Linux Essentials Final Comprehensive Exam (Modules 1 - 16) : Manage The System's Resources
Linux Essentials Final Comprehensive Exam (Modules 1 - 16) : Manage The System's Resources
Linux Essentials Final Comprehensive Exam (Modules 1 - 16) : Manage The System's Resources
(Modules 1 – 16)
Posted on February 5, 2016 by Admin
3. Question ID 5
6 Linux is written in:
C
.NET
C++
Java
Perl
4. Question ID 6
7 Source code refers to:
The version of a program that the computer runs on the CPU
The license that dictates how you may use and share the software
The interface that software uses to talk to the kernel
A human readable version of computer software
5. Question ID 22
8 What is the standard option to provide a command line program
to view its documentation?
–info
–doc
–help
-h
6. Question ID 23
9 The command man -k is the same as the command apropos.
10 True or False?
True
False
7. Question ID 24
11 The whatis command is the same as man -w.
True
False
8. Question ID 26
12 The directory where additional documentation for software
packages most likely can be found is:
/var/lib/doc
/usr/software/doc
/usr/share/doc
/var/share/doc
9. Question ID 47
13 Hidden files are files that begin with what character?
A plus (+)
A dash (-)
A period (.)
An asterisk (*)
10. Question ID 48
14 What option for the ls command will display all files, including
hidden files?
-w
-H
-L
-a
11. Question ID 49
15 The top-level directory on a Linux system is represented as:
/
/root
/home
C:
12. Question ID 50
16 Is the following path absolute or relative?
17 /etc/ppp
Relative
Absolute
13. Question ID 51
18 Is the following path absolute or relative?
19 sysadmin/Documents
Relative
Absolute
14. Question ID 73
20 Compression on a file works by:
Removing the high order bit from each byte
Consolidating multiple files into one
Removing redundant information
Storing most of the data on removable media and just leaving a pointer
Eliminating gaps within the file
15. Question ID 75
21 In general, for which of the following would you want to use
lossless compression?
An mp3 audio file
A movie
A log file
A JPEG image
An encrypted email
16. Question ID 76
22 Lossy compression:
23 (choose three)
Is often used with documents
Decompresses to an identical version as the original
Sacrifices some quality
Usually results better compression than lossless
Is often used with images
17. Question ID 77
24 You type gzip myfile.tar. What happens?
25 (choose two)
myfile.tar.gz holds a compressed version of myfile.tar
An error; you forgot to pass the name of the output file
An error; you forgot to specify the file with –f
myfile.tar is unarchived into the current directory
myfile.tar is removed
18. Question ID 93
26 Error messages generated by commands are sent where by
default?
STDIN
Log files
STDERR
STDOUT
19. Question ID 94
27 A successful command will print output to STDOUT.
28 True or False?
True
False
20. Question ID 95
29 Which of the following commands will direct error messages to
the file, error.log?
30 (choose one)
ls /root > error.log
ls /root >> error.log
ls /root 2> error.log
ls /root $> error.log
21. Question ID 96
31 A pipe allows you to…
…send the same input to multiple commands.
…send the output of one command to another.
…send the output of a command to a file.
…type multiple commands at one prompt.
