Linux Essentials Final Comprehensive Exam (Modules 1 – 16)

Last Updated on May 25, 2018 by Admin

Linux Essentials Final Comprehensive Exam (Modules 1 – 16) Answer

  1. Question ID 2

    One of the jobs of the kernel is to:

    • Manage the system’s resources
    • Turn source code into machine code
    • Load the operating system after the computer is turned on
    • Transfer mail from one machine to another
  2. Question ID 3

    Unix is:

    (choose two)

    • An operating system
    • A type of hardware
    • A trademark
    • A distribution of Linux
    • A text editor

  4. Question ID 5

    Linux is written in:

    • C
    • .NET
    • C++
    • Java
    • Perl
  5. Question ID 6

    Source code refers to:

    • The version of a program that the computer runs on the CPU
    • The license that dictates how you may use and share the software
    • The interface that software uses to talk to the kernel
    • A human readable version of computer software

  7. Question ID 22

    What is the standard option to provide a command line program to view its documentation?

    • –info
    • –doc
    • –help
    • -h
  8. Question ID 23

    The command man -k is the same as the command apropos.

    True or False?

    • True
    • False

  10. Question ID 24

    The whatis command is the same as man -w.

    • True
    • False
  11. Question ID 26

    The directory where additional documentation for software packages most likely can be found is:

    • /var/lib/doc
    • /usr/software/doc
    • /usr/share/doc
    • /var/share/doc
  12. Question ID 47

    Hidden files are files that begin with what character?

    • A plus (+)
    • A dash (-)
    • A period (.)
    • An asterisk (*)
  13. Question ID 48

    What option for the ls command will display all files, including hidden files?

    • -w
    • -H
    • -L
    • -a
  14. Question ID 49

    The top-level directory on a Linux system is represented as:

    • /
    • /root
    • /home
    • C:
  15. Question ID 50

    Is the following path absolute or relative?


    • Relative
    • Absolute
  16. Question ID 51

    Is the following path absolute or relative?


    • Relative
    • Absolute
  17. Question ID 73

    Compression on a file works by:

    • Removing the high order bit from each byte
    • Consolidating multiple files into one
    • Removing redundant information
    • Storing most of the data on removable media and just leaving a pointer
    • Eliminating gaps within the file
  18. Question ID 75

    In general, for which of the following would you want to use lossless compression?

    • An mp3 audio file
    • A movie
    • A log file
    • A JPEG image
    • An encrypted email
  19. Question ID 76

    Lossy compression:

    (choose three)

    • Is often used with documents
    • Decompresses to an identical version as the original
    • Sacrifices some quality
    • Usually results better compression than lossless
    • Is often used with images
  20. Question ID 77

    You type gzip myfile.tar. What happens?

    (choose two)

    • myfile.tar.gz holds a compressed version of myfile.tar
    • An error; you forgot to pass the name of the output file
    • An error; you forgot to specify the file with –f
    • myfile.tar is unarchived into the current directory
    • myfile.tar is removed
  21. Question ID 93

    Error messages generated by commands are sent where by default?

    • STDIN
    • Log files
    • STDERR
    • STDOUT
  22. Question ID 94

    A successful command will print output to STDOUT.

    True or False?

    • True
    • False
  23. Question ID 95

    Which of the following commands will direct error messages to the file, error.log?

    (choose one)

    • ls /root > error.log
    • ls /root >> error.log
    • ls /root 2> error.log
    • ls /root $> error.log
  24. Question ID 96

    A pipe allows you to…

    • …send the same input to multiple commands.
    • …send the output of one command to another.
    • …send the output of a command to a file.
    • …type multiple commands at one prompt.
  25. Question ID 97

    Channel 2 is:

    • STDERR
    • STDIN
    • STDALL
    • STDOUT
  26. Question ID 117

    The echo command:

    • Tests a variable for duplication
    • Duplicates the input stream to the output stream
    • Is used for variable assignment
    • Is used to output text to the console
    • Copies variables from one to another
  27. Question ID 118

    A file begins with #!/bin/csh. This means:

    • C Shell compatibility mode is enabled
    • Running the script will invoke /bin/csh to interpret the rest of the file
    • The operator should not be using /bin/csh
    • This is a Perl script
    • Nothing, this is a comment
  28. Question ID 119

    Which are appropriate editors for writing shell scripts?

