Linux Essentials Certification Exam Practice Test!

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Gdeisat
G
Gdeisat
Community Contributor
Quizzes Created: 7 | Total Attempts: 112,408
| Attempts: 108,216
SettingsSettings
Please wait...
  • 1/80 Questions

    Which of the following can be used to access the command line?

    • BIOS
    • Terminal
    • XWindow
    • Firefox
    • Xargs
Please wait...
About This Quiz

Those beginning their Linux careers may find the Linux Essentials certification an excellent place to start before jumping into the more advanced LPIC certifications. Linux Essentials cover necessary skills, such as command-line editing and the Linux operating system. This quiz will give you a chance to revise for the exam. All the best!

Linux Essentials Certification Exam Practice Test! - Quiz

Quiz Preview

  • 2. 

    Which of the following commands can be used to create a file?

    • Touch

    • Build

    • Nico

    • Create

    • Mkfile

    Correct Answer
    A. Touch
    Explanation
    The correct answer is touch. The touch command is commonly used in Unix and Linux operating systems to create an empty file. It can also be used to update the access and modification timestamps of an existing file. The other options, build, nico, create, and mkfile, are not valid commands for creating a file.

    Rate this question:

  • 3. 

    What is the number called that is used to identify a process?

    • Proc Num

    • PIN

    • Process Entry

    • PID

    Correct Answer
    A. PID
    Explanation
    The number used to identify a process is called PID, which stands for Process ID. A PID is a unique numerical identifier assigned to each running process in a computer system. It allows the operating system to keep track of and manage different processes effectively. By using PIDs, the operating system can identify and control individual processes, allocate system resources, and handle process-related activities such as scheduling, termination, and communication.

    Rate this question:

  • 4. 

    Which function does a shell program serve?

    • It provides a graphical environment

    • It is responsible for establishing a connection to another computer

    • It receives user commands and executes them

    • It is responsible for logging a user into the system

    Correct Answer
    A. It receives user commands and executes them
    Explanation
    A shell program serves the function of receiving user commands and executing them. It acts as an interface between the user and the operating system, allowing users to interact with the computer by entering commands. The shell program interprets these commands and executes them, performing various tasks such as running programs, managing files, and controlling system resources. It provides a command-line interface where users can enter commands and receive output or perform actions based on those commands.

    Rate this question:

  • 5. 

    Which of the following is a Linux-based operating system for use on mobile devices?

    • IOS

    • CentOS

    • Android

    • Debian

    Correct Answer
    A. Android
    Explanation
    Android is a Linux-based operating system for use on mobile devices. It was developed by Google and is widely used on smartphones, tablets, and other mobile devices. Android provides a user-friendly interface, supports a wide range of applications, and allows for customization and flexibility. It is known for its open-source nature, which allows developers to modify and enhance the operating system according to their needs.

    Rate this question:

  • 6. 

    Which Linux distribution is used as a basis for the creation of Ubuntu Linux?

    • Red Hat Linux

    • Arch Linux

    • SUSE Linux

    • Gentoo Linux

    • Debian Linux

    Correct Answer
    A. Debian Linux
    Explanation
    Ubuntu Linux is based on Debian Linux, a popular and stable Linux distribution known for its extensive software repositories and strong community support. Ubuntu builds upon Debian's foundation, adding its own user-friendly interface, software packages, and release cycle. This relationship allows Ubuntu to benefit from Debian's stability and security while providing a more accessible and streamlined experience for users.

    Rate this question:

  • 7. 

    Where is the BIOS located?

    • RAM

    • Hard drive

    • Motherboard

    • LCD Monitor

    Correct Answer
    A. Motherboard
    Explanation
    The BIOS (Basic Input/Output System) is located on the motherboard. It is a firmware that is responsible for initializing and configuring the hardware components of a computer during the boot process. The BIOS contains instructions and settings that allow the computer to start up and communicate with the operating system. It is stored in a chip on the motherboard, separate from other components like RAM, hard drive, or the LCD monitor.

    Rate this question:

  • 8. 

