option
Cuestiones
ayuda
daypo
buscar.php

LPI-1

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
LPI-1

Descripción:
CERTIFICACION DE ESTUDIO 4TH EDITION

Fecha de Creación: 2016/11/22

Categoría: Informática

Número Preguntas: 80

Valoración:(3)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

1.You type a command into bash and pass a long filename to it, but after you enter the command, you receive a File not found error message because of a typo in the filename. How might you proceed?. A. Retype the command, and be sure you type the filename correctly, letter by letter. B. Retype the command, but press the Tab key after typing a few letters of the long file- name to ensure that the filename is entered correctly. C. Press the Up arrow key, and use bash’s editing features to correct the typo. D. Any of the above. E. None of the above.

2.Which of the following commands is implemented as an internal command in bash?. A. cat. B. less. C. tee. D. sed. E. echo.

3.You type echo $PROC, and the computer replies Go away. What does this mean?. A. No currently running processes are associated with your shell, so you may log out without terminating them. B. The remote computer PROC isn’t accepting connections; you should contact its administrator to correct the problem. C. Your computer is handling too many processes; you must kill some of them to regain control of the computer. D. Your central processing unit (CPU) is defective and must be replaced as soon as possible. E. You, one of your configuration files, or a program you’ve run has set the $PROC environment variable to Go away.

4.What does the pwd command accomplish?. A. It prints the name of the working directory. B. It changes the current working directory. C. It prints wide displays on narrow paper. D. It parses web page URLs for display. E. It prints the terminal’s width in characters.

5.What is the surest way to run a program (say, myprog) that’s located in the current working directory?. A. Type ./ followed by the program name: ./myprog. B.Type the program name alone: myprog. C. Type run followed by the program name: run myprog. D. Type /. followed by the program name: /.myprog. E. Type the program name followed by an ampersand (&): myprog &.

6.How does man display information by default on most Linux systems?. A. Using a custom X-based application. B. Using the Firefox web browser. C. Using the info browser. D. Using the vi editor. E. Using the less pager.

7.You want to store the standard output of the ifconfig command in a text file (file.txt) for future reference, and you want to wipe out any existing data in the file. You do not want to store standard error in this file. How can you accomplish these goals?. A. ifconfig < file.txt. B. ifconfig >> file.txt. C. ifconfig > file.txt. D. ifconfig | file.txt. E. ifconfig 2> file.txt.

8.What is the effect of the following command? $ myprog &> input.txt. A. Standard error to myprog is taken from input.txt. B. Standard input to myprog is taken from input.txt. C. Standard output and standard error from myprog are written to input.txt. D. All of the above. E. None of the above.

9.How many commands can you pipe together at once?. A. 2. B. 3. C. 4. D. 16. E. >16.

10. You want to run an interactive script, gabby, which produces a lot of output in response to the user’s inputs. To facilitate future study of this script, you want to copy its output to a file. How might you do this?. A. gabby > gabby-out.txt. B. gabby | tee gabby-out.txt. C. gabby < gabby-out.txt. D. gabby &> gabby-out.txt. E. gabby `gabby-out.txt`.

11. A text-mode program, verbose, prints a lot of bogus “error” messages to standard error. How might you get rid of those messages while still interacting with the program?. A. verbose | quiet. B.verbose &> /dev/null. C. verbose 2> /dev/null. D. verbose > junk.txt. E. quiet-mode verbose.

12. How do the > and >> redirection operators differ?. A. The > operator creates a new file or overwrites an existing one; the >> operator creates a new file or appends to an existing one. B. The > operator creates a new file or overwrites an existing one; the >> operator appends to an existing file or issues an error message if the specified file doesn’t exist. C. The > operator redirects standard output; the >> operator redirects standard error. D. The > operator redirects standard output; the >> operator redirects standard input. E. The > operator writes to an existing file but fails if the file doesn’t exist; the >> operator writes to an existing file or creates a new one if it doesn’t already exist.

