Test Your Technical Skills Here

40 Questions | Attempts: 53
Share
SettingsSettings
Please wait...
  • 1/40 Questions

    To go to the end of an info page, press:

    • END
    • N
    • N
    • ]
Please wait...
Test Your Technical Skills Here - Quiz

Quiz Preview

  • 2. 

    When interpreting the SYNOPSIS of a command found on a man page, the “|” means:

    • The items it separates can be used together

    • The items it separates cannot be used together

    Correct Answer
    A. The items it separates cannot be used together
  • 3. 

    To move a page forward one at a time while viewing a man page, press the following:

    • Spacebar

    • M

    • A

    • Enter

    Correct Answer
    A. Spacebar
  • 4. 

    Which of the following commands can be used to rename a file?

    • Name

    • Rn

    • Mv

    • Cp

    Correct Answer
    A. Mv
  • 5. 

    In the command tar –czf foo.tar.gz bar, what is the purpose of the f flag? 

      • Tells tar to copy only files, and not directories

      • Tells tar to read from the file that follows the flag

      • Tells tar to print the name of each file as it is processed

      • Specifies extra compression is to be used

      • Tells tar to write to the file that follows the flag

      Correct Answer
      A. Tells tar to write to the file that follows the flag
    • 6. 

      Which command can be used to print line numbers?

        • Num

        • Ln

        • Nl

        • Sort

        Correct Answer
        A. Nl
      • 7. 

        The command echo “text” > file.txt will create file.txt if it does not already exist.

        • True

        • False

        Correct Answer
        A. True
      • 8. 

        The command echo “text” > file.txt will not overwrite file.txt if it already exists.

        • True

        • False

        Correct Answer
        A. False
      • 9. 

        The command echo “text” >> file.txt will not overwrite file.txt if it already exists.

        • True

        • False

        Correct Answer
        A. True
      • 10. 

        Participating in open source projects can improve your technical skills, even if it is not your day job.

        • True

        • False

        Correct Answer
        A. True
      • 11. 

        Social network “like” buttons can track your activity across the Internet.

        • True

        • False

        Correct Answer
        A. True
      • 12. 

        The acronym CLI stands for: 

          • Computer Link Interpreter

          • Command Line Interpreter

          • Computer Line Interface

          • Command Line Interface

          Correct Answer
          A. Command Line Interface
        • 13. 

          The rm command can delete multiple files at once.

          • True

          • False

          Correct Answer
          A. True
        • 14. 

          To go to the next match of a search on a man page, press:

          • ]

          • (n)

          • N

          • }

          Correct Answer
          A. (n)
        • 15. 

          After performing a search, you can use the ____ key to return to a previously found match:

          • (n)

          • N

          • D

          • U

          Correct Answer
          A. N
        • 16. 

          The ls command without options or arguments…

          • …lists the contents of the current directory.

          • …prompts for a directory to list.

          • …lists the contents of a user’s home directory.

          • …generates an error as this command requires arguments.

          Correct Answer
          A. …lists the contents of the current directory.
        • 17. 

          Which option can be used with the rm command to prompt before deleting?
          • I

          • -P

          • A

          • I

          • -i

          Correct Answer
          A. -i
        • 18. 

          You try to compress a file that is already compressed. Which of the following statements is true? 

            • The file will not be compressed any further than it already was

            • The file changed while you were compressing it

            • The file will actually be uncompressed

            • The compression algorithm needs to be set to the “currently compressed” mode for it to be compressed further

            • The file will be deleted

            Correct Answer
            A. The file will not be compressed any further than it already was
          • 19. 

            Which option for the wc command will print the total number of words in a file? 

              • -l

              • -L

              • -w

              • -c

              Correct Answer
              A. -w
            • 20. 

              Software is backward compatible if: 

                • It still supports old file formats or applications

                • If the next version still works the same way

                • People still use old versions

                • It works across Linux/Mac/Windows

                • It can be upgraded without downtime

                Correct Answer
                A. It still supports old file formats or applications
              • 21. 

                The difference between the GPL and LGPL licenses are: 

                  • LGPL allows you to distribute the software in binary-only form

                  • LGPL is shorter than GPL

                  • LGPL allows linking to non GPLed software

                  • LGPL applies to web service

                  • LGPL was made by the OSI while GPL was made by the FSF

                  Correct Answer
                  A. LGPL allows linking to non GPLed software
                • 22. 