    Which command would you use to get comprehensive documentation about any command in Linux?

    • Help command

    • Echo command

    • Locate command

    • Man command

    • Get command

    Correct Answer
    A. Man command
    Explanation
    The "man" command is used to get comprehensive documentation about any command in Linux. It displays the manual pages for the specified command, providing detailed information on its usage, options, and examples. This is a commonly used command by Linux users to quickly access documentation and understand how to use various commands effectively.

    Rate this question:

  • 9. 

    Which of the following commands can be used to extract files from an archive?

    • Tar -vf

    • Tar -xvf

    • Tar -evf

    • Tar -e

    • Tar -v

    Correct Answer
    A. Tar -xvf
    Explanation
    The correct answer is "tar -xvf" because the "-x" option is used to extract files from an archive, the "-v" option is used to display verbose output, and the "-f" option is used to specify the archive file. Therefore, "tar -xvf" is the correct command to extract files from an archive.

    Rate this question:

  • 10. 

    Which of the following commands can be used to extract content from  a tar file?

    • Tar -xvf

    • Tar -vf

    • Tar -e

    • Tar -c

    • Tar -v

    Correct Answer
    A. Tar -xvf
    Explanation
    The command "tar -xvf" can be used to extract content from a tar file. The "x" flag stands for extract, the "v" flag stands for verbose (displaying the progress and details of the extraction), and the "f" flag is used to specify the file name. This command will extract the contents of the tar file to the current directory.

    Rate this question:

  • 11. 

    Which of the following is NOT a core component of the Linux operating system kernel?

    • System call interface 

    • Process scheduler 

    • Memory management 

    • Graphical user interface (GUI)

    Correct Answer
    A. Graphical user interface (GUI)
    Explanation
    While a GUI is often part of a Linux distribution, it's not part of the kernel itself. The kernel handles fundamental tasks like managing the system's resources, scheduling processes, and providing an interface for programs to interact with the hardware. GUIs like GNOME or KDE are separate software components that run on top of the kernel.

    Rate this question:

  • 12. 

    When a new user is added, where does the user ID get stored?

    • /etc/users

    • /etc/realm

    • /etc/pass

    • /etc/shpasswd

    • /etc/passwd

    Correct Answer
    A. /etc/passwd
    Explanation
    The user ID of a new user is stored in the /etc/passwd file. This file is a system file that contains information about user accounts, including their usernames, user IDs, group IDs, home directories, and login shells. The /etc/passwd file is used by the system for user authentication and to determine various permissions and settings for each user.

    Rate this question:

  • 13. 

    Which of the following is a combined audio/video interface for the transmission of digital data?

    • ATI

    • DVD

    • HDMI

    • VGA

    • DVI

    Correct Answer
    A. HDMI
    Explanation
    HDMI (High-Definition Multimedia Interface) is a combined audio/video interface for the transmission of digital data. It is widely used in consumer electronics such as televisions, computers, and gaming consoles to connect devices and transmit high-quality audio and video signals. HDMI supports both audio and video signals in a single cable, making it convenient and efficient for transmitting digital data.

    Rate this question:

  • 14. 

    Which of the following commands will display a list of all files in the current directory, including  those that may be hidden?

    • Ls -a

    • Ls --hidden

    • Ls -h

    • Ls --a

    Correct Answer
    A. Ls -a
    Explanation
    The correct answer is "ls -a". The "-a" option in the "ls" command stands for "all" and it displays all files, including hidden files, in the current directory.

    Rate this question:

  • 15. 

    Which of the following hardware devices links a number of computers together to form an Ethernet LAN?

    • Server

    • Switch

    • Connector

    • Access point

    • Terminal

    Correct Answer
    A. Switch
    Explanation
    A switch is a hardware device that is used to connect multiple computers together to form an Ethernet LAN. It acts as a central hub, allowing the computers to communicate with each other by sending and receiving data packets. Switches are commonly used in both small and large networks to provide efficient and reliable connectivity. They are designed to handle high data traffic and can intelligently route data to the appropriate destination, improving network performance. Therefore, a switch is the correct hardware device for linking computers together in an Ethernet LAN.