13. What program would you use to display the end of a configuration file?. A. uniq. B. cut. C. tail. D. wc. E. fmt.

14. What is the effect of the following command? $ pr report.txt | lpr. A. The file report.txt is formatted for printing and sent to the lpr program. B. The files report.txt and lpr are combined together into one file and sent to standard output. C. Tabs are converted to spaces in report.txt, and the result is saved in lpr. D. The file report.txt is printed, and any error messages are stored in the file lpr. E. None of the above.

15. Which of the following commands will number the lines in aleph.txt? (Select three.). A. fmt aleph.txt. B. nl aleph.txt. C. cat -b aleph.txt. D. cat -n aleph.txt. E. od -nl aleph.txt.

16. You have a data file, data.txt, to be processed by a particular program. However, the program cannot handle data separated by tabs. The data.txt file’s data is separated by a tab stop at every eight characters. What command should you use before processing the data file with the program?. A. od data.txt > data1.txt. B. expand data.txt >> data.txt. C. fmt --remove-tabs data.txt. D. expand data.txt > data1.txt. E. unexpand -t 8 data.txt.

17. Which of the following commands will change all occurrences of dog in the file animals.txt to mutt in the screen display?. A. sed –s "dog" "mutt" animals.txt. B. grep –s "dog||mutt" animals.txt. C. sed 's/dog/mutt/g' animals.txt. D. cat animals.txt | grep –c "dog" "mutt". E. fmt animals.txt | cut 'dog' > 'mutt'.

18. You’ve received an ASCII text file (longlines.txt) that uses no carriage returns within paragraphs but two carriage returns between paragraphs. The result is that your preferred text editor displays each paragraph as a very long line. How can you reformat this file so that you can more easily edit it (or a copy)?. A. sed 's/Ctrl-M/NL/' longlines.txt. B. fmt longlines.txt > longlines2.txt. C. cat longlines.txt > longlines2.txt. D. pr longlines.txt > longlines2.txt. E. grep longlines.txt > longlines2.txt.

19. Which of the following commands will print lines from the file world.txt that contain matches to changes and changed?. A. grep change[ds] world.txt. B. sed change[d-s] world.txt. C. od "change'd|s'" world.txt. D. cat world.txt changes changed. E. find world.txt "change(d|s)".

20. Which of the following regular expressions will match the strings dog, dug, and various other strings but not dig?. A. d.g. B. d[ou]g. C. d[o-u]g. D. di*g. E. d.ig.

CAPITULO 2 1.Which of the following is not an advantage of a source package over a binary package?. A. A single source package can be used on multiple CPU architectures. B. By recompiling a source package, you can sometimes work around library incompat- ibilities. C. You can modify the code in a source package, thus altering the behavior of a program. D. Source packages can be installed more quickly than binary packages. E. You may be able to recompile source code for a non-Linux Unix program on Linux.

2.Which is true of using both RPM and Debian package management systems on one computer?. A. It’s generally inadvisable because the two systems don’t share installed-file database information. B. It’s impossible because their installed-file databases conflict with one another. C. It causes no problems if you install important libraries once in each format. D. It’s a common practice on Red Hat and Debian systems. E. Using both systems simultaneously requires installing the alien program.

3.Which of the following statements is true about binary RPM packages that are built for a particular distribution?. A. License requirements forbid using the package on any other distribution. B. They may be used in another RPM-based distribution only when you set the -- convert-distrib parameter to rpm. C. They may be used in another RPM-based distribution only after you recompile the package’s source RPM. D. They can be recompiled for an RPM-based distribution running on another type of CPU. E. They can often be used on another RPM-based distribution for the same CPU architecture, but this isn’t guaranteed.

