Linux Essentials Midterm Exam Modules 1 – 8 Answer
![]() |
![]() |
![]() |
Título del Test:![]() Linux Essentials Midterm Exam Modules 1 – 8 Answer Descripción: Linux Essentials |




Comentarios | |
---|---|
| |
FIN DE LA LISTA |
To go to the end of an info page, press: END. n. N. ]. To go to the next match of a search on a man page, press: ]. n. N. }. When interpreting the SYNOPSIS of a command found on a man page, the “|” means: The items it separates can be used together. The items it separates cannot be used together. After performing a search, you can use the ____ key to return to a previously found match: n. N. D. U. To move a page forward one at a time while viewing a man page, press the following: Spacebar. m. a. Enter. The ls command without options or arguments…. …lists the contents of the current directory. …prompts for a directory to list. …lists the contents of a user’s home directory. …generates an error as this command requires arguments. Which option can be used with the rm command to prompt before deleting?. I. -i. -P. A. The rm command can delete multiple files at once. True or False?. True. False. Which of the following commands can be used to rename a file?. name. rn. mv. cp. The touch command can be used to: (choose two). Update the time stamp of existing files. Create new files. Change a file’s name. Change ownership of a file. You try to compress a file that is already compressed. Which of the following statements is true?. The file will not be compressed any further than it already was. The file changed while you were compressing it. The file will actually be uncompressed. The compression algorithm needs to be set to the “currently compressed” mode for it to be compressed further. The file will be deleted. Which of the following commands can be used to compress a file? (choose three). bunzip2. zip. bzip2. cat. gzip. The three main modes of tar are: (choose three). Extract. Copy. Compress. List. Create. In the command tar –czf foo.tar.gz bar, what is the purpose of the f flag?. Tells tar to copy only files, and not directories. Tells tar to read from the file that follows the flag. Tells tar to print the name of each file as it is processed. Specifies extra compression is to be used. Tells tar to write to the file that follows the flag. Which two commands do the same thing? (choose two). tar –xzf foo.tar.gz. tar –x foo | gzip. tar –c foo | gzip > foo.tar.gz. tar –tzf foo.tar.gz. tar –czf foo.tar.gz foo. Which option for the wc command will print the total number of words in a file?. -l. -L. -w. -C. Which command can be used to print line numbers?. num. ln. nl. sort. The command echo “text” > file.txt will create file.txt if it does not already exist. True or False?. True. False. The command echo “text” > file.txt will create file.txt if it does not already exist. True or False?. True. False. The command echo “text” >> file.txt will not overwrite file.txt if it already exists. True or False?. True. False. Software is backward compatible if: It still supports old file formats or applications. If the next version still works the same way. People still use old versions. It works across Linux/Mac/Windows. It can be upgraded without downtime. Apple’s OS X is: (choose three). Derived from Linux. Only compatible with Apple hardware. Able to natively run Windows binaries. Derived from FreeBSD. Certified as UNIX compatible. Primarily used to manage network services. Microsoft Windows: (choose three). Has a short maintenance cycle. Comes in desktop and server variants. Has built in virtualization. Has a new desktop version every year. Has a Linux compatibility mode. Has powerful scripting capabilities. Other commercial Unixes: (choose two). Are almost obsolete. Are tied to their vendor’s hardware. Use completely different commands than Linux. Are UNIX certified. Do not run the GNU tools. When choosing a distribution of Linux, you should consider: (choose five). Which management tools are provided by the distribution. Which distributions are supported by the software you need to run. Popularity on social media. The maintenance cycle of the distribution. If you need support on the distribution itself. Whether or not the distribution is under active development. The difference between the GPL and LGPL licenses are: LGPL allows you to distribute the software in binary-only form. LGPL is shorter than GPL. LGPL allows linking to non GPLed software. LGPL applies to web services. LGPL was made by the OSI while GPL was made by the FSF. Permissive free software licenses: (choose three). Can allow software to be used inside closed source software. Are not approved by the OSI. Are not approved by the FSF. Include the GPLv2 and BSD. Don’t have a copyleft provision. The Creative Commons version of Public Domain licensing is: Attribution-NonCommercial-ShareAlike. Attribution-NonCommercial. NoAttribution-ShareAlike. No Rights Reserved. Attribution. Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?. There are no requirements. You must make the source to your custom web interface available. You must make your hardware designs available. You must make the source to your kernel available. You must ensure your custom kernel runs on a regular Intel machine. Participating in open source projects can improve your technical skills, even if it is not your day job. True or False?. True. False. What are tradeoffs of increasing the level of privacy you have in your web browser? (choose two). You may get viruses. Sites may not work properly. Websites may load slower. Images won’t load properly. You may have to explicitly permit some cookies to be saved. Which of the following is a tool that helps you anonymize your Internet browsing?. CookieCleaner. Web proxy. The onion router. AnonFirefox. iptables. Social network “like” buttons can track your activity across the Internet. True or False?. True. False. Which of the following are properties of a strong password? (choose three). A mix of upper and lower case. Long so that it can be reused on multiple sites. Includes symbols. At least 10 characters long. Based on easy to remember items like birthdays. What can be done to prevent remote people from running programs on your computer? (choose two). Don’t use wireless networks – only wired. Use strong passwords on all user accounts. Turn on a firewall. Block third party cookies. Block all cookies. The acronym CLI stands for: Computer Link Interpreter. Command Line Interpreter. Computer Line Interface. Command Line Interface. Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like –all. l. LINUX. Kernel. GNU. shell. The acronym GNU stands for: Gnu’s Not Unix. Go Next Unit. Gnu’s Nearly Unix. Good News Unix. What one character treats the character that follows it as if it was surrounded by single quotes?. /. %. \. #. The main purpose of using glob characters is to be able to provide a command a list of filenames. True or False?. True. False. |