Past Paper - Linux and System Administration
Document Details
Uploaded by MemorablePointillism
null
Tags
Summary
This document contains a collection of questions and answers related to Linux and system administration topics. The various questions cover different aspects including commands, system concepts, and software packages.
Full Transcript
Question ID 1897 Embedded Systems means: Users must support the systems themselves Businesses cannot charge anything for the software, only the hardware Systems designed to do a specific task on hardware optimized for only that purpose Companies must share their changes You can...
Question ID 1897 Embedded Systems means: Users must support the systems themselves Businesses cannot charge anything for the software, only the hardware Systems designed to do a specific task on hardware optimized for only that purpose Companies must share their changes You can view the software\'s source code Question ID 1901 Linux originally only ran on: Specialized processor chips Intel 386 PCs Macintosh Xerox copy machines Raspberry Pi computers Question ID 1912 Bundling utilities, management tools, and application software with a Linux kernel is called a: A trademark A distribution of Linux A type of hardware A text editor Question ID 1916 A software release cycle describes: How often security fixes are implemented How often the computer must be upgraded to support new software How often the computer must be rebooted How often upgrades come out for software How often the software's memory is released back to the operating system Question ID 1923 Apple's OS X is: (choose three) Tightly integrated with Apple hardware Able to natively run Windows binaries Primarily used to manage network services A fully certified UNIX distribution Derived from Linux Partially based on code from the FreeBSD project Question ID 1924 Microsoft Windows: (choose three) Is generally backwards compatible with previous versions Has a Linux compatibility mode Has a scripting environment called PowerShell Has a new desktop version every year. Has a short maintenance cycle Offers both desktop and server products Question ID 1935 An interpreted programming language: (choose two) Tends to offer more features than compiled languages Is converted into machine specific instructions as the program runs Requires a linking step but no compilation step Takes fewer resources to run than a compiled language Requires a compilation step but no linking step Question ID 1940 The two main families of Linux shells are: (choose two) Emacs Python Shell Bourne Shell C Shell Korn shell Question ID 1946 In virtualization, what are the host and guest? (choose two) A guest is a virtual machine The host is the machine that runs the virtual machines A host is a virtual machine The guest is the machine that runs the virtual machines The terms can be used interchangeably Question ID 1951 Cloud computing is: Requires fewer resources because systems are shared among many users Allows users in different geographical regions to work together in real time All are correct Is useful for both business and home users Is made possible by faster internet speeds Question ID 1958 Which of the following are properties of a strong password? (choose three) Based on easy to remember items like birthdays At least 10 characters long Includes symbols Long so that it can be reused on multiple sites A mix of upper and lower case Question ID 1965 A license where you don't have access to the source code is called: Closed source Open source Impaired source Sourceless Question ID 1968 A copyleft provision in a software license means: You give up your copyright to the software You must provide support for your modifications If you redistribute the software, you must distribute the source to any changes you make You may not link against third party closed source software You must provide free copies of the software if you use it Question ID 1970 The Free Software Foundation believes that: (choose two) Software should be free to share People should write software with no expectation of making money Software should not have copyright Software should be free to modify No money should ever change hands Question ID 1977 What does it mean when a work is placed in the public domain? The author has relinquished the copyright on the work The author has died You may not use the work for commercial purposes You must redistribute changes to the software The work was done by a government agency Question ID 1990 The semicolon (;) can be used to separate multiple commands to be executed in order. True or False? True False Question ID 1992 To be able to output messages to the screen, use the \_\_\_\_\_\_\_ command: display type echo print Question ID 1993 The \_\_\_\_\_\_\_ command will print a list of the commands that you\'ve previously executed. eval exec list history Question ID 2000 HOME is an example of \_\_\_\_\_\_\_\_\_. A local variable An environment variable A path variable An internal command An alias Question ID 2004 The directory where additional documentation for software packages most likely can be found is: /usr/share/doc /usr/software/doc /var/lib/doc /var/share/doc Question ID 2012 To start searching a man page, the first key you press is: f / ! s Question ID 2014 To get help on using the info command, execute: (choose two) info info man info info -q help info Question ID 2020 The \_\_\_\_\_ command can be used to find any file, not just commands or man pages. apropos whatis whereis locate Question ID 2025 Hidden files are files that begin with what character? A dash (-) An asterisk (\*) A plus (+) A period (.) Question ID 2027 The top-level directory on a Linux system is represented as: / C: /home /root Question ID 2037 The ls command without options or arguments\... \...prompts for a directory to list. \...lists the contents of the current directory. \...generates an error as this command requires arguments. \...lists the contents of a user\'s home directory. Question ID 2042 The command ls -S will sort files: By number of symlinks, largest to smallest By size, largest to smallest By modification date, newest to oldest By size, smallest to largest Question ID 2043 When using the cp command, you must provide both a source and a destination. True or False? True False Question ID 2046 Which option can be used with the rm command to prompt before deleting? -i l -P A Question ID 2055 Which command would list files that do not begin with a T or a W? echo /etc/\*\[TW!