
CORRECT - See section 1.3.3
Linux is written in:
- C
CORRECT - See section 1.3.3
Source code refers to:
- A human readable version of computer software
CORRECT - See section 5.3.7
The command
man -k
is the same as the command apropos
.- True
CORRECT - See section 5.3.6.3
The
whatis
command is the same as man -w
.- False
CORRECT - See section 6.3.5
Is the following path absolute or relative?
/etc/ppp
- Absolute
CORRECT - See section 6.3.5
Is the following path absolute or relative?
sysadmin/Documents
- Relative
CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
- True
CORRECT - See section 8.4.5
Which of the following commands will direct error messages to the file, error.log?
- ls /root 2> error.log
CORRECT - See section 9.3
The
echo
command:- Is used to output text to the console
CORRECT - See section 9.3
A file begins with
#!/bin/csh
. This means:- Running the script will invoke /bin/csh to interpret the rest of the file
CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
- nano
- vi
CORRECT - See section 9.4
Most of nanos commands take the form of:
- Control and another character
CORRECT - See section 9.5.2
What does this shell script do?
FOO=/tmp/foo if [ ! d $FOO ]; then mkdir $FOO fi
- Creates /tmp/foo if it does not exist
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
- 32 bit
- 64 bit
CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
- True
CORRECT - See section 11.3.2
What does the acronym RPM mean?
- RPM Package Management
CORRECT - See section 11.3
One way to install new software on a Linux system is to use a package management system.
- True
CORRECT - See section 11.10
When you execute the
dmesg
command, the system displays messages that are generated by the kernel.- True
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
- dpkg
- aptitude
- apt-get
CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
- rpm
- yum
- yumex
CORRECT - See section 12.3
Which of the following would be considered a host?
- A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
- ...a feature provided by one computer to another.
CORRECT - See section 12.4
Only servers have hostnames.
- False
CORRECT - See section 13.3
Which files contain user account information?
- /etc/passwd
- /etc/shadow
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
- The root user
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
- id
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
- who
CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
- System accounts, such as server processes
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
- ...will show a UID as the owner, but not user name.
CORRECT - See section 14.8.1
Which of the following options for the
useradd
command allows root to specify supplementary groups the user will be a member of?- -G
CORRECT - See section 14.8.1
On a system that does not use UPG, the
useradd
command will also create a user group. For example, user bob, group bob.- False
CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
- chmod o=rx file
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
- chmod 775 file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
- False
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the
chmod
command?- octal
- symbolic
CORRECT - See section 15.6
The
chown
command can be used to change the owner and group of a file.- True
CORRECT - See section 2.3.1
The Samba application is a:
- File Server
CORRECT - See section 2.3
Which of the following are examples of desktop software?
- Web browser
- Music player
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
- WordPress
CORRECT - See section 2.3.1
Which of the following pieces of software deal with file sharing?
- Samba
- Netatalk
- NFS
CORRECT - See section 3.3
Which of the following is true about graphical mode?
- You access this mode by logging into a graphical display
- You have menus and tools to help you find what you are looking for
- After login, you are provided with a desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
- False
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
- terminal
- xterm
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
- Many users can log in simultaneously with a unique account
- Users can protect their information from other users
- Resources are shared between users
CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
- PATH
CORRECT - See section 4.9
Select the command that can report the location of a command:
- which
CORRECT - See section 4.13.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
- True
CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
- False
CORRECT - See section 16.7
The "sticky bit" permission...
- ...prevents others from removing files they don't own from a common directory.
CORRECT - See section 16.3
The "setuid" permission...
- ...allows a command to be run as the file owner.
0 komentar