Top Banner
1. Match each term with the correct statement below. 1. A user-friendly name that masks an IP address. 2. The list of instructions that a software developer writes to make up a program 3. An organized collection of data that is arranged into tables of related information. 4. A service that protects companies from outside intruders on the Internet. 5. A computer equipped with open source software such as text editors, desktop publishing software, and office productivity suites. 6. A software system that installs and maintains software. 7. The sets of instructions or programs that understand how to use the hardware of the computer in a meaningful way. 8. A GUI Environment for Linux written in the C programming language. 9. A service that requests outside Internet resources on behalf of a computer inside of a company. a. GNOME b. source code c. fully qualified domain names d. firewall e. package manager f. software g. proxy server h. database i. office workstation Statement Response Value Correct Match 1 c 11.11% c 2 b 11.11% b 3 h 11.11% h
42

Linux Final

Apr 03, 2015

Download

Documents

rjc1
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Linux Final

1.

 

Match each term with the correct statement below.

1.  A user-friendly name that masks an IP address.

2.  The list of instructions that a software developer writes to make up a program

3.  An organized collection of data that is arranged into tables of related information.

4.  A service that protects companies from outside intruders on the Internet.

5.  A computer equipped with open source software such as text editors, desktop publishing software, and office productivity suites.

6.  A software system that installs and maintains software.

7.  The sets of instructions or programs that understand how to use the hardware of the computer in a meaningful way.

8.  A GUI Environment for Linux written in the C programming language.

9.  A service that requests outside Internet resources on behalf of a computer inside of a company.

  a.  GNOME

b.  source code

c.  fully qualified domain names

d.  firewall

e.  package manager

f.  software

g.  proxy server

h.  database

i.  office workstation

Statement Response Value Correct Match

1  c 11.11% c

2  b 11.11% b

3  h 11.11% h

4  d 11.11% d

5  i 11.11% i

6  e 11.11% e

7  f 11.11% f

8  a 11.11% a

9  g 11.12% g

2.

  A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.

Page 2: Linux Final

  Student Response

Value Correct Answer

Feedback

A. system service

   

B. graphical user interface

   

C. user interface

   

D. device driver

100%   Correct.<br/><br/> 

3.

 

A ____ is merely a compressed archive of files that  usually contain scripts that install the software contents to the correct location on the system.

  Student Response

Value Correct Answer

Feedback

A. package manager

0%   Incorrect. 

B. DBMS    

C. tarball    

D. router    

4.

  The concept of ____ enables software developers to read the source code of other people’s software, modify that source code to make the program better, and redistribute that source code to other developers who might improve it further.

  Student Response

Value Correct Answer

Feedback

A. Open Source Software

100%   Correct. 

B. Linux    

C. Closed Source Software

   

Page 3: Linux Final

D. Freeware    

5.

 

The ____ stipulates that the source code of any software published under its license must be freely available.

  Student Response

Value Correct Answer

Feedback

A. Artistic License

   

B. GNU Public License

100%   Correct. 

C. Free Software Foundation

   

D. Freeware    

6.

 

Linux is merely one product of open source development.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

7.

 

Each computer participating on the Internet must have an IP address.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

Page 4: Linux Final

8.

 

Services that are used on the local computer are referred to as server services.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

9.

 

The ____ stores information for retrieval in a separate computer chip that is connected to the processor via a high-speed link.

  Student Response

Value Correct Answer

Feedback

A. Level 1 (L1) cache

   

B. Level 2 (L2) cache

100%   Correct. 

C. Level 3 (L3) cache

   

D. Control Unit

   

10.

 

The most common slot for peripheral devices used today is a(n) ____ slot.

  Student Response

Value Correct Answer

Feedback

A. PCI 100%   Correct. 

B. ISA    

C. AGP    

D. DMA    

 

Page 5: Linux Final

11.

 

On Linux, a master hard drive connected to the secondary IDE controller would be named ____.

  Student Response

Value Correct Answer

Feedback

A. hda    

B. hdb    

C. hdc 100%   Correct. 

D. hdd    

12.

 

Greater amounts of ____ memory allow more programs to run simultaneously on the system.

