LX0-103: CompTIA Linux+ Certification Test! Trivia Questions Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,231
| Attempts: 165 | Questions: 120
Please wait...
Question 1 / 120
0 %
0/100
Score 0/100
1. Which command is used in a Linux environment to create a new directory? (Specify ONLY the command without any path or parameters.)

Explanation

The command "mkdir" is used in a Linux environment to create a new directory. Additionally, the command "/usr/bin/mkdir" can also be used to achieve the same result.

Submit
Please wait...
About This Quiz
LX0-103: CompTIA Linux+ Certification Test! Trivia Questions Quiz - Quiz

Are you looking for a trivia questions quiz to help you with the Lx0-103: CompTIA Linux+ Certification Test? Every time you get a certificate you have three years till you take the next exam so it is very important to ensure that you are up to date with changes in... see morethe information sector. How about you give it a shot and get the well-deserved revision. All the best! see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What is the output of the following command? echo "Hello World" | tr -d aieou

Explanation

The given command "echo "Hello World" | tr -d aieou" is a combination of two commands. The "echo" command is used to display the string "Hello World" on the console. The "|" symbol is a pipe operator, which redirects the output of the "echo" command to the input of the "tr" command. The "tr" command is used to delete characters specified in the set "aieou" from the input. Therefore, the output will be "Hll Wrld" as all the vowels (a, i, e, o, u) are removed from the original string "Hello World".

Submit
3. Which of the following commands will print the last 10 lines of a text file to the standard output?

Explanation

The correct answer is "tail -n 10 filename". The tail command is used to display the last part of a file. The "-n 10" option specifies that it should display the last 10 lines of the file. Therefore, this command will print the last 10 lines of the text file to the standard output.

Submit
4. Which of the following commands replaces each occurrence of 'bob' in the file letter with 'Bob' and writes the result to the file newletter?

Explanation

The correct answer is "sed 's/bob/Bob/g' letter > newletter" because it uses the sed command with the 's' flag to substitute each occurrence of 'bob' with 'Bob' in the file "letter". The 'g' flag ensures that all occurrences are replaced, not just the first one. The '>' symbol redirects the output to a new file called "newletter".

Submit
5. Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?

Explanation

The correct answer is "timeout". In a GRUB Legacy configuration file, the "timeout" option is used to define the amount of time that the GRUB menu will be shown to the user. This option allows the user to select an operating system or boot option before the default option is automatically selected.

Submit
6. Which command will disable swapping on a device? (Specify ONLY the command without any path or parameters.)

Explanation

The command "swapoff" is used to disable swapping on a device. This command is typically located in the "/sbin" directory. By running this command without any path or parameters, the swapping functionality on the device will be turned off.

Submit
7. What is the purpose of the Bash built-in export command?

Explanation

The purpose of the Bash built-in export command is to set up environment variables for applications. Environment variables are used to store information that can be accessed by programs running on the system. By using the export command, these variables are made available to all child processes and subshells, allowing them to access and use the information stored in the variables.

Submit
8. Which character, added to the end of a command, runs that command in the background as a child process of the current shell?

Explanation

The character "&" added to the end of a command runs that command in the background as a child process of the current shell. This means that the command will be executed separately from the current shell, allowing the user to continue using the shell while the command is running in the background.

Submit
9. 57. What is the difference between the i and a commands of the vi editor?

Explanation

The i command in the vi editor allows the user to insert text before the current cursor position, while the a command allows the user to insert text after the cursor. This means that when using the i command, the text will be inserted at the current cursor position, pushing the existing text forward. On the other hand, when using the a command, the text will be inserted after the cursor, without affecting the existing text.

Submit
10. Which variable defines the directories in which a Bash shell searches for executable commands?

Explanation

The variable "PATH" defines the directories in which a Bash shell searches for executable commands. It contains a list of directory paths separated by colons, and when a command is entered in the shell, it will search for the command's executable file in each of these directories in the order specified.

Submit
11. Which of the following commands prints a list of usernames (first column) and their primary group (fourth column) from the /etc/passwd file?

Explanation

The command "cut -d : -f 1,4 /etc/passwd" is the correct answer because it uses the "cut" command to extract specific fields from the /etc/passwd file. The "-d :" option specifies that the fields are delimited by colons, and the "-f 1,4" option specifies that the first and fourth fields should be extracted. This will result in a list of usernames (first column) and their primary groups (fourth column) being printed.

Submit
12. Which of the following commands is used to update the list of available packages when using dpkg based package management?

Explanation

The correct answer is apt-get update. This command is used to update the list of available packages when using dpkg based package management. It retrieves the latest package information from the repositories and updates the local package database.

Submit
13. Which of the following commands moves and resumes in the background the last stopped shell job?

Explanation

The command "bg" is used to move and resume the last stopped shell job in the background. It allows the job to continue running without being attached to the current terminal session. This is useful when a job has been stopped using the "Ctrl+Z" command and needs to be resumed in the background.

Submit
14. Which of the following commands will write a message to the terminals of all logged in users?

Explanation

The "wall" command is used to write a message to the terminals of all logged in users. It is a broadcast command that sends a message to all users who are currently logged in, regardless of their location or terminal. This command is commonly used by system administrators to send important announcements or notifications to all users on a system.

Submit
15. Which of the following commands kills the process with the PID 123 but allows the process to "clean up" before exiting?

Explanation

The command "kill -TERM 123" kills the process with the PID 123 but allows the process to "clean up" before exiting. The -TERM option sends a termination signal to the process, allowing it to gracefully exit and perform any necessary cleanup tasks before terminating. This is in contrast to the -KILL option, which immediately terminates the process without giving it a chance to clean up. The -STOP and -PIPE options are not relevant to this scenario.

Submit
16. During a system boot cycle, what program is executed after the BIOS completes its tasks?

Explanation

After the BIOS completes its tasks during a system boot cycle, the bootloader program is executed. The bootloader is responsible for loading the operating system into memory and initiating its execution. It is typically stored in a specific location on the computer's hard drive or in a separate boot partition. The bootloader plays a crucial role in the boot process by locating the operating system files and transferring control to the kernel, which is the core of the operating system.

Submit
17. Which umask value will result in the default access permissions of 600 (rw——-) for files and 700 (rwx——) for directories? (Specify only the numerical umask value.)