4.An administrator types the following command on an RPM-based Linux distribution: # rpm -ivh megaprog.rpm What is the effect of this command?. A. If the megaprog package is installed on the computer, it is uninstalled. B. If the megaprog.rpm package exists, is valid, and isn’t already installed on the computer, it is installed. C. The megaprog.rpm source RPM package is compiled into a binary RPM for the computer. D. Nothing; megaprog.rpm isn’t a valid RPM filename, so rpm will refuse to operate on this file. E. The megaprog.rpm package replaces any earlier version of the package that’s already installed on the computer.

5.Which of the following commands will extract the contents of the myfonts.rpm file into the current directory?. A. rpm2cpio myfonts.rpm | cpio -i --make-directories. B. rpm2cpio myfonts.rpm > make-directories. C. rpm -e myfonts.rpm. D. alien --to-extract myfonts.rpm. E. rpmbuild --rebuild myfonts.rpm.

6.To use dpkg to remove a package called theprogram, including its configuration files, which of the following commands would you issue?. A. dpkg -e theprogram. B. dpkg -p theprogram. C. dpkg -r theprogram. D. dpkg -r theprogram-1.2.3-4.deb. E. dpkg -P theprogram.

7.Which of the following describes a difference between apt-get and dpkg?. A. apt-get provides a GUI interface to Debian package management; dpkg doesn’t. B. apt-get can install tarballs in addition to Debian packages; dpkg can’t. C. apt-get can automatically retrieve and update programs from Internet sites; dpkg can’t. D. apt-get is provided only with the original Debian distribution, but dpkg comes with Debian and its derivatives. E. apt-get works only with Debian-based distributions, but dpkg can work with both RPMs and Debian packages.

8.What command would you type to obtain a list of all of the installed packages on a Debian system?. A. apt-get showall. B. apt-cache showpkg. C. dpkg -r allpkgs. D. dpkg –i. E. dpkg --get-selections.

9.As root, you type apt-get update on a Debian system. What should be the effect of this command?. A. None: update is an invalid option to apt-get. B.The APT utilities deliver information about the latest updates you’ve made to the APT Internet repositories, enabling you to share your changes with others. C. The APT utilities download all available upgrades for your installed programs and install them on your system. D. The APT utilities retrieve information about the latest packages available so that you may install them with subsequent apt-get commands. E. The APT utilities update themselves, ensuring that you’re using the latest version of APT.

10.Which of the following commands would you type to update the unzip program on a Fedora system to the latest version? (Select all that apply.). A. yum update unzip. B. yum upgrade unzip. C. yum -u unzip. D. yum -U unzip. E. yum check-update unzip.

11. How should you configure a system that uses Yum to access an additional Yum software repository?. A. Edit the /etc/apt/sources.list file to include the repository site’s URL, as detailed on the repository’s website. B. Download a package from the repository site, and install it with RPM, or place a configuration file from the repository site in the /etc/yum.repos.d directory. C. Use the add-repository subcommand to yum or the Add Repository option in the File menu in yumex, passing it the URL of the repository. D. Edit the /etc/yum.conf file, locate the [repos] section, and add the URL to the repository after the existing repository URLs. E. Edit the /etc/yum.conf file, locate the REPOSITORIES= line, and add the new repository to the colon-delimited list on that line.

12. What is the preferred method of adding a directory to the library path for all users?. A. Modify the LD_LIBRARY_PATH environment variable in a global shell script. B. Add the directory to the /etc/ld.so.conf file, and then type ldconfig. C. Type ldconfig /new/dir, where /new/dir is the directory you want to add. D. Create a symbolic link from that directory to one that’s already on the library path. E. Type ldd /new/dir, where /new/dir is the directory you want to add.