  Student Response

Value Correct Answer

Feedback

A. PROM    

B. ROM    

C. RAM 100%   Correct. 

D. BIOS ROM

   

13.

 

Keyboards and mice are devices that facilitate user input and direction.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Page 6: Linux Final

14.

 

Any operating system can be installed on any computer, regardless of the computer’s hardware.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

15.

  Match each correct item with the statement below.

1.  Filesystem that performs journaling

2.  Passwords that are stored in a separate database from the user account information

3.  Program started by the BIOS ROM that loads the Linux kernel into memory from a hard disk partition inside the computer

4.  Passwords that support a length of up to 256 characters and are encrypted using a hash algorithm

5.  Allows you to choose the operating system to boot upon system startup

6.  Specify a commands’ working parameters

7.  May be required if the / or /boot partition starts after the 1024th cylinder of the hard disk

8.  Alter the way a command works

9.  Traditional filesystem still used on most Linux computers

  a.  MD5 passwords

b.  Dual booting

c.  ext3

d.  Arguments

e.  LBA32

f.  Boot loader

g.  Shadow passwords

h.  Options

i.  ext2

Statement Response Value Correct Match

1  c 11.11% c

2  g 11.11% g

3  f 11.11% f

4  a 11.11% a

5  b 11.11% b

6  d 11.11% d

7  e 11.11% e

Page 7: Linux Final

8  h 11.11% h

9  i 11.12% i

16.

 

LDAP stands for ____.

  Student Response

Value Correct Answer

Feedback

A. Linux Distributed Access Protocol

   

B. Lightweight Directory Access Protocol

100%   Correct. 

C. Linear Distributed Access Patrol

   

D. Linux-Delegated Access Protocol

   

17.

 

To find all of the commands that have the word “list” in their name or description, you would type ____.

  Student Response

Value Correct Answer

Feedback

A. man -j list    

B. man -k list

100%   Correct. 

C. man -l list    

D. man -m list

   

Page 8: Linux Final

18.

 

In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.

  Student Response

Value Correct Answer

Feedback

A. processor    

B. user interface

   

C. swap memory

   

D. shell 100%   Correct.<br/><br/> 

19.

 

In Linux, a "-" precedes a(n) ____.

  Student Response

Value Correct Answer

Feedback

A. argument    

B. option 100%   Correct. 

C. keyword    

D. command    

20.

 

The ____ metacharacter indicates background command execution.

  Student Response

Value Correct Answer

Feedback

A. @    

B. ^    

C. & 100%   Correct. 

D. !    

 

21.

Page 9: Linux Final

 

A swap partition contains a filesystem.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

22.

 

Typically, you only perform an upgrade if there are data and configurations on the previous installation of Red Hat Linux that are difficult to re-create or back up.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

23.

 

To display the contents of a file called data, use the command ____.

  Student Response

Value Correct Answer

Feedback

A. disp data    

B. ls data    

C. ls -l data    

D. cat data 100%   Correct.<br/><br/> 

24.

  The ____ command displays the last 10 lines of a text file.

Page 10: Linux Final

  Student Response

Value Correct Answer

Feedback

A. end -10    

B. head -10    

C. stop -10    

D. tail -10 100%   Correct.<br/><br/> 

25.

 

The ____ metacharacter can also be used to refer to the current user's home directory.

  Student Response

Value Correct Answer

Feedback

A. ~ 100%   Correct. 

B. @    

C. &    

D. #    

26.

 

A linked file is followed by a(n) ____.

  Student Response

Value Correct Answer

Feedback

A. @ 100%   Correct. 

B. *    

C. /    

D. =    

27.

 

It is acceptable to use shell metacharacters when naming files.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

28.

Page 11: Linux Final

 

Pressing the Esc key at the prompt while using the more command displays a help screen.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

29.

 

The command strings /bin/echo displays the binary characters inside the /bin/echo binary executable program.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

30.

 

The ____ section of a filesystem is the section that contains information about the filesystem in general.

  Student Response

Value Correct Answer

Feedback

A. inode table

   

B. inode    

C. data blocks

   

D. superblock

100%   Correct.<br/><br/> 

Score: 10/10

 

31.

