Linux originally only ran on

Содержание
  1. Linux Essentials 2.0 Final Comprehensive Exam (Chapter 1-18) Answers
  2. NDG Linux Essentials 2.0 Final Comprehensive Exam (Chapter 1-18) Answers
  3. Embedded Systems means:
  4. Linux originally only ran on:
  5. Bundling utilities, management tools, and application software with a Linux kernel is called a:
  6. A software release cycle describes:
  7. Apple’s OS X is:
  8. (choose three)
  9. Microsoft Windows:
  10. (choose three)
  11. An interpreted programming language:
  12. (choose two)
  13. The two main families of Linux shells are:
  14. (choose two)
  15. In virtualization, what are the host and guest?
  16. (choose two)
  17. Cloud computing is:
  18. Which of the following are properties of a strong password?
  19. (choose three)
  20. A license where you don’t have access to the source code is called:
  21. A copyleft provision in a software license means:
  22. The Free Software Foundation believes that:
  23. (choose two)
  24. What does it mean when a work is placed in the public domain?
  25. The semicolon ( ; ) can be used to separate multiple commands to be executed in order.
  26. True or False?
  27. To be able to output messages to the screen, use the _______ command:
  28. The _______ command will print a list of the commands that you’ve previously executed.
  29. HOME is an example of _________.
  30. The directory where additional documentation for software packages most likely can be found is:
  31. To start searching a man page, the first key you press is:
  32. To get help on using the info command, execute:
  33. (choose two)
  34. The _____ command can be used to find any file, not just commands or man pages.
  35. Hidden files are files that begin with what character?
  36. The top-level directory on a Linux system is represented as:
  37. The ls command without options or arguments…
  38. The command ls -S will sort files:
  39. When using the cp command, you must provide both a source and a destination.
  40. True or False?
  41. Which option can be used with the rm command to prompt before deleting?
  42. Which command would list files that do not begin with a “T” or a “W”?
  43. In general, for which of the following would you want to use lossless compression?
  44. You type gzip myfile.tar . What happens?
  45. (choose two)
  46. Which command will show what is inside the compressed tarball with a name of foo.tar.gz ?
  47. By default, the zip command replaces uncompressed files with compressed files.
  48. True or False?
  49. Error messages generated by commands are sent where by default?
  50. Which of the following commands will display only lines that begin with test ?
  51. Which of the following commands will display lines that contain either start or end?
  52. A file begins with #!/bin/csh . This means:
  53. Most of nano ’s commands take the form of:
  54. The if command looks for what exit code to consider a condition to be true?
  55. The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
  56. Which of the following are valid partitioning types?
  57. (choose two)
  58. Software that allows hardware devices to communicate with the installed operating system is called?
  59. Which of the following commands will check hard disk GPT partitions?
  60. (choose three)
  61. The process ( ps ) command shows only processes running in the current shell by default.
  62. True or False?
  63. The free command outputs statistics about:
  64. Which file contains the information passed to the kernel at boot time?
  65. To make changes permanent for kernel parameter files found under /proc/sys , the following file can have entries added to it:
  66. Which of the following commands will display the IP address on a Linux system?
  67. The RSA key fingerprint allows the dig command to connect to remote systems.
  68. True or False?
  69. When issuing the service network restart command, which of the following occurs?
  70. Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?
  71. Which of the following commands will display the groups that the user bob belongs to?
  72. Traditional UNIX systems allowed users to belong to how many groups?
  73. A value of 0 in the “minimum” password aging field means the user cannot change their password.
  74. True or False?
  75. Sudo privileges allow users to execute commands as another user.
  76. True or False?
  77. The first line of this command displays how long the system has been running since being rebooted.
  78. Which option for the usermod command can be used to specify a user’s group ID (either primary or secondary)?
  79. (choose two)
  80. The groupmod command can be used to add users to a group.
  81. True or False?
  82. Which of the following files contains user IDs?
  83. Which of the following commands, run as root, will prevent the user bob from logging in?
  84. What directory contains a user’s home directory?
  85. GIDs under 500 (or 1000) are usually reserved for what kind of groups?
  86. A user cannot delete a file if they do not own it.
  87. True or False?
  88. The chown command permits changing group ownership done by root only.
  89. True or False?
  90. Which of the following commands will list hidden files as well as their ownership?
  91. Which of the following commands will set setuid for /usr/bin/ program?
  92. Setting setgid on a directory…
  93. Deleting a source file will break an associated hard link.
  94. True or False?
  95. Which of the following commands would create a hard link, link to file ?
Читайте также:  Manjaro linux пароль пользователя

