Past Paper - Linux and System Administration
Document Details

Uploaded by MemorablePointillism
null
Tags
Summary
This document contains a collection of questions and answers related to Linux and system administration topics. The various questions cover different aspects including commands, system concepts, and software packages.
Full Transcript
Question ID 1897 Embedded Systems means:  Users must support the systems themselves  Businesses cannot charge anything for the software, only the hardware  Systems designed to do a specific task on hardware optimized for only that purpose  Companies must share their changes  You can...
Question ID 1897 Embedded Systems means:  Users must support the systems themselves  Businesses cannot charge anything for the software, only the hardware  Systems designed to do a specific task on hardware optimized for only that purpose  Companies must share their changes  You can view the software\'s source code Question ID 1901 Linux originally only ran on:  Specialized processor chips  Intel 386 PCs  Macintosh  Xerox copy machines  Raspberry Pi computers Question ID 1912 Bundling utilities, management tools, and application software with a Linux kernel is called a:  A trademark  A distribution of Linux  A type of hardware  A text editor Question ID 1916 A software release cycle describes:  How often security fixes are implemented  How often the computer must be upgraded to support new software  How often the computer must be rebooted  How often upgrades come out for software  How often the software's memory is released back to the operating system Question ID 1923 Apple's OS X is: (choose three)  Tightly integrated with Apple hardware  Able to natively run Windows binaries  Primarily used to manage network services  A fully certified UNIX distribution  Derived from Linux  Partially based on code from the FreeBSD project Question ID 1924 Microsoft Windows: (choose three)  Is generally backwards compatible with previous versions  Has a Linux compatibility mode  Has a scripting environment called PowerShell  Has a new desktop version every year.  Has a short maintenance cycle  Offers both desktop and server products Question ID 1935 An interpreted programming language: (choose two)  Tends to offer more features than compiled languages  Is converted into machine specific instructions as the program runs  Requires a linking step but no compilation step  Takes fewer resources to run than a compiled language  Requires a compilation step but no linking step Question ID 1940 The two main families of Linux shells are: (choose two)  Emacs  Python Shell  Bourne Shell  C Shell  Korn shell Question ID 1946 In virtualization, what are the host and guest? (choose two)  A guest is a virtual machine  The host is the machine that runs the virtual machines  A host is a virtual machine  The guest is the machine that runs the virtual machines  The terms can be used interchangeably Question ID 1951 Cloud computing is:  Requires fewer resources because systems are shared among many users  Allows users in different geographical regions to work together in real time  All are correct  Is useful for both business and home users  Is made possible by faster internet speeds Question ID 1958 Which of the following are properties of a strong password? (choose three)  Based on easy to remember items like birthdays  At least 10 characters long  Includes symbols  Long so that it can be reused on multiple sites  A mix of upper and lower case Question ID 1965 A license where you don't have access to the source code is called:  Closed source  Open source  Impaired source  Sourceless Question ID 1968 A copyleft provision in a software license means:  You give up your copyright to the software  You must provide support for your modifications  If you redistribute the software, you must distribute the source to any changes you make  You may not link against third party closed source software  You must provide free copies of the software if you use it Question ID 1970 The Free Software Foundation believes that: (choose two)  Software should be free to share  People should write software with no expectation of making money  Software should not have copyright  Software should be free to modify  No money should ever change hands Question ID 1977 What does it mean when a work is placed in the public domain?  The author has relinquished the copyright on the work  The author has died  You may not use the work for commercial purposes  You must redistribute changes to the software  The work was done by a government agency Question ID 1990 The semicolon (;) can be used to separate multiple commands to be executed in order. True or False?  True  False Question ID 1992 To be able to output messages to the screen, use the \_\_\_\_\_\_\_ command:  display  type  echo  print Question ID 1993 The \_\_\_\_\_\_\_ command will print a list of the commands that you\'ve previously executed.  eval  exec  list  history Question ID 2000 HOME is an example of \_\_\_\_\_\_\_\_\_.  A local variable  An environment variable  A path variable  An internal command  An alias Question ID 2004 The directory where additional documentation for software packages most likely can be found is:  /usr/share/doc  /usr/software/doc  /var/lib/doc  /var/share/doc Question ID 2012 To start searching a man page, the first key you press is:  f  /  !  s Question ID 2014 To get help on using the info command, execute: (choose two)  info info  man info  info -q  help info Question ID 2020 The \_\_\_\_\_ command can be used to find any file, not just commands or man pages.  apropos  whatis  whereis  locate Question ID 2025 Hidden files are files that begin with what character?  A dash (-)  An asterisk (\*)  A plus (+)  A period (.) Question ID 2027 The top-level directory on a Linux system is represented as:  /  C:  /home  /root Question ID 2037 The ls command without options or arguments\...  \...prompts for a directory to list.  \...lists the contents of the current directory.  \...generates an error as this command requires arguments.  \...lists the contents of a user\'s home directory. Question ID 2042 The command ls -S will sort files:  By number of symlinks, largest to smallest  By size, largest to smallest  By modification date, newest to oldest  By size, smallest to largest Question ID 2043 When using the cp command, you must provide both a source and a destination. True or False?  True  False Question ID 2046 Which option can be used with the rm command to prompt before deleting?  -i  l  -P  A Question ID 2055 Which command would list files that do not begin with a T or a W?  echo /etc/\*\[TW!\]  echo /etc/\[!TW\]\*  echo /etc/!TW  echo /etc/\[\*TW\]! Question ID 2057 In general, for which of the following would you want to use lossless compression?  A movie  An mp3 audio file  A log file  An encrypted email  A JPEG image Question ID 2059 You type gzip myfile.tar. What happens? (choose two)  myfile.tar.gz holds a compressed version of myfile.tar  An error; you forgot to pass the name of the output file  An error; you forgot to specify the file with -f  myfile.tar is removed  myfile.tar is unarchived into the current directory Question ID 2063 Which command will show what is inside the compressed tarball with a name of foo.tar.gz?  tar --tjf foo.tar.gz  tar --xf foo.tar.gz  tar --tf foo.tar.gz  tar --tzf foo.tar.gz  tar --lf foo.tar.gz Question ID 2076 By default, the zip command replaces uncompressed files with compressed files. True or False?  True  False Question ID 2077 Error messages generated by commands are sent where by default?  STDOUT  STDERR  STDIN  Log files Question ID 2088 Which of the following commands will display only lines that begin with test?  grep \^test file.txt  grep &test file.txt  grep \$test\* file.txt  grep \*test file.txt Question ID 2089 Which of the following commands will display lines that contain either start or end?  egrep \'start\|end\' file.txt  egrep start end file.txt  egrep (start\|end) file.txt  egrep start&end file.txt Question ID 2099 A file begins with \#!/bin/csh. This means:  C Shell compatibility mode is enabled  Nothing, this is a comment  This is a Perl script  Running the script will invoke /bin/csh to interpret the rest of the file  The operator should not be using /bin/csh Question ID 2101 Most of nano's commands take the form of:  **Escape** followed by another character  Mouse clicks  **Alt** and another character  The **F1** through **F12** function keys  **Control** and another character Question ID 2111 The if command looks for what exit code to consider a condition to be true?  0  10  2  1  255 Question ID 2112 The number of users logged in is in a variable called USERS. How would you test to see if there are 5 users logged in?  test \$USERS --eq 5  test \$USERS = 5  test \$USERS,5  test \$USERS --a 5  test --f USERS=5 Question ID 2122 Which of the following are valid partitioning types? (choose two)  MBR  GPT  PC  BIOS Question ID 2128 Software that allows hardware devices to communicate with the installed operating system is called?  Instructions  Packages  Drivers  Programs Question ID 2130 Which of the following commands will check hard disk GPT partitions? (choose three)  sgdisk  gfdisk  sfdisk  cgdisk  gdisk Question ID 2135 The process (ps) command shows only processes running in the current shell by default. True or False?  True  False Question ID 2137 The free command outputs statistics about:  Memory usage  Disk usage  CPU usage  Software usage Question ID 2144 Which file contains the information passed to the kernel at boot time?  /proc/kargs  /proc/kernel  /proc/cmdline  /proc/kopts Question ID 2145 To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:  /etc/sysctl.conf  /etc/procsys.conf  /etc/sysinfo.conf  /etc/procctl.conf Question ID 2159 Which of the following commands will display the IP address on a Linux system?  route  dig  ifconfig  ipconfig Question ID 2164 The RSA key fingerprint allows the dig command to connect to remote systems. True or False?  True  False Question ID 2166 When issuing the service network restart command, which of the following occurs?  \...the networking for the system is stopped and then started back up.  \...takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.  \...brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted. Question ID 2168 Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?  route  top  ss  ifconfig Question ID 2176 Which of the following commands will display the groups that the user bob belongs to?  group bob  all bob  groups -a  id bob Question ID 2190 Traditional UNIX systems allowed users to belong to how many groups?  10,000  16  256  1  65,000 Question ID 2195 A value of 0 in the "minimum" password aging field means the user *cannot* change their password. True or False?  True  False Question ID 2198 Sudo privileges allow users to execute commands as another user. True or False?  True  False Question ID 2200 The first line of this command displays how long the system has been running since being rebooted.  getent  who  su  id  w Question ID 2209 Which option for the usermod command can be used to specify a user\'s group ID (either primary or secondary)? (choose two)  -s  -g  -G  -S Question ID 2213 The groupmod command can be used to add users to a group. True or False?  True  False Question ID 2217 Which of the following files contains user IDs?  /etc/passwd  /etc/group  /etc/usr  /etc/shadow Question ID 2219 Which of the following commands, run as root, will prevent the user bob from logging in?  usermod -l bob  usermod -L bob  usermod -D bob  usermod -d bob Question ID 2220 What directory contains a user\'s home directory?  /home  /  /rootfs  /user Question ID 2221 GIDs under 500 (or 1000) are usually reserved for what kind of groups?  System use  Administrators  User private groups (UPG)  Are not used for groups, but for user accounts Question ID 2249 A user cannot delete a file if they do not own it. True or False?  True  False Question ID 2257 The chown command permits changing group ownership done by root only. True or False?  True  False Question ID 2259 Which of the following commands will list hidden files as well as their ownership?  ls -la  ls -a  ls -l  ls -z Question ID 2264 Which of the following commands will set *setuid* for the /usr/bin/program?  None of the above  chmod 2755 /usr/bin/program  chmod 4755 /usr/bin/program  chmod 1755 /usr/bin/program Question ID 2268 Setting *setgid* on a directory\...  \...will set the group owner of all files created in the directory to the group owner of the directory.  \...will allow scripts in the directory to be executed as the group owner of the directory.  \...does nothing.  \...is not allowed by the system. Question ID 2269 Deleting a source file will break an associated hard link. True or False?  True  False Question ID 2273 Which of the following commands would create a hard link for *link* to *file*?  ln -s file link  ln link file  ln -s link file  ln file link