Linux Final

Post on 03-Apr-2015

3511 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

1.

 

Match each term with the correct statement below.

1.  A user-friendly name that masks an IP address.

2.  The list of instructions that a software developer writes to make up a program

3.  An organized collection of data that is arranged into tables of related information.

4.  A service that protects companies from outside intruders on the Internet.

5.  A computer equipped with open source software such as text editors, desktop publishing software, and office productivity suites.

6.  A software system that installs and maintains software.

7.  The sets of instructions or programs that understand how to use the hardware of the computer in a meaningful way.

8.  A GUI Environment for Linux written in the C programming language.

9.  A service that requests outside Internet resources on behalf of a computer inside of a company.

  a.  GNOME

b.  source code

c.  fully qualified domain names

d.  firewall

e.  package manager

f.  software

g.  proxy server

h.  database

i.  office workstation

Statement Response Value Correct Match

1  c 11.11% c

2  b 11.11% b

3  h 11.11% h

4  d 11.11% d

5  i 11.11% i

6  e 11.11% e

7  f 11.11% f

8  a 11.11% a

9  g 11.12% g

2.

  A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.

  Student Response

Value Correct Answer

Feedback

A. system service

   

B. graphical user interface

   

C. user interface

   

D. device driver

100%   Correct.<br/><br/> 

3.

 

A ____ is merely a compressed archive of files that  usually contain scripts that install the software contents to the correct location on the system.

  Student Response

Value Correct Answer

Feedback

A. package manager

0%   Incorrect. 

B. DBMS    

C. tarball    

D. router    

4.

  The concept of ____ enables software developers to read the source code of other people’s software, modify that source code to make the program better, and redistribute that source code to other developers who might improve it further.

  Student Response

Value Correct Answer

Feedback

A. Open Source Software

100%   Correct. 

B. Linux    

C. Closed Source Software

   

D. Freeware    

5.

 

The ____ stipulates that the source code of any software published under its license must be freely available.

  Student Response

Value Correct Answer

Feedback

A. Artistic License

   

B. GNU Public License

100%   Correct. 

C. Free Software Foundation

   

D. Freeware    

6.

 

Linux is merely one product of open source development.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

7.

 

Each computer participating on the Internet must have an IP address.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

8.

 

Services that are used on the local computer are referred to as server services.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

9.

 

The ____ stores information for retrieval in a separate computer chip that is connected to the processor via a high-speed link.

  Student Response

Value Correct Answer

Feedback

A. Level 1 (L1) cache

   

B. Level 2 (L2) cache

100%   Correct. 

C. Level 3 (L3) cache

   

D. Control Unit

   

10.

 

The most common slot for peripheral devices used today is a(n) ____ slot.

  Student Response

Value Correct Answer

Feedback

A. PCI 100%   Correct. 

B. ISA    

C. AGP    

D. DMA    

 

11.

 

On Linux, a master hard drive connected to the secondary IDE controller would be named ____.

  Student Response

Value Correct Answer

Feedback

A. hda    

B. hdb    

C. hdc 100%   Correct. 

D. hdd    

12.

 

Greater amounts of ____ memory allow more programs to run simultaneously on the system.

  Student Response

Value Correct Answer

Feedback

A. PROM    

B. ROM    

C. RAM 100%   Correct. 

D. BIOS ROM

   

13.

 

Keyboards and mice are devices that facilitate user input and direction.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

14.

 

Any operating system can be installed on any computer, regardless of the computer’s hardware.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

15.

  Match each correct item with the statement below.

1.  Filesystem that performs journaling

2.  Passwords that are stored in a separate database from the user account information

3.  Program started by the BIOS ROM that loads the Linux kernel into memory from a hard disk partition inside the computer

4.  Passwords that support a length of up to 256 characters and are encrypted using a hash algorithm

5.  Allows you to choose the operating system to boot upon system startup

6.  Specify a commands’ working parameters

7.  May be required if the / or /boot partition starts after the 1024th cylinder of the hard disk

8.  Alter the way a command works

9.  Traditional filesystem still used on most Linux computers

  a.  MD5 passwords

b.  Dual booting

c.  ext3

d.  Arguments

e.  LBA32

f.  Boot loader

g.  Shadow passwords

h.  Options

i.  ext2

Statement Response Value Correct Match

1  c 11.11% c

2  g 11.11% g

3  f 11.11% f

4  a 11.11% a

5  b 11.11% b

6  d 11.11% d

7  e 11.11% e

8  h 11.11% h

9  i 11.12% i

16.