Explanation

A umask value of 0077 will result in the default access permissions of 600 (rw-------) for files and 700 (rwx------) for directories. The umask value determines the permission bits that are turned off when a new file or directory is created. In this case, the umask value of 0077 means that the read, write, and execute permission bits for the group and others are turned off, resulting in the desired permissions of 600 for files and 700 for directories.

Submit
18. Which grep command will print only the lines that do not end with a / in the file foo?

Explanation

The correct answer is "grep -v '/$' foo". This command will use the grep utility to search for lines in the file "foo" that do not end with a forward slash ("/"). The "-v" option in grep is used to invert the match, so it will print the lines that do not match the pattern. The pattern in this case is '/$', which represents the end of a line followed by a forward slash. Therefore, this command will print only the lines that do not end with a forward slash in the file "foo".

Submit
19. When given the following command line. echo "foo bar" | tee bar | cat Which of the following output is created?

Explanation

The given command line uses the "echo" command to print the string "foo bar". The "|" symbol is used to redirect the output of the echo command to the "tee" command, which creates a file named "bar" and also displays the output on the screen. The "|" symbol is used again to redirect the output of the tee command to the "cat" command, which simply displays the output on the screen. Therefore, the output created will be "foo bar".

Submit
20. Which of the following is correct when talking about mount points?

Explanation

Every existing directory can be used as a mount point. This means that any directory on a file system can be designated as a mount point for another file system. When a file system is mounted on a directory, the contents of that directory are hidden and replaced by the contents of the mounted file system. It is not necessary for the directory to be empty or have any specific permissions or flags set in order to be used as a mount point.

Submit
21. What happens after issuing the command vi without any additional parameters?

Explanation

After issuing the command "vi" without any additional parameters, the vi editor will start in command mode and open a new empty file. This means that the user can begin typing and editing text in the newly opened file. The other options are incorrect because they either involve loading a previous file, requiring the user to explicitly create or load a file, or exiting with an error message.

Submit
22. Which of the following commands displays the contents of a gzip compressed tar archive?

Explanation

The command "tar ztf archive.tgz" displays the contents of a gzip compressed tar archive. The "z" option is used to specify that the archive is compressed with gzip, and the "t" option is used to list the contents of the archive. The "f" option is used to specify the name of the archive file.

Submit
23. What command will generate a list of user names from /etc/passwd along with their login shell?

Explanation

The command "cut -d: -f1,7 /etc/passwd" will generate a list of user names from /etc/passwd along with their login shell. The "cut" command is used to extract specific columns from a file, and in this case, the delimiter (-d) is set to ":" and the fields (-f) to be extracted are 1 and 7. This will extract the first field (user name) and the seventh field (login shell) from the /etc/passwd file.

Submit
24. What is the default nice level when a process is started using the nice command?

Explanation

The default nice level when a process is started using the nice command is 10. The nice command is used in Unix-like operating systems to adjust the scheduling priority of a process. The nice level ranges from -20 to 19, with lower values indicating higher priority. A nice level of 10 means that the process has a relatively lower priority compared to other processes, allowing them to have more CPU time.

Submit
25. In a nested directory structure, which find command line option would be used to restrict the command to searching down a particular number of subdirectories?

Explanation

The correct answer is -maxdepth. This option is used to limit the depth of the search in a nested directory structure. By specifying a number after -maxdepth, the find command will only search for files and directories within that number of subdirectories. For example, if -maxdepth 2 is used, the search will be restricted to only two levels of subdirectories.

Submit
26. Which of the following commands changes the ownership of file.txt to the user dan and the group staff?

Explanation

The correct answer is "chown dan:staff file.txt". This command uses the chown command to change the ownership of the file.txt to the user "dan" and the group "staff". The colon ":" is used to separate the user and group names in the chown command.

Submit
27. After running the command umount /mnt, the following error message is displayed: umount: /mnt: device is busy. What is a common reason for this message?

Explanation

When the error message "umount: /mnt: device is busy" is displayed after running the command umount /mnt, it is commonly because a user has a file open in the /mnt directory. This means that there is an active process or program that is currently using a file within the /mnt directory, preventing the unmounting of the device. To successfully unmount the device, the user must close any open files within the /mnt directory and ensure that no processes are actively using those files.

Submit
28. When removing a package, which of the following dpkg options will completely remove the files including configuration files?

Explanation

The option "-purge" is used with the dpkg command to completely remove a package and its associated files, including configuration files. This option ensures that all traces of the package are removed from the system, providing a clean uninstallation. The other options listed (-clean, -delete, -remove) do not remove configuration files, so they are not suitable for completely removing a package.

Submit
29. Which of the following commands is used to change options and positional parameters for a running Bash?

Explanation

The "set" command is used to change options and positional parameters for a running Bash. It allows the user to modify various settings and configurations within the Bash environment. This command is commonly used to enable or disable specific options, define variables, and customize the behavior of the shell. By using the "set" command, users can adjust the settings to suit their preferences and requirements while using Bash.

Submit
30. Which of the following statements is correct regarding the command foo 1> bar?

Explanation

The correct answer is that the stdout from the command foo overwrites the file bar. This means that the output of the command foo will be written to the file bar, replacing any existing content in the file.

Submit
31. Which of the following commands can be used to create a USB storage media from a disk image?

Explanation

The "dd" command can be used to create a USB storage media from a disk image. This command is commonly used in Unix-like operating systems to convert and copy files. In this context, it can be used to create a bootable USB drive by copying the disk image onto the USB storage media. The "dd" command is powerful and can be used for various disk operations, including creating disk images, copying partitions, and backing up data.

Submit
32. In Bash, inserting 1>&2 after a command redirects

Explanation

When "1>&2" is inserted after a command in Bash, it redirects the standard output (file descriptor 1) to the standard error (file descriptor 2). This means that any output generated by the command will be sent to the standard error stream instead of the standard output stream.

Submit
33. Which file should be edited to select the network locations from which Debian installation package files are loaded?

Explanation

The file that should be edited to select the network locations from which Debian installation package files are loaded is /etc/apt/sources.list. This file contains a list of repositories from which the package manager retrieves the necessary files and updates for the system. By editing this file, users can add or remove repositories to customize the package sources for their Debian installation.