    (choose two)

    • nano
    • LibreOffice Writer
    • /bin/bash
    • vi
    • Firefox
  29. Question ID 120

    Most of nano’s commands take the form of:

    • Escape followed by another character
    • Mouse clicks
    • The F1 through F12 function keys
    • Alt and another character
    • Control and another character
  30. Question ID 121

    What does this shell script do?


    if [ ! –d $FOO ]; then

    mkdir $FOO


    • Nothing, since there is a problem with the conditions in the if statement
    • Makes the /tmp/foo directory if a file by that name exists
    • Creates /tmp/foo if it does not exist
    • Creates /tmp/foo and raises an error if there is a problem
    • Outputs a message to the screen
  31. Question ID 140

    Which of the following are valid CPU types for Intel-based platforms?

    (choose two)

    • 48 bit
    • 24 bit
    • 64 bit
    • 32 bit
  32. Question ID 141

    64 bit platforms can access more memory than 32 bit platforms.

    True or False?

    • True
    • False
  33. Question ID 157

    What does the acronym RPM mean?

    • Relocate Package Manager
    • Return Package Management
    • RPM Package Management
    • Recursive Package Manager
  34. Question ID 158

    One way to install new software on a Linux system is to use a package management system.

    True or False?

    • True
    • False
  35. Question ID 159

    When you execute the dmesg command, the system displays messages that are generated by the kernel.

    True or False?

    • True
    • False
  36. Question ID 160

    Which of the following are package management commands for distributions with software distributed in files ending in .deb?

    (choose three)

    • rpm
    • apt-get
    • dpkg
    • aptitude
  37. Question ID 161

    Which of the following are package management commands for distributions with software distributed in files ending in .rpm?

    (choose three)

    • yum
    • apt-get
    • rpm
    • yumex
  38. Question ID 177

    Which of the following would be considered a host?

    • A printer attached to the network via an IP address
    • A CDROM
    • The computer’s hard drive
    • A network cable
  39. Question ID 178

    A service is…

    • …a file that contains configuration information.
    • …another name for a computer’s hostname.
    • …a feature provided by one computer to another.
    • …like an IP address.
  40. Question ID 180

    A network packet contains …

    (choose two)

    • …the IP address of the destination machine.
    • …a hard drive partition.
    • …the name of the router.
    • …the IP address of the source machine.
  41. Question ID 181

    Only servers have hostnames.

    True or False?

    • True
    • False
  42. Question ID 197

    Which files contain user account information?

    (choose two)

    • /etc/passwd
    • /etc/shadow
    • /etc/group
  43. Question ID 198

    Which user can view the /etc/shadow file?

    • The root user
    • No users
    • Any member of the password group
    • All users
  44. Question ID 199

    Which command will display the UID, GID and groups your current user belongs to?

    • id
    • whoami
    • who
    • about
  45. Question ID 200

    Each user belongs to at least one group.

    True or False?

    • True
    • False
  46. Question ID 201

    Which command will display the users that are currently logged in to the system?

    • who
    • about
    • whoami
    • id
  47. Question ID 217

    UIDs 1-500 are usually reserved for what kind of users?

    • Are not used for user accounts, but for group accounts
    • System accounts, such as server processes
    • Remote log-in accounts
    • Log-in (human) users
  48. Question ID 218

    If a user is deleted, the files and directories that the user owned…

    • …are deleted as well.
    • …will have no UID owner.
    • …will show a UID as the owner, but not user name.
    • …will have no user owner.
  49. Question ID 219

    Which of the following options for the useradd command allows root to specify the UID to be associated with the account?

    • -g
    • -u
    • -U
    • -G
  50. Question ID 220

    Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?

    • -u
    • U
    • -g
    • -G
  51. Question ID 221

    On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob.

    True or False?

    • True
    • False
  52. Question ID 237

    Which of the following commands set “other” permissions on file to r-x?

