CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
WRONG - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
echo n .
process_data > /tmp/foo
done
Which of the following are true?
- /tmp/foo will be removed if it exists
CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1))
?
- 1 will be added to the i variable
CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
- test d /tmp/foo o $USERS gt 5
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
CORRECT - See section 10.6
Which of the following are valid partitioning types?
CORRECT - See section 10.6
The fdisk
command is a tool used for working with the MBR partitioned disks.
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
CORRECT - See section 10.8
Which of the following are valid video cable connector types?
CORRECT - See section 11.7
A command that will continuously update statistics about running processes:
CORRECT - See section 11.6
The following are valid Linux option styles:
- Traditional Unix with a single dash (-)
- BSD Unix without a dash
- GNU long options with two dashes (--)
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
WRONG - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
CORRECT - See section 12.3
Which of the following would be considered a host?
- A printer attached to the network via an IP address
CORRECT - See section 12.7.4
What option to the netstat
command has information shown as numbers rather than names?
CORRECT - See section 12.7.7
Which of the following commands will allow you to log into the machine server1 with the account name nick?
CORRECT - See section 12.7.7.1
The RSA key fingerprint allows the dig
command to connect to remote systems.
CORRECT - See section 13.3
Which files contain user account information?
CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su
command, the installation process automatically configures one user account to be able to use the sudo
command to execute commands as if they were executed by the root user.
CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
WRONG - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
CORRECT - See section 14.8.2
Which of the following files contains user IDs?
WRONG - See section 14.3
Which of the following files does the groupadd
command use to determine the new GID when a GID isn't specified?
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
CORRECT - See section 15.6
The chmod
command can be used on a file by:
CORRECT - See section 15.6
Which option for the chown
command can be used to change the owner of a directory and all the files and directories below it?
CORRECT - See section 15.6
The chown
command will only accept one file at a time as an argument.
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?