Submit
34. Which of the following files, located in the user home directory, is used to store the Bash history?

Explanation

The file ".bash_history" is used to store the Bash history in the user home directory. This file keeps a record of all the commands that have been entered in the Bash shell by the user. It allows users to easily recall and reuse previously executed commands.

Submit
35. Which of the following is the device file name for the second partition on the only SCSI drive?

Explanation

The correct answer is /dev/sda2. This is because the /dev/sda2 device file name follows the naming convention for SCSI drives. The "sda" indicates the first SCSI drive, and the "2" indicates the second partition on that drive. Therefore, /dev/sda2 is the device file name for the second partition on the only SCSI drive.

Submit
36. Regarding the command: nice -5 /usr/bin/prog Which of the following statements is correct?

Explanation

The nice command is used to set the priority of a command or process. The nice level ranges from -20 to 19, with lower values indicating higher priority. In this case, the nice level is set to -5, which means the command /usr/bin/prog will be executed with a higher priority. Therefore, the correct statement is that /usr/bin/prog is executed with a nice level of 5, not -5.

Submit
37. Which of the following file permissions belong to a symbolic link?

Explanation

The correct answer is "lrwxrwxrwx". In Linux file systems, the first character of the file permissions represents the file type. In this case, "l" indicates a symbolic link. The remaining nine characters "rwxrwxrwx" represent the permissions for the owner, group, and others, indicating that the symbolic link has read, write, and execute permissions for all.

Submit
38. Which of the following commands will change the quota for a specific user?

Explanation

The "edquota" command is used to change the quota for a specific user. It allows the system administrator to edit the disk quotas for a user, including setting the soft and hard limits for disk space usage. The "repquota" command is used to display the disk usage and quotas for all users, not to change them. The "quota -e" command is used to edit user quotas, but it does not specify a specific user. The "quota" command is used to display disk usage and quota information, but it does not change quotas.

Submit
39. Which of the following command sets the Bash variable named TEST with the content FOO?

Explanation

The correct answer is "TEST=”FOO”". This command sets the Bash variable named TEST with the content FOO. The syntax "variable_name=value" is used to assign a value to a variable in Bash. In this case, the variable name is TEST and the value assigned to it is "FOO".

Submit
40. Which SysV init configuration file should be modified to disable the ctrl-Alt-delete key combination?

Explanation

The correct answer is /etc/inittab. This file is used by the SysV init system to configure the initialization of the system. By modifying this file, you can disable the ctrl-Alt-delete key combination, which is typically used to initiate a system reboot.

Submit
41. Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, which single character command will insert the deleted content below the current line?

Explanation

After deleting 3 lines of text in vi and moving the cursor to a different line, the command "p" (lowercase) will insert the deleted content below the current line.

Submit
42. Which command will display messages from the kernel that were output during the normal boot sequence?

Explanation

The command "dmesg" or "/bin/dmesg" will display messages from the kernel that were output during the normal boot sequence. This command is commonly used to troubleshoot and diagnose any issues that may have occurred during the boot process. By running this command, users can view important information and error messages related to hardware, drivers, and system initialization, providing valuable insights into the system's health and any potential problems that may need to be addressed.

Submit
43. In compliance with the FHS, in which of the directories are man pages found?

Explanation

Man pages, which are the documentation files for Unix and Unix-like operating systems, are typically found in the "/usr/share/man" directory. This directory follows the Filesystem Hierarchy Standard (FHS), which provides guidelines for organizing files and directories in Unix-like systems. The "/usr/share/man" directory is commonly used to store system-wide documentation, including man pages, making it the correct answer in this case.

Submit
44. Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file1.log?

Explanation

The command "myapp | tee file1.log" will send the output from the program myapp to both standard output (stdout) and the file file1.log. The tee command is used to read from standard input and write to both standard output and files. In this case, it will read the output from myapp and write it to both the console and the file file1.log.

Submit
45. What is the maximum niceness value that a regular user can assign to a process with the nice command when executing a new process?

Explanation

The maximum niceness value that a regular user can assign to a process with the nice command when executing a new process is 19. Niceness values range from -20 to 19, with lower values indicating higher priority and higher values indicating lower priority. Regular users typically have limited privileges and cannot assign negative niceness values, so the maximum value they can assign is 19.

Submit
46.   When starting a program with the nice command without any additional parameters, which nice level is set for the resulting process?

Explanation

When starting a program with the nice command without any additional parameters, the resulting process is set to a nice level of 10. The nice command is used in Unix-like operating systems to adjust the scheduling priority of a process. The nice level ranges from -20 to 19, with lower values indicating higher priority. By default, the nice command sets the nice level to 10 if no additional parameters are specified.

Submit
47. What is the name of the main configuration file for GNU GRUB? (Specify the file name only without any path.)

Explanation

The main configuration file for GNU GRUB can be named as menu.lst, grub.conf, or grub.cfg. This file contains the settings and options for the GRUB bootloader, which is responsible for loading the operating system on a computer. The specific name of the file may vary depending on the version and distribution of GNU GRUB being used.

Submit
48. Instead of supplying an explicit device in /etc/fstab for mounting, what other options may be used to identify the intended partition? (Choose TWO correct answers.)

Explanation

In addition to supplying an explicit device in /etc/fstab for mounting, the UUID and LABEL options can also be used to identify the intended partition. UUID stands for Universally Unique Identifier, which is a unique identifier assigned to each partition on a system. The UUID option allows the system to identify the partition based on its unique identifier. LABEL, on the other hand, refers to the label or name assigned to a partition. By using the LABEL option, the system can identify the partition based on its assigned label or name.

Submit
49. What does the command mount -a do?

Explanation

The command "mount -a" mounts all filesystems listed in the /etc/fstab file that have the option "auto" set. This means that all the filesystems that are set to be automatically mounted at system startup will be mounted onto their respective mount points.

Submit
50. Which of the following settings for umask ensures that new files have the default permissions -rw-r—– ?

Explanation

Setting the umask to 0027 ensures that new files have the default permissions -rw-r--r--. The umask is a value that is subtracted from the default permissions to determine the actual permissions of new files. In this case, the default permissions are -rw-rw-rw- (666 in octal), and subtracting 0027 from it results in -rw-r--r-- (640 in octal).