    • chmod o+rx file
    • chmod o-r-w file
    • chmod o=r+x file
    • chmod o=rx file
  53. Question ID 238

    Which of the following commands sets “other” permissions on file to r-x?

    • chmod 774 file
    • chmod 776 file
    • chmod 775 file
    • chmod 777 file
  54. Question ID 239

    Only one set (user, group, other) of permission can be changed at once using the symbolic method.

    True or False?

    • True
    • False
  55. Question ID 240

    Which of the following are methods for setting permissions using the chmod command?

    (choose two)

    • letter
    • octal
    • symbolic
    • binary
  56. Question ID 241

    The chown command can be used to change the owner and group of a file.

    True or False?

    • True
    • False
  57. Question ID 267

    The Samba application is a:

    • Mail Server
    • Security Server
    • File Server
    • Web Server
  58. Question ID 268

    Which of the following are examples of desktop software?

    (choose two)

    • Web server
    • Web browser
    • File share
    • Compiler
    • Music player
  59. Question ID 269

    If you wanted to set up a blog, which software would be most helpful?

    • MySQL
    • Postfix
    • WordPress
    • Dovecot
    • Samba
  60. Question ID 270

    Which of the following pieces of software deal with file sharing?

    (choose three)

    • NFS
    • X-Windows
    • Netatalk
    • Samba
    • PostgreSQL
  61. Question ID 271

    If you wanted to create and print an invoice, which software could you use?

    • GNOME
    • Compiz
    • Firefox
    • LibreOffice
    • Evolution
  62. Question ID 307

    Which of the following is true about graphical mode?

    (choose three)

    • You have menus and tools to help you find what you are looking for
    • You access this mode by logging into a graphical display
    • After login, you are provided with a command prompt
    • After login, you are provided with a desktop
    • You cannot use your mouse
  63. Question ID 308

    Which of the following is provided by a graphical interface that isn’t normally provided to a non graphical interface?

    (choose four)

    • Desktop
    • Shell
    • Windows
    • Popups
    • Menus
  64. Question ID 309

    A server is likely to be running in graphical mode.

    True or False?

    • True
    • False
  65. Question ID 310

    In graphical mode, you can get to a shell by running which applications?

    (choose two)

    • guiterm
    • gbash
    • terminal
    • xconsole
    • xterm
  66. Question ID 311

    Which of the following are traits of a multiuser operating system?

    (choose three)

    • An administrative user gets a dedicated CPU
    • Users can protect their information from other users
    • Resources are shared between users
    • Many users can log in simultaneously with a unique account
    • Each user can only log in once per day
  67. Question ID 327

    Select all the applications that provide access to the Command Line Interface (CLI)?

    (choose two)

    • Virtual Terminal
    • firefox
    • opera
    • Terminal window
  68. Question ID 328

    Which environment variable contains a list of directories that is searched for commands to execute?

    • PATH
    • EXEC
    • PS1
    • PS2
  69. Question ID 329

    Select the command that can report the location of a command:

    • where
    • what
    • which
  70. Question ID 331

    A pair of single quotes ( ‘ ) will prevent the shell from interpreting any metacharacter.

    True or False?

    • True
    • False
  71. Question ID 348

    The /tmp directory is a temporary directory and will not exist on a system at all times.

    True or False?

    • True
    • False
  72. Question ID 349

    The /var directory has files that change over time.

    True or False?

    • True
    • False
  73. Question ID 350

    The “sticky bit” permission…

    • …prevents others from removing files they don’t own from a common directory.
    • …changes the group ownership of existing files in a directory.
    • …prevents others from overwriting files they don’t own in common directories.
    • …sets the group ownership of any new file created in a directory.
  74. Question ID 352

    Which of the following commands will set the “sticky bit” on /shared ?

    • chmod 4777 /shared
    • chmod 2777 /shared
    • chmod 7777 /shared
    • chmod 1777 /shared
  75. Question ID 353

    The “setuid” permission…

    • …allows a command to be run as the file owner.
    • …allows files in a directory to be manipulated as by the directory owner.
    • …prevents the owner of a file from being changed.
    • …reports the output of a script to the owner.