\] echo /etc/\[!TW\]\* echo /etc/!TW echo /etc/\[\*TW\]! Question ID 2057 In general, for which of the following would you want to use lossless compression? A movie An mp3 audio file A log file An encrypted email A JPEG image Question ID 2059 You type gzip myfile.tar. What happens? (choose two) myfile.tar.gz holds a compressed version of myfile.tar An error; you forgot to pass the name of the output file An error; you forgot to specify the file with -f myfile.tar is removed myfile.tar is unarchived into the current directory Question ID 2063 Which command will show what is inside the compressed tarball with a name of foo.tar.gz? tar --tjf foo.tar.gz tar --xf foo.tar.gz tar --tf foo.tar.gz tar --tzf foo.tar.gz tar --lf foo.tar.gz Question ID 2076 By default, the zip command replaces uncompressed files with compressed files. True or False? True False Question ID 2077 Error messages generated by commands are sent where by default? STDOUT STDERR STDIN Log files Question ID 2088 Which of the following commands will display only lines that begin with test? grep \^test file.txt grep &test file.txt grep \$test\* file.txt grep \*test file.txt Question ID 2089 Which of the following commands will display lines that contain either start or end? egrep \'start\|end\' file.txt egrep start end file.txt egrep (start\|end) file.txt egrep start&end file.txt Question ID 2099 A file begins with \#!/bin/csh. This means: C Shell compatibility mode is enabled Nothing, this is a comment This is a Perl script Running the script will invoke /bin/csh to interpret the rest of the file The operator should not be using /bin/csh Question ID 2101 Most of nano's commands take the form of: **Escape** followed by another character Mouse clicks **Alt** and another character The **F1** through **F12** function keys **Control** and another character Question ID 2111 The if command looks for what exit code to consider a condition to be true? 0 10 2 1 255 Question ID 2112 The number of users logged in is in a variable called USERS. How would you test to see if there are 5 users logged in? test \$USERS --eq 5 test \$USERS = 5 test \$USERS,5 test \$USERS --a 5 test --f USERS=5 Question ID 2122 Which of the following are valid partitioning types? (choose two) MBR GPT PC BIOS Question ID 2128 Software that allows hardware devices to communicate with the installed operating system is called? Instructions Packages Drivers Programs Question ID 2130 Which of the following commands will check hard disk GPT partitions? (choose three) sgdisk gfdisk sfdisk cgdisk gdisk Question ID 2135 The process (ps) command shows only processes running in the current shell by default. True or False? True False Question ID 2137 The free command outputs statistics about: Memory usage Disk usage CPU usage Software usage Question ID 2144 Which file contains the information passed to the kernel at boot time? /proc/kargs /proc/kernel /proc/cmdline /proc/kopts Question ID 2145 To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it: /etc/sysctl.conf /etc/procsys.conf /etc/sysinfo.conf /etc/procctl.conf Question ID 2159 Which of the following commands will display the IP address on a Linux system? route dig ifconfig ipconfig Question ID 2164 The RSA key fingerprint allows the dig command to connect to remote systems. True or False? True False Question ID 2166 When issuing the service network restart command, which of the following occurs? \...the networking for the system is stopped and then started back up. \...takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted. \...brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted. Question ID 2168 Which of the following commands can be used to display socket statistics, and supports all major packet and socket types? route top ss ifconfig Question ID 2176 Which of the following commands will display the groups that the user bob belongs to? group bob all bob groups -a id bob Question ID 2190 Traditional UNIX systems allowed users to belong to how many groups? 10,000 16 256 1 65,000 Question ID 2195 A value of 0 in the "minimum" password aging field means the user *cannot* change their password. True or False? True False Question ID 2198 Sudo privileges allow users to execute commands as another user. True or False? True False Question ID 2200 The first line of this command displays how long the system has been running since being rebooted. getent who su id w Question ID 2209 Which option for the usermod command can be used to specify a user\'s group ID (either primary or secondary)? (choose two) -s -g -G -S Question ID 2213 The groupmod command can be used to add users to a group. True or False? True False Question ID 2217 Which of the following files contains user IDs? /etc/passwd /etc/group /etc/usr /etc/shadow Question ID 2219 Which of the following commands, run as root, will prevent the user bob from logging in? usermod -l bob usermod -L bob usermod -D bob usermod -d bob Question ID 2220 What directory contains a user\'s home directory? /home / /rootfs /user Question ID 2221 GIDs under 500 (or 1000) are usually reserved for what kind of groups? System use Administrators User private groups (UPG) Are not used for groups, but for user accounts Question ID 2249 A user cannot delete a file if they do not own it. True or False? True False Question ID 2257 The chown command permits changing group ownership done by root only. True or False? True False Question ID 2259 Which of the following commands will list hidden files as well as their ownership? ls -la ls -a ls -l ls -z Question ID 2264 Which of the following commands will set *setuid* for the /usr/bin/program? None of the above chmod 2755 /usr/bin/program chmod 4755 /usr/bin/program chmod 1755 /usr/bin/program Question ID 2268 Setting *setgid* on a directory\... \...will set the group owner of all files created in the directory to the group owner of the directory. \...will allow scripts in the directory to be executed as the group owner of the directory. \...does nothing. \...is not allowed by the system. Question ID 2269 Deleting a source file will break an associated hard link. True or False? True False Question ID 2273 Which of the following commands would create a hard link for *link* to *file*? ln -s file link ln link file ln -s link file ln file link