Submit
51. Which of the following commands can be used to locate programs and their corresponding man pages and configuration files?

Explanation

The command "whereis" can be used to locate programs and their corresponding man pages and configuration files.

Submit
52. Which command displays a list of all background tasks running in the current shell? (Specify ONLY the command without any path or parameters.)

Explanation

The command "jobs" displays a list of all background tasks running in the current shell. This can be useful to see what processes are running in the background and manage them accordingly.

Submit
53. Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)

Explanation

The correct answers are "telinit 6" and "shutdown -r now". "telinit 6" is a command that initiates a system reboot in SysV init. "shutdown -r now" is another command that immediately reboots the system.

Submit
54. Which of the following commands updates the linker cache of shared libraries?

Explanation

ldconfig is the correct answer because it is a command used in Linux systems to update the linker cache of shared libraries. The linker cache is a database that stores information about shared libraries and their locations, allowing the system to quickly locate and load the required libraries when an executable is run. By running ldconfig, the system updates this cache, ensuring that any changes or additions to shared libraries are recognized and accessible by the system.

Submit
55. Which of the following commands overwrites the bootloader located on /dev/sda without overwriting the partition table or any data following it?

Explanation

The correct answer is "dd if=/dev/zero of=/dev/sda bs=440 count=1". This command uses the dd utility to overwrite the first 440 bytes of the /dev/sda device with zeros, effectively removing the bootloader without affecting the partition table or any data following it. The "count=1" parameter ensures that only one block of 440 bytes is overwritten.

Submit
56. Which function key is used to start Safe Mode in Windows NT?

Explanation

Safe Mode is a troubleshooting mode in Windows that starts the operating system with a minimal set of drivers and services. It allows users to diagnose and fix problems that may be preventing the computer from starting normally. However, Windows NT does not have a built-in Safe Mode feature like newer versions of Windows. Therefore, the correct answer is that Windows NT does not support Safe Mode.

Submit
57. Which shell command is used to continue background execution of a suspended command?

Explanation

The correct answer is "bg". The "bg" command is used to continue the background execution of a suspended command. When a command is suspended using the "ctrl+z" shortcut, it is paused and moved to the background. The "bg" command allows the suspended command to resume execution in the background, allowing the user to continue working on other tasks in the foreground.

Submit
58. Which of the following commands determines the type of a file by using a definition database file which contains information about all common file types?

Explanation

The correct answer is "file." The "file" command is used to determine the type of a file by using a definition database file that contains information about all common file types. It analyzes the content of the file and provides information such as the file type, encoding, and other relevant details.

Submit
59. Which of the following environment variables overrides or extends the list of directories holding shared libraries?

Explanation

LD_LIBRARY_PATH is the correct answer because it is an environment variable that overrides or extends the list of directories holding shared libraries. When a program is run, the operating system searches for the required shared libraries in the directories specified by LD_LIBRARY_PATH before searching the default directories. This allows users to specify additional directories for shared libraries, enabling the program to locate and load the required libraries successfully.

Submit
60. Which of the following commands will NOT update the modify timestamp on the file /tmp/myfile.txt? 

Explanation

The "file /tmp/myfile.txt" command will NOT update the modify timestamp on the file /tmp/myfile.txt. This command is used to display information about the file, such as its type, size, and permissions, but it does not modify the file itself or update its timestamp.

Submit
61. Which of the following information is stored within the BIOS? (Choose TWO correct answers.)

Explanation

The BIOS (Basic Input/Output System) is responsible for initializing and controlling hardware during the boot process. It stores information about the boot device order, which determines the sequence in which the computer looks for an operating system to load. Additionally, the BIOS stores hardware configuration information, such as the settings for the CPU, memory, and other devices connected to the motherboard. This information is crucial for the proper functioning of the computer. The other options, such as Linux kernel version, timezone, and the system's hostname, are not typically stored within the BIOS.

Submit
62. Which of the following commands lists all currently installed packages when using RPM package management?

Explanation

The correct answer is "rpm --query --all" because this command is used in RPM package management to list all currently installed packages. The "--query" option is used to query the package database, and the "--all" option is used to display all packages without any filters.

Submit
63. Which of the following commands can be used to determine how long the system has been running? (Choose TWO correct answers.)

Explanation

The command "top" can be used to determine how long the system has been running by displaying the system uptime in its output. The command "uptime" can also be used to directly display the system uptime.

Submit
64. Which utility would be used to change how often a filesystem check is performed on an ext2 filesystem without losing any data stored on that filesystem?

Explanation

The utility "tune2fs" would be used to change how often a filesystem check is performed on an ext2 filesystem without losing any data stored on that filesystem. This utility allows the user to modify various parameters of the ext2 filesystem, including the interval at which filesystem checks are performed. It provides a safe way to adjust these settings without causing any data loss.

Submit
65. What is the purpose of the Filesystem Hierarchy Standard?

Explanation

The purpose of the Filesystem Hierarchy Standard is to provide a distribution neutral description of the locations of files and directories. This standard ensures that different operating systems and distributions can have a consistent and standardized file structure, making it easier for users and developers to navigate and manage files. It helps in maintaining compatibility and interoperability between different systems, allowing for easier sharing and portability of files.

Submit
66. After modifying GNU GRUB's configuration file, which command must be run for the changes to take effect?

Explanation

After modifying GNU GRUB's configuration file, no action is required for the changes to take effect. The changes made in the configuration file are automatically applied and take effect without the need for any additional command or action.

Submit
67. Which of the following commands will reduce all consecutive spaces down to a single space?

Explanation

The correct command to reduce all consecutive spaces down to a single space is "tr -s ' ' b.txt". The "-s" option in the "tr" command squeezes multiple occurrences of the specified character into a single occurrence. In this case, it squeezes multiple spaces into a single space. The input file "a.txt" is redirected to the command, and the output is redirected to the file "b.txt".

Submit
68. What is the effect of the egrep command when the -v option is used?

Explanation

When the egrep command is used with the -v option, it only outputs the lines that do not match the specified pattern. This means that it excludes any lines that match the pattern and only displays the lines that do not have a match.

Submit
69. Which of the following Linux filesystems preallocates a fixed number of inodes at the filesystem's make/creation time and does NOT generate them as needed? (Choose TWO correct answers.)