13. You prefer the look of GTK+ widgets to Qt widgets, so you want to substitute the GTK+ libraries for the Qt libraries on your system. How would you do this?. A. You must type ldconfig --makesubs=qt,gtk. This command substitutes the GTK+ libraries for the Qt libraries at load time. B. You must uninstall the Qt library packages and reinstall the GTK+ packages with the --substitute=qt option to rpm or the --replace=qt option to dpkg. C. You must note the filenames of the Qt libraries, uninstall the packages, and create symbolic links from the Qt libraries to the GTK+ libraries. D. You can’t easily do this; libraries can’t be arbitrarily exchanged for one another. You would need to rewrite all of the Qt-using programs to use GTK+. E. You must reboot the computer and pass the subst=qt,gtk option to the kernel. This causes the kernel to make the appropriate substitutions.

14. A user types kill -9 11287 at a bash prompt. What is the probable intent, assuming the user typed the correct command?. A. To cut off a network connection using TCP port 11287. B. To display the number of processes that have been killed with signal 11287 in the last nine days. C. To cause a server with process ID 11287 to reload its configuration file. D. To terminate a misbehaving or hung program with process ID 11287. E. To increase the priority of the program running with process ID 11287.

15. What programs might you use to learn what your system’s load average is? (Select two.). A. ld. B. load. C. top. D. uptime. E. la.

16. Which of the following commands creates a display of processes, showing the parent-child relationships through links between their names?. A. ps --forest. B. ps aux. C. ps -e. D. ps --tree. E. All of the above.

17. You use top to examine the CPU time being consumed by various processes on your system. You discover that one process, dfcomp, is consuming more than 90 percent of your system’s CPU time. What can you conclude?. A. Very little: dfcomp could be legitimately consuming that much CPU time, or it could be an unauthorized or malfunctioning program. B. No program should consume 90 percent of available CPU time; dfcomp is clearly malfunctioning and should be terminated. C. This is normal; dfcomp is the kernel’s main scheduling process, and it consumes any unused CPU time. D. This behavior is normal if your CPU is less powerful than a 2.5 GHz EM64T Pentium. However, on newer systems, no program should consume 90 percent of CPU time. E. This behavior is normal if your CPU has at least four cores, but on systems with fewer cores than this, no program should consume 90 percent of CPU time.

18. You type jobs at a bash command prompt and receive a new command prompt with no intervening output. What can you conclude?. A. The total CPU time used by your processes is negligible (below 0.1). B. No processes are running under your username except the shell that you’re using. C. The jobs shell is installed and working correctly on the system. D. The system has crashed; jobs normally returns a large number of running processes. E. No background processes are running that were launched from the shell that you’re using.

19. Which of the following commands are equivalent to one another? (Select two.). A. nice --value 10 crunch. B. nice -n -10 crunch. C. nice -10 crunch. D. nice 10 crunch. E. nice crunch.

20. Which of the following are restrictions on ordinary users’ abilities to run renice? (Select two.). A. Users may not modify the priorities of processes that are already running. B. Users may not modify the priority of their programs launched from anything but their current shells. C. Users may not decrease the priority (that is, increase the priority value) of their own processes. D. Users may not modify the priorities of other users’ processes. E. Users may not increase the priority (that is, decrease the priority value) of their own processes .

CAPÍTULO 3 1.What are common IRQs for RS-232 serial ports? (Select two.). A. 1. B.3. C. 4. D. 8. E. 16.

2.What tool would you use to disable a motherboard’s sound hardware if you don’t want to use it?. A. The firmware. B. The alsactl utility. C. The lsmod command. D. The lspci program. E. None of the above; onboard sound devices can’t be disabled.

3.What is the purpose of udev?. A. To aid in the development of softwar. B. To unload Linux device drivers. C. To load Linux device drivers. D. To store devices’ BIOS configurations in files. E. To manage the /dev directory tree.

4.You’ve just installed Linux on a new computer with a single SATA hard disk. What device identifier will refer to the disk?. A. /dev/sda. B. /dev/mapper/disk1. C. /dev/hda. D. C:. E. /dev/sda or /dev/hda.

