Linux Quiz - Chapters 1-6

11 Questions | Total Attempts: 301

SettingsSettingsSettings
Please wait...
Linux Quiz - Chapters 1-6

.


Questions and Answers
  • 1. 
    What would the Octal and Mnemonic syntax of then following permission set be? User=Read, Execute; Group=Read; Other=ReadExtra Credit: What would the umask be?
  • 2. 
    The "man" command on a Linux system can be used for what?
    • A. 

      To find out who logged into the system last sorted by username.

    • B. 

      To find detailed help information about another command or system component.

    • C. 

      To allow you to find very brief help information about another command or system component.

  • 3. 
    What does GRUB stand for and what is its primary purpose?
    • A. 

      GRUB is the Global RedHat User Base. It is a group of people that provide Red Hat support to the community.

    • B. 

      GRUB is the Generic Run-time User Browser. It is what is used to browse system files in the GUI.

    • C. 

      GRUB is the Grand Unified Boot Loader. It is used to boot the Red Hat Linux operating system.

  • 4. 
    Init has several different run-levels that is can operate under. Run-level 6 is generally used for what?
    • A. 

      Run-level 6 is the reboot run-level.

    • B. 

      Run-level 6 is the shutdown run-level.

    • C. 

      Run-level 6 is the graphical desktop run-level

  • 5. 
    What is the name of the tool that can be used to allow a user to run commands under the context of another user without knowing the users password? What is the name of the configuration file for this command?
    • A. 

      Su is the name of the command and /etc/shadow is the name of its configuration file.

    • B. 

      Sudo is the name of the command and /etc/sudoers is the name of its configuration file.

    • C. 

      Init is the name of the command and /etc/inittab is the name of its configuration file.

  • 6. 
    What is the difference between a processes UID and EUID?
    • A. 

      The UID of a process is the user identification number of the person who created it (owner). The EUID of a process is the "effective" user ID which is what is used to determine the permissions that he process has on the system.

    • B. 

      The UID of a process is the unit identification number of the system that the process is running on (host). The EUID of a process is the "effective" unit ID which is what is used to determine what system the process is running on when executing command remotely.

    • C. 

      The UID of a process is the unique identification number of the process itself. The EUID of a process is the "parent" unique ID which shows the UID of the process that invoked it.

  • 7. 
    Signals can be sent to a process using which command?
    • A. 

      The init command.

    • B. 

      The signal command.

    • C. 

      The kill command.

  • 8. 
    The "niceness" of a process is used to....
    • A. 

      Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for CPU.

    • B. 

      Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for memory.

    • C. 

      Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for disk.

  • 9. 
    The "setattr" command is used to change extended file attributes.
    • A. 

      True

    • B. 

      False

  • 10. 
    Why is there an inconsistency in the group permissions below?[[email protected] ~]# ls -l file-rw-rw-r--+ 1 root root 0 Oct 19 13:49 file[[email protected] ~]# getfacl file# file: file# owner: root# group: rootuser::rw-user:jgimer:rw-group::r--mask::rw-other::r--
    • A. 

      The user jgimer's ACL entry overwrote the group permissions, thus causing the inconsistency.

    • B. 

      POSIX ACL data is stored in the group portion of the permission set of a file within the filesystem, thus causing the inconsistency.

    • C. 

      There isn't any inconsistency.

  • 11. 
    What symbol is used to signify that an ACL is in use on a file when performing a long listing with "ls -l"?
    • A. 

      *

    • B. 

      -

    • C. 

      +

Back to Top Back to top