Explanation

ext2 and ext3 are Linux filesystems that preallocate a fixed number of inodes at the filesystem's make/creation time and do not generate them as needed. This means that a certain number of inodes are reserved and allocated when the filesystem is created, regardless of whether they are actually used or not. This can be beneficial in terms of performance and efficiency, as it avoids the need to dynamically generate inodes as files are created. Both ext2 and ext3 are widely used in Linux systems.

Submit
70. Which of the following commands lists the dependencies of a given dpkg package?

Explanation

The apt-cache depends command is used to list the dependencies of a given dpkg package. It allows users to view the package's dependencies, which are other packages that must be installed for the package to function properly. This command is useful for troubleshooting and managing package dependencies in a Linux system.

Submit
71. What does the command mount -a do?

Explanation

The command "mount -a" ensures that all file systems listed with the option "auto" in the /etc/fstab file are mounted. This means that any file systems that have been set to automatically mount will be mounted when this command is executed. It does not mount file systems listed with the option "noauto" and it does not open an editor to edit the /etc/fstab file. It also does not show all mounted file systems, only the ones that have been automatically mounted.

Submit
72. Which of the following commands can be used to display the inode number of a given file?

Explanation

The ls command can be used to display the inode number of a given file. The ls command is used to list files and directories in a directory. By using the -i option with the ls command, it will display the inode number along with the file or directory name. The inode number is a unique identifier for each file or directory in a file system.

Submit
73. Which of the following kernel parameters instructs the kernel to suppress most boot messages?

Explanation

The kernel parameter "quiet" instructs the kernel to suppress most boot messages. By using this parameter, the system will not display detailed information during the boot process, resulting in a quieter boot experience. This can be useful in situations where the user wants a cleaner and less cluttered boot screen without unnecessary messages.

Submit
74. What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

Explanation

The Logical Volume Manager (LVM) can be used for dynamically changing the size of logical volumes, creating snapshots, and dynamically creating or deleting logical volumes. LVM allows for flexible management of storage by abstracting the physical storage devices and providing logical volumes that can be resized as needed. Snapshots can be created to capture the state of a logical volume at a specific point in time. Logical volumes can also be created or deleted on the fly, allowing for easy management of storage space.

Submit
75. What information can the lspci command display about the system hardware? (Choose THREE correct answers.)

Explanation

The lspci command can display information about the system hardware such as the PCI bus speed, device vendor identification, and device IRQ settings. It does not provide information about the system battery type or Ethernet MAC address.

Submit
76. Which of the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)

Explanation

The commands "telinit 1" and "init 1" both bring a system running SysV init into a state where it is safe to perform maintenance tasks. These commands switch the system to runlevel 1, also known as single-user mode or maintenance mode. In this mode, only essential services are started, and the system is in a minimal state, allowing for maintenance tasks to be performed without interference from other processes.

Submit
77. How many fields are in a syntactically correct line of /etc/fstab?

Explanation

A syntactically correct line of /etc/fstab typically consists of six fields. These fields include the file system, mount point, file system type, options, dump frequency, and file system check order. Each field serves a specific purpose in defining the file systems that are automatically mounted during system startup.

Submit
78. After moving data to a new filesystem, how can the former path of the data be kept intact in order to avoid reconfiguration of existing applications? (Choose TWO correct answers.)

Explanation

To keep the former path of the data intact and avoid reconfiguration of existing applications after moving data to a new filesystem, two correct solutions are suggested. First, by mounting the new filesystem on the original path of the data, the applications will continue to access the data from the same location without any reconfiguration. Second, creating a symbolic link from the old to the new path of the data allows applications to access the data through the old path, while the data is actually stored in the new filesystem. This maintains compatibility with existing applications and avoids the need for reconfiguration.

Submit
79. Which of the following commands can be used to search for the executable file foo when it has been placed in a directory not included in $PATH?

Explanation

The command "find" can be used to search for the executable file "foo" when it has been placed in a directory not included in $PATH. The "find" command is a powerful tool that allows users to search for files and directories based on various criteria, such as name, size, and location. In this case, it can be used to locate the "foo" executable file even if it is not in one of the directories specified in the $PATH environment variable.

Submit
80. Which Bash environment variable defines in which file the user history is stored when exiting a Bash process? (Specify ONLY the variable name.)

Explanation

The Bash environment variable "HISTFILE" defines the file in which the user history is stored when exiting a Bash process. This variable allows the user to customize the location and name of the history file, providing flexibility and control over the storage of command history.

Submit
81. Which of the following signals is sent to a process when the key combination CTRL+C is pressed on the keyboard?

Explanation

When the key combination CTRL+C is pressed on the keyboard, the signal that is sent to a process is SIGINT. This signal is used to interrupt a process and request it to terminate. It is commonly used to terminate a process gracefully, allowing it to clean up resources and exit properly.

Submit
82. Which of the following commands can be used to download the RPM package kernel without installing it?

Explanation

The correct answer is "yumdownloader kernel". The yumdownloader command is used to download RPM packages from the repositories without installing them. In this case, it is specifically used to download the kernel package. The other options provided are not valid commands for downloading RPM packages without installation.

Submit
83. After successfully creating a hard link called bar to the ordinary file foo, foo is deleted from the filesystem. Which of the following describes the resulting situation?

Explanation

When a hard link is created, it creates a new directory entry that points to the same inode (data structure that stores information about a file) as the original file. In this scenario, after creating a hard link called "bar" to the file "foo" and deleting "foo", the file "bar" would still exist and be accessible. This is because the hard link "bar" still points to the same inode, even though the original directory entry for "foo" has been removed. Therefore, "foo" would be removed while "bar" would remain accessible.

Submit
84. Which run levels should never be declared as the default run level when using SysV init? (Choose TWO correct answers.)

Explanation

Run levels 6 and 0 should never be declared as the default run level when using SysV init. Run level 6 is used for system reboot, so setting it as the default run level can cause unintended reboots. Run level 0 is used for system shutdown, so setting it as the default run level can result in accidental shutdowns. It is recommended to set the default run level to a non-shutdown or non-reboot run level, such as run level 3 or 5, depending on the specific requirements of the system.

Submit
85. In the vi editor, how can commands such as moving the cursor or copying lines into the buffer be issued multiple times or applied to multiple rows?