 

LDAP stands for ____.

  Student Response

Value Correct Answer

Feedback

A. Linux Distributed Access Protocol

   

B. Lightweight Directory Access Protocol

100%   Correct. 

C. Linear Distributed Access Patrol

   

D. Linux-Delegated Access Protocol

   

17.

 

To find all of the commands that have the word “list” in their name or description, you would type ____.

  Student Response

Value Correct Answer

Feedback

A. man -j list    

B. man -k list

100%   Correct. 

C. man -l list    

D. man -m list

   

18.

 

In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.

  Student Response

Value Correct Answer

Feedback

A. processor    

B. user interface

   

C. swap memory

   

D. shell 100%   Correct.<br/><br/> 

19.

 

In Linux, a "-" precedes a(n) ____.

  Student Response

Value Correct Answer

Feedback

A. argument    

B. option 100%   Correct. 

C. keyword    

D. command    

20.

 

The ____ metacharacter indicates background command execution.

  Student Response

Value Correct Answer

Feedback

A. @    

B. ^    

C. & 100%   Correct. 

D. !    

 

21.

 

A swap partition contains a filesystem.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

22.

 

Typically, you only perform an upgrade if there are data and configurations on the previous installation of Red Hat Linux that are difficult to re-create or back up.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

23.

 

To display the contents of a file called data, use the command ____.

  Student Response

Value Correct Answer

Feedback

A. disp data    

B. ls data    

C. ls -l data    

D. cat data 100%   Correct.<br/><br/> 

24.

  The ____ command displays the last 10 lines of a text file.

  Student Response

Value Correct Answer

Feedback

A. end -10    

B. head -10    

C. stop -10    

D. tail -10 100%   Correct.<br/><br/> 

25.

 

The ____ metacharacter can also be used to refer to the current user's home directory.

  Student Response

Value Correct Answer

Feedback

A. ~ 100%   Correct. 

B. @    

C. &    

D. #    

26.

 

A linked file is followed by a(n) ____.

  Student Response

Value Correct Answer

Feedback

A. @ 100%   Correct. 

B. *    

C. /    

D. =    

27.

 

It is acceptable to use shell metacharacters when naming files.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

28.

 

Pressing the Esc key at the prompt while using the more command displays a help screen.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

29.

 

The command strings /bin/echo displays the binary characters inside the /bin/echo binary executable program.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

30.

 

The ____ section of a filesystem is the section that contains information about the filesystem in general.

  Student Response

Value Correct Answer

Feedback

A. inode table

   

B. inode    

C. data blocks

   

D. superblock

100%   Correct.<br/><br/> 

Score: 10/10

 

31.

  In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

  Student Value Correct Feedback

Response

Answer

A. /load    

B. /bin    

C. /boot 100%   Correct. 

D. /mnt    

Score: 10/10

 

32.

 

In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

  Student Response

Value Correct Answer

Feedback

A. *    

B. +    

C. ?    

D. - 100%   Correct.<br/><br/> 

Score: 10/10

 

33.

 

When using the chmod command, the mode rwx can be represented by the number ____.

  Student Response

Value Correct Answer

Feedback

A. 0    

B. 1    

C. 7 100%   Correct. 

D. 8    

Score: 10/10

 

34.

  To move files you can use the mv command.

  Student Respons

Value Correct Answer

Feedback

e

A. True 100%   Correct. 

B. False    

Score: 10/10

 

35.

 

The rmdir command automatically removes a directory and all of its subdirectories and files.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct. 

Score: 10/10

 

36.

 

You can use wildcard metacharacters with the find command.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

37.

 

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

38.

  Match each term with the correct statement below.

1.  Directory that stores device files.   a.  major

2.  Indicates a particular device.

3.  File on the hard disk representing a device on a Linux system.

4.  Command used to create a journal file on the filesystem.

5.  The first readable sector of a hard disk, where partition definitions are stored.

6.  File that contains a list of devices that are currently used on the system and their major numbers.

7.  Quota limits that are rigid and prevents the user from going past them.

8.  Points to the device driver for a device in the Linux kernel.

9.  Quota limits that allows the user to extend them for a certain period of time.

number

b.  /proc/devices

c.  MBR

d.  soft limits

e.  tune2fs

f.  hard limits

g.  minor number

h.  /dev

i.  device file

Statement Response Value Correct Match

1  h 11.11% h

2  g 11.11% g

3  i 11.11% i

4  e 11.11% e

5  c 11.11% c

6  b 11.11% b

7  f 11.11% f

8  a 11.11% a

9  d 11.12% d

Score: 10/10

 

39.

