100% found this document useful (1 vote)
476 views6 pages

Final Exam Linux CISCO

This document contains answers to questions about Linux and operating systems. It covers topics like Unix vs Linux, file permissions, users and groups, package management, graphical vs command-line interfaces, servers, and temporary directories. Each answer includes a reference to the section number in a larger document where the topic is covered in more detail.

Uploaded by

Dancila Ovidiu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
476 views6 pages

Final Exam Linux CISCO

This document contains answers to questions about Linux and operating systems. It covers topics like Unix vs Linux, file permissions, users and groups, package management, graphical vs command-line interfaces, servers, and temporary directories. Each answer includes a reference to the section number in a larger document where the topic is covered in more detail.

Uploaded by

Dancila Ovidiu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 6

CORRECT - See section 1.

3
Unix is
An operating system
A trademark
CORRECT - See section 1.3.3
Linux is written in:
C
CORRECT - See section 1.3.3
Source code refers to:
Human readable version of computer software
WRONG - See section 5.5.1
What is the standard option to provide a command line program to view its docume
ntation?
--info
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True
CORRECT - See section 5.5.2
The directory where additional documentation for software packages most likely c
an be found is:
/usr/share/doc
CORRECT - See section 6.4.2
Hidden files are files that begin with what character?
A period (.)
CORRECT - See section 6.3
The top-level directory on a Linux system is represented as:
/
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information
CORRECT - See section 7.3
In general, which of the following would you want to use lossless compression?

A log file
CORRECT - See section 7.3
Lossy compression:
Usually results better compression than lossless
Is often used with images
Sacrifices some quality
WRONG - See section 8.4.5
Which of the following commands will direct error messages to the file error.log
?
ls /root > error.log
ls /root 2> error.log
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another
CORRECT - See section 8.4.5
Channel 2 is:
STDERR
WRONG - See section 9.3
A file begins with #!/bin/csh. This means:
C Shell compatibility mode is enabled
CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi
CORRECT - See section 9.5.2
What does this shell script do?
FOO=/tmp/foo
if [ ! d $FOO ]; then
mkdir $FOO
fi
Creates /tmp/foo if it does not exist
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit

64 bit
CORRECT - See section 11.10
When you execute the dmesg command, the system displays messages that are genera
ted by the kernel.
True
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with so
ftware distributed in files ending in ".deb"?
dpkg
aptitude
apt-get
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id
WRONG - See section 13.1
Each user is a member of their own private group, of which they are the only mem
ber.
False
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who

CORRECT - See section 14.8.1


UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify th
e UID to be associated with the account?
-u
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user g
roup. For example, user "bob", group "bob".
False
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on "file" to r-x?
chmod 775 file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the
symbolic method.
False
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod comma
nd?
octal
symbolic
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 2.3.1
The Samba application is a:
File Server

CORRECT - See section 2.3


Which of the following are examples of desktop software?
Web browser
Music player
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally p
rovided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (C
LI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.8


Select from the following commands those which can report the location of a comm
and:
which
CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metac
haracter.
True
WRONG - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at al
l times.
True
CORRECT - See section 16.7
The "sticky bit" permission...
prevents others from removing files they don't own from a common directory
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.3
The "setuid" permission...
allows a command to be run as the file owner.

You might also like