Explanation

In the vi editor, commands can be repeated or applied to multiple rows by specifying the number right in front of the command. For example, using "4l" will move the cursor four spaces to the right, and using "2yj" will copy two lines downwards. This allows for efficient and quick execution of commands on multiple rows.

Submit
86. What is the default action of the split command on an input file?

Explanation

The default action of the split command on an input file is to break the file into new files of 1,000 line pieces each.

Submit
87. When running the command sed -e "s/a/b/" /tmp/file >/tmp/file While /tmp/file contains data, why is /tmp/file empty afterwards?

Explanation

The file /tmp/file is empty afterwards because when the shell establishes the redirection using the ">" character, it overwrites the target file before the redirected command starts and opens it for reading. This means that the contents of the file are cleared before the sed command is executed, resulting in an empty file.

Submit
88. What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?

Explanation

The given answer suggests that when a binary file is executed as a command and the permissions are -rwSr-xr-x, the execute flag is not set for the owner. As a result, the SetUID flag is ignored. This means that the command will not be executed with the effective rights of the owner, but rather with the effective rights of the group instead.

Submit
89. Which type of filesystem is created by mkfs when it is executed with the block device name only and without any additional parameters?

Explanation

When mkfs is executed with only the block device name and without any additional parameters, it creates an ext2 filesystem. Ext2 is a second extended filesystem, which is a widely used filesystem for Linux operating systems. It does not have the journaling feature present in ext3 and ext4, making it simpler and more lightweight.

Submit
90. What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?

Explanation

The correct answer is /sbin/init. This is the first program that is usually started by the Linux kernel when using SysV init. Init is responsible for initializing the system and starting all other processes. It is located in the /sbin directory, which contains essential system binaries.

Submit
91. Which of the following statements is correct when talking about /proc/?

Explanation

The correct answer is that all changes to files in /proc/ are immediately recognized by the kernel. The /proc/ directory is a virtual file system that provides information about processes and system resources. It allows processes to communicate with the kernel by reading from and writing to specific files in the /proc/ directory. Any changes made to these files are immediately recognized by the kernel, allowing for dynamic adjustments and monitoring of system parameters.

Submit
92. Creating a hard link to an ordinary file returns an error. What could be the reason for this?

Explanation

When creating a hard link to a file, both the source file and the target file must be on the same filesystem. If they are on different filesystems, it will result in an error.

Submit
93. Which of the following commands makes /bin/foo executable by everyone but writable only by its owner?

Explanation

The correct answer is "chmod u=rwx,go=rx /bin/foo". This command sets the permissions for the file /bin/foo in a way that the owner has read, write, and execute permissions (rwx), while the group and others have only read and execute permissions (rx). This ensures that the owner can modify the file, while everyone else can only execute it.

Submit
94. In order to display all currently mounted filesystems, which of the following commands could be used? (Choose TWO correct answers.)

Explanation

The correct answer is "cat /proc/self/mounts" and "mount". The "cat /proc/self/mounts" command displays all currently mounted filesystems by reading the /proc/self/mounts file, which contains information about mounted filesystems. The "mount" command can also be used to display currently mounted filesystems by itself.

Submit
95. In the vi editor, which of the following commands will copy the current line into the vi buffer?

Explanation

The command "yy" in the vi editor will copy the current line into the vi buffer. This command is used to yank (copy) the current line, and it can be pasted elsewhere using the paste command. The other options mentioned in the question do not perform the same action of copying the current line into the vi buffer.

Submit
96. Which of the following commands prints all files and directories within the /tmp directory or its subdirectories which are also owned by the user root? (Choose TWO correct answers.)

Explanation

The first command "find /tmp -user root" is correct because it searches for files and directories within the /tmp directory that are owned by the user root. The second command "find /tmp -user root -print" is also correct because it not only searches for the files and directories owned by the user root within the /tmp directory, but also prints them out.

Submit
97. Which of the following pieces of information of an existing file is changed when a hard link pointing to that file is created?

Explanation

When a hard link is created to an existing file, the only piece of information that is changed is the link count. Link count refers to the number of hard links that point to a particular file. When a new hard link is created, the link count for that file increases by one. The permissions, file size, modify timestamp, and inode number remain unchanged when a hard link is created.

Submit
98. Which RPM command will output the name of the package which supplied the file /etc/exports?

Explanation

The correct answer is "rpm -qf /etc/exports". This command is used to query the RPM database and find out which package provided a specific file. In this case, it will output the name of the package that supplied the file "/etc/exports".

Submit
99. Which of the following characters can be combined with a separator string in order to read from the current input source until the separator string, which is on a separate line and without any trailing spaces, is reached?

Explanation

The correct answer is "

Submit
100. Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)

Explanation

SysV init, systemd, and Upstart are all init systems used within Linux systems. These init systems are responsible for managing the booting process and starting and stopping services on a Linux system. SysV init is the traditional init system used in older versions of Linux, while systemd is a more modern init system that has become the standard in many Linux distributions. Upstart is another init system that was used in some distributions but has been largely replaced by systemd.

Submit
101. Which of the following options for the kernel's command line changes the systemd boot target to rescue.target instead of the default target?

Explanation

The correct answer is "systemd.unit=rescue.target". This option changes the systemd boot target to rescue.target instead of the default target. The systemd.unit parameter is used to specify the systemd unit that should be activated during boot, and in this case, it is set to rescue.target which is the target for rescue mode.

Submit
102. When using rpm –verify to check files created during the installation of RPM packages, which of the following information is taken into consideration? (Choose THREE correct answers.)

Explanation

When using rpm --verify to check files created during the installation of RPM packages, the following information is taken into consideration:

1. Timestamps: The timestamps of the files are checked to ensure that they have not been modified since the installation.

2. MD5 checksums: The MD5 checksums of the files are compared to the original values stored during installation to verify the integrity of the files.

3. File sizes: The sizes of the files are compared to the expected sizes to ensure that they have not been altered.

These three factors are important in ensuring the integrity and consistency of the installed RPM packages.

Submit
103. Which of the following commands shows the definition of a given shell command?

Explanation

The "type" command is used to display the definition or location of a given shell command. It is commonly used to determine whether a command is a built-in shell command or an external command located in a specific directory. By typing the command followed by the name of the shell command, the user can see the definition or location of that command.