22. Question ID 97
32 Channel 2 is:
STDERR
STDIN
STDALL
STDOUT
23. Question ID 117
33 The echo command:
Tests a variable for duplication
Duplicates the input stream to the output stream
Is used for variable assignment
Is used to output text to the console
Copies variables from one to another
24. Question ID 118
34 A file begins with #!/bin/csh. This means:
C Shell compatibility mode is enabled
Running the script will invoke /bin/csh to interpret the rest of the file
The operator should not be using /bin/csh
This is a Perl script
Nothing, this is a comment
25. Question ID 119
35 Which are appropriate editors for writing shell scripts?
36 (choose two)
nano
LibreOffice Writer
/bin/bash
vi
Firefox
26. Question ID 120
37 Most of nano’s commands take the form of:
Escape followed by another character
Mouse clicks
The F1 through F12 function keys
Alt and another character
Control and another character
27. Question ID 121
38 What does this shell script do?
39 FOO=/tmp/foo
40 if [ ! –d $FOO ]; then
41 mkdir $FOO
42 fi
Nothing, since there is a problem with the conditions in the if statement
Makes the /tmp/foo directory if a file by that name exists
Creates /tmp/foo if it does not exist
Creates /tmp/foo and raises an error if there is a problem
Outputs a message to the screen
28. Question ID 140
43 Which of the following are valid CPU types for Intel-based
platforms?
44 (choose two)
48 bit
24 bit
64 bit
32 bit
29. Question ID 141
45 64 bit platforms can access more memory than 32 bit platforms.
46 True or False?
True
False
30. Question ID 157
47 What does the acronym RPM mean?
Relocate Package Manager
Return Package Management
RPM Package Management
Recursive Package Manager
31. Question ID 158
48 One way to install new software on a Linux system is to use a
package management system.
49 True or False?
True
False
32. Question ID 159
50 When you execute the dmesg command, the system displays
messages that are generated by the kernel.
51 True or False?
True
False
33. Question ID 160
52 Which of the following are package management commands for
distributions with software distributed in files ending in .deb?
53 (choose three)
rpm
apt-get
dpkg
aptitude
34. Question ID 161
54 Which of the following are package management commands for
distributions with software distributed in files ending in .rpm?
55 (choose three)
yum
apt-get
rpm
yumex
35. Question ID 177
56 Which of the following would be considered a host?
A printer attached to the network via an IP address
A CDROM
The computer’s hard drive
A network cable
36. Question ID 178
57 A service is…
…a file that contains configuration information.
…another name for a computer’s hostname.
…a feature provided by one computer to another.
…like an IP address.
37. Question ID 180
58 A network packet contains …
59 (choose two)
…the IP address of the destination machine.
…a hard drive partition.
…the name of the router.
…the IP address of the source machine.
38. Question ID 181
60 Only servers have hostnames.
61 True or False?
True
False
39. Question ID 197
62 Which files contain user account information?
63 (choose two)
/etc/passwd
/etc/shadow
/etc/group
40. Question ID 198
64 Which user can view the /etc/shadow file?
The root user
No users
Any member of the password group
All users
41. Question ID 199
65 Which command will display the UID, GID and groups your
current user belongs to?
id
whoami
who
about
42. Question ID 200
66 Each user belongs to at least one group.
67 True or False?
True
False
43. Question ID 201
68 Which command will display the users that are currently logged
in to the system?
who
about
whoami
id
44. Question ID 217
69 UIDs 1-500 are usually reserved for what kind of users?
Are not used for user accounts, but for group accounts
System accounts, such as server processes
Remote log-in accounts
Log-in (human) users
45. Question ID 218
70 If a user is deleted, the files and directories that the user
owned…
…are deleted as well.
…will have no UID owner.
…will show a UID as the owner, but not user name.
…will have no user owner.
46. Question ID 219
71 Which of the following options for the useradd command allows
root to specify the UID to be associated with the account?
-g
-u
-U
-G
47. Question ID 220
72 Which of the following options for the useradd command allows
root to specify supplementary groups the user will be a member of?
-u
U
-g
-G
48. Question ID 221
73 On a system that does not use UPG, the useradd command will
also create a user group. For example, user bob, group bob.
74 True or False?
True
False
49. Question ID 237
75 Which of the following commands set “other” permissions on
file to r-x?
chmod o+rx file
chmod o-r-w file
chmod o=r+x file
chmod o=rx file
50. Question ID 238
76 Which of the following commands sets “other” permissions on
file to r-x?
chmod 774 file
chmod 776 file
chmod 775 file
chmod 777 file
51. Question ID 239
77 Only one set (user, group, other) of permission can be changed
at once using the symbolic method.
