Linux Essentials Midterm Exam (Modules 1 – 8)

Last Updated on May 25, 2018 by Admin

Linux Essentials Midterm Exam Modules 1 – 8 Answer

  1. Question ID 42

    To go to the end of an info page, press:

    • END
    • n
    • N
    • ]
  2. Question ID 43

    To go to the next match of a search on a man page, press:

    • ]
    • n
    • N
    • }
  3.  

  4. Question ID 44

    When interpreting the SYNOPSIS of a command found on a man page, the “|” means:

    • The items it separates can be used together
    • The items it separates cannot be used together
  5. Question ID 45

    After performing a search, you can use the ____ key to return to a previously found match:

    • n
    • N
    • D
    • U
  6.  

  7. Question ID 46

    To move a page forward one at a time while viewing a man page, press the following:

    • Spacebar
    • m
    • a
    • Enter
  8. Question ID 59

    The ls command without options or arguments…

    • …lists the contents of the current directory.
    • …prompts for a directory to list.
    • …lists the contents of a user’s home directory.
    • …generates an error as this command requires arguments.
  9.  

  10. Question ID 68

    Which option can be used with the rm command to prompt before deleting?

    • I
    • -i
    • -P
    • A
  11. Question ID 69

    The rm command can delete multiple files at once.

    True or False?

    • True
    • False
  12. Question ID 70

    Which of the following commands can be used to rename a file?

    • name
    • rn
    • mv
    • cp
  13. Question ID 72

    The touch command can be used to:

    (choose two)

    • Update the time stamp of existing files
    • Create new files
    • Change a file’s name
    • Change ownership of a file
  14. Question ID 88

    You try to compress a file that is already compressed. Which of the following statements is true?

    • The file will not be compressed any further than it already was
    • The file changed while you were compressing it
    • The file will actually be uncompressed
    • The compression algorithm needs to be set to the “currently compressed” mode for it to be compressed further
    • The file will be deleted
  15. Question ID 89

    Which of the following commands can be used to compress a file?

    (choose three)

    • bunzip2
    • zip
    • bzip2
    • cat
    • gzip
  16. Question ID 90

    The three main modes of tar are:

    (choose three)

    • Extract
    • Copy
    • Compress
    • List
    • Create
  17. Question ID 91

    In the command tar –czf foo.tar.gz bar, what is the purpose of the f flag?

    • Tells tar to copy only files, and not directories
    • Tells tar to read from the file that follows the flag
    • Tells tar to print the name of each file as it is processed
    • Specifies extra compression is to be used
    • Tells tar to write to the file that follows the flag
  18. Question ID 92

    Which two commands do the same thing?

    (choose two)

    • tar –xzf foo.tar.gz
    • tar –x foo | gzip
    • tar –c foo | gzip > foo.tar.gz
    • tar –tzf foo.tar.gz
    • tar –czf foo.tar.gz foo
  19. Question ID 112

    Which option for the wc command will print the total number of words in a file?

    • -l
    • -L
    • -w
    • -C
  20. Question ID 113

    Which command can be used to print line numbers?

    • num
    • ln
    • nl
    • sort
  21. Question ID 114

    The command echo “text” > file.txt will create file.txt if it does not already exist.

    True or False?

    • True
    • False
  22. Question ID 115

    The command echo “text” > file.txt will not overwrite file.txt if it already exists.

    True or False?

    • True
    • False
  23. Question ID 116

    The command echo “text” >> file.txt will not overwrite file.txt if it already exists.

    True or False?

