Past Paper - Linux and System Administration

Summary

This document contains a collection of questions and answers related to Linux and system administration topics. The various questions cover different aspects including commands, system concepts, and software packages.

Full Transcript

Question ID 1897 Embedded Systems means:   Users must support the systems themselves   Businesses cannot charge anything for the software, only the hardware   Systems designed to do a specific task on hardware optimized for only that purpose   Companies must share their changes   You can...

Question ID 1897 Embedded Systems means:   Users must support the systems themselves   Businesses cannot charge anything for the software, only the hardware   Systems designed to do a specific task on hardware optimized for only that purpose   Companies must share their changes   You can view the software\'s source code Question ID 1901 Linux originally only ran on:   Specialized processor chips   Intel 386 PCs   Macintosh   Xerox copy machines   Raspberry Pi computers Question ID 1912 Bundling utilities, management tools, and application software with a Linux kernel is called a:   A trademark   A distribution of Linux   A type of hardware   A text editor Question ID 1916 A software release cycle describes:   How often security fixes are implemented   How often the computer must be upgraded to support new software   How often the computer must be rebooted   How often upgrades come out for software   How often the software's memory is released back to the operating system Question ID 1923 Apple's OS X is: (choose three)   Tightly integrated with Apple hardware   Able to natively run Windows binaries   Primarily used to manage network services   A fully certified UNIX distribution   Derived from Linux   Partially based on code from the FreeBSD project Question ID 1924 Microsoft Windows: (choose three)   Is generally backwards compatible with previous versions   Has a Linux compatibility mode   Has a scripting environment called PowerShell   Has a new desktop version every year.   Has a short maintenance cycle   Offers both desktop and server products Question ID 1935 An interpreted programming language: (choose two)   Tends to offer more features than compiled languages   Is converted into machine specific instructions as the program runs   Requires a linking step but no compilation step   Takes fewer resources to run than a compiled language   Requires a compilation step but no linking step Question ID 1940 The two main families of Linux shells are: (choose two)   Emacs   Python Shell   Bourne Shell   C Shell   Korn shell Question ID 1946 In virtualization, what are the host and guest? (choose two)   A guest is a virtual machine   The host is the machine that runs the virtual machines   A host is a virtual machine   The guest is the machine that runs the virtual machines   The terms can be used interchangeably Question ID 1951 Cloud computing is:   Requires fewer resources because systems are shared among many users   Allows users in different geographical regions to work together in real time   All are correct   Is useful for both business and home users   Is made possible by faster internet speeds Question ID 1958 Which of the following are properties of a strong password? (choose three)   Based on easy to remember items like birthdays   At least 10 characters long   Includes symbols   Long so that it can be reused on multiple sites   A mix of upper and lower case Question ID 1965 A license where you don't have access to the source code is called:   Closed source   Open source   Impaired source   Sourceless Question ID 1968 A copyleft provision in a software license means:   You give up your copyright to the software   You must provide support for your modifications   If you redistribute the software, you must distribute the source to any changes you make   You may not link against third party closed source software   You must provide free copies of the software if you use it Question ID 1970 The Free Software Foundation believes that: (choose two)   Software should be free to share   People should write software with no expectation of making money   Software should not have copyright   Software should be free to modify   No money should ever change hands Question ID 1977 What does it mean when a work is placed in the public domain?   The author has relinquished the copyright on the work   The author has died   You may not use the work for commercial purposes   You must redistribute changes to the software   The work was done by a government agency Question ID 1990 The semicolon (;) can be used to separate multiple commands to be executed in order. True or False?   True   False Question ID 1992 To be able to output messages to the screen, use the \_\_\_\_\_\_\_ command:   display   type   echo   print Question ID 1993 The \_\_\_\_\_\_\_ command will print a list of the commands that you\'ve previously executed.   eval   exec   list   history Question ID 2000 HOME is an example of \_\_\_\_\_\_\_\_\_.   A local variable   An environment variable   A path variable   An internal command   An alias Question ID 2004 The directory where additional documentation for software packages most likely can be found is:   /usr/share/doc   /usr/software/doc   /var/lib/doc   /var/share/doc Question ID 2012 To start searching a man page, the first key you press is:   f   /   !   s Question ID 2014 To get help on using the info command, execute: (choose two)   info info   man info   info -q   help info Question ID 2020 The \_\_\_\_\_ command can be used to find any file, not just commands or man pages.   apropos   whatis   whereis   locate Question ID 2025 Hidden files are files that begin with what character?   A dash (-)   An asterisk (\*)   A plus (+)   A period (.) Question ID 2027 The top-level directory on a Linux system is represented as:   /   C:   /home   /root Question ID 2037 The ls command without options or arguments\...   \...prompts for a directory to list.   \...lists the contents of the current directory.   \...generates an error as this command requires arguments.   \...lists the contents of a user\'s home directory. Question ID 2042 The command ls -S will sort files:   By number of symlinks, largest to smallest   By size, largest to smallest   By modification date, newest to oldest   By size, smallest to largest Question ID 2043 When using the cp command, you must provide both a source and a destination. True or False?   True   False Question ID 2046 Which option can be used with the rm command to prompt before deleting?   -i   l   -P   A Question ID 2055 Which command would list files that do not begin with a T or a W?   echo /etc/\*\[TW!\]   echo /etc/\[!TW\]\*   echo /etc/!TW   echo /etc/\[\*TW\]! Question ID 2057 In general, for which of the following would you want to use lossless compression?   A movie   An mp3 audio file   A log file   An encrypted email   A JPEG image Question ID 2059 You type gzip myfile.tar. What happens? (choose two)   myfile.tar.gz holds a compressed version of myfile.tar   An error; you forgot to pass the name of the output file   An error; you forgot to specify the file with -f   myfile.tar is removed   myfile.tar is unarchived into the current directory Question ID 2063 Which command will show what is inside the compressed tarball with a name of foo.tar.gz?   tar --tjf foo.tar.gz   tar --xf foo.tar.gz   tar --tf foo.tar.gz   tar --tzf foo.tar.gz   tar --lf foo.tar.gz Question ID 2076 By default, the zip command replaces uncompressed files with compressed files. True or False?   True   False Question ID 2077 Error messages generated by commands are sent where by default?   STDOUT   STDERR   STDIN   Log files Question ID 2088 Which of the following commands will display only lines that begin with test?   grep \^test file.txt   grep &test file.txt   grep \$test\* file.txt   grep \*test file.txt Question ID 2089 Which of the following commands will display lines that contain either start or end?   egrep \'start\|end\' file.txt   egrep start end file.txt   egrep (start\|end) file.txt   egrep start&end file.txt Question ID 2099 A file begins with \#!/bin/csh. This means:   C Shell compatibility mode is enabled   Nothing, this is a comment   This is a Perl script   Running the script will invoke /bin/csh to interpret the rest of the file   The operator should not be using /bin/csh Question ID 2101 Most of nano's commands take the form of:   **Escape** followed by another character   Mouse clicks   **Alt** and another character   The **F1** through **F12** function keys   **Control** and another character Question ID 2111 The if command looks for what exit code to consider a condition to be true?   0   10   2   1   255 Question ID 2112 The number of users logged in is in a variable called USERS. How would you test to see if there are 5 users logged in?   test \$USERS --eq 5   test \$USERS = 5   test \$USERS,5   test \$USERS --a 5   test --f USERS=5 Question ID 2122 Which of the following are valid partitioning types? (choose two)   MBR   GPT   PC   BIOS Question ID 2128 Software that allows hardware devices to communicate with the installed operating system is called?   Instructions   Packages   Drivers   Programs Question ID 2130 Which of the following commands will check hard disk GPT partitions? (choose three)   sgdisk   gfdisk   sfdisk   cgdisk   gdisk Question ID 2135 The process (ps) command shows only processes running in the current shell by default. True or False?   True   False Question ID 2137 The free command outputs statistics about:   Memory usage   Disk usage   CPU usage   Software usage Question ID 2144 Which file contains the information passed to the kernel at boot time?   /proc/kargs   /proc/kernel   /proc/cmdline   /proc/kopts Question ID 2145 To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:   /etc/sysctl.conf   /etc/procsys.conf   /etc/sysinfo.conf   /etc/procctl.conf Question ID 2159 Which of the following commands will display the IP address on a Linux system?   route   dig   ifconfig   ipconfig Question ID 2164 The RSA key fingerprint allows the dig command to connect to remote systems. True or False?   True   False Question ID 2166 When issuing the service network restart command, which of the following occurs?   \...the networking for the system is stopped and then started back up.   \...takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.   \...brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted. Question ID 2168 Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?   route   top   ss   ifconfig Question ID 2176 Which of the following commands will display the groups that the user bob belongs to?   group bob   all bob   groups -a   id bob Question ID 2190 Traditional UNIX systems allowed users to belong to how many groups?   10,000   16   256   1   65,000 Question ID 2195 A value of 0 in the "minimum" password aging field means the user *cannot* change their password. True or False?   True   False Question ID 2198 Sudo privileges allow users to execute commands as another user. True or False?   True   False Question ID 2200 The first line of this command displays how long the system has been running since being rebooted.   getent   who   su   id   w Question ID 2209 Which option for the usermod command can be used to specify a user\'s group ID (either primary or secondary)? (choose two)   -s   -g   -G   -S Question ID 2213 The groupmod command can be used to add users to a group. True or False?   True   False Question ID 2217 Which of the following files contains user IDs?   /etc/passwd   /etc/group   /etc/usr   /etc/shadow Question ID 2219 Which of the following commands, run as root, will prevent the user bob from logging in?   usermod -l bob   usermod -L bob   usermod -D bob   usermod -d bob Question ID 2220 What directory contains a user\'s home directory?   /home   /   /rootfs   /user Question ID 2221 GIDs under 500 (or 1000) are usually reserved for what kind of groups?   System use   Administrators   User private groups (UPG)   Are not used for groups, but for user accounts Question ID 2249 A user cannot delete a file if they do not own it. True or False?   True   False Question ID 2257 The chown command permits changing group ownership done by root only. True or False?   True   False Question ID 2259 Which of the following commands will list hidden files as well as their ownership?   ls -la   ls -a   ls -l   ls -z Question ID 2264 Which of the following commands will set *setuid* for the /usr/bin/program?   None of the above   chmod 2755 /usr/bin/program   chmod 4755 /usr/bin/program   chmod 1755 /usr/bin/program Question ID 2268 Setting *setgid* on a directory\...   \...will set the group owner of all files created in the directory to the group owner of the directory.   \...will allow scripts in the directory to be executed as the group owner of the directory.   \...does nothing.   \...is not allowed by the system. Question ID 2269 Deleting a source file will break an associated hard link. True or False?   True   False Question ID 2273 Which of the following commands would create a hard link for *link* to *file*?   ln -s file link   ln link file   ln -s link file   ln file link

Use Quizgecko on...
Browser
Browser