You are on page 1of 6

CORRECT - See section 1.

3
Unix is
An operating system
A trademark
CORRECT - See section 1.3.3
Linux is written in:
C
CORRECT - See section 1.3.3
Source code refers to:
Human readable version of computer software
WRONG - See section 5.5.1
What is the standard option to provide a command line program to view its docume
ntation?
--info
CORRECT - See section 5.3.7
The command man -k is the same as the command apropos.
True
CORRECT - See section 5.5.2
The directory where additional documentation for software packages most likely c
an be found is:
/usr/share/doc
CORRECT - See section 6.4.2
Hidden files are files that begin with what character?
A period (.)
CORRECT - See section 6.3
The top-level directory on a Linux system is represented as:
/
CORRECT - See section 7.1
Compression on a file works by:
Removing redundant information
CORRECT - See section 7.3
In general, which of the following would you want to use lossless compression?

A log file
CORRECT - See section 7.3
Lossy compression:
Usually results better compression than lossless
Is often used with images
Sacrifices some quality
WRONG - See section 8.4.5
Which of the following commands will direct error messages to the file error.log
?
ls /root > error.log
ls /root 2> error.log
CORRECT - See section 8.3
A pipe allows you to...
...send the output of one command to another
CORRECT - See section 8.4.5
Channel 2 is:
STDERR
WRONG - See section 9.3
A file begins with #!/bin/csh. This means:
C Shell compatibility mode is enabled
CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
nano
vi
CORRECT - See section 9.5.2
What does this shell script do?
FOO=/tmp/foo
if [ ! d $FOO ]; then
mkdir $FOO
fi
Creates /tmp/foo if it does not exist
CORRECT - See section 10.3
Which of the following are valid CPU types for Intel-based platforms?
32 bit

64 bit
CORRECT - See section 11.10
When you execute the dmesg command, the system displays messages that are genera
ted by the kernel.
True
CORRECT - See section 11.3.1
Which of the following are package management commands for distributions with so
ftware distributed in files ending in ".deb"?
dpkg
aptitude
apt-get
CORRECT - See section 12.3
Which of the following would be considered a host?
A printer attached to the network via an IP address
CORRECT - See section 12.3
A service is...
...a feature provided by one computer to another
CORRECT - See section 12.4
Only servers have hostnames.
False
CORRECT - See section 13.3.2
Which user can view the /etc/shadow file?
The root user
CORRECT - See section 13.3.4
Which command will display the UID, GID and groups your current user belongs to?
id
WRONG - See section 13.1
Each user is a member of their own private group, of which they are the only mem
ber.
False
CORRECT - See section 13.8
Which command will display the users that are currently logged in to the system?
who

CORRECT - See section 14.8.1


UIDs 1-500 are usually reserved for what kind of users?
System accounts, such as server processes
CORRECT - See section 14.13
If a user is deleted, the files and directories that the user owned...
...will show a UID as the owner, but not user name
CORRECT - See section 14.8.1
Which of the following options for the useradd command allows root to specify th
e UID to be associated with the account?
-u
CORRECT - See section 14.8.1
On a system that does not use UPG, the useradd command will also create a user g
roup. For example, user "bob", group "bob".
False
CORRECT - See section 15.7.3
Which of the following commands sets "other" permissions on "file" to r-x?
chmod 775 file
CORRECT - See section 15.7.2
Only one set (user, group, other) of permission can be changed at once using the
symbolic method.
False
CORRECT - See section 15.7.2
Which of the following are methods for setting permissions using the chmod comma
nd?
octal
symbolic
CORRECT - See section 15.6
The chown command can be used to change the owner and group of a file.
True
CORRECT - See section 2.3.1
The Samba application is a:
File Server

CORRECT - See section 2.3


Which of the following are examples of desktop software?
Web browser
Music player
CORRECT - See section 2.3.1
If you wanted to set up a blog, which software would be most helpful?
WordPress
CORRECT - See section 3.3
Which of the following is true about graphical mode?
You access this mode by logging into a graphical display
You have menus and tools to help you find what you are looking for
After login, you are provided with a desktop
CORRECT - See section 3.3
Which of the following is provided by a graphical interface that isnt normally p
rovided to a non graphical interface?
menus
windows
popups
desktop
CORRECT - See section 3.3
A server is likely to be running in graphical mode.
False
CORRECT - See section 3.4
In graphical mode, you can get to a shell by running which applications?
terminal
xterm
CORRECT - See section 3.5
Which of the following are traits of a multiuser operating system?
Many users can log in simultaneously with a unique account
Users can protect their information from other users
Resources are shared between users
CORRECT - See section 4.4
Select all the applications that provide access to the Command Line Interface (C
LI)?
Terminal window
Virtual Terminal

CORRECT - See section 4.8


Select from the following commands those which can report the location of a comm
and:
which
CORRECT - See section 4.11.2
A pair of single quotes ( ' ) will prevent the shell from interpreting any metac
haracter.
True
WRONG - See section 16.9
The /tmp directory is a temporary directory and will not exist on a system at al
l times.
True
CORRECT - See section 16.7
The "sticky bit" permission...
prevents others from removing files they don't own from a common directory
CORRECT - See section 16.7
Which of the following commands will set the "sticky bit" on /shared ?
chmod 1777 /shared
CORRECT - See section 16.3
The "setuid" permission...
allows a command to be run as the file owner.

You might also like