  To create partitions after installation, you can use the ____ command.

  Student Response

Value Correct Answer

Feedback

A. format    

B. formatdisk

   

C. fdisk 100%   Correct. 

D. partition    

Score: 10/10

 

40.

 

To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.

  Student Response

Value Correct Answer

Feedback

A. fcheck 0%   Incorrect. 

B. fsc    

C. fscheck    

D. fsck    

Score: 0/10

 

41.

 

If you do not know the type, major, or minor number of a device, you can use the ____ program to re-create the device based on the common name.

  Student Response

Value

Correct Answer

Feedback

A. /dev/MAKEDEV

100%   Correct. 

B. mkfs    

C. mknod    

D. /dev/makedevice    

Score: 10/10

 

42.

  The ____ filesystem contains most of the operating system files.

  Student Response

Value Correct Answer

Feedback

A. boot    

B. data    

C. mnt    

D. root 100%   Correct.<br/><br/> 

Score: 10/10

 

43.

 

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

  Student Response

Value Correct Answer

Feedback

A. -t 100%   Correct. 

B. -f    

C. -c    

D. -o    

Score: 10/10

 

44.

 

After a typical Red Hat Fedora Linux installation,over 18,000 different device files are in the /dev directory.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

45.

  In Linux you must use only one type of filesystem on a system.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

46.

 

Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.

  Student Response

Value Correct Answer

Feedback

A. 256    

B. 512    

C. 1024 100%   Correct. 

D. 2048    

Score: 10/10

 

47.

 

To verify hardware settings, you can examine the contents of the ____ directory.

  Student Response

Value Correct Answer

Feedback

A. /log    

B. /root    

C. /proc 100%   Correct. 

D. /hw    

Score: 10/10

 

48.

  The ____ standard support speeds of up to 80 MB/second.

  Student Response

Value Correct Answer

Feedback

A. SCSI-3 Ultra2 Wide

100%   Correct. 

B. SCSI-2 Wide

   

C. SCSI-3 Ultra

   

D. SCSI-3 Ultra3 Wide

   

Score: 10/10

 

49.

 

RAID level ____ is often referred to as disk mirroring.

  Student Response

Value Correct Answer

Feedback

A. 1 100%   Correct. 

B. 2    

C. 3    

D. 4    

Score: 10/10

 

50.

 

IRQ 2 and IRQ 9 are linked such that they are seen by the system as a single IRQ.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

51.

  Multiple devices can use a DMA channel simultaneously.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

52.

 

The BIOSes on different computers are generally very similar or exactly the same.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

  53. Match each term with the correct statement below.

1.  Labels representing command input and output.

2.  Any error messages generated by a command.

3.  Shell variables that are typically set by the system and contain information that the system and programs access regularly.

4.  Files that are typically used to create custom programs that perform administrative tasks on Linux systems.

5.  The first line in a shell script, which specifies the

  a.  decision construct

b.  stderr

c.  tee

d.  stdout

e.  hashpling

f.  environment

pathname to the shell that interprets the contents of the shell script.

6.  The information that is processed by the command during execution.

7.  Constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.

8.  The normal output of a command.

9.  A filter command that takes information from Standard Input and sends that information to a file, as well as to Standard Output.

variables

g.  file descriptors

h.  stdin

i.  shell scripts

Statement Response Value Correct Match

1  g 11.11% g

2  b 11.11% b

3  f 11.11% f

4  i 11.11% i

5  e 11.11% e

6  h 11.11% h

7  a 11.11% a

8  d 11.11% d

9  c 11.12% c

54.

 

The ____ escape sequence represents a form feed.

  Student Response

Value Correct Answer

Feedback

A. \n    

B. \f 100%   Correct. 

C. /f    

D. /n    

55.

  You can redirect a file to the Standard Input of a command using the ____ metacharacter.

  Student Response

Value Correct Answer

Feedback

A. >    

B. #    

C. |    

D. < 100%   Correct.<br/><br/> 

Score: 10/10

 

56.

 

The ____ command counts the number of lines, words, and characters in a file.

  Student Response

Value Correct Answer

Feedback

A. pr    

B. nl    

C. tr    

D. wc 100%   Correct.<br/><br/> 

Score: 10/10

 

57.

 

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

  Student Response

Value Correct Answer

Feedback

A. True 0%   Incorrect. 

B. False    

Score: 0/10

 

58.

