Last Updated on May 25, 2018 by Admin
Linux Essentials Final Comprehensive Exam (Modules 1 – 16) Answer
-
Question ID 2
One of the jobs of the kernel is to:
- Manage the system’s resources
- Turn source code into machine code
- Load the operating system after the computer is turned on
- Transfer mail from one machine to another
-
Question ID 3
Unix is:
(choose two)
- An operating system
- A type of hardware
- A trademark
- A distribution of Linux
- A text editor
-
Question ID 5
Linux is written in:
- C
- .NET
- C++
- Java
- Perl
-
Question ID 6
Source code refers to:
- The version of a program that the computer runs on the CPU
- The license that dictates how you may use and share the software
- The interface that software uses to talk to the kernel
- A human readable version of computer software
-
Question ID 22
What is the standard option to provide a command line program to view its documentation?
- –info
- –doc
- –help
- -h
-
Question ID 23
The command man -k is the same as the command apropos.
True or False?
- True
- False
-
Question ID 24
The whatis command is the same as man -w.
- True
- False
-
Question ID 26
The directory where additional documentation for software packages most likely can be found is:
- /var/lib/doc
- /usr/software/doc
- /usr/share/doc
- /var/share/doc
-
Question ID 47
Hidden files are files that begin with what character?
- A plus (+)
- A dash (-)
- A period (.)
- An asterisk (*)
-
Question ID 48
What option for the ls command will display all files, including hidden files?
- -w
- -H
- -L
- -a
-
Question ID 49
The top-level directory on a Linux system is represented as:
- /
- /root
- /home
- C:
-
Question ID 50
Is the following path absolute or relative?
/etc/ppp
- Relative
- Absolute
-
Question ID 51
Is the following path absolute or relative?
sysadmin/Documents
- Relative
- Absolute
-
Question ID 73
Compression on a file works by:
- Removing the high order bit from each byte
- Consolidating multiple files into one
- Removing redundant information
- Storing most of the data on removable media and just leaving a pointer
- Eliminating gaps within the file
-
Question ID 75
In general, for which of the following would you want to use lossless compression?
- An mp3 audio file
- A movie
- A log file
- A JPEG image
- An encrypted email
-
Question ID 76
Lossy compression:
(choose three)
- Is often used with documents
- Decompresses to an identical version as the original
- Sacrifices some quality
- Usually results better compression than lossless
- Is often used with images
-
Question ID 77
You type gzip myfile.tar. What happens?
(choose two)
- myfile.tar.gz holds a compressed version of myfile.tar
- An error; you forgot to pass the name of the output file
- An error; you forgot to specify the file with –f
- myfile.tar is unarchived into the current directory
- myfile.tar is removed
-
Question ID 93
Error messages generated by commands are sent where by default?
- STDIN
- Log files
- STDERR
- STDOUT
-
Question ID 94
A successful command will print output to STDOUT.
True or False?
- True
- False
-
Question ID 95
Which of the following commands will direct error messages to the file, error.log?
(choose one)
- ls /root > error.log
- ls /root >> error.log
- ls /root 2> error.log
- ls /root $> error.log
-
Question ID 96
A pipe allows you to…
- …send the same input to multiple commands.
- …send the output of one command to another.
- …send the output of a command to a file.
- …type multiple commands at one prompt.
-
Question ID 97
Channel 2 is:
- STDERR
- STDIN
- STDALL
- STDOUT
-
Question ID 117
The echo command:
- Tests a variable for duplication
- Duplicates the input stream to the output stream
- Is used for variable assignment
- Is used to output text to the console
- Copies variables from one to another
-
Question ID 118
A file begins with #!/bin/csh. This means:
- C Shell compatibility mode is enabled
- Running the script will invoke /bin/csh to interpret the rest of the file
- The operator should not be using /bin/csh
- This is a Perl script
- Nothing, this is a comment
-
Question ID 119
Which are appropriate editors for writing shell scripts?
(choose two)
- nano
- LibreOffice Writer
- /bin/bash
- vi
- Firefox
-
Question ID 120
Most of nano’s commands take the form of:
- Escape followed by another character
- Mouse clicks
- The F1 through F12 function keys
- Alt and another character
- Control and another character
-
Question ID 121
What does this shell script do?
FOO=/tmp/foo
if [ ! –d $FOO ]; then
mkdir $FOO
fi
- Nothing, since there is a problem with the conditions in the if statement
- Makes the /tmp/foo directory if a file by that name exists
- Creates /tmp/foo if it does not exist
- Creates /tmp/foo and raises an error if there is a problem
- Outputs a message to the screen
-
Question ID 140
Which of the following are valid CPU types for Intel-based platforms?
(choose two)
- 48 bit
- 24 bit
- 64 bit
- 32 bit
-
Question ID 141
64 bit platforms can access more memory than 32 bit platforms.
True or False?
- True
- False
-
Question ID 157
What does the acronym RPM mean?
- Relocate Package Manager
- Return Package Management
- RPM Package Management
- Recursive Package Manager
-
Question ID 158
One way to install new software on a Linux system is to use a package management system.
True or False?
- True
- False
-
Question ID 159
When you execute the dmesg command, the system displays messages that are generated by the kernel.
True or False?
- True
- False
-
Question ID 160
Which of the following are package management commands for distributions with software distributed in files ending in .deb?
(choose three)
- rpm
- apt-get
- dpkg
- aptitude
-
Question ID 161
Which of the following are package management commands for distributions with software distributed in files ending in .rpm?
(choose three)
- yum
- apt-get
- rpm
- yumex
-
Question ID 177
Which of the following would be considered a host?
