Introduction to Linux I Final Exam Answer (Modules 15 – 26) 2016

  • 1 year ago
  • 340 Views
  • 0 0

1 Which command is used to create or update the quota database files?

  • quotactl
  • quotadb
  • quotacheck
  • dbquota

2. By default, the edquota command will use which editor?

  • joe
  • emacs
  • gedit
  • vi

3. The quotacheck command creates databases with which names?.
(choose two)

  • group.quota
  • aquota.group
  • aquota.user
  • user.quota

4. Which directory is the root file system mounted on?

  • /rootfs
  • /root
  • /home
  • /

5. In which directory are you most likely to find software from third-party publishers?

  • /usr/local
  • /var/lib
  • /usr/third
  • /opt

6. To activate a swap space that has been initialized, you can execute:

  • swapcontrol
  • swapon
  • swapoff
  • swapctl

7. The first field in the /etc/fstab file is used to specify:

  • The filesystem type
  • The mount point
  • The mount options
  • The dump level
  • The device to mount
  • The fsck order

8. The fifth field in the /etc/fstab file is used to specify:

  • The mount options
  • The dump level
  • The filesystem type
  • The device to mount
  • The mount point
  • The fsck order

9. The sixth field in the /etc/fstab file is used to specify:

  • The mount point
  • The device to mount
  • The dump level
  • The filesystem type
  • The fsck order
  • The mount options

10. Which mount option will remount a currently mounted filesystem?

  • mount -o reset
  • mount -o reload
  • mount -o mount
  • mount -o remount

11. What determines how many files can be stored in a filesystem?

  • The number of inodes
  • The Superblock size
  • The number of data blocks
  • The number of bytes

12. The number of inodes in a filesystem is:

  • Always the same for every filesystem
  • Determined when the filesystem is created
  • Determined by the filesystem type
  • Something that can be changed at a later date

13. Which of the following is true about the fsck command?

  • It should only be executed on unmounted filesystems
  • It can only be used to fix ext2 filesystems
  • It can only be used to fix ext3 filesystems
  • It should only be executed on mounted filesystems

14. Which of the following commands will create a soft link from the /tmp/test file to the /tmp/data file?

  • ln -s /tmp/data /tmp/test
  • ln /tmp/test /tmp/data
  • ln -s /tmp/test /tmp/data
  • ln /tmp/data /tmp/test

15. Which of the following commands will create a hard link from the /tmp/test file to the /tmp/data file?

  • ln -s /tmp/test /tmp/data
  • ln /tmp/test /tmp/data
  • ln -s /tmp/data /tmp/test
  • ln /tmp/data /tmp/test

16. Which value represents the inode number in the following output of the ls -li command: 87589 -rw-r–r–. 2 root root 83 Mar 4 22:45 myhosts

  • 83
  • 2
  • 22:45
  • 87589

17. Which value represents the hard link count in the following output of the ls -li command: 87589 -rw-r–r–. 2 root root 83 Mar 4 22:45 myhosts

  • 83
  • 2
  • 22:45
  • 87589

18. Which bootloader includes the Secure Boot feature?

  • BIOS
  • UEFI
  • LILO
  • GRUB

19. In GRUB Legacy, the _____ directive indicates how long to wait before automatically booting the default operating system.

  • fallback=
  • timeout=
  • password=
  • kernel

20. Which of the following commands can be used to create an encrypted password that can be used with the password directive in GRUB Legacy:

  • crypt-md5-grub
  • grub-md5-crypt
  • grub-crypt
  • crypt-grub

21. The first stage of the boot process is:

  • The firmware (BIOS/UEFI) stage
  • The init phase
  • The kernel phase
  • The Bootloader (LILO/GRUB) stage

22. The fourth stage of the boot process is:

  • The init phase
  • The Bootloader (LILO/GRUB) stage
  • The firmware (BIOS/UEFI) stage
  • The kernel

23. The bootloader (GRUB/LILO) loads which of the following components into memory?.
(choose two)

  • The root filesystem
  • The kernel
  • The init process
  • The ramdisk

24. Which of the following commands can be used to reboot the system?.
(choose two)

  • shutdown
  • halt
  • reboot
  • shutdown -r

25. What two differences are there between querying an installed RPM and an RPM package file with the rpm command?.
(choose two)

  • You must use the full filename when querying the installed RPM.
  • To query the installed RPM, you have to add the -i option.
  • You must use the full filename when querying the package.
  • To query the package file, you have to add the -p option.

26. The rpm2cpio command can be used to:.
(choose two)

  • Create a new “.rpm” file
  • Extract files from a “.rpm” file
  • List the content of a “.rpm” file
  • Build a binary “.rpm” file from a source “.src.rpm” file

27. Which command will remove all files that belong to a Debian package?

  • apt-get purge
  • apt-get remove
  • apt-get uninstall
  • apt-get erase

28. Which command will update the list of available packages for APT?

  • apt-cache update
  • apt-get update
  • apt-cache upgrade
  • apt-get upgrade

29. Which command may be used to get a list of the installed Debian packages?

  • dpkg -l
  • dpkg -L
  • apt-get list
  • apt-get show

30. Which command will show the dependencies of a Debian package?

  • apt-cache requires
  • apt-get depends
  • apt-cache depends
  • apt-get requires

31. Which command will show the dependencies of an RPM package?

  • rpm -qpd
  • yum provides
  • yum requires
  • rpm -qpR

32. Which two commands will show detailed information about a Debian package?.
(choose two)

  • apt-cache info
  • apt-cache show
  • dpkg -s
  • dpkg -i

33 Which command shows the scripts that may be part of a RPM package?

  • yum scripts
  • yum info
  • rpm -qs
  • rpm -q –scripts

34. Which command is used to display the shared libraries of a dynamically linked executable?

  • ldd
  • ld.so
  • ldlist
  • ldconfig

35. Which option to the df command displays the size of a filesystem in “human readable” format?

  • -h
  • -human
  • -g
  • No option will provide this feature

36. You can display current filesystem space usage with the _____ command.

  • du
  • ls
  • dw
  • df

37. A system that contains Linux as well as a Microsoft Windows operating system is called a:

  • This sort of system cannot exist
  • Multi environment system
  • A file base system
  • Dual boot system

38. In what directory are you most likely to find user’s home directories?

  • /usr/local
  • /home
  • /var/lib
  • /usr/third

39. Which directory structure has directories which may have heavy activity for services like mail, ftp, httpd and printing?