    Rate this question:

  • 16. 

    What are the three sets of permission for a file?

    • User, group, others

    • Administrator, group, others

    • User, standard user, others

    • Administrator, standard user, others

    Correct Answer
    A. User, group, others
    Explanation
    The three sets of permission for a file are user, group, and others. These permissions determine who can read, write, or execute the file. The user permissions apply to the owner of the file, the group permissions apply to the group that the owner belongs to, and the others permissions apply to everyone else. This system allows for fine-grained control over file access and ensures that only authorized individuals or groups can interact with the file.

    Rate this question:

  • 17. 

    Which command will display running process information in realtime?

    • Top

    • Show current

    • Ps current

    • Process

    Correct Answer
    A. Top
    Explanation
    The correct answer is "top". The "top" command is used to display real-time information about running processes on a system. It provides a dynamic view of the system's processes, including details such as CPU usage, memory usage, and process IDs. By continuously updating the information, "top" allows users to monitor the system's performance and identify any processes that may be consuming excessive resources.

    Rate this question:

  • 18. 

    What is the first character for a file or directory names if they should not be displayed by commands such as ls unless specifically requested?

    • \ (backslash)

    • . (dot)

    • - (minus)

    • _ (underscore)

    Correct Answer
    A. . (dot)
    Explanation
    In Unix-based systems, the dot (.) is used as the first character for file or directory names that should not be displayed by commands like ls unless specifically requested. This convention is commonly used for hidden files or directories, which typically contain configuration files or sensitive data that should not be easily accessible or accidentally modified. By starting the name with a dot, the file or directory is effectively "hidden" from regular directory listings, providing a level of privacy or organization.

    Rate this question:

  • 19. 

    Which one of the following statements concerning Linux passwords is true?

    • All passwords can be decrypted using the system administrator's master password

    • Passwords may never start with a non-letter

    • Users cannot change their password once it has been set

    • Passwords are only stored in encrypted form

    • Passwords may be at most six characters long

    Correct Answer
    A. Passwords are only stored in encrypted form
    Explanation
    Passwords are only stored in encrypted form. This means that when a user sets a password on a Linux system, it is encrypted and stored securely. The encryption ensures that even if someone gains unauthorized access to the system's password file, they will not be able to determine the actual passwords easily. This is an important security measure to protect user accounts and sensitive information.

    Rate this question:

  • 20. 

    Which command lists all files in the current directory that starts with a capital letter?

    • Ls [A-Z]*

    • Ls A-Z

    • Ls A-Z*

    • Ls --upercasefiles

    • Ls -uppercase-files

    Correct Answer
    A. Ls [A-Z]*
    Explanation
    The correct answer is "ls [A-Z]*". This command uses the wildcard character "*" to match any file that starts with a capital letter in the current directory. The "[A-Z]" specifies that the file must start with a capital letter, and the "*" allows for any additional characters after the capital letter.

    Rate this question:

  • 21. 

    While deleting all files beginning with the letter a there was still the file Access.txt left. Assuming that it had the correct ownership, why was it not deleted?

    • Files with extensions need a different treatment

    • Rm had to be called with the option -R to delete all files

    • The file Access.txt was probably opened by another application

    • The file Access.txt was hidden

    • Linux file names are case sensitive

    Correct Answer
    A. Linux file names are case sensitive
    Explanation
    The reason the file Access.txt was not deleted is because Linux file names are case sensitive. The command used to delete the files beginning with the letter "a" would only delete files with lowercase "a" as the first letter, while "Access.txt" starts with an uppercase "A". Therefore, it was not deleted.

    Rate this question:

  • 22. 

    Which of the following commands is used to lookup the current IP address of a system?

    • Less/proc/net/ipconfig

    • Ifconfig

    • Showip

    • Ipconfig

    • Sysinfo | grep ipaddress

    Correct Answer
    A. Ifconfig
    Explanation
    The correct answer is "ifconfig". This command is used to lookup the current IP address of a system. It displays the network configuration information of all network interfaces on the system, including the IP address assigned to each interface.