5.Which files contain essential system information such as IRQs, direct-memory access channels, and I/O addresses? (Select three.). A. /proc/ioports. B. /proc/ioaddresses. C. /proc/dma. D. /proc/interrupts. E. /proc/hardware.

6.Typing fdisk -l /dev/sda on a Linux computer with an MBR disk produces a listing of four partitions: /dev/sda1, /dev/sda2, /dev/sda5, and /dev/sda6. Which of the following is true?. A. The disk contains two primary partitions and two extended partitions. B. Either /dev/sda1 or /dev/sda2 is an extended partition. C. The partition table is corrupted; there should be a /dev/sda3 and a /dev/sda4 before /dev/sda5. D. If you add a /dev/sda3 with fdisk, /dev/sda5 will become /dev/sda6, and /dev/ sda6 will become /dev/sda7. E. Both /dev/sda1 and /dev/sda2 are logical partitions.

7. A new Linux administrator plans to create a system with separate /home, /usr/local, and /etc partitions, in addition to the root (/) partition. Which of the following best describes this configuration?. A. The system won’t boot because critical boot-time files reside in /home. B. The system will boot, but /usr/local won’t be available because mounted partitions must be mounted directly off their parent partition, not in a subdirectory. C. The system will boot only if the /home partition is on a separate physical disk from the /usr/local partition. D. The system will boot and operate correctly, provided each partition is large enough for its intended use. E. The system won’t boot because /etc contains configuration files necessary to mount non-root partitions.

8.Which of the following directories is most likely to be placed on its own hard disk partition?. A. /bin. B. /sbin. C. /mnt. D. /home. E. /dev.

9.You discover that an MBR hard disk has partitions with type codes of 0x0f, 0x82, and 0x83. Assuming these type codes are accurate, what can you conclude about the disk?. A. The disk holds a partial or complete Linux system. B. The disk holds a Windows installation. C. The disk holds a FreeBSD installation. D. The disk is corrupt; those partition type codes are incompatible. E. The disk holds a Mac OS X installation.

10.You run Linux’s fdisk and modify your partition layout. Before exiting the program, you realize that you’ve been working on the wrong disk. What can you do to correct this problem?. A. Nothing; the damage is done, so you’ll have to recover data from a backup. B.Type w to exit fdisk without saving changes to disk. C. Type q to exit fdisk without saving changes to disk. D. Type u repeatedly to undo the operations you’ve made in error. E. Type t to undo all of the changes and return to the original disk state.

11.What does the following command accomplish? # mkfs -t ext2 /dev/sda4. A. It sets the partition table type code for /dev/sda4 to ext2. B. It converts a FAT partition into an ext2fs partition without damaging the partition’s existing files. C. Nothing; the -t option isn’t valid, and so it causes mkfs to abort its operation. D. It converts an ext2 filesystem to an ext4 filesystem. E. It creates a new ext2 filesystem on /dev/sda4, overwriting any existing filesystem and data.

12. Which of the following best summarizes the differences between Windows’s FDISK and Linux’s fdisk?. A. Linux’s fdisk is a simple clone of Windows’s FDISK but written to work from Linux rather than from Windows. B. The two are completely independent programs that accomplish similar goals, although Linux’s fdisk is more flexible. C. Windows’s FDISK uses GUI controls, whereas Linux’s fdisk uses a command-line interface, but they have similar functionality. D. Despite their similar names, they’re completely different tools—the Windows FDISK command handles disk partitioning, whereas Linux’s fdisk formats floppy disks. E. The Windows FDISK command manages GPT disks, whereas Linux’s fdisk manages MBR disks.

13. What mount point should you associate with swap partitions?. A. /. B. /swap. C. /boot. D. /mem. E. None of the above.

14. Which of the following options is used with fsck to force it to use a particular filesystem type?. A. -A. B. -N. C. -t. D. -C. E. -f.

