OS Iitu Quiz

107 Questions | Attempts: 674
Please wait...
Question 1 / 108
🏆 Rank #--
Score 0/100

1. Linux developed by 

Submit
Please wait...
About This Quiz
OS Iitu Quiz - Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What are the numeric equivalents of the alphabetic permisson bits?

Submit

3. Which command would you use to set full permission for the owner and group and no permission to other users

Submit

4. What is the alternative of 361 permission?

Submit

5. How can we list particular directories?

Submit

6. What is the alternative of 421 permission?

Submit

7. What are the permission types a UNIX file can be assigned 

Submit

8. How many categories of Linux distributions are there?

Submit

9. How can we list directories with hidden files?

Submit

10. How many built-in-rules do iptables have?

Submit

11. What is the first program that is executed after system boot up?

Submit

12. Which of these funtions has security risks?

Submit

13. What is the number equivalent of r-x--x--x

Submit

14. What is the number equivalent of r--rwxrw- permission

Submit

15. We can use both gzip -d and gunzip to decompress file 

Submit

16. What will you write in order to check whether the directory with name "quizzes" exist or not?Format: option dirname

Submit

17. Enter the name of file that contains the user accoutn information for your system

Submit

18. Which utility is used to modify file /etc/sudoers?

Submit

19. Choose the equivalent of @yearly special word

Submit

20. What will be the output of the following program is we run it as ./quiz.sh 11

Submit

21. What is the alternative of 512 permission?

Submit

22. How can you list all available signals?

Submit

23. The user and group number of root is 0

Submit

24. Crontab is used to schedule commands to be executed only once

Submit

25. Which table used to alter packets that create a new connection. 

Submit

26. Select an(the) example(s) of free software

Submit

27. Input the number equivalent of rw-r-x--x permission

Submit

28. What you should write in order to get silent promt from user? Format: [command] [option(s)]

Submit

29. We use OR operation if we want to perform the action if one of several condtion is met

Submit

30. ? By default, a regular expression is case sensitive 

Submit

31. What you should write in order to edit the list of cronjobs?

Submit

32. Which file contains passwords for your groups?

Submit

33. What will the output of following script if we run like: ./greet.sh teacher

Submit

34. Which of the following belongs to commercial business distribution used mainly for internet servers?

Submit

35. When using command line arguments, what does $$ return?

Submit

36. What is the umask for the definitions below?- read, execute for owner- read for group- write, execute for others 

Submit

37. What is equivalent of -wxr-x-wx permission

Submit

38. What is PID of init process?

Submit

39. Choose the correct format of /etc/passwd file

Submit

40. We can use both chown and chgrp to change the group ownership

Submit

41. How many approaches of mutex implementation are there?

Submit

42. Which signal is a program termination signal (kill will send this by default)?

Submit

43. In concurrency, sharing global resources safety is difficult

Submit

44. What will be the output if we will run the following script: ./quiz.sh 4 3Filename: quiz.sh 

Submit

45. When using command line arguments, what does $0 return?

Submit

46. What is the alternative of 543 permission?

Submit

47. Which table is the default table for handling network packets?

Submit

48. Which table is used for specific types of packet alteration

Submit

49. ? How can we make regular expression case insensitive?

Submit

50. When using command line arguments, what does $@ return? 

Submit

51. Which of the following distribution designed for advanced Linux users?

Submit

52. Which expression prints out the result of an expression?

Submit

53. When using command line arguments, what does $0 return?

Submit

54. How can you add read and execute permission to owner for file quiz.txt

Submit

55. Choose the correct format of /etc/gshadow file

Submit

56. In ACCEPT target the packet its handed over to the end application or the operationg system for processing

Submit

57. What command is used to modify a file's owner?

Submit

58. Which permission belongs to 260 umask

Submit

59. Which signal is sent to a process when its controlling terminal is closed?

Submit

60. Select chains for filter table

Submit

61. What is a deadlock?

Submit

62. What option you should write, if you want to find all files?

Submit

63. Open source is free software, software that the licensee can use without paying a license fee

Submit

64. In concurrency optimal allocation of resources is difficult

Submit

65. We should use chmod to set permission for newly created files

Submit

66. Which chain applies to network packets that are targeted for the host?

Submit

67. What you should write in order to get list of cronjobs?

Submit

68. If we want the variable to be available to the other scripts, which command do we need?

Submit

69. Which chain applies to locally-generated network packets?

Submit

70. In which file the default parameters for new user are stored?

Submit

71. Match following signals with their definitions. 

Submit

72. The parent process of all process in Linux called root

Submit

73. One account has elevated privileges to issue any command, access any file, and peform every function

Submit

74. There are 2 policies of deadlock prevention

Submit

75. Select chains for mangle table

Submit

76. /etc/passwd contains password related information for accounts

Submit

77. Select the type(s) of OS

Submit

78. Multiple processes on a system with a single processor? 

Submit

79. Which line executes the script chech_status.sh on 10th June 08:30 AM

Submit

80. Choose the correct answer for the following definition: "No process can be forces to release a resource"

Submit

81. Mint is one of the original Linux distributions sets, popular with Linux geeks

Submit

82. Foreground processes doesn't expect user input

Submit

83. Choose the correct definition for daemons

Submit

84. Choose the correct answer for the following definition "A closed chain of processes exists, such that each process is blocked waiting for a resource held by another process in the set"

Submit

85. Which of the following belong(s) to system level interface

Submit

86. Match table names with their definitions

Submit

87. REJECT target works like the DROP target, but doesn't return an error message

Submit

88. Choose correct answer for following definition "A closed chain of processes exists, such that each process is blocked waiting for a resource held by another process in the set"

Submit

89. Which permission belongs to 162 umask?

Submit

90. What will be the output if we will run script: ./quiz.sh 200Filename: quiz.sh

Submit

91. Match the following signals with their definitions

Submit

92. When using expr we need to enclose the expression in quotes

Submit

93. Which permission belongs to 452 umask?

Submit

94. Which of the following belong to user benefits?

Submit

95. Which of the following belongs to application benefits?

Submit

96. Choose the correct approach for the following definition "adopting a static policy that disallows one of the four conditions above."