- A printer attached to the network via an IP address
- A CDROM
- The computer’s hard drive
- A network cable
-
Question ID 178
A service is…
- …a file that contains configuration information.
- …another name for a computer’s hostname.
- …a feature provided by one computer to another.
- …like an IP address.
-
Question ID 180
A network packet contains …
(choose two)
- …the IP address of the destination machine.
- …a hard drive partition.
- …the name of the router.
- …the IP address of the source machine.
-
Question ID 181
Only servers have hostnames.
True or False?
- True
- False
-
Question ID 197
Which files contain user account information?
(choose two)
- /etc/passwd
- /etc/shadow
- /etc/group
-
Question ID 198
Which user can view the /etc/shadow file?
- The root user
- No users
- Any member of the password group
- All users
-
Question ID 199
Which command will display the UID, GID and groups your current user belongs to?
- id
- whoami
- who
- about
-
Question ID 200
Each user belongs to at least one group.
True or False?
- True
- False
-
Question ID 201
Which command will display the users that are currently logged in to the system?
- who
- about
- whoami
- id
-
Question ID 217
UIDs 1-500 are usually reserved for what kind of users?
- Are not used for user accounts, but for group accounts
- System accounts, such as server processes
- Remote log-in accounts
- Log-in (human) users
-
Question ID 218
If a user is deleted, the files and directories that the user owned…
- …are deleted as well.
- …will have no UID owner.
- …will show a UID as the owner, but not user name.
- …will have no user owner.
-
Question ID 219
Which of the following options for the useradd command allows root to specify the UID to be associated with the account?
- -g
- -u
- -U
- -G
-
Question ID 220
Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?
- -u
- U
- -g
- -G
-
Question ID 221
On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.
True or False?
- True
- False
-
Question ID 237
Which of the following commands set “other” permissions on file to r-x?
- chmod o+rx file
- chmod o-r-w file
- chmod o=r+x file
- chmod o=rx file
-
Question ID 238
Which of the following commands sets “other” permissions on file to r-x?
- chmod 774 file
- chmod 776 file
- chmod 775 file
- chmod 777 file
-
Question ID 239
Only one set (user, group, other) of permission can be changed at once using the symbolic method.
True or False?
- True
- False
-
Question ID 240
Which of the following are methods for setting permissions using the chmod command?
(choose two)
- letter
- octal
- symbolic
- binary
-
Question ID 241
The chown command can be used to change the owner and group of a file.
True or False?
- True
- False
-
Question ID 267
The Samba application is a:
- Mail Server
- Security Server
- File Server
- Web Server
-
Question ID 268
Which of the following are examples of desktop software?
(choose two)
- Web server
- Web browser
- File share
- Compiler
- Music player
-
Question ID 269
If you wanted to set up a blog, which software would be most helpful?
- MySQL
- Postfix
- WordPress
- Dovecot
- Samba
-
Question ID 270
Which of the following pieces of software deal with file sharing?
(choose three)
- NFS
- X-Windows
- Netatalk
- Samba
- PostgreSQL
-
Question ID 271
If you wanted to create and print an invoice, which software could you use?
- GNOME
- Compiz
- Firefox
- LibreOffice
- Evolution
-
Question ID 307
Which of the following is true about graphical mode?
(choose three)
- You have menus and tools to help you find what you are looking for
- You access this mode by logging into a graphical display
- After login, you are provided with a command prompt
- After login, you are provided with a desktop
- You cannot use your mouse
-
Question ID 308
Which of the following is provided by a graphical interface that isn’t normally provided to a non graphical interface?
(choose four)
- Desktop
- Shell
- Windows
- Popups
- Menus
-
Question ID 309
A server is likely to be running in graphical mode.
True or False?
- True
- False
-
Question ID 310
In graphical mode, you can get to a shell by running which applications?
(choose two)
- guiterm
- gbash
- terminal
- xconsole
- xterm
-
Question ID 311
Which of the following are traits of a multiuser operating system?
(choose three)
- An administrative user gets a dedicated CPU
- Users can protect their information from other users
- Resources are shared between users
- Many users can log in simultaneously with a unique account
- Each user can only log in once per day
-
Question ID 327
Select all the applications that provide access to the Command Line Interface (CLI)?
(choose two)
- Virtual Terminal
- firefox
- opera
- Terminal window
-
Question ID 328
Which environment variable contains a list of directories that is searched for commands to execute?
- PATH
- EXEC
- PS1
- PS2
-
Question ID 329
Select the command that can report the location of a command:
- where
- what
- which
-
Question ID 331
A pair of single quotes ( ‘ ) will prevent the shell from interpreting any metacharacter.
True or False?
- True
- False
-
Question ID 348
The /tmp directory is a temporary directory and will not exist on a system at all times.
True or False?
- True
- False
-
Question ID 349
The /var directory has files that change over time.
True or False?
- True
- False
-
Question ID 350
The “sticky bit” permission…
- …prevents others from removing files they don’t own from a common directory.
- …changes the group ownership of existing files in a directory.
- …prevents others from overwriting files they don’t own in common directories.
- …sets the group ownership of any new file created in a directory.
-
Question ID 352
Which of the following commands will set the “sticky bit” on /shared ?
- chmod 4777 /shared
- chmod 2777 /shared
- chmod 7777 /shared
- chmod 1777 /shared
-
Question ID 353
The “setuid” permission…
- …allows a command to be run as the file owner.
- …allows files in a directory to be manipulated as by the directory owner.
- …prevents the owner of a file from being changed.
- …reports the output of a script to the owner.