  You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

59.

 

You can use the sed command to remove unwanted lines of text.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 0%   Incorrect.  

Score: 0/10

 

60.

 

Any command that can be executed on the command line can also be placed inside any environment file.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

61.

 

____ is the Window Manager used for the GNOME desktop in Red Hat Fedora Core 2.

  Student Response

Value Correct Answer

Feedback

A. kwin    

B. twm    

C. metacity 100%   Correct. 

D. sawfish    

Score: 10/10

 

62.

  If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.

  Student Response Valu Correct Feedback

e Answer

A. /etc/X11/XF86Config

   

B. /etc/X11/xorg.conf 100%   Correct. 

C. /etc/X11/xwin.conf    

D. /etc/X11/xorg    

Score: 10/10

 

63.

 

To configure your keyboard, you can use the ____ command from either a GUI or terminal environment and restart X Windows.

  Student Response

Value Correct Answer

Feedback

A. sys-conf-kb

   

B. system-config-kb

   

C. sys-config-keyboard

   

D. system-config-keyboard

100%   Correct.<br/><br/> 

Score: 10/10

 

64.

  After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility after X Windows has started

  Student Response

Value Correct Answer

Feedback

A. xvidtune 100%   Correct. 

B. xvideotune

   

C. xtune    

D. vidtune    

Score: 10/10

 

65.

 

In Linux, runlevel ____ is also known as multiuser mode.

  Student Response

Value Correct Answer

Feedback

A. 1    

B. 2 100%   Correct. 

C. 3    

D. 4    

Score: 10/10

 

66.

 

The /etc/rc.d/rc 5 command only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

67.

 

Most daemons accept the arguments start, stop, and restart.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

68.

  You can choose to use a Window Manager only, and not use a desktop manager.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

69.

 

Match each term with the correct statement below.

1.  Identifies the process that started another process.

2.  Ignoring a kill signal.

3.  Daemon used to schedule a command to execute once in the future.

4.  Directory storing the shell environment and scheduled commands.

5.  A process’s identifier that allows the kernel to identify it uniquely.

6.  The location of user cron tables.

7.  Daemon used to schedule a command to execute repeatedly in the future.

8.  The location of system cron tables.

9.  An executable file on the hard disk that can be run when you execute it.

  a.  program

b.  at daemon

c.  /etc/crontab

d.  /var/spool/cron

e.  /var/spool/at

f.  PID

g.  cron daemon

h.  trapping

i.  PPID

Statement Response Value Correct Match

1  i 11.11% i

2  h 11.11% h

3  b 11.11% b

4  e 11.11% e

5  f 11.11% f

6  d 11.11% d

7  g 11.11% g

8  c 11.11% c

9  a 11.12% a

Score: 10/10

 

70.

  A system process that is not associated with a terminal is called a(n) ____.

  Student Response

Value Correct Answer

Feedback

A. daemon 100%   Correct. 

B. user    

C. parent    

D. startup    

Score: 10/10

 

71.

 

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

  Student Response

Value Correct Answer

Feedback

A. *    

B. + 100%   Correct. 

C. -    

D. /    

Score: 10/10

 

72.

 

To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

  Student Response

Value Correct Answer

Feedback

A. -f    

B. -l    

C. -a    

D. -e 100%   Correct.<br/><br/> 

Score: 10/10

 

73.

  There are ____ different kill signals that the kill command can send to a certain process.

  Student Value Correct Feedback

Response

Answer

A. 16    

B. 32    

C. 64 100%   Correct. 

D. 128    

Score: 10/10

 

74.

 

The ps command is the only command that can view process information.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

75.

 

The killall command uses the PID to kill a process.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

76.

 

After a process has been started, you can change its priority by using the renice command.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

77.

 

The skeleton directory on most Linux systems is ____.

  Student Response

Value Correct Answer

Feedback

A. /etc/skel 100%   Correct. 

B. /var/skel    

C. /etc/skeleton    

D. /var/skeleton

   

Score: 10/10

 

78.

 

To lock an account, you can use the usermod command with the ____ option.

  Student Response

Value Correct Answer

Feedback

A. -U    

B. -u    

C. -l    

D. -L 100%   Correct.<br/><br/> 

Score: 10/10

 

79.

 

The lp command uses the ____ option to specify the destination printer name.

  Student Response

Value Correct Answer

Feedback

A. -n    

B. -p    

C. -d 100%   Correct. 

D. -l    

Score: 10/10

 

80.

  The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.