  In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

  Student Value Correct Feedback

Page 12: Linux Final

Response

Answer

A. /load    

B. /bin    

C. /boot 100%   Correct. 

D. /mnt    

Score: 10/10

 

32.

 

In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

  Student Response

Value Correct Answer

Feedback

A. *    

B. +    

C. ?    

D. - 100%   Correct.<br/><br/> 

Score: 10/10

 

33.

 

When using the chmod command, the mode rwx can be represented by the number ____.

  Student Response

Value Correct Answer

Feedback

A. 0    

B. 1    

C. 7 100%   Correct. 

D. 8    

Score: 10/10

 

34.

  To move files you can use the mv command.

  Student Respons

Value Correct Answer

Feedback

Page 13: Linux Final

e

A. True 100%   Correct. 

B. False    

Score: 10/10

 

35.

 

The rmdir command automatically removes a directory and all of its subdirectories and files.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct. 

Score: 10/10

 

36.

 

You can use wildcard metacharacters with the find command.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

37.

 

The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

38.

  Match each term with the correct statement below.

1.  Directory that stores device files.   a.  major

Page 14: Linux Final

2.  Indicates a particular device.

3.  File on the hard disk representing a device on a Linux system.

4.  Command used to create a journal file on the filesystem.

5.  The first readable sector of a hard disk, where partition definitions are stored.

6.  File that contains a list of devices that are currently used on the system and their major numbers.

7.  Quota limits that are rigid and prevents the user from going past them.

8.  Points to the device driver for a device in the Linux kernel.

9.  Quota limits that allows the user to extend them for a certain period of time.

number

b.  /proc/devices

c.  MBR

d.  soft limits

e.  tune2fs

f.  hard limits

g.  minor number

h.  /dev

i.  device file

Statement Response Value Correct Match

1  h 11.11% h

2  g 11.11% g

3  i 11.11% i

4  e 11.11% e

5  c 11.11% c

6  b 11.11% b

7  f 11.11% f

8  a 11.11% a

9  d 11.12% d

Score: 10/10

 

39.

  To create partitions after installation, you can use the ____ command.

  Student Response

Value Correct Answer

Feedback

Page 15: Linux Final

A. format    

B. formatdisk

   

C. fdisk 100%   Correct. 

D. partition    

Score: 10/10

 

40.

 

To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.

  Student Response

Value Correct Answer

Feedback

A. fcheck 0%   Incorrect. 

B. fsc    

C. fscheck    

D. fsck    

Score: 0/10

 

41.

 

If you do not know the type, major, or minor number of a device, you can use the ____ program to re-create the device based on the common name.

  Student Response

Value

Correct Answer

Feedback

A. /dev/MAKEDEV

100%   Correct. 

B. mkfs    

C. mknod    

D. /dev/makedevice    

Score: 10/10

 

42.

  The ____ filesystem contains most of the operating system files.

  Student Response

Value Correct Answer

Feedback

Page 16: Linux Final

A. boot    

B. data    

C. mnt    

D. root 100%   Correct.<br/><br/> 

Score: 10/10

 

43.

 

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

  Student Response

Value Correct Answer

Feedback

A. -t 100%   Correct. 

B. -f    

C. -c    

D. -o    

Score: 10/10

 

44.

 

After a typical Red Hat Fedora Linux installation,over 18,000 different device files are in the /dev directory.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

45.

  In Linux you must use only one type of filesystem on a system.

  Student Response

Value Correct Answer

Feedback

A. True    

Page 17: Linux Final

B. False 100%   Correct.  

Score: 10/10

 

46.

 

Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.

  Student Response

Value Correct Answer

Feedback

A. 256    

B. 512    

C. 1024 100%   Correct. 

D. 2048    

Score: 10/10

 

47.

 

To verify hardware settings, you can examine the contents of the ____ directory.

  Student Response

Value Correct Answer

Feedback

A. /log    

B. /root    

C. /proc 100%   Correct. 

D. /hw    

Score: 10/10

 

48.

  The ____ standard support speeds of up to 80 MB/second.

  Student Response

Value Correct Answer

Feedback

A. SCSI-3 Ultra2 Wide

100%   Correct. 

