Invert Pro

Selamat Datang...

Haiii haiiii Admin kembali lagi.

MULAIJOIN THIS SITE

Wednesday, December 2, 2015

Final Exam (Modules 9 - 16) NDG CISCO


Final Exam (Modules 9 - 16)



CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
  • test $USERS eq 5

WRONG - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
    echo n .
    process_data > /tmp/foo
done
Which of the following are true?
  • /tmp/foo will be removed if it exists

CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
  • case

CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
  • 1 will be added to the i variable

CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
  • test d /tmp/foo o $USERS gt 5

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
  • partition
  • slice

CORRECT - See section 10.6
Which of the following are valid partitioning types?
  • MBR
  • GPT

CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
  • True

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
  • /dev/hda

CORRECT - See section 10.8
Which of the following are valid video cable connector types?
  • VGA
  • DVI

CORRECT - See section 11.7
A command that will continuously update statistics about running processes:
  • top

CORRECT - See section 11.6
The following are valid Linux option styles:
  • Traditional Unix with a single dash (-)
  • BSD Unix without a dash
  • GNU long options with two dashes (--)

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
  • /proc/cmdline

WRONG - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
  • /etc/procctl.conf

CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
  • rpm -qa

CORRECT - See section 12.3
Which of the following would be considered a host?
  • A printer attached to the network via an IP address

CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
  • -n

CORRECT - See section 12.7.7
Which of the following commands will allow you to log into the machine server1 with the account name nick?
  • ssh nick@server1

CORRECT - See section 12.7.7.1
The RSA key fingerprint allows the dig command to connect to remote systems.
  • False

CORRECT - See section 13.3
Which files contain user account information?
  • /etc/passwd
  • /etc/shadow

CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
  • True

CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
  • True

CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
  • w
  • uptime

WRONG - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
  • True

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
  • getent

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
  • last

CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
  • /etc/shadow

CORRECT - See section 14.8.2
Which of the following files contains user IDs?
  • /etc/passwd

WRONG - See section 14.3
Which of the following files does the groupadd command use to determine the new GID when a GID isn't specified?
  • /etc/shadow

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
  • usermod -L bob

CORRECT - See section 15.6
The chmod command can be used on a file by:
  • The file owner and root

CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
  • -R

CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
  • False

CORRECT - See section 15.9
The "execute" permission is never set on files by default.
  • True

CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
  • False

CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
  • True

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
  • True

CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
  • False

CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
  • ln file link

CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
  • ln -s file link
Load disqus comments

0 komentar