  Student Response

Value Correct Answer

Feedback

A. -o    

B. -a    

C. -p 100%   Correct. 

D. -e    

Score: 10/10

 

81.

 

The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

  Student Response

Value Correct Answer

Feedback

A. wtmp    

B. messages    

C. dmesg    

D. secure 100%   Correct.<br/><br/> 

Score: 10/10

 

82.

 

Can each user on a Linux system specify his or her own default printer?

  Student Response

Value Correct Answer

Feedback

A. Yes 100%   Correct. 

B. No    

Score: 10/10

 

83.

  Can the lp command accept information from Standard Input?

  Student Response

Value Correct Answer

Feedback

A. Yes 100%   Correct. 

B. No    

Score: 10/10

 

84.

 

Did older Linux systems store encrypted passwords in the /etc/shadow file?

  Student Response

Value Correct Answer

Feedback

A. Yes    

B. No 100%   Correct.  

Score: 10/10

 

85.

  Match each term with the correct statement below.

1.  Burning software that comes with Red Hat Fedora Core 2.

2.  Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives.

3.  Command that can be used to ensure that a file was received in its entirety after you download it.

4.  Command that can be used to manipulate tape devices or prepare a tape for system backup.

5.  Archiving all data on a filesystem.

6.  Values that are typically calculated using a Message Digest 5 (MD5) algorithm.

7.  Back-up copies of files and directories.

8.  Standard set of instructions used to compress a file.

9.  The rate of compression.

  a.  full backup

b.  tarball

c.  compression algorithm

d.  mt

e.  compression ratio

f.  checksum

g.  sum

h.  archive

i.  X-CD-Roast

Statement Response Value Correct Match

1  i 11.11% i

2  b 11.11% b

3  g 11.11% g

4  d 11.11% d

5  a 11.11% a

6  f 11.11% f

7  h 11.11% h

8  c 11.11% c

9  e 11.12% e

Score: 10/10

 

86.

 

The compression algorithm used by the compress utility has an average compression ratio of ____%.

  Student Response

Value Correct Answer

Feedback

A. 30-40    

B. 40–50 100%   Correct. 

C. 50-60    

D. 60-70    

Score: 10/10

 

87.

 

The ____ option can be used with the tar command to extract a specified archive.

  Student Response

Value Correct Answer

Feedback

A. -s    

B. -e    

C. -x 100%   Correct. 

D. -a    

Score: 10/10

 

88.

  You can perform up to ____ different incremental backups using the dump/restore utility.

  Student Response

Value Correct Answer

Feedback

A. 7    

B. 8    

C. 9 100%   Correct. 

D. 10    

Score: 10/10

 

89.

 

The ____ command can be used to display the contents of a compressed file.

  Student Response

Value Correct Answer

Feedback

A. acat    

B. zcat 100%   Correct. 

C. cat    

D. ccat    

Score: 10/10

 

90.

 

When used with the compress command, the ____ option can be used to compress symbolic links.

  Student Response

Value Correct Answer

Feedback

A. -f 100%   Correct. 

B. -c    

C. -v    

D. -r    

Score: 10/10

 

91.

  When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

92.

 

The tar utility cannot back up device files or files with filenames longer than 255 characters.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

93.

 

The ____ option for the sar command is used to displays statistics for the processor queue.

  Student Response

Value Correct Answer

Feedback

A. -r    

B. -c    

C. -q 100%   Correct. 

D. -v    

Score: 10/10

 

94.

  When compiling a kernel, if the source code has been compiled previously, you can optionally use the ____ command to remove any files created by previous kernel compilations.

  Student Response

Value Correct Answer

Feedback

A. make proper

0%   Incorrect. 

B. make mproper

   

C. make mrpr

   

D. make    

mrproper

Score: 0/10

 

95.

 

The shell restricts the number of filehandles that programs can open to ____ by default.

  Student Response

Value Correct Answer

Feedback

A. 256    

B. 512    

C. 1024 100%   Correct. 

D. 2048    

Score: 10/10

 

96.

 

The ____ keyword used with the setserial utility sets the speed of a serial port to 56KB/s.

  Student Response

Value Correct Answer

Feedback

A. spd_vhi    

B. spd    

C. spd_hi 100%   Correct. 

D. spd_normal

   

Score: 10/10

 

97.

 

Many Linux problems are posted on Web sites or newsgroups.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

98.

 

Almost all hardware problems are the result of damaged hardware.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

99.

 

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

100.

 

Performance problems can only be caused by hardware.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

top related