Page 18: Linux Final

B. SCSI-2 Wide

   

C. SCSI-3 Ultra

   

D. SCSI-3 Ultra3 Wide

   

Score: 10/10

 

49.

 

RAID level ____ is often referred to as disk mirroring.

  Student Response

Value Correct Answer

Feedback

A. 1 100%   Correct. 

B. 2    

C. 3    

D. 4    

Score: 10/10

 

50.

 

IRQ 2 and IRQ 9 are linked such that they are seen by the system as a single IRQ.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

51.

  Multiple devices can use a DMA channel simultaneously.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

Page 19: Linux Final

 

52.

 

The BIOSes on different computers are generally very similar or exactly the same.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

  53. Match each term with the correct statement below.

1.  Labels representing command input and output.

2.  Any error messages generated by a command.

3.  Shell variables that are typically set by the system and contain information that the system and programs access regularly.

4.  Files that are typically used to create custom programs that perform administrative tasks on Linux systems.

5.  The first line in a shell script, which specifies the

  a.  decision construct

b.  stderr

c.  tee

d.  stdout

e.  hashpling

f.  environment

Page 20: Linux Final

pathname to the shell that interprets the contents of the shell script.

6.  The information that is processed by the command during execution.

7.  Constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.

8.  The normal output of a command.

9.  A filter command that takes information from Standard Input and sends that information to a file, as well as to Standard Output.

variables

g.  file descriptors

h.  stdin

i.  shell scripts

Statement Response Value Correct Match

1  g 11.11% g

2  b 11.11% b

3  f 11.11% f

4  i 11.11% i

5  e 11.11% e

6  h 11.11% h

7  a 11.11% a

8  d 11.11% d

9  c 11.12% c

54.

 

The ____ escape sequence represents a form feed.

  Student Response

Value Correct Answer

Feedback

A. \n    

B. \f 100%   Correct. 

C. /f    

D. /n    

55.

  You can redirect a file to the Standard Input of a command using the ____ metacharacter.

Page 21: Linux Final

  Student Response

Value Correct Answer

Feedback

A. >    

B. #    

C. |    

D. < 100%   Correct.<br/><br/> 

Score: 10/10

 

56.

 

The ____ command counts the number of lines, words, and characters in a file.

  Student Response

Value Correct Answer

Feedback

A. pr    

B. nl    

C. tr    

D. wc 100%   Correct.<br/><br/> 

Score: 10/10

 

57.

 

To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.

  Student Response

Value Correct Answer

Feedback

A. True 0%   Incorrect. 

B. False    

Score: 0/10

 

58.

  You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

  Student Response

Value Correct Answer

Feedback

A. True    

Page 22: Linux Final

B. False 100%   Correct.  

Score: 10/10

 

59.

 

You can use the sed command to remove unwanted lines of text.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 0%   Incorrect.  

Score: 0/10

 

60.

 

Any command that can be executed on the command line can also be placed inside any environment file.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

61.

 

____ is the Window Manager used for the GNOME desktop in Red Hat Fedora Core 2.

  Student Response

Value Correct Answer

Feedback

A. kwin    

B. twm    

C. metacity 100%   Correct. 

D. sawfish    

Score: 10/10

 

62.

  If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.

  Student Response Valu Correct Feedback

Page 23: Linux Final

e Answer

A. /etc/X11/XF86Config

   

B. /etc/X11/xorg.conf 100%   Correct. 

C. /etc/X11/xwin.conf    

D. /etc/X11/xorg    

Score: 10/10

 

63.

 

To configure your keyboard, you can use the ____ command from either a GUI or terminal environment and restart X Windows.

  Student Response

Value Correct Answer

Feedback

A. sys-conf-kb

   

B. system-config-kb

   

C. sys-config-keyboard

   

D. system-config-keyboard

100%   Correct.<br/><br/> 

Score: 10/10

 

64.

  After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility after X Windows has started

  Student Response

Value Correct Answer

Feedback

A. xvidtune 100%   Correct. 

B. xvideotune

   

C. xtune    

D. vidtune    

Score: 10/10

Page 24: Linux Final

 

65.

 

In Linux, runlevel ____ is also known as multiuser mode.