78 True or False?
True
False
52. Question ID 240
79 Which of the following are methods for setting permissions
using the chmod command?
80 (choose two)
letter
octal
symbolic
binary
53. Question ID 241
81 The chown command can be used to change the owner and
group of a file.
82 True or False?
True
False
54. Question ID 267
83 The Samba application is a:
Mail Server
Security Server
File Server
Web Server
55. Question ID 268
84 Which of the following are examples of desktop software?
85 (choose two)
Web server
Web browser
File share
Compiler
Music player
56. Question ID 269
86 If you wanted to set up a blog, which software would be most
helpful?
MySQL
Postfix
WordPress
Dovecot
Samba
57. Question ID 270
87 Which of the following pieces of software deal with file sharing?
88 (choose three)
NFS
X-Windows
Netatalk
Samba
PostgreSQL
58. Question ID 271
89 If you wanted to create and print an invoice, which software
could you use?
GNOME
Compiz
Firefox
LibreOffice
Evolution
59. Question ID 307
90 Which of the following is true about graphical mode?
91 (choose three)
You have menus and tools to help you find what you are looking for
You access this mode by logging into a graphical display
After login, you are provided with a command prompt
After login, you are provided with a desktop
You cannot use your mouse
60. Question ID 308
92 Which of the following is provided by a graphical interface that
isn’t normally provided to a non graphical interface?
93 (choose four)
Desktop
Shell
Windows
Popups
Menus
61. Question ID 309
94 A server is likely to be running in graphical mode.
95 True or False?
True
False
62. Question ID 310
96 In graphical mode, you can get to a shell by running which
applications?
97 (choose two)
guiterm
gbash
terminal
xconsole
xterm
63. Question ID 311
98 Which of the following are traits of a multiuser operating
system?
99 (choose three)
An administrative user gets a dedicated CPU
Users can protect their information from other users
Resources are shared between users
Many users can log in simultaneously with a unique account
Each user can only log in once per day
64. Question ID 327
100 Select all the applications that provide access to the Command
Line Interface (CLI)?
101 (choose two)
Virtual Terminal
firefox
opera
Terminal window
65. Question ID 328
102 Which environment variable contains a list of directories that is
searched for commands to execute?
PATH
EXEC
PS1
PS2
66. Question ID 329
103 Select the command that can report the location of a command:
where
what
which
67. Question ID 331
104 A pair of single quotes ( ‘ ) will prevent the shell from
interpreting any metacharacter.
105 True or False?
True
False
68. Question ID 348
106 The /tmp directory is a temporary directory and will not exist on
a system at all times.
107 True or False?
True
False
69. Question ID 349
108 The /var directory has files that change over time.
109 True or False?
True
False
70. Question ID 350
110 The “sticky bit” permission…
…prevents others from removing files they don’t own from a common directory.
…changes the group ownership of existing files in a directory.
…prevents others from overwriting files they don’t own in common directories.
…sets the group ownership of any new file created in a directory.
71. Question ID 352
111 Which of the following commands will set the “sticky bit” on
/shared ?
chmod 4777 /shared
chmod 2777 /shared
chmod 7777 /shared
chmod 1777 /shared
72. Question ID 353
112 The “setuid” permission…
…allows a command to be run as the file owner.
…allows files in a directory to be manipulated as by the directory owner.
…prevents the owner of a file from being changed.
…reports the output of a script to the owner.
