Final Exam (Modules 9 - 16)
CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
- test $USERS eq 5
WRONG - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do echo n . process_data > /tmp/foo done
Which of the following are true?
- /tmp/foo will be removed if it exists
CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
- case
CORRECT - See section 9.5.3
What is the meaning of
$(( $i + 1))
?- 1 will be added to the i variable
CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
- test d /tmp/foo o $USERS gt 5
CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
- partition
- slice
CORRECT - See section 10.6
Which of the following are valid partitioning types?
- MBR
- GPT
CORRECT - See section 10.6
The
fdisk
command is a tool used for working with the MBR partitioned disks.- True
CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
- /dev/hda
CORRECT - See section 10.8
Which of the following are valid video cable connector types?
- VGA
- DVI
CORRECT - See section 11.7
A command that will continuously update statistics about running processes:
- top
CORRECT - See section 11.6
The following are valid Linux option styles:
- Traditional Unix with a single dash (-)
- BSD Unix without a dash
- GNU long options with two dashes (--)
CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
- /proc/cmdline
WRONG - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
- /etc/procctl.conf
CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
- rpm -qa
CORRECT - See section 12.3
Which of the following would be considered a host?
- A printer attached to the network via an IP address
CORRECT - See section 12.7.4
What option to the
netstat
command has information shown as numbers rather than names?- -n
CORRECT - See section 12.7.7
Which of the following commands will allow you to log into the machine server1 with the account name nick?
- ssh nick@server1
CORRECT - See section 12.7.7.1
The RSA key fingerprint allows the
dig
command to connect to remote systems.- False
CORRECT - See section 13.3
Which files contain user account information?
- /etc/passwd
- /etc/shadow
CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
- True
CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the
su
command, the installation process automatically configures one user account to be able to use the sudo
command to execute commands as if they were executed by the root user.- True
CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
- w
- uptime
WRONG - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
- True
CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
- getent
CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
- last
CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
- /etc/shadow
CORRECT - See section 14.8.2
Which of the following files contains user IDs?
- /etc/passwd
WRONG - See section 14.3
Which of the following files does the
groupadd
command use to determine the new GID when a GID isn't specified?- /etc/shadow
CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
- usermod -L bob
CORRECT - See section 15.6
The
chmod
command can be used on a file by:- The file owner and root
CORRECT - See section 15.6
Which option for the
chown
command can be used to change the owner of a directory and all the files and directories below it?- -R
CORRECT - See section 15.6
The
chown
command will only accept one file at a time as an argument.- False
CORRECT - See section 15.9
The "execute" permission is never set on files by default.
- True
CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
- False
CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
- True
CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
- True
CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
- False
CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
- ln file link
CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
- ln -s file link
0 komentar