OS Iitu Quiz

107 Questions | Attempts: 674
Share

SettingsSettingsSettings
OS Iitu Quiz - Quiz


Questions and Answers
  • 1. 

    The user and group number of root is 0

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 2. 

    Enter the name of file that contains the user accoutn information for your system

    • A.

      /etc/passwd

    • B.

      /etc/password

    • C.

      /etc/shadow

    • D.

      /etc/gshadow

    Correct Answer
    A. /etc/passwd
  • 3. 

    Which file contains passwords for your groups?

    • A.

      /etc/passwd

    • B.

      /etc/password

    • C.

      /etc/shadow

    • D.

      /etc/gshadow

    Correct Answer
    D. /etc/gshadow
  • 4. 

    /etc/passwd contains password related information for accounts

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 5. 

    One account has elevated privileges to issue any command, access any file, and peform every function

    Correct Answer
    Root, root, superuser, Superuser
  • 6. 

    Choose the correct format of /etc/passwd file

    • A.

      Name:UID:password:group_number:comment:directory:start_program

    • B.

      UID:name:password:group_number:comment:directory:start_program

    • C.

      Name:password:UID:group_number:comment:directory:start_program

    • D.

      Group_number:name:UID:password:comment:directory:start_program

    Correct Answer
    C. Name:password:UID:group_number:comment:directory:start_program
  • 7. 

    We can use both chown and chgrp to change the group ownership

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 8. 

    Which utility is used to modify file /etc/sudoers?

    • A.

      Psw

    • B.

      Su

    • C.

      Visudo

    • D.

      Gshadow

    Correct Answer
    C. Visudo
  • 9. 

    Choose the correct format of /etc/gshadow file

    • A.

      UID:Name:Password:Admins:Users

    • B.

      Name:Password:Admins:Users

    • C.

      Name:UID:Password:Users:Admins

    • D.

      Password:Admins:Users:Name

    Correct Answer
    B. Name:Password:Admins:Users
  • 10. 

    What is the alternative of 543 permission?

    • A.

      R-xr---wx

    • B.

      R-xrw-r--

    • C.

      R--w-x--x

    • D.

      Rw-r-x-wx

    Correct Answer
    A. R-xr---wx
  • 11. 

    How can we list directories with hidden files?

    • A.

      Ls -t

    • B.

      Ls -a

    • C.

      Ls -l

    • D.

      Ls -r

    Correct Answer
    B. Ls -a
  • 12. 

    How can we list particular directories?

    • A.

      Ls -t

    • B.

      Ls -r

    • C.

      Ls -a

    • D.

      Ls -d

    Correct Answer
    D. Ls -d
  • 13. 

    What is the umask for the definitions below?- read, execute for owner- read for group- write, execute for others 

    • A.

      234

    • B.

      013

    • C.

      665

    • D.

      777

    • E.

      631

    Correct Answer
    A. 234
  • 14. 

    We should use chmod to set permission for newly created files

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 15. 

    How can you add read and execute permission to owner for file quiz.txt

    • A.

      Chmod u+rx quiz.txt

    • B.

      Chmod o=rx quiz.txt

    • C.

      Chmod u-rx quiz.txt

    • D.

      Chmod o+rx quiz.txt

    • E.

      Umask o+rx quiz.txt

    Correct Answer
    A. Chmod u+rx quiz.txt
  • 16. 

    We can use both gzip -d and gunzip to decompress file 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 17. 

    Input the number equivalent of rw-r-x--x permission

    • A.

      651

    • B.

      777

    • C.

      541

    • D.

      661

    • E.

      415

    Correct Answer
    A. 651
  • 18. 

    What is the first program that is executed after system boot up?

    Correct Answer
    Init, init
  • 19. 

    Foreground processes doesn't expect user input

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 20. 

    What are the processes that are initialized and controlled through a terminal session?

    • A.

      Foreground

    • B.

      Background

    • C.

      Interactive

    Correct Answer(s)
    A. Foreground
    C. Interactive
  • 21. 

    The parent process of all process in Linux called root

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 22. 

    Which of these funtions has security risks?

    • A.

      Fork()

    • B.

      System()

    • C.

      Exec()

    Correct Answer
    B. System()
  • 23. 

    Select chains for NAT table

    • A.

      INPUT

    • B.

      OUTPUT

    • C.

      PREROUTING

    • D.

      FORWARD

    • E.

      POSTROUTING

    Correct Answer(s)
    B. OUTPUT
    C. PREROUTING
    E. POSTROUTING
  • 24. 

    How many built-in-rules do iptables have?

    • A.

      3

    • B.

      4

    • C.

      1

    • D.

      2

    Correct Answer
    A. 3
  • 25. 

    Select chains for mangle table

    • A.

      INPUT

    • B.

      OUTPUT

    • C.

      FORWARD

    • D.

      POSTROUTING

    • E.

      PREROUTING

    Correct Answer(s)
    A. INPUT
    B. OUTPUT
    C. FORWARD
    D. POSTROUTING
    E. PREROUTING
  • 26. 

    Select chains for filter table

    • A.

      FORWARD

    • B.

      INPUT

    • C.

      OUTPUT

    • D.

      POSTROUTING

    Correct Answer(s)
    A. FORWARD
    B. INPUT
    C. OUTPUT
  • 27. 

    REJECT target works like the DROP target, but doesn't return an error message

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 28. 

    When using command line arguments, what does $$ return?

    • A.

      Name of running script

    • B.