3. Question ID 5
118 Linux is written in:
C
.NET
Java
Perl
C++
4. Question ID 6
119 Source code refers to:
The interface that software uses to talk to the kernel
The license that dictates how you may use and share the software
The version of a program that the computer runs on the CPU
A human readable version of computer software
5. Question ID 7
120 Open source means:
121 (choose two)
You must support the software you share
You can view the software’s source code
You cannot charge anything for the software
You must share your changes
You can modify the software’s source code
6. Question ID 8
122 Most of the tools that are part of Linux systems come from:
Google
Red Hat and Debian
The Open Source Initiative
The Linux foundation
The GNU project
7. Question ID 10
123 The Linux platform that runs on mobile phones is called:
IOS
Teldroid
LinuxMobile
Android
MicroLinux
8. Question ID 11
124 What does a distribution provide to add and remove software
from the system?
Bash
Application Programming Interface (API)
Partitioning tool
Package manager
Compiler
9. Question ID 12
125 The bootloader’s job is to:
Load the application into memory
Assign initial settings such as network address
Install software from the Internet or removable media
Perform the initial installation of the kernel to hard drive
Load the kernel after the computer is powered on
10. Question ID 13
126 UNIX was originally invented at:
Stanford University
AT&T Bell Labs
Berkeley University
Xerox PARC
Bangalore University
11. Question ID 14
127 A license where you don’t have access to the source code is
called:
Impaired source
Closed source
Open source
Sourceless
12. Question ID 16
128 Which distributions are made by, or clones of, Red Hat?
129 (choose two)
Fedora
Ubuntu
Slackware
Debian
CentOS
13. Question ID 17
130 Ubuntu is derived from which distribution?
Scientific Linux
Slackware
Fedora
Debian
Red Hat Enterprise Linux
14. Question ID 19
131 Open source licenses differ, but generally agree that:
132 (choose two)
You must redistribute your changes
You are not allowed to sell the software
You should be able modify the software as you wish
You should have access to the source code of software
15. Question ID 20
133 Applications make requests to the kernel and receive
resources, such as memory, CPU, and disk in return.
134 True or False?
True
False
16. Question ID 257
135 The most important consideration when choosing an operating
system is:
What the computer will do
The licensing model of the operating system
The operating system’s mascot
How much performance is needed
Whether or not it is cloud-friendly
17. Question ID 258
136 Linux is not Unix because:
It’s not good enough
It’s free
It’s not made by the Open Group
There are too many distributions
It hasn’t undergone certification
18. Question ID 259
137 A release cycle:
Is always 6 months
Doesn’t matter in an Open Source environment
Describes how long the software will be supported for
Describes how often updates to the software come out
Only applies to software you pay for
19. Question ID 260
138 A maintenance cycle:
Should be long so that you have time before you need to upgrade
Only has meaning for paid software
Should be short so you always have the freshest releases
Describes how often updates for software come out
Describes how long a version of software will be supported
20. Question ID 261
139 If a software release is in a state in that it has many new
features that have not been rigorously tested, it is typically referred to
as beta software.
140 True or False?
True
False
21. Question ID 262
141 Software is backward compatible if:
It still supports old file formats or applications
It can be upgraded without downtime
If the next version still works the same way
It works across Linux/Mac/Windows
People still use old versions
22. Question ID 263
142 Apple’s OS X is:
143 (choose three)
Derived from Linux
Only compatible with Apple hardware
Primarily used to manage network services
Certified as UNIX compatible
Derived from FreeBSD
Able to natively run Windows binaries
23. Question ID 264
144 Microsoft Windows:
145 (choose three)
Has a new desktop version every year.
Has a short maintenance cycle
Comes in desktop and server variants
Has built in virtualization
Has a Linux compatibility mode
Has powerful scripting capabilities
24. Question ID 265
146 Other commercial Unixes:
147 (choose two)
Are tied to their vendor’s hardware
Do not run the GNU tools
Are UNIX certified
Are almost obsolete
Use completely different commands than Linux
25. Question ID 266
148 When choosing a distribution of Linux, you should consider:
149 (choose five)
Which management tools are provided by the distribution
Whether or not the distribution is under active development
The maintenance cycle of the distribution
Popularity on social media.
If you need support on the distribution itself
Which distributions are supported by the software you need to run