0% found this document useful (0 votes)
36 views13 pages

NDG Linux2

The document outlines various concepts related to embedded systems, Linux, and command-line operations. It covers topics such as software licensing, password security, virtualization, cloud computing, and file management commands. Additionally, it includes questions and answers regarding Linux commands, user permissions, and system administration tasks.

Uploaded by

xdaimpr0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views13 pages

NDG Linux2

The document outlines various concepts related to embedded systems, Linux, and command-line operations. It covers topics such as software licensing, password security, virtualization, cloud computing, and file management commands. Additionally, it includes questions and answers regarding Linux commands, user permissions, and system administration tasks.

Uploaded by

xdaimpr0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

1.

Embedded Systems means:

o Businesses cannot charge anything for the software, only the


hardware
o Systems designed to do a specific task on hardware optimized for
only that purpose
o Users must support the systems themselves
o You can view the software’s source code
o Companies must share their changes

2. Linux originally only ran on:

o Specialized processor chips


o Raspberry Pi computers
o Xerox copy machines
o Intel 386 PCs
o Macintosh

3. Bundling utilities, management tools, and application


software with a Linux kernel is called a:

o A text editor
o A type of hardware
o A distribution of Linux
o A trademark

4. A software release cycle describes:

o How often the software’s memory is released back to the operating


system
o How often the computer must be rebooted
o How often upgrades come out for software
o How often security fixes are implemented
o How often the computer must be upgraded to support new software

5. Apple’s OS X is:

(choose three)

o Tightly integrated with Apple hardware


o A fully certified UNIX distribution
o Primarily used to manage network services
o Able to natively run Windows binaries
o Derived from Linux
o Partially based on code from the FreeBSD project
6. Microsoft Windows:

(choose three)

o Offers both desktop and server products


o Has a short maintenance cycle
o Has a Linux compatibility mode
o Is generally backwards compatible with previous versions
o Has a scripting environment called PowerShell
o Has a new desktop version every year.

7. An interpreted programming language:

(choose two)

o Takes fewer resources to run than a compiled language


o Requires a compilation step but no linking step
o Tends to offer more features than compiled languages
o Is converted into machine specific instructions as the program runs
o Requires a linking step but no compilation step

8. The two main families of Linux shells are:

(choose two)

o Emacs
o Korn shell
o Bourne Shell
o C Shell
o Python Shell

9. In virtualization, what are the host and guest?

(choose two)

o The guest is the machine that runs the virtual machines


o The terms can be used interchangeably
o The host is the machine that runs the virtual machines
o A guest is a virtual machine
o A host is a virtual machine

10. Cloud computing is:

o Is made possible by faster internet speeds


o Is useful for both business and home users
o All are correct
o Requires fewer resources because systems are shared among many
users
o Allows users in different geographical regions to work together in
real time

11. Which of the following are properties of a strong


password?

(choose three)

o Includes symbols
o At least 10 characters long
o A mix of upper and lower case
o Based on easy to remember items like birthdays
o Long so that it can be reused on multiple sites

12. A license where you don’t have access to the source code
is called:

o Closed source
o Sourceless
o Impaired source
o Open source

13. A copyleft provision in a software license means:

o You must provide support for your modifications


o You must provide free copies of the software if you use it
o You may not link against third party closed source software
o You give up your copyright to the software
o If you redistribute the software, you must distribute the source to
any changes you make

14. The Free Software Foundation believes that:

(choose two)

o Software should be free to modify


o Software should be free to share
o No money should ever change hands
o People should write software with no expectation of making money
o Software should not have copyright

15. What does it mean when a work is placed in the public


domain?

o The author has relinquished the copyright on the work


o The author has died
o You must redistribute changes to the software
o You may not use the work for commercial purposes
o The work was done by a government agency

16. The semicolon (;) can be used to separate multiple


commands to be executed in order.
True or False?

o True
o False

17. To be able to output messages to the screen, use the


_______ command:

o type
o print
o display
o echo
o
18. The _______ command will print a list of the commands
that you’ve previously executed.

o history
o exec
o eval
o list

19. HOME is an example of _________.

o An internal command
o An alias
o A path variable
o A local variable
o An environment variable

20. The directory where additional documentation for


software packages most likely can be found is:

o /usr/share/doc
o /var/share/doc
o /var/lib/doc
o /usr/software/doc

21. To start searching a man page, the first key you press is:
o s
o !
o /
o F

22. To get help on using the info command, execute:


(choose two)

o help info
o man info
o info -q
o info info

23. The _____ command can be used to find any file, not just
commands or man pages.

o whatis
o whereis
o apropos
o locate

24. Hidden files are files that begin with what character?

o A dash (-)
o A plus (+)
o A period (.)
o An asterisk (*)

25. The top-level directory on a Linux system is represented


as:

o C:
o /home
o /
o /root

26. The ls command without options or arguments…


o …lists the contents of the current directory.
o …prompts for a directory to list.
o …generates an error as this command requires arguments.
o …lists the contents of a user’s home directory.

27. The command ls -S will sort files:


o By size, smallest to largest
o By size, largest to smallest
o By number of symlinks, largest to smallest
o By modification date, newest to oldest

28. When using the cp command, you must provide both a


source and a destination.
True or False?

o True
o False

29. Which option can be used with the rm command to prompt


before deleting?
o l
o -i
o A
o -P

30. Which command would list files that do not begin with
a T or a W?
o echo /etc/*[TW!]
o echo /etc/[!TW]*
o echo /etc/!TW
o echo /etc/[*TW]!