Linux Essentials 2.0 Final Comprehensive Exam (Chapter 1-18) Answers

NDG Linux Essentials 2.0 Final Comprehensive Exam (Chapter 1-18) Answers

Embedded Systems means:

  • Companies must share their changes
  • You can view the software’s source code
  • Businesses cannot charge anything for the software, only the hardware
  • Systems designed to do a specific task on hardware optimized for only that purpose
  • Users must support the systems themselves

Linux originally only ran on:

  • Xerox copy machines
  • Specialized processor chips
  • Intel 386 PCs
  • Raspberry Pi computers
  • Macintosh

Bundling utilities, management tools, and application software with a Linux kernel is called a:

  • A trademark
  • A distribution of Linux
  • A type of hardware
  • A text editor

A software release cycle describes:

  • How often security fixes are implemented
  • How often the software’s memory is released back to the operating system
  • How often upgrades come out for software
  • How often the computer must be rebooted
  • How often the computer must be upgraded to support new software

Apple’s OS X is:

(choose three)

  • A fully certified UNIX distribution
  • Tightly integrated with Apple hardware
  • Partially based on code from the FreeBSD project
  • Primarily used to manage network services
  • Derived from Linux
  • Able to natively run Windows binaries

Microsoft Windows:

(choose three)

  • Is generally backwards compatible with previous versions
  • Offers both desktop and server products
  • Has a Linux compatibility mode
  • Has a short maintenance cycle
  • Has a scripting environment called PowerShell
  • Has a new desktop version every year.

An interpreted programming language:

(choose two)

  • Requires a compilation step but no linking step
  • Is converted into machine specific instructions as the program runs
  • Tends to offer more features than compiled languages
  • Requires a linking step but no compilation step
  • Takes fewer resources to run than a compiled language

The two main families of Linux shells are:

(choose two)

In virtualization, what are the host and guest?

(choose two)

  • The host is the machine that runs the virtual machines
  • The guest is the machine that runs the virtual machines
  • The terms can be used interchangeably
  • A host is a virtual machine
  • A guest is a virtual machine

Cloud computing is:

  • Requires fewer resources because systems are shared among many users
  • Allows users in different geographical regions to work together in real time
  • All are correct
  • Is made possible by faster internet speeds
  • Is useful for both business and home users

Which of the following are properties of a strong password?

(choose three)

  • Based on easy to remember items like birthdays
  • Long so that it can be reused on multiple sites
  • Includes symbols
  • At least 10 characters long
  • A mix of upper and lower case
Читайте также:  Adobe в системах linux

A license where you don’t have access to the source code is called:

A copyleft provision in a software license means:

  • You must provide support for your modifications
  • You may not link against third party closed source software
  • If you redistribute the software, you must distribute the source to any changes you make
  • You must provide free copies of the software if you use it
  • You give up your copyright to the software

The Free Software Foundation believes that:

(choose two)

  • Software should be free to modify
  • People should write software with no expectation of making money
  • Software should not have copyright
  • Software should be free to share
  • No money should ever change hands

What does it mean when a work is placed in the public domain?

  • The work was done by a government agency
  • You may not use the work for commercial purposes
  • The author has died
  • The author has relinquished the copyright on the work
  • You must redistribute changes to the software

The semicolon ( ; ) can be used to separate multiple commands to be executed in order.

True or False?

To be able to output messages to the screen, use the _______ command:

The _______ command will print a list of the commands that you’ve previously executed.

HOME is an example of _________.

  • A path variable
  • A local variable
  • An environment variable
  • An alias
  • An internal command

The directory where additional documentation for software packages most likely can be found is:

To start searching a man page, the first key you press is:

To get help on using the info command, execute:

(choose two)

The _____ command can be used to find any file, not just commands or man pages.

Hidden files are files that begin with what character?

The top-level directory on a Linux system is represented as:

The ls command without options or arguments…

  • …prompts for a directory to list.
  • …lists the contents of the current directory.
  • …lists the contents of a user’s home directory.
  • …generates an error as this command requires arguments.

The command ls -S will sort files:

  • By size, smallest to largest
  • By modification date, newest to oldest
  • By number of symlinks, largest to smallest
  • By size, largest to smallest

When using the cp command, you must provide both a source and a destination.

True or False?