  • /home
  • /rootfs
  • /root
  • /var

40. wAfter running fdisk -cu /dev/sdb, what fdisk command will allow you to change a partition type?

  • d
  • f
  • t
  • g

41. wAfter running fdisk -cu /dev/sdb, what fdisk command will allow you to create a new partition?

  • c
  • w
  • n
  • g

42. wAfter running fdisk -cu /dev/sdb, what fdisk command will allow you to delete a partition?

  • r
  • g
  • d
  • s

43. what option to the fdisk command is used to utilize sector unit sizes?

  • -t
  • -s
  • -usize
  • -u

44. Which mount option mounts a filesystem allowing reading only?

  • readonly
  • ronly
  • ro
  • rw

45. Which option to the tune2fs command will change the space reserved for system use?

  • -R
  • -m
  • -M
  • -r

46. Which option to the dumpe2fs command will have the command display only superblock information?

  • -h
  • -g
  • -d
  • -s

47. The _____ command will display how much space a filesystem has free?

  • du
  • free
  • df
  • init

48. Which option to the fsck command will answer “yes” to all queries?

  • -y
  • -n
  • -N
  • -Y

49. Which option to the fsck command will answer “no” to all queries?

  • -y
  • -Y
  • -n
  • -N

50. Which option to the fsck command will allow you to specify the filesystem type?

  • -t
  • -F
  • -T
  • -f

51. Missing files don’t have their original file names, instead they are named with their _____ number?

  • device
  • inode
  • UID
  • GID

52. Which type of link can be made to a file on another filesystem, hard or soft?

  • soft
  • hard

53. To use an encrypted password in the GRUB Legacy configuration file, use the _____ option to the password directive.

  • –md5
  • –encrypt
  • –secure
  • –crypt

54. The primary configuration file for the GRUB 2 on a Fedora system is _____.

  • /boot/grub2/grub.cfg
  • /boot/grub/grub2.cfg
  • /boot/grub2.cfg
  • /boot/grub/grub.cfg

55. Which runlevel number is defined as “user-definable”?

  • 6
  • 5
  • 3
  • 1
  • 2
  • 0
  • 4

56. Which runlevel number defines halting the system?

  • 5
  • 3
  • 4
  • 0
  • 2
  • 6
  • 1

57.wThe first process that the kernel launches is called the _____ process.

  • init
  • kernel
  • sys
  • startx

58.wOn a Ubuntu system, what variable defines the default runlevel in the /etc/init/rc-sysinit.conf file?

  • DEFAULT_RUNLEVEL
  • DEFAULT
  • RUNLEVEL
  • RUN

59.wWhat are the correct options for the rpm command to display a list of all installed packages?

  • -qa
  • -a
  • -qall
  • -b

60. which environment variable can a user set, that will affect where shared libraries can be located and loaded?

  • LIBRARY_PATH
  • LIBRARY_LD_PATH
  • LD_PATH
  • LD_LIBRARY_PATH

61. Which of the following are benefits of a shared library:.
(choose two)

  • Programs run faster
  • Programs can be smaller
  • Programs run slower
  • Programs use a more consistent base of code

62. Which of the following will find and load shared libraries when a program is executed?

  • The scheduler
  • The dynamic linker
  • The kernel
  • The init process

63. Which of the following contents is in the ldconfig configuration file by default?

  • include all
  • include /etc/ldconfig
  • include ldconfig
  • include ld.so.conf.d/*.conf

64. Which command is used to view the services that are set to start or stop automatically?

  • config
  • chkconfig
  • lsconfig
  • initconfig

65. Which of the following is not a daemon used for logging?

  • klogd
  • ilogd
  • rsyslogd
  • syslogd

66. What is the maximum memory that a 64 bit processor can theoretically use?

  • 16 EiB
  • 8 GiB
  • 2 GiB
  • 4 GiB

67. Which of the following is not a characteristic of firmware?

  • Change runlevels
  • Tests the components upon startup
  • Typically stored in ROM
  • Change settings to affect the use of external devices

68. Which of the following resources are used by devices to communicate with the system?

  • IO Channels, IO Memory, Interrupts and DMA Ports
  • IO Ports, IO Memory, Interrupts, and DMA Channels
  • IO Ports, IO Memory, Signals and DMA Channels
  • IO Ports, RAM, Interrupts and DMA Channels

69. Interrupts cannot be shared between devices..
True or False?

  • True
  • False

70. Which option of the lspci command would you use to troubleshoot a network interface card?

  • -r
  • -t
  • -nn
  • -a

All Comments

  • Yad vaShem published a book about Nazi petrecusion of Jews in Libya and Tunisia a few years ago. A friend of mine was interviewed for the book about his experiences in a forced labor camp in Tunisia during the German occupation.

    Makaela January 25, 2017 2:24 am Reply

Leave a Comment

Your email address will not be published. Required fields are marked *