Submit
104. What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)

Explanation

When using udev, additional rules can be created by adding them to the /etc/udev/rules.d/ directory. This allows for customization and specific configurations for devices. Additionally, the /dev/ directory is a filesystem of type tmpfs, which means it is stored in memory and not on a physical disk. It is mounted by udev during system startup to provide access to device files.

Submit
105. Which option to the yum command will update the entire system? (Specify ONLY the option name without any additional parameters.)

Explanation

The options "update" and "upgrade" are both valid options for the yum command that can be used to update the entire system. These options download and install the latest versions of all packages on the system, ensuring that all software is up to date.

Submit
106. Which of the following commands set the sticky bit for the directory /tmp? (Choose TWO correct answers.)

Explanation

The sticky bit is a permission that can be set on a directory. It allows only the owner of a file within that directory to delete or rename the file. The first command, "chmod +s /tmp," is incorrect because "+s" sets the setuid permission, not the sticky bit. The second command, "chmod +t /tmp," is correct because "+t" sets the sticky bit on the directory /tmp. The third command, "chmod 1775 /tmp," is correct because "1" sets the sticky bit, "7" sets read, write, and execute permissions for the owner, "7" sets read, write, and execute permissions for the group, and "5" sets read and execute permissions for others. The fourth and fifth commands are incorrect because they do not set the sticky bit.

Submit
107. Which of the following commands changes the number of days before the ext3 filesystem on /dev/sda1 has to run through a full filesystem check while booting?

Explanation

The command "tune2fs -i 200 /dev/sda1" changes the number of days before the ext3 filesystem on /dev/sda1 has to run through a full filesystem check while booting. The "-i" option is used to specify the interval between two filesystem checks in days. In this case, the interval is set to 200 days.

Submit
108. Which world-writable directory should be placed on a separate partition in order to prevent users from being able to fill up the / filesystem? (Specify the full path to the directory.)

Explanation

The /tmp and /var/tmp directories are commonly used for temporary files and are world-writable by default. Placing these directories on a separate partition can prevent users from filling up the root (/) filesystem, which could potentially cause system instability or denial of service. By isolating these directories, any excessive usage or filling up of the partition will not affect the overall system.

Submit
109. Which command is used to create and initialize the files used to store quota information? (Specify ONLY the command without any path or parameters.)

Explanation

The command "quotacheck" is used to create and initialize the files that are used to store quota information. This command is typically used in Linux systems to set up disk quotas, which allow administrators to limit the amount of disk space that users or groups can use. By running the quotacheck command, the system creates the necessary files and initializes them with the current disk usage information, enabling the implementation of disk quotas.

Submit
110. Which of the following commands creates an ext3 filesystem on /dev/sdb1? (Choose TWO correct answers.)

Explanation

The correct answers are "/sbin/mke2fs -j /dev/sdb1" and "/sbin/mkfs -t ext3 /dev/sdb1". These commands both create an ext3 filesystem on the specified device (/dev/sdb1). The "-j" option in "/sbin/mke2fs -j /dev/sdb1" enables the creation of an ext3 journal, while the "-t ext3" option in "/sbin/mkfs -t ext3 /dev/sdb1" specifies the filesystem type as ext3.

Submit
111. Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel? (Specify the file name only without any path.)

Explanation

The correct answer is "/proc/cmdline". This file in the /proc filesystem lists the parameters that are passed from the bootloader to the kernel. It contains the command line arguments that were used to boot the kernel, including options such as the root device, kernel parameters, and other configuration settings. By accessing this file, one can view and modify the parameters passed to the kernel during the boot process.

Submit
112. Which of the following shell redirections will write standard output and standard error output to a file named filename?

Explanation

The correct answer is ">filename 2>&1". This redirection will write both standard output and standard error output to a file named "filename". The ">" symbol is used to redirect standard output to a file, and "2>&1" is used to redirect standard error output to the same location as standard output. Therefore, this combination of redirections will achieve the desired result of writing both outputs to the specified file.

Submit
113. Which of the following sequences in the vi editor saves the opened document and exits the editor? (Choose TWO correct answers.)

Explanation

The first correct answer, "esc :wq!", is the sequence in the vi editor that saves the opened document and exits the editor. The "esc" key is used to enter command mode, followed by ":wq!" which saves the changes and quits the editor. The second correct answer, "esc ZZ", also achieves the same result. "esc" enters command mode and "ZZ" saves the changes and exits the editor.

Submit
114. From a Bash shell, which of the following commands directly executes the instruction from the file /usr/local/bin/runme.sh without starting a subshell? (Please select TWO answers.)

Explanation

The "source /usr/local/bin/runme.sh" command directly executes the instruction from the file /usr/local/bin/runme.sh without starting a subshell. Similarly, the ". /usr/local/bin/runme.sh" command also executes the instruction from the file /usr/local/bin/runme.sh without starting a subshell.

Submit
115. A user accidentally created the subdirectory \\dir in his home directory. Which of the following commands will remove that directory?

Explanation

The correct answer is "rmdir ~/\\\\dir". This command will remove the subdirectory named "dir" that was accidentally created in the user's home directory. The "~" symbol represents the user's home directory, and the "\\" is used to escape the special character "\". Therefore, this command will correctly target and remove the subdirectory.

Submit
116. Which signal is missing from the following command that is commonly used to instruct a daemon to reinitialize itself, including reading configuration files? killall -s _____ daemon

Explanation

The missing signal in the command is "HUP" or "SIGHUP" or "1". These signals are commonly used to instruct a daemon to reinitialize itself, including reading configuration files.

Submit
117. Which of the following are valid stream redirection operators within Bash? (Choose THREE correct answers.)

Explanation

The three valid stream redirection operators in Bash are "" (output redirection). The "" operator is used to redirect output to a file.

Submit
118.   What does the ? symbol within regular expressions represent?

Explanation

The ? symbol within regular expressions represents matching the preceding qualifier zero or one times. This means that the preceding element can occur either zero times or one time in the input string.

Submit
119. In which directory must definition files be placed to add additional repositories to yum?

Explanation

Definition files must be placed in the /etc/yum.repos.d directory in order to add additional repositories to yum.