    Rate this question:

  • 23. 

    Which statement about users and user groups is correct?

    • A group can only have one main user

    • There can be only one user group on a system

    • Users do not have to belong to a user group

    • Every user belongs at least to one user group

    Correct Answer
    A. Every user belongs at least to one user group
    Explanation
    Every user belongs at least to one user group. This means that in a system, every user must be assigned to at least one user group for the purpose of access control and permissions management. User groups are used to categorize users based on their roles, responsibilities, or access privileges, allowing administrators to assign permissions and restrictions to groups rather than individual users. This ensures efficient management of user access and simplifies the process of granting or revoking permissions for multiple users at once.

    Rate this question:

  • 24. 

    Which of the following commands increases the number of elements in a directory  (choose two answers)

    • Touch newfile

    • Create newfile

    • Ls newfile

    • Rmdir newdirectory

    • Mkdir newdirectory

    Correct Answer(s)
    A. Touch newfile
    A. Mkdir newdirectory
    Explanation
    A) touch newfile: This command creates a new file named "newfile" if it does not already exist. By creating a new file, it increases the number of elements (files and directories) in the directory.
    E) mkdir newdirectory: This command creates a new directory named "newdirectory" within the current directory. This also increases the number of elements in the directory by adding a new directory to it.

    Rate this question:

  • 25. 

    What is the command that will show system boot time messages?

    • Dmesg

    • Echo

    • Lspci

    • Display system boot

    • Messages

    Correct Answer
    A. Dmesg
    Explanation
    The command "dmesg" is used to display system boot time messages. It allows users to view the kernel ring buffer, which contains information about the system's hardware, drivers, and other messages generated during the boot process. This command is commonly used for troubleshooting purposes and to gather information about the system's initialization and hardware configuration.

    Rate this question:

  • 26. 

    Which command will display the last line of the file foo.txt?

    • Head -n foo.txt

    • Tail foo.txt

    • Last -n 1 foo.txt

    • Tail -n 1 foo.txt

    Correct Answer
    A. Tail -n 1 foo.txt
    Explanation
    The command "tail -n 1 foo.txt" will display the last line of the file foo.txt. The "tail" command is used to display the last part of a file, and the "-n 1" option specifies that only the last line should be displayed.

    Rate this question:

  • 27. 

    How is it possible to determine if an executable file is a shell script that is ready by Bash?

    • The r bit is set

    • The file must end with .sh

    • The file line starts with #!/bin/bash

    • /bin/bash has to be run in debug mode

    • Scripts are never executable files

    Correct Answer
    A. The file line starts with #!/bin/bash
    Explanation
    The correct answer is "The file line starts with #!/bin/bash". This is because the shebang line, which starts with #!, is used to specify the interpreter for the script. In this case, the shebang line indicates that the script should be interpreted by the Bash shell.

    Rate this question:

  • 28. 

    Which of the following directories is often used to store log files?

    • /home

    • /var

    • /temp

    • /dev

    • /usr

    Correct Answer
    A. /var
    Explanation
    The /var directory is often used to store log files. This directory contains variable data files, including system logs, that are constantly changing in size as the system runs. Storing log files in the /var directory allows for easy access and management of these files. The other directories listed (/home, /temp, /dev, /usr) are not typically used for storing log files.

    Rate this question:

  • 29. 

    Which commands provide help for a specific Linux command? (Choose two answers).

    • Info

    • Man

    • Helpme

    • Ask

    • Whatdoes

    Correct Answer(s)
    A. Info
    A. Man
    Explanation
    The "info" and "man" commands provide help for specific Linux commands. The "info" command displays detailed information about a command, including its usage, options, and examples. The "man" command displays the manual pages for a command, which contain comprehensive documentation and instructions on how to use the command effectively. These commands are commonly used by Linux users to quickly access information and understand the functionality of specific commands.

    Rate this question:

  • 30. 