Submit

97. Select chains for NAT table

Submit

98. What are the processes that are initialized and controlled through a terminal session?

Submit

99. Match chain names to their definition

Submit

100. What are the levels of access control on UNIX systems?

Submit

101. In which of the following approaches there is no shared data?

Submit

102. What is an Operating System? 

Submit

103. Using which expression(s) we can write the result of and expression to variable?

Submit

104. We can group a sequence of characters using open and close brackets

Submit

105. Choose the correct answer for the following definition "When one process is inside a critical section of entering that section"

Submit

106. Match chain names to their definitions

Submit

107. What is the alternative of 165 permission?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (107)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Linux developed by 
What are the numeric equivalents of the alphabetic permisson bits?
Which command would you use to set full permission for the owner and...
What is the alternative of 361 permission?
How can we list particular directories?
What is the alternative of 421 permission?
What are the permission types a UNIX file can be assigned 
How many categories of Linux distributions are there?
How can we list directories with hidden files?
How many built-in-rules do iptables have?
What is the first program that is executed after system boot up?
Which of these funtions has security risks?
What is the number equivalent of r-x--x--x
What is the number equivalent of r--rwxrw- permission
We can use both gzip -d and gunzip to decompress file 
What will you write in order to check whether the directory with name...
Enter the name of file that contains the user accoutn information for...
Which utility is used to modify file /etc/sudoers?
Choose the equivalent of @yearly special word
What will be the output of the following program is we run it as...
What is the alternative of 512 permission?
How can you list all available signals?
The user and group number of root is 0
Crontab is used to schedule commands to be executed only once
Which table used to alter packets that create a new...
Select an(the) example(s) of free software
Input the number equivalent of rw-r-x--x permission
What you should write in order to get silent promt from user? Format:...
We use OR operation if we want to perform the action if one of several...
? By default, a regular expression is case sensitive 
What you should write in order to edit the list of cronjobs?
Which file contains passwords for your groups?
What will the output of following script if we run like: ./greet.sh...
Which of the following belongs to commercial business distribution...
When using command line arguments, what does $$ return?
What is the umask for the definitions below?- read, execute for owner-...
What is equivalent of -wxr-x-wx permission
What is PID of init process?
Choose the correct format of /etc/passwd file
We can use both chown and chgrp to change the group ownership
How many approaches of mutex implementation are there?
Which signal is a program termination signal (kill will send this by...
In concurrency, sharing global resources safety is difficult
What will be the output if we will run the following script: ./quiz.sh...
When using command line arguments, what does $0 return?
What is the alternative of 543 permission?
Which table is the default table for handling network packets?
Which table is used for specific types of packet alteration
? How can we make regular expression case insensitive?
When using command line arguments, what does $@ return? 
Which of the following distribution designed for advanced Linux users?
Which expression prints out the result of an expression?
When using command line arguments, what does $0 return?
How can you add read and execute permission to owner for...
Choose the correct format of /etc/gshadow file
In ACCEPT target the packet its handed over to the end application or...
What command is used to modify a file's owner?
Which permission belongs to 260 umask
Which signal is sent to a process when its controlling terminal is...
Select chains for filter table
What is a deadlock?
What option you should write, if you want to find all files?
Open source is free software, software that the licensee can use...
In concurrency optimal allocation of resources is difficult
We should use chmod to set permission for newly created...
Which chain applies to network packets that are targeted for the host?
What you should write in order to get list of cronjobs?
If we want the variable to be available to the other scripts, which...
Which chain applies to locally-generated network packets?
In which file the default parameters for new user are stored?
Match following signals with their definitions. 
The parent process of all process in Linux called root
One account has elevated privileges to issue any command, access any...
There are 2 policies of deadlock prevention
Select chains for mangle table
/etc/passwd contains password related information for accounts
Select the type(s) of OS
Multiple processes on a system with a single processor? 
Which line executes the script chech_status.sh on 10th June 08:30 AM
Choose the correct answer for the following definition: "No...
Mint is one of the original Linux distributions sets, popular with...
Foreground processes doesn't expect user input
Choose the correct definition for daemons
Choose the correct answer for the following definition "A closed...
Which of the following belong(s) to system level interface
Match table names with their definitions
REJECT target works like the DROP target, but doesn't return an...
Choose correct answer for following definition "A closed chain of...
Which permission belongs to 162 umask?
What will be the output if we will run script: ./quiz.sh 200Filename:...
Match the following signals with their definitions
When using expr we need to enclose the expression in quotes
Which permission belongs to 452 umask?
Which of the following belong to user benefits?
Which of the following belongs to application benefits?
Choose the correct approach for the following definition...
Select chains for NAT table
What are the processes that are initialized and controlled through a...
Match chain names to their definition
What are the levels of access control on UNIX systems?
In which of the following approaches there is no shared data?
What is an Operating System? 
Using which expression(s) we can write the result of and expression to...
We can group a sequence of characters using open and close brackets
Choose the correct answer for the following definition "When one...
Match chain names to their definitions
What is the alternative of 165 permission?
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!