  Student Response

Value Correct Answer

Feedback

A. 1    

B. 2 100%   Correct. 

C. 3    

D. 4    

Score: 10/10

 

66.

 

The /etc/rc.d/rc 5 command only executes files that start with S in the /etc/rc.d/rc5.d/ directory.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

67.

 

Most daemons accept the arguments start, stop, and restart.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

68.

  You can choose to use a Window Manager only, and not use a desktop manager.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Page 25: Linux Final

Score: 10/10

 

69.

 

Match each term with the correct statement below.

1.  Identifies the process that started another process.

2.  Ignoring a kill signal.

3.  Daemon used to schedule a command to execute once in the future.

4.  Directory storing the shell environment and scheduled commands.

5.  A process’s identifier that allows the kernel to identify it uniquely.

6.  The location of user cron tables.

7.  Daemon used to schedule a command to execute repeatedly in the future.

8.  The location of system cron tables.

9.  An executable file on the hard disk that can be run when you execute it.

  a.  program

b.  at daemon

c.  /etc/crontab

d.  /var/spool/cron

e.  /var/spool/at

f.  PID

g.  cron daemon

h.  trapping

i.  PPID

Statement Response Value Correct Match

1  i 11.11% i

2  h 11.11% h

3  b 11.11% b

4  e 11.11% e

5  f 11.11% f

6  d 11.11% d

7  g 11.11% g

8  c 11.11% c

9  a 11.12% a

Score: 10/10

 

70.

  A system process that is not associated with a terminal is called a(n) ____.

Page 26: Linux Final

  Student Response

Value Correct Answer

Feedback

A. daemon 100%   Correct. 

B. user    

C. parent    

D. startup    

Score: 10/10

 

71.

 

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

  Student Response

Value Correct Answer

Feedback

A. *    

B. + 100%   Correct. 

C. -    

D. /    

Score: 10/10

 

72.

 

To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

  Student Response

Value Correct Answer

Feedback

A. -f    

B. -l    

C. -a    

D. -e 100%   Correct.<br/><br/> 

Score: 10/10

 

73.

  There are ____ different kill signals that the kill command can send to a certain process.

  Student Value Correct Feedback

Page 27: Linux Final

Response

Answer

A. 16    

B. 32    

C. 64 100%   Correct. 

D. 128    

Score: 10/10

 

74.

 

The ps command is the only command that can view process information.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

75.

 

The killall command uses the PID to kill a process.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

76.

 

After a process has been started, you can change its priority by using the renice command.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

77.

Page 28: Linux Final

 

The skeleton directory on most Linux systems is ____.

  Student Response

Value Correct Answer

Feedback

A. /etc/skel 100%   Correct. 

B. /var/skel    

C. /etc/skeleton    

D. /var/skeleton

   

Score: 10/10

 

78.

 

To lock an account, you can use the usermod command with the ____ option.

  Student Response

Value Correct Answer

Feedback

A. -U    

B. -u    

C. -l    

D. -L 100%   Correct.<br/><br/> 

Score: 10/10

 

79.

 

The lp command uses the ____ option to specify the destination printer name.

  Student Response

Value Correct Answer

Feedback

A. -n    

B. -p    

C. -d 100%   Correct. 

D. -l    

Score: 10/10

 

80.

  The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.

Page 29: Linux Final

  Student Response

Value Correct Answer

Feedback

A. -o    

B. -a    

C. -p 100%   Correct. 

D. -e    

Score: 10/10

 

81.

 

The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

  Student Response

Value Correct Answer

Feedback

A. wtmp    

B. messages    

C. dmesg    

D. secure 100%   Correct.<br/><br/> 

Score: 10/10

 

82.

 

Can each user on a Linux system specify his or her own default printer?

  Student Response

Value Correct Answer

Feedback

A. Yes 100%   Correct. 

B. No    

Score: 10/10

 

83.

  Can the lp command accept information from Standard Input?

  Student Response

Value Correct Answer

Feedback

A. Yes 100%   Correct. 

B. No    

Page 30: Linux Final

Score: 10/10

 

84.

 

Did older Linux systems store encrypted passwords in the /etc/shadow file?