    What keyword is missing from the following segment of the shell script?for i in*;----cat $idone

    • Do

    • Then

    • Endo

    • Fi

    • Run

    Correct Answer
    A. Do
    Explanation
    The missing keyword in the given shell script segment is "do". The "do" keyword is used in shell scripting to indicate the start of a loop or a block of code that needs to be executed repeatedly. In this case, the "do" keyword is missing before the "cat $idone" line, which suggests that the script is incomplete and the intended loop or block of code is not properly defined.

    Rate this question:

  • 31. 

    Which of the following Linux distributions use the dpkg package management system? (Choose two correct answers)

    • Suse

    • Red Hat

    • Debian

    • Ubuntu

    • Mandriva

    Correct Answer(s)
    A. Debian
    A. Ubuntu
    Explanation
    Debian and Ubuntu both use the dpkg package management system. Dpkg is a package manager used in Debian-based Linux distributions to install, remove, and manage software packages. Suse, Red Hat, and Mandriva use different package management systems such as RPM (Red Hat Package Manager) or Zypper. Therefore, the correct answers are Debian and Ubuntu.

    Rate this question:

  • 32. 

    Which of the following commands is used to list the contents of a directory in Linux?

    • Cd 

    • Ls 

    • Mkdir 

    • Rm

    Correct Answer
    A. Ls 
    Explanation
    The ls command is a fundamental Linux command used to list the files and directories within a specified directory. It provides various options for customizing the output, such as displaying file sizes, permissions, and modification times. The other options are also common Linux commands: cd (change directory), mkdir (make directory), and rm (remove).

    Rate this question:

  • 33. 

    Which of the following files holds the definition of the local user accounts?

    • /etc/secret

    • /etc/users

    • /etc/passwd

    • /etc/id

    • /etc/home

    Correct Answer
    A. /etc/passwd
    Explanation
    The correct answer is /etc/passwd. This file holds the definition of the local user accounts on a Unix-like operating system. It contains important information such as the username, user ID, group ID, home directory, and shell for each user. This file is used by the system to authenticate users and manage their permissions and access privileges.

    Rate this question:

  • 34. 

    Which of the following statements concerning the General Public License (GPL) is true?

    • The GPL is designed to ensure that the source code of a software remains freely available

    • The GPL is identical to the BSD license

    • GPL software may never be sold for money

    • If you changed a program you received under the GPL, you must send your changes to the original author for approval

    • GPL software may not be used to run nuclear reactors or air traffic control systems

    Correct Answer
    A. The GPL is designed to ensure that the source code of a software remains freely available
    Explanation
    The General Public License (GPL) is a license designed to guarantee that the source code of a software remains freely available. This means that anyone who receives a software under the GPL has the right to access, modify, and distribute its source code. The GPL promotes the idea of open source software and encourages collaboration and innovation within the software community. It does not restrict the selling of GPL software or require approval from the original author for changes made to the program.

    Rate this question:

  • 35. 

    Which of the following programs is not  a graphical web browser?

    • Konqueror

    • Firefox

    • Links

    • Opera

    • Chrome

    Correct Answer
    A. Links
    Explanation
    Links is not a graphical web browser because it is a text-based web browser. Unlike graphical web browsers, Links does not display web pages with images or other visual elements. Instead, it focuses on providing a lightweight and efficient browsing experience by rendering web pages in text format. This makes it suitable for low-resource environments or for users who prefer a minimalist browsing experience.

    Rate this question:

  • 36. 

    What does LAMP mean?

    • The Linux Advanced Mode Programming Interface which gives advanced capabilities to application developers

    • The bus ID of an attached USB device that emits light

    • Short for Lightweight Access Management Protocol which synchronizes permission in a network

    • The combination of Linux, Apache, MySQL, and PHP and other programming languages

    • Short for lamport-clock which is important in distributed network computing

    Correct Answer
    A. The combination of Linux, Apache, MySQL, and PHP and other programming languages
    Explanation
    The correct answer is the combination of Linux, Apache, MySQL, and PHP and other programming languages. LAMP is a popular open-source web development platform that uses these technologies to create dynamic websites and web applications. Linux is the operating system, Apache is the web server software, MySQL is the database management system, and PHP is the programming language. This combination provides a powerful and flexible environment for building and deploying web applications.