15. Which of the following pieces of information can df not report?. A. How long the filesystem has been mounted. B. The number of inodes used on an ext3fs partition. C. The filesystem type of a partition. D. The percentage of available disk space used on a partition. E. The mount point associated with a filesystem.

16. What is an advantage of a journaling filesystem over a conventional (non-journaling) file-system?. A. Journaling filesystems are older and better tested than non-journaling filesystems. B. Journaling filesystems never need to be checked with fsck. C. Journaling filesystems support Linux ownership and permissions; non-journaling file-systems don’t. D. Journaling filesystems require shorter disk checks after a power failure or system crash. E. Journaling filesystems record all transactions, enabling them to be undone.

17. To access files on a USB flash drive, you type mount /dev/sdc1 /media/flash as root. Which types of filesystems will this command mount?. A. Ext2fs. B. FAT. C. HFS. D. ReiserFS. E. All of the above.

18. Which of the following /etc/fstab entries will mount /dev/sdb2 as the /home directory at boot time?. A. /dev/sdb2 reiserfs /home defaults 0 0. B. /dev/sdb2 /home reiserfs defaults 0 0. C. /home reiserfs /dev/sdb2 noauto 0 0. D. /home /dev/sdb2 reiserfs noauto 0 0. E. reiserfs /dev/sdb2 /home noauto 0 0.

19. What filesystem options might you specify in /etc/fstab to make a removable disk (such as a USB flash drive) mountable by an ordinary user with a UID of 1000? (Select three.). A. user. B. users. C. owner. D. owners. E. uid=1000.

20. What is the minimum safe procedure for removing a USB flash drive, mounted from /dev/ sdb1 at /media/usb, from a Linux computer?. A. Type umount /media/usb, wait for the command to return and disk-activity lights to stop, and then unplug the drive. B. Unplug the drive, and then type umount /media/usb to ensure that Linux registers the drive’s removal from the system. C. Unplug the drive, and then type sync /dev/sdb1 to flush the caches to ensure that problems don’t develop. D. Type usbdrive-remove, and then quickly remove the disk before its activity light stops blinking. E. Type fsck /dev/sdb1 , wait for the command to return and disk-activity lights to stop, and then unplug the drive.

Capitulo 4 1.Why might you type touch filename?. A. To move filename to the current directory. B.To ensure that filename ’s time stamp holds the current time. C. To convert filename from DOS-style to Unix-style end-of-line characters. D. To test the validity of filename ’s disk structures. E. To write cached data relating to filename to the disk.

2.What parameter can you pass to ln to create a soft link? (Select two.). A. -s. B. --soft. C. --slink. D. --symbolic. E. --sl.

3.You want to discover the sizes of several dot files in a directory. Which of the following commands might you use to do this?. A. ls -la. B. ls -p. C. ls -R. D. ls –d. E. ls -F.

4.You want to move a file from your hard disk to a USB flash drive. Which of the following is true?. A. You’ll have to use the --preserve option to mv to keep ownership and permissions set correctly. B. The mv command will adjust filesystem pointers without physically rewriting data if the flash drive uses the same filesystem type as the hard disk partition. C. You must use the same filesystem type on both media to preserve ownership and permissions. D. The mv command will delete the file on the hard disk after copying it to the flash drive. E. You must use the FAT filesystem on the USB flash drive; Linux-native filesystems won’t work on removable disks.

5.You type mkdir one/two/three and receive an error message that reads, in part, No such file or directory. What can you do to overcome this problem? (Select two). A. Add the --parents parameter to the mkdir command. B.Issue three separate mkdir commands: mkdir one, then mkdir one/two, and then mkdir one/two/three. C.Type touch /bin/mkdir to be sure the mkdir program file exists. D. Type rmdir one to clear away the interfering base of the desired new directory tree. E. Type mktree one/two/three instead of mkdir one/two/three.

6.Which of the following commands are commonly used to create archive files? (Select two.). A. restore. B. vi. C. tape. D. cpio. E. tar.