    • True
    • False
  24. Question ID 262

    Software is backward compatible if:

    • It still supports old file formats or applications
    • If the next version still works the same way
    • People still use old versions
    • It works across Linux/Mac/Windows
    • It can be upgraded without downtime
  25. Question ID 263

    Apple’s OS X is:

    (choose three)

    • Derived from Linux
    • Only compatible with Apple hardware
    • Able to natively run Windows binaries
    • Derived from FreeBSD
    • Certified as UNIX compatible
    • Primarily used to manage network services
  26. Question ID 264

    Microsoft Windows:

    (choose three)

    • Has a short maintenance cycle
    • Comes in desktop and server variants
    • Has built in virtualization
    • Has a new desktop version every year.
    • Has a Linux compatibility mode
    • Has powerful scripting capabilities
  27. Question ID 265

    Other commercial Unixes:

    (choose two)

    • Are almost obsolete
    • Are tied to their vendor’s hardware
    • Use completely different commands than Linux
    • Are UNIX certified
    • Do not run the GNU tools
  28. Question ID 266

    When choosing a distribution of Linux, you should consider:

    (choose five)

    • Which management tools are provided by the distribution
    • Which distributions are supported by the software you need to run
    • Popularity on social media.
    • The maintenance cycle of the distribution
    • If you need support on the distribution itself
    • Whether or not the distribution is under active development
  29. Question ID 302

    The difference between the GPL and LGPL licenses are:

    • LGPL allows you to distribute the software in binary-only form
    • LGPL is shorter than GPL
    • LGPL allows linking to non GPLed software
    • LGPL applies to web services
    • LGPL was made by the OSI while GPL was made by the FSF
  30. Question ID 303

    Permissive free software licenses:

    (choose three)

    • Can allow software to be used inside closed source software
    • Are not approved by the OSI
    • Are not approved by the FSF
    • Include the GPLv2 and BSD
    • Don’t have a copyleft provision
  31. Question ID 304

    The Creative Commons version of Public Domain licensing is:

    • Attribution-NonCommercial-ShareAlike
    • Attribution-NonCommercial
    • NoAttribution-ShareAlike
    • No Rights Reserved
    • Attribution
  32. Question ID 305

    Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?

    • There are no requirements
    • You must make the source to your custom web interface available
    • You must make your hardware designs available
    • You must make the source to your kernel available
    • You must ensure your custom kernel runs on a regular Intel machine
  33. Question ID 306

    Participating in open source projects can improve your technical skills, even if it is not your day job.

    True or False?

    • True
    • False
  34. Question ID 322

    What are tradeoffs of increasing the level of privacy you have in your web browser?

    (choose two)

    • You may get viruses
    • Sites may not work properly
    • Websites may load slower
    • Images won’t load properly
    • You may have to explicitly permit some cookies to be saved
  35. Question ID 323

    Which of the following is a tool that helps you anonymize your Internet browsing?

    • CookieCleaner
    • Web proxy
    • The onion router
    • AnonFirefox
    • iptables
  36. Question ID 324

    Social network “like” buttons can track your activity across the Internet.

    True or False?

    • True
    • False
  37. Question ID 325

    Which of the following are properties of a strong password?

    (choose three)

    • A mix of upper and lower case
    • Long so that it can be reused on multiple sites
    • Includes symbols
    • At least 10 characters long
    • Based on easy to remember items like birthdays
  38. Question ID 326

    What can be done to prevent remote people from running programs on your computer?

    (choose two)

    • Don’t use wireless networks – only wired
    • Use strong passwords on all user accounts
    • Turn on a firewall
    • Block third party cookies
    • Block all cookies
  39. Question ID 343

    The acronym CLI stands for:

    • Computer Link Interpreter
    • Command Line Interpreter
    • Computer Line Interface
    • Command Line Interface
  40. Question ID 344

    Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like –all.

    • LINUX
    • Kernel
    • GNU
    • shell
  41. Question ID 345

    The acronym GNU stands for:

    • Gnu’s Not Unix
    • Go Next Unit
    • Gnu’s Nearly Unix
    • Good News Unix
  42. Question ID 346

    What one character treats the character that follows it as if it was surrounded by single quotes?

    • /
    • %
    • #
  43. Question ID 347

    The main purpose of using glob characters is to be able to provide a command a list of filenames.

    True or False?

    • True
    • False