    Rate this question:

  • 37. 

    Which of the following answers are true for cloud computing? (Choose two correct answers)

    • Cloud Computing provides new tools to manage IT resources

    • From the business perspective, Cloud Computing means outsourcing or centralization of IT operations

    • Cloud Computing is the opposite of the Green IT; i.e., the use of fossil non-regenerative energy for computing

    • Cloud Computing implies sharing all information with everyone else in 'the cloud'

    Correct Answer(s)
    A. Cloud Computing provides new tools to manage IT resources
    A. From the business perspective, Cloud Computing means outsourcing or centralization of IT operations
    Explanation
    Cloud Computing provides new tools to manage IT resources, which means that it offers innovative solutions and technologies for handling and optimizing IT resources. From the business perspective, Cloud Computing involves outsourcing or centralization of IT operations, allowing companies to rely on external providers for their IT needs, resulting in cost savings and increased efficiency.

    Rate this question:

  • 38. 

    Which command shows if /usr/bin is in the current shell search path?

    • Cat PATH

    • Echo $PATH

    • Cat %PATH

    • Echo %PATH%

    Correct Answer
    A. Echo $PATH
    Explanation
    The command "echo $PATH" is used to display the value of the PATH environment variable in the current shell session. The PATH variable contains a list of directories where the shell searches for executable files when a command is entered. Each directory in the PATH variable is separated by a colon (:). By executing "echo $PATH", the shell will print out the contents of the PATH variable, showing all the directories included in the search path. If "/usr/bin" is included in the output, it indicates that this directory is part of the current shell's search path.

    Rate this question:

  • 39. 

    Which of the following file systems is most commonly used for Linux distributions?

    • HFS+

    • Ext4

    • FAT32

    • NTFS

    Correct Answer
    A. Ext4
    Explanation
    ext4 is the most commonly used file system for Linux distributions because it is the default file system for many Linux operating systems. It offers improved performance, reliability, and support for larger file sizes and partitions compared to its predecessor, ext3. Additionally, ext4 supports features such as journaling, which helps to prevent data loss in the event of a system crash. Overall, ext4 is widely adopted and trusted by the Linux community, making it the preferred choice for Linux distributions.

    Rate this question:

  • 40. 

    Which option will cause the echo command NOT to output a trailing newline?

    • -e

    • -p

    • -n

    • -s

    Correct Answer
    A. -n
    Explanation
    The option "-n" will cause the echo command to not output a trailing newline. This means that when using the echo command with the "-n" option, the text will be displayed without a new line character at the end, allowing the next output to be displayed on the same line.

    Rate this question:

  • 41. 

    Which of the following is a requirement of the GPL license but not the BSD license?

    • Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license.

    • The GPL license forbids the removal of the copyright and license notices from the source code files that are distributed.

    • The GPL license contains a disclaimer of warranty requiring users not to hold the software authors liable to any damage.

    • The GPL license requires that any legal disputes be settled with the modification of Free Software Foundation.

    Correct Answer
    A. Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license.
    Explanation
    The requirement of making modifications available to recipients under the same license is specific to the GPL license and not the BSD license. The BSD license allows users to modify and distribute the software under different licenses, whereas the GPL license ensures that any modifications made are shared with others under the same license. This requirement promotes the open-source nature of the GPL license and encourages collaboration and sharing within the software community.

    Rate this question:

  • 42. 

    Which permissions should be given to a file that needs to be opened and edited by the file's owner and opened read-only by the file's group?

    • 0751

    • 0466

    • 0540

    • 0640

    • 0444

    Correct Answer
    A. 0640
    Explanation
    The correct answer is 0640. This permission code indicates that the file's owner has read and write permissions (6), while the file's group has only read permissions (4). The other digits in the code represent the permissions for other users, which in this case are set to 0, meaning no permissions. This configuration ensures that the file can be opened and edited by the owner, while the group members can only open it in read-only mode.

