Add this symbol to a command to run it in the background
1. &
2.*
3.2
4. $
As a privileged user, you may set the hostname with the command:
1.hostname
2.name
3.hn
4.host
Consider using the command “cd /a/b/c”, then executing “cd ..”. What does this last command do?
1. changes to your home directory
2.displays the default directory path
3.prompts you for the next directory choice
4. changes to /a/b directory
etc/resolv.conf is …
1.Configuration file with local user accounts and its identificators
2.Network interfaces configuration file
3. The DNS resolver configuration file
4. Configuration file with software sources
Executing “pwd” in shell will return:
1.None of these
2.There is no such command
3.Your password
4.Current directory
Fedora Linux uses _____ packages.
1.deb
2.ebuild
3.deb_src
4.rpm
GRUB stands for _____.
1.Grand Unified Boot Loader
2.Gentoo’s Regular Booter
3.Great Unix Boot Loader
4. GNU Released Unix Booter
How do you show all processes being run by a particular user?
1.cat /home/USERNAME/open.process
2. top –USERNAME
3.cat /etc/activeprocess | grep USERNAME
4. top -U [USERNAME]
How do you view the documentation for the command ‘kill’ in the Linux terminal?
1. kill -help
2.kill –help
3.doc kill
4.man kill
How to reveal detailed information about CPU?
1. sysinfo –cpu
2.cpusage
3.cpusage
4.cat /proc/cpuinfo
If a host is called HHH, ‘rstat HHH’ will:
1. show HHH uptime
2.show HHH load averages
3.all are correct
4.show HHH current time
If DDD is a non empty directory, and you execute ‘rmdir DDD’, it will:
1.move the contents of DDD to /tmp, and delete the DDD directory
2.delete only the contents of the DDD directory
3.produce an error
4.delete both the contents of and the DDD directory
is a boot loader that can boot Linux
1. is a boot loader that can boot Linux
2.is only used by Slackware
3.stands for “Light Loader”
4.is a type of Linux Distro
LVM is…
1.Logical Volume Manager
2. Linux Video Manager
3. Linux Volume Manager
4. Light Video Manager
mknod can create special file (used for sending or receiving data) of type:
1. character file
2. fifo (pipe) file
3.all are correct
4.block file
mount -a’ will load all filesystems listed in:
1.etc/mtab
2.etc/filesystems
3.etc/fstab
4.etc/fs.conf
On Red Hat Linux and its derivatives, which of the following commands will be appropriate to check whether a particular “package” is installed or not?
1.query-pkg
2.rpm -qa
3.pkg
4.sys
SSH stands for _____.
1.Security Shell
2. Synchronous Shell
3.System Shell
4.Secure Shell
The command du -h ~
1.duplicates the current process
2.searches you home directory for duplicate filenames
3.deletes your account and home directory
4.lists the size of all files within your $HOME with sizes in human readable form
The jobs command
1. puts all foreground jobs in the background
2.lists background jobs
3.prints a dedication to Steve Jobs
4. provides basic accounting information for all current jobs
The Linux Kernel was written by?
1.Brian Kernighan
2.Dennis Ritchie
3.Richard Stallman
4.Linus Torvalds
The loaded modules in the kernel are listed in /proc/modules. You can get this list using the command:
1.lsmod
2.lsattr
3.listmodules
4.modules
The netstat command give information on:
1. all are correct
2.active sockets
3.open sockets
4.routing tables
the ‘-r’ switch to the mount command will:
1.mount remote (network) filesystems
2.mount filesystem only after a read-write check is performed
3.mount removable (e.g., CD-ROM) filesystem
4. mount a filesystem as read-only
The ”rm” command is used to:
1.remove a kernel module owned by you
2.run an M4 macro
3.mount a remote file system
4.delete a file
To access the value of an environment variable, we _____.
1.add the dollar ($) symbol before the variable name
2. type the variable’s name (in lower case only)
3.add the hash (#) symbol after the variable name
4.add the dollar ($) symbol after the variable name
To query DNS (Internet domain name) servers, you use the command:
1.dns
2.lsrouted
3.dnsquery
4.nslookup
To read one or more files and type them on standard output, you use:
1.ls
2.cat
3.type
4.biff
To start another shell under the current shell you use the command:
1.bash
2.All of these
3.sh
4.csh
To transfer files in an insecure way to and from a remote network site host, you use the command:
1.ftp
2.tcp
3.ucp
4.sftp
To use chown recursively, instead of using _recursive you can use:
1.NAME
2.r
3.c
4.R
Ubuntu is based on…
1.Fedora
2.Slackware
3.Debian
4.None of these
uname -a will output…
1.kernel info
2.architecture
3.date where the kernel was built
4.All of the answers are correct.
What command can be used to delete a directory, recursively searching for files and other directories and deleting them?
1.rd
2.rmdir
3. rm -d
4. rm -r
What does GRUB stand for?
1. Grand Unified Bootloader
2.Grand Unification Bootloader
3.Great Unique Bootloader
4.Gum Removal Under Boot
What does it means when the ps commands shows a ‘Z’ in the status column for a process?
1.The process is in sleep mode.
2. The process is running at top priority.
3.The process is a zombie process.
4.The process is running at low priority.
What does the pwd command do?
1.It saves the current working directory, so that you can return there with the popd command.
2. It asks the password of the current user, and the prompts for a new password.
3.It prints the path of the current working directory
4. It launches the power management daemon.
What is swap?
1.Swap space is the area on a hard disk which is part of the Virtual Memory of your machine (Swap+RAM)
2.Swap is the cache of your HDD
3. Swap is the cache of your Physical Memory (RAM)
4.Swap is the ability to switch between users in one terminal session
What is the linux mascot?
1.Hat
2.Gecko
3.Elephant
4.Penguin
What is the right command to save file and exit in Vim?
1. :wq
2. :a
3. :q
4. :q!
What is the ssh command?
1.It is the standard shell: it has a restricted set of commands, but those are portable across different Linux distributions.
2.It is the synchronous shell: all commands are performed in real-time.
3.It is the secure shell; it is used to restrict actions available to users.
4.It is the secure shell; it is used to connect to remote hosts via an authenticated and encrypted channel.
What will show you all the subdirectories of the current directory?
1.rm
2.ls
3.cd
4.cp
Which answer assists you in finding help on the whois command?
1. help whois
2.man whois
3.none of these
4.man help whois
Which firewall is most commonly used on Linux?
1.ipchains
2.ipfw
3.pf
4.iptables
Which of the following is not an editor?
1.expr
2.vi
3.emacs
4.ex
Which return value from an ioctl request indicates success?
1.ENOTTY
2. 0
3.EINVAL
4.EBADF
With which userspace is Linux typically paired?
1.Hurd
2.System V
3.GNU
4.BSD
___ is a Linux “desktop environment”.
1.XFCe
2.Gnome
3.KDE
4. All of these
____ command starts the default desktop environment.
1.gdm
2.xterm
3.startx
4.gdm-start
‘mkfs’ is used to:
1.create a filesystem on a device (such as a hard disk partition)
2.format a floppy disk
3.create a fast changing section on a hard disk
4. create a named pipe (fifo) on a device