31. In general, for which of the following would you want to


use lossless compression?

o An mp3 audio file


o A movie
o A JPEG image
o A log file
o An encrypted email

32. You type gzip myfile.tar. What happens?


(choose two)

o myfile.tar is removed
o An error; you forgot to pass the name of the output file
o myfile.tar is unarchived into the current directory
o myfile.tar.gz holds a compressed version of myfile.tar
o An error; you forgot to specify the file with -f

33. Which command will show what is inside the compressed


tarball with a name of foo.tar.gz?
o tar –tf foo.tar.gz
o tar –lf foo.tar.gz
o tar –tzf foo.tar.gz
o tar –tjf foo.tar.gz
o tar –xf foo.tar.gz
34. By default, the zip command replaces uncompressed files
with compressed files.
True or False?

o True
o False

35. Error messages generated by commands are sent where


by default?

o STDOUT
o Log files
o STDERR
o STDIN

36. Which of the following commands will display only lines


that begin with test?
o grep $test* file.txt
o grep ^test file.txt
o grep &test file.txt
o grep *test file.txt

37. Which of the following commands will display lines that


contain either start or end?

o egrep start end file.txt


o egrep (start|end) file.txt
o egrep start&end file.txt
o egrep 'start|end' file.txt

38. A file begins with #!/bin/csh. This means:


o Nothing, this is a comment
o This is a Perl script
o Running the script will invoke /bin/csh to interpret the rest of the file
o The operator should not be using /bin/csh
o C Shell compatibility mode is enabled

39. Most of nano’s commands take the form of:


o Alt and another character
o Control and another character
o The F1 through F12 function keys
o Mouse clicks
o Escape followed by another character
40. The if command looks for what exit code to consider a
condition to be true?
o 0
o 10
o 255
o 2
o 1

41. The number of users logged in is in a variable


called USERS. How would you test to see if there are 5 users
logged in?
o test –f USERS=5
o test $USERS –eq 5
o test $USERS = 5
o test $USERS –a 5
o test $USERS,5
42. Which of the following are valid partitioning types?

(choose two)

o GPT
o PC
o MBR
o BIOS

43. Software that allows hardware devices to communicate


with the installed operating system is called?

o Packages
o Drivers
o Instructions
o Programs

44. Which of the following commands will check hard disk


GPT partitions?(choose three)

o gdisk
o sfdisk
o gfdisk
o sgdisk
o cgdisk

45. The process (ps) command shows only processes running


in the current shell by default.
True or False?

o True
o False
46. The free command outputs statistics about:
o Disk usage
o Memory usage
o Software usage
o CPU usage

47. Which file contains the information passed to the kernel


at boot time?

o /proc/kernel
o /proc/kargs
o /proc/kopts
o /proc/cmdline

48. To make changes permanent for kernel parameter files


found under /proc/sys, the following file can have entries
added to it:

o /etc/sysinfo.conf
o /etc/sysctl.conf
o /etc/procctl.conf
o /etc/procsys.conf

49. Which of the following commands will display the IP


address on a Linux system?

o dig
o ifconfig
o route
o ipconfig

50. The RSA key fingerprint allows the dig command to


connect to remote systems.
True or False?

o True
o False

51. When issuing the service network restart command,


which of the following occurs?
o …the networking for the system is stopped and then started back
up.
o …brings up all network interfaces, re-reads all related configuration
files and then the networking for the system is restarted.
o …takes down all network interfaces, re-reads all related
configuration files and then the networking for the system is
restarted.
52. Which of the following commands can be used to display
socket statistics, and supports all major packet and socket
types?

o route
o ss
o top
o ifconfig

53. Which of the following commands will display the groups


that the user bob belongs to?

o groups -a
o group bob
o all bob
o id bob

54. Traditional UNIX systems allowed users to belong to how


many groups?

o 256
o 65,000
o 1
o 10,000
o 16

55. A value of 0 in the “minimum” password aging field


means the user cannot change their password.
True or False?

o True
o False

56. Sudo privileges allow users to execute commands as


another user.

True or False?

o True
o False

57. The first line of this command displays how long the
system has been running since being rebooted.

o getent
o id
o w
o su
o who

58. Which option for the usermod command can be used to


specify a user’s group ID (either primary or secondary)?
(choose two)

o -G
o -s
o -S
o -g

59. The groupmod command can be used to add users to a


group.
True or False?

o True
o False

60. Which of the following files contains user IDs?

o /etc/usr
o /etc/shadow
o /etc/group
o /etc/passwd

61. Which of the following commands, run as root, will


prevent the user bob from logging in?
o usermod -D bob
o usermod -d bob
o usermod -L bob
o usermod -l bob

62. What directory contains a user’s home directory?

o /rootfs
o /
o /home
o /user

63. GIDs under 500 (or 1000) are usually reserved for what
kind of groups?

o Administrators
o System use
o User private groups (UPG)
o Are not used for groups, but for user accounts

64. A user cannot delete a file if they do not own it. True or
False?

o True
o False

65. The chown command permits changing group ownership


done by root only. True or False?
o True
o False

66. Which of the following commands will list hidden files as


well as their ownership?

o ls -l
o ls -z
o ls -a
o ls -la

67. Which of the following commands will set setuid for


the /usr/bin/program?
o chmod 1755 /usr/bin/program
o None of the above
o chmod 2755 /usr/bin/program
o chmod 4755 /usr/bin/program

68. Setting setgid on a directory…

o …will set the group owner of all files created in the directory to the
group owner of the directory.
o …will allow scripts in the directory to be executed as the group
owner of the directory.
o …does nothing.
o …is not allowed by the system.

69. Deleting a source file will break an associated hard link.


True or False?

o True
o False
70. Which of the following commands would create a hard
link, link to file?

o ln link file
o ln -s file link
o ln -s link file
o ln file link

You might also like