    Rate this question:

  • 43. 

    What permissions are set on a file with the command chmod 654 file.txt?

    • Drw-r-xr--

    • D--wxr-x--

    • --wxr-x--x

    • -rwxrw--x

    • -rw-r-xr--

    Correct Answer
    A. -rw-r-xr--
    Explanation
    The first character indicates the file type (in this case, it's a regular file).
    The next three characters "rw-" specify the permissions for the file owner (read and write, but not execute).
    The next three characters "r-x" specify the permissions for the group (read and execute, but not write).
    The last three characters "r--" specify the permissions for others (read only, no write or execute).

    Rate this question:

  • 44. 

    Which of the following Ubuntu releases is considered most stable and fit to use for business purposes?

    • LTS

    • Xubuntu

    • Ubuntu Vanilla

    • Kubuntu

    • Xubuntu Server

    Correct Answer
    A. LTS
    Explanation
    LTS releases of Ubuntu are specifically designed for stability and long-term use, making them ideal for business environments where reliability and support are crucial. These LTS releases receive long-term support and security updates, typically for five years on the desktop and server editions. Therefore, LTS releases are recommended for business use.

    Rate this question:

  • 45. 

    After installing a new package, in which directory are you most likely find its configuration file?

    • /lib

    • /conf

    • /etc

    • /usr

    • /opt

    Correct Answer
    A. /etc
    Explanation
    After installing a new package, you are most likely to find its configuration file in the /etc directory. The /etc directory is commonly used to store system-wide configuration files in Unix-like operating systems. It is the standard location for various configuration files, including those related to installed packages. Therefore, it is the most probable directory to find the configuration file of a newly installed package.

    Rate this question:

  • 46. 

    Which of the following commands can be used to determine the time of the last login of a given user?

    • Showlog

    • Recent

    • Last

    • History

    • Login

    Correct Answer
    A. Last
    Explanation
    The "last" command can be used to determine the time of the last login of a given user. This command displays a list of recent login sessions, including the username, terminal, date, and time of each login. By using the "last" command followed by the username, you can specifically view the login history for that particular user.

    Rate this question:

  • 47. 

    Which of the following will change the group that is associated with a file?

    • Chmod

    • Chmod -w

    • Chown

    • Ls -g

    Correct Answer
    A. Chown
    Explanation
    The command "chown" is used to change the owner of a file, and by extension, it also changes the group associated with that file. This command allows the user to transfer ownership from one user to another, and in doing so, the group association may also be modified. Therefore, "chown" is the correct answer for changing the group associated with a file.

    Rate this question:

  • 48. 

    What two-character sequence is present at the beginning of an interpreted script? Please specify two characters only.

    Correct Answer
    #!
    Explanation
    The two character sequence present at the beginning of an interpreted script is "#!". This sequence is known as a shebang or hashbang and is used to specify the interpreter for the script. It tells the operating system which interpreter should be used to execute the script.

    Rate this question:

  • 49. 

    Which criteria are useful when deciding which operating system to use? (Choose three correct answers).

    • License costs

    • Ideological preferences of the system administrator

    • Linux can do everything, there is no need for further evaluation

    • Availability of mandatory applications and tools

    • Skills of the administrators and staff

    Correct Answer(s)
    A. License costs
    A. Availability of mandatory applications and tools
    A. Skills of the administrators and staff
    Explanation
    The criteria that are useful when deciding which operating system to use are license costs, availability of mandatory applications and tools, and skills of the administrators and staff. License costs are important because they can vary greatly between different operating systems and can impact the overall budget of an organization. The availability of mandatory applications and tools is also crucial as certain industries or specific tasks may require specific software that may only be compatible with certain operating systems. Lastly, the skills of the administrators and staff play a significant role as they need to be familiar and proficient with the chosen operating system in order to effectively manage and troubleshoot any issues that may arise.

    Rate this question:

Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): May 6, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 06, 2025
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Mar 05, 2016
    Quiz Created by
    Gdeisat
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.