  Student Response

Value Correct Answer

Feedback

A. Yes    

B. No 100%   Correct.  

Score: 10/10

 

85.

  Match each term with the correct statement below.

1.  Burning software that comes with Red Hat Fedora Core 2.

2.  Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives.

3.  Command that can be used to ensure that a file was received in its entirety after you download it.

4.  Command that can be used to manipulate tape devices or prepare a tape for system backup.

5.  Archiving all data on a filesystem.

6.  Values that are typically calculated using a Message Digest 5 (MD5) algorithm.

7.  Back-up copies of files and directories.

8.  Standard set of instructions used to compress a file.

9.  The rate of compression.

  a.  full backup

b.  tarball

c.  compression algorithm

d.  mt

e.  compression ratio

f.  checksum

g.  sum

h.  archive

i.  X-CD-Roast

Statement Response Value Correct Match

1  i 11.11% i

2  b 11.11% b

3  g 11.11% g

4  d 11.11% d

5  a 11.11% a

Page 31: Linux Final

6  f 11.11% f

7  h 11.11% h

8  c 11.11% c

9  e 11.12% e

Score: 10/10

 

86.

 

The compression algorithm used by the compress utility has an average compression ratio of ____%.

  Student Response

Value Correct Answer

Feedback

A. 30-40    

B. 40–50 100%   Correct. 

C. 50-60    

D. 60-70    

Score: 10/10

 

87.

 

The ____ option can be used with the tar command to extract a specified archive.

  Student Response

Value Correct Answer

Feedback

A. -s    

B. -e    

C. -x 100%   Correct. 

D. -a    

Score: 10/10

 

88.

  You can perform up to ____ different incremental backups using the dump/restore utility.

  Student Response

Value Correct Answer

Feedback

A. 7    

Page 32: Linux Final

B. 8    

C. 9 100%   Correct. 

D. 10    

Score: 10/10

 

89.

 

The ____ command can be used to display the contents of a compressed file.

  Student Response

Value Correct Answer

Feedback

A. acat    

B. zcat 100%   Correct. 

C. cat    

D. ccat    

Score: 10/10

 

90.

 

When used with the compress command, the ____ option can be used to compress symbolic links.

  Student Response

Value Correct Answer

Feedback

A. -f 100%   Correct. 

B. -c    

C. -v    

D. -r    

Score: 10/10

 

91.

  When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Page 33: Linux Final

Score: 10/10

 

92.

 

The tar utility cannot back up device files or files with filenames longer than 255 characters.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

93.

 

The ____ option for the sar command is used to displays statistics for the processor queue.

  Student Response

Value Correct Answer

Feedback

A. -r    

B. -c    

C. -q 100%   Correct. 

D. -v    

Score: 10/10

 

94.

  When compiling a kernel, if the source code has been compiled previously, you can optionally use the ____ command to remove any files created by previous kernel compilations.

  Student Response

Value Correct Answer

Feedback

A. make proper

0%   Incorrect. 

B. make mproper

   

C. make mrpr

   

D. make    

Page 34: Linux Final

mrproper

Score: 0/10

 

95.

 

The shell restricts the number of filehandles that programs can open to ____ by default.

  Student Response

Value Correct Answer

Feedback

A. 256    

B. 512    

C. 1024 100%   Correct. 

D. 2048    

Score: 10/10

 

96.

 

The ____ keyword used with the setserial utility sets the speed of a serial port to 56KB/s.

  Student Response

Value Correct Answer

Feedback

A. spd_vhi    

B. spd    

C. spd_hi 100%   Correct. 

D. spd_normal

   

Score: 10/10

 

97.

 

Many Linux problems are posted on Web sites or newsgroups.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

98.

Page 35: Linux Final

 

Almost all hardware problems are the result of damaged hardware.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10

 

99.

 

If the / filesystem becomes corrupted, the system is unstable and must be turned off.

  Student Response

Value Correct Answer

Feedback

A. True 100%   Correct. 

B. False    

Score: 10/10

 

100.

 

Performance problems can only be caused by hardware.

  Student Response

Value Correct Answer

Feedback

A. True    

B. False 100%   Correct.  

Score: 10/10