7.You’ve received a tar archive called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this?. A. tar uvf data79.tar. B. tar cvf data79.tar. C. tar xvf data79.tar. D. tar rvf data79.tar. E. tar tvf data79.tar.

8.You want to create a link from your home directory on your hard disk to a directory on a DVD drive. Which of the following link types might you use?. A. Only a symbolic link. B. Only a hard link. C. Either a symbolic or a hard link. D. Only a hard link, and then only if both directories use the same low-level filesystem. E. None of the above; such links aren’t possible under Linux.

9.What command would you type (as root) to change the ownership of somefile.txt from ralph to tony?. A. chown ralph:tony somefile.txt. B.chmod somefile.txt tony. C. chown somefile.txt tony. D. chmod tony:ralph somefile.txt. E. chown tony somefile.txt.

10.Typing ls -ld wonderjaye reveals a symbolic file mode of drwxr-xr-x. Which of the following are true? (Select two.). A. wonderjaye is a symbolic link. B.wonderjaye is an executable program. C. wonderjaye is a directory. D. wonderjaye has its SUID bit set. E. wonderjaye may be read by all users of the system.

11. When should programs be configured SUID root?. A. At all times. This permission is required for executable programs. B. Whenever a program should be able to access a device file. C. Only when they require root privileges to do their job. D. Never. This permission is a severe security risk. E. Whenever the program file is owned by the root user.

12. Which of the following commands would you type to enable world read access to the file myfile.txt? (Assume that you’re the owner of myfile.txt.). A. chmod 741 myfile.txt. B. chmod 0640 myfile.txt. C. chmod u+r myfile.txt. D. chmod a-r myfile.txt. E. chmod o+r myfile.txt.

13. Which of the following umask values will result in files with rw-r----- permissions?. A. 640. B. 210. C. 022. D. 027. E. 138.

14. You see the usrquota and grpquota options in the /etc/fstab entry for a filesystem. What is the consequence of these entries?. A. Quota support will be available if it’s compiled into the kernel; it will be automatically activated when you mount the filesystem. B. User quotas will be available, but the grpquota option is invalid and will be ignored. C. Quota support will be disabled on the filesystem in question. D. Nothing. These options are malformed and so will have no effect. E. Quota support will be available if it’s compiled into your kernel, but you must activate it with the quotaon command.

15. Which of the following commands can be used to summarize the quota information about all filesystems?. A. repquota. B. repquota -a. C. quotacheck. D. quotacheck –a. E. edquota -a.

16. You’ve installed a commercial spreadsheet program called WonderCalc on a workstation. In which of the following directories are you most likely to find the program executable file?. A. /usr/sbin. B. /etc/X11. C. /boot. D. /opt/wcalc/bin. E. /sbin/wcalc.

17. Which of the following file-location commands is likely to take the most time to find a file that may be located anywhere on the computer (assuming the operation succeeds)?. A. The find command. B. The locate command. C. The whereis command. D. The type command. E. They’re all equal in speed.

18. What can the type command do that whereis can’t?. A. Identify the command as being for x86 or x86-64 CPUs. B. Locate commands based on their intended purpose, not just by name. C. Identify a command as an alias, internal command, or external command. D. Assist in typing a command by finishing typing it for you. E. Identify a command as being a binary or a script.

19. You want to track down all of the files in /home that are owned by karen. Which of the following commands will do the job?. A. find /home -uid karen. B. find /home -user karen. C. locate /home -username karen. D. locate /home Karen. E. find /home -name Karen.

20. What can you conclude from the following interaction? $ which man /usr/bin/man. A. The only file called man on the computer is in /usr/bin. B. The /usr/bin/man program was installed by system package tools. C. The /usr/bin/man program will be run by any user who types man. D. The first instance of the man program, in path search order, is in /usr/bin. E. The user man owns the /usr/bin/man program file.

Denunciar Test