Which option can be used with the rm command to prompt before deleting?

Which command would list files that do not begin with a “T” or a “W”?

In general, for which of the following would you want to use lossless compression?

  • A JPEG image
  • A log file
  • An encrypted email
  • A movie
  • An mp3 audio file

You type gzip myfile.tar . What happens?

(choose two)

  • An error; you forgot to specify the file with -f
  • myfile.tar is unarchived into the current directory
  • myfile.tar is removed
  • An error; you forgot to pass the name of the output file
  • myfile.tar.gz holds a compressed version of myfile.tar

Which command will show what is inside the compressed tarball with a name of foo.tar.gz ?

  • tar –tf foo.tar.gz
  • tar –tzf foo.tar.gz
  • tar –xf foo.tar.gz
  • tar –lf foo.tar.gz
  • tar –tjf foo.tar.gz

By default, the zip command replaces uncompressed files with compressed files.

True or False?

Error messages generated by commands are sent where by default?

Which of the following commands will display only lines that begin with test ?

  • grep *test file.txt
  • grep &test file.txt
  • grep $test* file.txt
  • grep ^test file.txt

Which of the following commands will display lines that contain either start or end?

  • egrep ‘start|end’ file.txt
  • egrep start end file.txt
  • egrep start&end file.txt
  • egrep (start|end) file.txt

A file begins with #!/bin/csh . This means:

  • This is a Perl script
  • The operator should not be using /bin/csh
  • C Shell compatibility mode is enabled
  • Running the script will invoke /bin/csh to interpret the rest of the file
  • Nothing, this is a comment
Читайте также:  Скрипт копирования файлов по сети linux

Most of nano ’s commands take the form of:

  • Alt and another character
  • Escape followed by another character
  • The F1 through F12 function keys
  • Mouse clicks
  • Control and another character

The if command looks for what exit code to consider a condition to be true?

The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?

  • test $USERS –eq 5
  • test $USERS,5
  • test –f USERS=5
  • test $USERS = 5
  • test $USERS –a 5

Which of the following are valid partitioning types?

(choose two)

Software that allows hardware devices to communicate with the installed operating system is called?

Which of the following commands will check hard disk GPT partitions?

(choose three)

The process ( ps ) command shows only processes running in the current shell by default.

True or False?

The free command outputs statistics about:

Which file contains the information passed to the kernel at boot time?

To make changes permanent for kernel parameter files found under /proc/sys , the following file can have entries added to it:

Which of the following commands will display the IP address on a Linux system?

The RSA key fingerprint allows the dig command to connect to remote systems.

True or False?

When issuing the service network restart command, which of the following occurs?

  • …takes down all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.
  • …the networking for the system is stopped and then started back up.
  • …brings up all network interfaces, re-reads all related configuration files and then the networking for the system is restarted.

Which of the following commands can be used to display socket statistics, and supports all major packet and socket types?

Which of the following commands will display the groups that the user bob belongs to?

Traditional UNIX systems allowed users to belong to how many groups?

A value of 0 in the “minimum” password aging field means the user cannot change their password.

True or False?

Sudo privileges allow users to execute commands as another user.

True or False?

The first line of this command displays how long the system has been running since being rebooted.

Which option for the usermod command can be used to specify a user’s group ID (either primary or secondary)?

(choose two)

The groupmod command can be used to add users to a group.

True or False?

Which of the following files contains user IDs?

Which of the following commands, run as root, will prevent the user bob from logging in?

What directory contains a user’s home directory?

GIDs under 500 (or 1000) are usually reserved for what kind of groups?

  • Are not used for groups, but for user accounts
  • Administrators
  • User private groups (UPG)
  • System use

A user cannot delete a file if they do not own it.

True or False?

The chown command permits changing group ownership done by root only.

True or False?

Which of the following commands will list hidden files as well as their ownership?

Which of the following commands will set setuid for /usr/bin/ program?

  • chmod 1755 /usr/bin/program
  • chmod 4755 /usr/bin/program
  • chmod 2755 /usr/bin/program
  • None of the above

Setting setgid on a directory…

  • …will allow scripts in the directory to be executed as the group owner of the directory.
  • …will set the group owner of all files created in the directory to the group owner of the directory.
  • …is not allowed by the system.
  • …does nothing.

Deleting a source file will break an associated hard link.

True or False?

Which of the following commands would create a hard link, link to file ?

Источник

Оцените статью
Adblock
detector