as well.
Which type of IP addresses uses a dotted-decimal notation?
IPv4
IPv4 uses dotted decimal notation, such as 192.168.1.1. IPv6 uses a 128-bit address written as hexadecimal digits separated by colons. MAC addresses are 48-bit addresses written in hexadecimal digits separated by colons.
In computer networks, what does DHCP stand for?
Dynamic Host Configuration Protocol
The DHCP or Dynamic Host Configuration Protocol is a network management protocol where a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network to communicate with other IP networks.
Which information is used by a computer to connect to a typical local area network?
IP address
Network administrators assign an IP address to each device connected to a network. An IP address serves two main functions: host or network interface identification and location addressing.
Which of the following commands can be used to resolve a DNS name to an IP address?
host
The host command is used for DNS (Domain Name System) lookup operations. It is used to find the IP address of a particular domain name or the domain name of a particular IP address. Nslookup and dig are also commands that can be used to lookup a domain name and convert it to an IP address within a Linux system.
What command would you use to create a symbolic link in Linux?
ln -s
To create a soft link from the shell, you should use “ln -s <original_file> <link_created>". The soft link is essentially a pointer to the original file, and when the original file is deleted, the soft link does not point to anything, so “no such file or directory” is reported.</link_created></original_file>
After installing a new package, in which directory are you most likely to find its configuration file?
/etc
The /etc folder is where configuration files are usually stored in a Linux system.
What permissions would be represented by the octal 517?
r-x–xrwx
In Linux, you can convert letter permissions to octals by giving 4 for each R, 2 for each W, and 1 for each X. So, R-X is 5, –X is 1, and RWX is 7.
Where are the passwords stored for users on a Linux system?
/etc/shadow
The /etc/shadow file stores the actual password in an encrypted format (more like the hash of the password) for the user’s account with additional properties related to the user password. Basically, it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file.
What is the limit on the number of user accounts in a single computer in Linux?
Unlimited
In Linux, there is virtually no limit to the number of user accounts on a single computer. It is considered to be unlimited.
What is the output of the following command?
for token in a b c;
do echo -n ${token};
done
abc
A token is a sequence of characters that forms a word or punctuation sign. It is made up of ordinary characters or operator characters but not both.
Which of the following information is provided in the default output of the who command?
Username, Terminal Identifier, Login Date and Time
The output of the who command includes Username, Terminal Identifier, Login Date, and Time. The who command displays a list of users who are currently logged into the computer. The who command is related to the command w, which provides the same information but also displays additional data and statistics.
Which UID is usually used to represent the root user on a Linux system?
0
The UID of 0 has a special role: it is always the root account (i.e., the superuser or administrative user). Although the user name can be changed on this account, and additional accounts can be created with the same UID, neither action is recommended since they are considered a poor security practice.
How would you represent rwxr-xr– in octal notation?
754
In Linux, you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. So, RWX is 7, R-X is 5, and R– is 4.
Which of the following is the dmesg command used for?
To show the kernel log messages
The dmesg (display message or driver message) command is a command on most Unix-like operating systems that prints the message buffer of the kernel. The output of this command typically contains the messages produced by the device drivers and serves to show the kernel’s log messages to the screen.
Which of the following software packages is a mail server?
Postfix
Postfix is a free and open-source mail transfer agent that routes and delivers electronic mail. Thunderbird is a mail client, Apache is a web server, and GIMP is an image manipulation program.
Which of the following commands creates an archive file work.tar from the contents of the directory ./work/?
tar -cf work.tar ./work/
The tar command allows you to quickly access a collection of files and place them into a highly compressed archive file. The -c option creates a new archive while -f uses the given filename as the archive’s filename. Specifying the directory ensures the files to be placed in the archive file come from that folder.
Which command is used to print the last 10 lines of a file to the display?
tail
Tail is a command which prints the last few numbers of lines (10 lines by default) of a certain file, then terminates.