      Array containing all parameters

    • C.

      Word containing all parameters

    • D.

      Process ID of running script

    • E.

      Number of passed parameters

    Correct Answer
    D. Process ID of running script
  • 29. 

    What are the permission types a UNIX file can be assigned 

    • A.

      Read

    • B.

      Write

    • C.

      Execute

    • D.

      User

    • E.

      Group

    • F.

      Deploy

    Correct Answer(s)
    A. Read
    B. Write
    C. Execute
  • 30. 

    Open source is free software, software that the licensee can use without paying a license fee

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 31. 

    Which of the following distribution designed for advanced Linux users?

    • A.

      Red Hat

    • B.

      Gentoo

    • C.

      Fedora

    • D.

      Debian

    • E.

      Slackware

    Correct Answer
    B. Gentoo
  • 32. 

    Which permission belongs to 452 umask?

    • A.

      R---xrw-

    • B.

      Rw-r-xrwx

    • C.

      Rwxrw-r-x

    • D.

      -wx-w-r-x

    Correct Answer
    D. -wx-w-r-x
  • 33. 

    Which of the following belong(s) to system level interface

    • A.

      Shell

    • B.

      Icons, windows, buttons

    • C.

      Applications

    • D.

      Invoked from programs

    Correct Answer
    D. Invoked from programs
  • 34. 

    What will you write in order to check whether the directory with name "quizzes" exist or not?Format: option dirname

    Correct Answer
    -d quizzes
  • 35. 

    What will be the output if we will run the following script: ./quiz.sh 4 3Filename: quiz.sh 

    • A.

      C

    • B.

      Script won't run because of error

    • C.

      A

    • D.

      B

    Correct Answer
    D. B
  • 36. 

    What will be the output if we will run script: ./quiz.sh 200Filename: quiz.sh

    • A.

      B

    • B.

      A

    • C.

      C

    • D.

      Script won't run because an error

    Correct Answer
    D. Script won't run because an error
  • 37. 

    If we want the variable to be available to the other scripts, which command do we need?

    Correct Answer
    export, Export, EXPORT
  • 38. 

    What is an Operating System? 

    • A.

      A collection of software that manages computer hardware resources and provides common services for computer programs

    • B.

      It acts as an intermediary between a user and the computer system

    • C.

      A hardware layer to abstract away and manage details of software resources

    • D.

      The OS is a vital component of the system hardware in a computer system

    Correct Answer(s)
    A. A collection of software that manages computer hardware resources and provides common services for computer programs
    B. It acts as an intermediary between a user and the computer system
  • 39. 

    What are the levels of access control on UNIX systems?

    • A.

      Root

    • B.

      Other

    • C.

      User

    • D.

      Group

    • E.

      Administrator

    • F.

      Administrator

    Correct Answer(s)
    A. Root
    C. User
  • 40. 

    What is the alternative of 361 permission?

    • A.

      Rw-r-x-wx

    • B.

      -wxrw---x

    • C.

      Rw-rw-r-x

    • D.

      Rw-r-x-x

    Correct Answer
    B. -wxrw---x
  • 41. 

    What is PID of init process?

    • A.

      3

    • B.

      4

    • C.

      5

    • D.

      1

    • E.

      0

    Correct Answer
    D. 1
  • 42. 

    Select an(the) example(s) of free software

    • A.

      UTorrent Google Chrome

    • B.

      Linux

    • C.

      Mozilla Firefox FreeBSD KDE

    • D.

      Open Office

    Correct Answer
    A. UTorrent Google Chrome
  • 43. 

    Which permission belongs to 260 umask

    • A.

      R-xr-xr-x

    • B.

      R-x--xrwx

    • C.

      Rw---xr-x

    • D.

      R-x---rw-

    Correct Answer
    B. R-x--xrwx
  • 44. 

    Linux developed by 

    • A.

      Andrew Tannenbaum

    • B.

      Bill Gates

    • C.

      Linus Torvalds

    • D.

      Mark Zyckerberg

    Correct Answer
    C. Linus Torvalds
  • 45. 

    Which signal is sent to a process when its controlling terminal is closed?

    • A.

      SIGINT

    • B.

      SIGKILL

    • C.

      SIGBUS

    • D.

      SIGSTP

    • E.

      SIGHUP

    Correct Answer
    E. SIGHUP
  • 46. 

    What is the alternative of 421 permission?

    • A.

      Rw-r-x--x

    • B.

      R-xrw-wx

    • C.

      Rw-w-x--x

    • D.

      R---w---x

    Correct Answer
    D. R---w---x
  • 47. 

    How can you list all available signals?

    Correct Answer
    kill -l
  • 48. 

    What you should write in order to edit the list of cronjobs?

    Correct Answer
    sudo crontab -e, crontab -e
  • 49. 

    Which of the following belongs to commercial business distribution used mainly for internet servers?

    • A.

      Red Hat

    • B.

      Fedora

    • C.

      Gentoo

    • D.

      Debian

    • E.

      OpenSuse

    Correct Answer
    A. Red Hat
  • 50. 

    Which line executes the script chech_status.sh on 10th June 08:30 AM

    • A.

      30 08 10 06 * check_status.sh

    • B.

      10 06 30 08 * check_status.sh

    • C.

      30 08 06 10 * check_status.sh

    • D.

      08 30 10 06 * check_status.sh

    Correct Answer
    A. 30 08 10 06 * check_status.sh

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 13, 2017
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 12, 2017
    Quiz Created by
    Daniyar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.