Invert Pro

Selamat Datang...

Haiii haiiii Admin kembali lagi.

MULAIJOIN THIS SITE

Wednesday, December 9, 2015

Final Comprehensive Exam (Modules 1 - 16)

Final Comprehensive Exam (Modules 1 - 16)





CORRECT - See section 1.3.3
Linux is written in:
  • C

CORRECT - See section 1.3.3
Source code refers to:
  • A human readable version of computer software

Get Free Traffic



CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
  • True

CORRECT - See section 5.3.6.3
The whatis command is the same as man -w.
  • False

CORRECT - See section 6.3.5
Is the following path absolute or relative?
/etc/ppp
  • Absolute

CORRECT - See section 6.3.5
Is the following path absolute or relative?
sysadmin/Documents
  • Relative

CORRECT - See section 8.4.2
A successful command will print output to STDOUT.
  • True

CORRECT - See section 8.4.5
Which of the following commands will direct error messages to the file, error.log?
  • ls /root 2> error.log

CORRECT - See section 9.3
The echo command:
  • Is used to output text to the console

CORRECT - See section 9.3
A file begins with #!/bin/csh. This means:
  • Running the script will invoke /bin/csh to interpret the rest of the file

CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
  • nano
  • vi

CORRECT - See section 9.4
Most of nanos commands take the form of:
  • Control and another character

CORRECT - See section 9.5.2
What does this shell script do?
FOO=/tmp/foo
if [ ! d $FOO ]; then
    mkdir $FOO
fi
  • Creates /tmp/foo if it does not exist

CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
  • 32 bit
  • 64 bit

CORRECT - See section 10.3
64 bit platforms can access more memory than 32 bit platforms.
  • True

CORRECT - See section 11.3.2
What does the acronym RPM mean?
  • RPM Package Management

CORRECT - See section 11.3
One way to install new software on a Linux system is to use a package management system.
  • True

CORRECT - See section 11.10
When you execute the dmesg command, the system displays messages that are generated by the kernel.
  • True

CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
  • dpkg
  • aptitude
  • apt-get

CORRECT - See section 11.3.2
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
  • rpm
  • yum
  • yumex

CORRECT - See section 12.3
Which of the following would be considered a host?
  • A printer attached to the network via an IP address

CORRECT - See section 12.3
A service is...
  • ...a feature provided by one computer to another.

CORRECT - See section 12.4
Only servers have hostnames.
  • False

CORRECT - See section 13.3
Which files contain user account information?
  • /etc/passwd
  • /etc/shadow

CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
  • The root user

CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
  • id

CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
  • who

CORRECT - See section 14.8.1
UIDs 1-500 are usually reserved for what kind of users?
  • System accounts, such as server processes

CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
  • ...will show a UID as the owner, but not user name.

CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
  • -G

CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
  • False

CORRECT - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
  • chmod o=rx file

CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on file to r-x?
  • chmod 775 file

CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
  • False

CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod command?
  • octal
  • symbolic

CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
  • True

CORRECT - See section 2.3.1
The Samba application is a:
  • File Server

CORRECT - See section 2.3
Which of the following are examples of desktop software?
  • Web browser
  • Music player

CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
  • WordPress

CORRECT - See section 2.3.1
Which of the following pieces of software deal with file sharing?
  • Samba
  • Netatalk
  • NFS

CORRECT - See section 3.3
Which of the following is true about graphical mode?
  • You access this mode by logging into a graphical display
  • You have menus and tools to help you find what you are looking for
  • After login, you are provided with a desktop

CORRECT - See section 3.3
A server is likely to be running in graphical mode.
  • False

CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
  • terminal
  • xterm

CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
  • Many users can log in simultaneously with a unique account
  • Users can protect their information from other users
  • Resources are shared between users

CORRECT - See section 4.7
Which environment variable contains a list of directories that is searched for commands to execute?
  • PATH

CORRECT - See section 4.9
Select the command that can report the location of a command:
  • which

CORRECT - See section 4.13.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metacharacter.
  • True

CORRECT - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at all times.
  • False

CORRECT - See section 16.7
The "sticky bit" permission...
  • ...prevents others from removing files they don't own from a common directory.

CORRECT - See section 16.3
The "setuid" permission...
  • ...allows a command to be run as the file owner.
Load disqus comments

0 komentar