Submit
120. Which Debian package management tool asks the configuration questions for a specific already installed package just as if the package were being installed for the first time? (Specify ONLY the command without any path or parameters.)

Explanation

The Debian package management tool that asks the configuration questions for an already installed package as if it were being installed for the first time is "dpkg-reconfigure". This command allows the user to reconfigure the settings of a package, prompting them with the same questions that would be asked during the initial installation process.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 05, 2019
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (120)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which command is used in a Linux environment to create a new...
What is the output of the following command? echo "Hello World" | tr...
Which of the following commands will print the last 10 lines of a text...
Which of the following commands replaces each occurrence of 'bob' in...
Which of the following options is used in a GRUB Legacy configuration...
Which command will disable swapping on a device? (Specify ONLY the...
What is the purpose of the Bash built-in export command?
Which character, added to the end of a command, runs that command in...
57. What is the difference between the i and a commands of the vi...
Which variable defines the directories in which a Bash shell searches...
Which of the following commands prints a list of usernames (first...
Which of the following commands is used to update the list of...
Which of the following commands moves and resumes in the background...
Which of the following commands will write a message to the terminals...
Which of the following commands kills the process with the PID 123 but...
During a system boot cycle, what program is executed after the BIOS...
Which umask value will result in the default access permissions of 600...
Which grep command will print only the lines that do not end with a /...
When given the following command line. echo "foo bar" | tee bar | cat...
Which of the following is correct when talking about mount points?
What happens after issuing the command vi without any additional...
Which of the following commands displays the contents of a gzip...
What command will generate a list of user names from /etc/passwd along...
What is the default nice level when a process is started using the...
In a nested directory structure, which find command line option would...
Which of the following commands changes the ownership of file.txt to...
After running the command umount /mnt, the following error message is...
When removing a package, which of the following dpkg options will...
Which of the following commands is used to change options and...
Which of the following statements is correct regarding the command foo...
Which of the following commands can be used to create a USB storage...
In Bash, inserting 1>&2 after a command redirects
Which file should be edited to select the network locations from which...
Which of the following files, located in the user home directory, is...
Which of the following is the device file name for the second...
Regarding the command: nice -5 /usr/bin/prog Which of the following...
Which of the following file permissions belong to a symbolic link?
Which of the following commands will change the quota for a specific...
Which of the following command sets the Bash variable named TEST with...
Which SysV init configuration file should be modified to disable the...
Immediately after deleting 3 lines of text in vi and moving the cursor...
Which command will display messages from the kernel that were output...
In compliance with the FHS, in which of the directories are man pages...
Which of the following commands will send output from the program...
What is the maximum niceness value that a regular user can assign to a...
  ...
What is the name of the main configuration file for GNU GRUB? (Specify...
Instead of supplying an explicit device in /etc/fstab for mounting,...
What does the command mount -a do?
Which of the following settings for umask ensures that new files have...
Which of the following commands can be used to locate programs and...
Which command displays a list of all background tasks running in the...
Which of the following commands reboots the system when using SysV...
Which of the following commands updates the linker cache of shared...
Which of the following commands overwrites the bootloader located on...
Which function key is used to start Safe Mode in Windows NT?
Which shell command is used to continue background execution of a...
Which of the following commands determines the type of a file by using...
Which of the following environment variables overrides or extends the...
Which of the following commands will NOT update the modify timestamp...
Which of the following information is stored within the BIOS? (Choose...
Which of the following commands lists all currently installed packages...
Which of the following commands can be used to determine how long the...
Which utility would be used to change how often a filesystem check is...
What is the purpose of the Filesystem Hierarchy Standard?
After modifying GNU GRUB's configuration file, which command must be...
Which of the following commands will reduce all consecutive spaces...
What is the effect of the egrep command when the -v option is used?
Which of the following Linux filesystems preallocates a fixed number...
Which of the following commands lists the dependencies of a given dpkg...
What does the command mount -a do?
Which of the following commands can be used to display the inode...
Which of the following kernel parameters instructs the kernel to...
What can the Logical Volume Manager (LVM) be used for? (Choose THREE...
What information can the lspci command display about the system...
Which of the following commands brings a system running SysV init into...
How many fields are in a syntactically correct line of /etc/fstab?
After moving data to a new filesystem, how can the former path of the...
Which of the following commands can be used to search for the...
Which Bash environment variable defines in which file the user history...
Which of the following signals is sent to a process when the key...
Which of the following commands can be used to download the RPM...
After successfully creating a hard link called bar to the ordinary...
Which run levels should never be declared as the default run level...
In the vi editor, how can commands such as moving the cursor or...
What is the default action of the split command on an input file?
When running the command sed -e "s/a/b/" /tmp/file >/tmp/file While...
What do the permissions -rwSr-xr-x mean for a binary file when it is...
Which type of filesystem is created by mkfs when it is executed with...
What is the first program that is usually started, at boot time, by...
Which of the following statements is correct when talking about...
Creating a hard link to an ordinary file returns an error. What could...
Which of the following commands makes /bin/foo executable by everyone...
In order to display all currently mounted filesystems, which of the...
In the vi editor, which of the following commands will copy the...
Which of the following commands prints all files and directories...
Which of the following pieces of information of an existing file is...
Which RPM command will output the name of the package which supplied...
Which of the following characters can be combined with a separator...
Which of the following are init systems used within Linux systems?...
Which of the following options for the kernel's command line changes...
When using rpm –verify to check files created during the...
Which of the following commands shows the definition of a given shell...
What of the following statements are true regarding /dev/ when using...
Which option to the yum command will update the entire system?...
Which of the following commands set the sticky bit for the directory...
Which of the following commands changes the number of days before the...
Which world-writable directory should be placed on a separate...
Which command is used to create and initialize the files used to store...
Which of the following commands creates an ext3 filesystem on...
Which file in the /proc filesystem lists parameters passed from the...
Which of the following shell redirections will write standard output...
Which of the following sequences in the vi editor saves the opened...
From a Bash shell, which of the following commands directly executes...
A user accidentally created the subdirectory \\dir in his home...
Which signal is missing from the following command that is commonly...
Which of the following are valid stream redirection operators within...
  What does the ? symbol within regular expressions represent?
In which directory must definition files be placed to add additional...
Which Debian package management tool asks the configuration questions...
Alert!

Advertisement