                  The Creative Commons version of Public Domain licensing is: 

                    • Attribution-NonCommercial-ShareAlike

                    • Attribution-NonCommercial

                    • NoAttribution-ShareAlike

                    • No Rights Reserved

                    • Attribution

                    Correct Answer
                    A. No Rights Reserved
                  • 23. 

                    Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2? 

                      • There are no requirements

                      • You must make the source to your custom web interface available

                      • You must make your hardware designs available

                      • You must make the source to your kernel available

                      • You must ensure your custom kernel runs on a regular Intel machine

                      Correct Answer
                      A. You must make the source to your kernel available
                    • 24. 

                      Which of the following is a tool that helps you anonymize your Internet browsing? 

                        • CookieCleaner

                        • Web proxy

                        • The onion router

                        • AnonFirefox

                        • Iptables

                        Correct Answer
                        A. The onion router
                      • 25. 

                        Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like –all. 

                          • LINUX

                          • Kernel

                          • GNU

                          • Shell

                          Correct Answer
                          A. GNU
                        • 26. 

                          The acronym GNU stands for: 

                            • Gnu’s Not Unix

                            • Go Next Unit

                            • Gnu’s Nearly Unix

                            • Good News Unix

                            Correct Answer
                            A. Gnu’s Not Unix
                          • 27. 

                            What one character treats the character that follows it as if it was surrounded by single quotes? 

                              • /

                              • %

                              • Option 3

                              • #

                              Correct Answer
                              A. /
                            • 28. 

                              The main purpose of using glob characters is to be able to provide a command a list of filenames.​

                              • True

                              • False

                              Correct Answer
                              A. True
                            • 29. 

                              The touch command can be used to:(choose two)

                              • Update the time stamp of existing files

                              • Create new files

                              • Change a file’s name

                              • Change ownership of a file

                              Correct Answer(s)
                              A. Update the time stamp of existing files
                              A. Create new files
                            • 30. 

                              Which of the following commands can be used to compress a file?(choose three)

                              • Bunzip2

                              • Zip

                              • Bzip2

                              • Cat

                              • Gzip

                              Correct Answer(s)
                              A. Zip
                              A. Bzip2
                              A. Gzip
                            • 31. 

                              The three main modes of tar are:(choose three)

                              • Extract

                              • Copy

                              • Compress

                              • List

                              • Create

                              Correct Answer(s)
                              A. Extract
                              A. List
                              A. Create
                            • 32. 

                              Which two commands do the same thing?(choose two)

                              • Tar –xzf foo.tar.gz

                              • Tar –x foo | gzip

                              • Tar –c foo | gzip > foo.tar.gz

                              • Tar –tzf foo.tar.gz

                              • Tar –czf foo.tar.gz foo

                              Correct Answer(s)
                              A. Tar –c foo | gzip > foo.tar.gz
                              A. Tar –czf foo.tar.gz foo
                            • 33. 

                              Apple’s OS X is:(choose three)

                              • Derived from Linux

                              • Only compatible with Apple hardware

                              • Able to natively run Windows binaries

                              • Derived from FreeBSD

                              • Certified as UNIX compatible

                              • Primarily used to manage network services

                              Correct Answer(s)
                              A. Only compatible with Apple hardware
                              A. Derived from FreeBSD
                              A. Certified as UNIX compatible
                            • 34. 

                              Microsoft Windows:(choose three)

                              • Has a short maintenance cycle

                              • Comes in desktop and server variants

                              • Has built in virtualization

                              • Has a new desktop version every year.

                              • Has a Linux compatibility mode

                              • Has powerful scripting capabilities

                              Correct Answer(s)
                              A. Comes in desktop and server variants
                              A. Has built in virtualization
                              A. Has powerful scripting capabilities
                            • 35. 

                              Other commercial Unixes:(choose two)

                              • Are almost obsolete

                              • Are tied to their vendor’s hardware

                              • Use completely different commands than Linux

                              • Are UNIX certified

                              • Do not run the GNU tools

                              Correct Answer(s)
                              A. Are tied to their vendor’s hardware
                              A. Are UNIX certified
                            • 36. 

                              When choosing a distribution of Linux, you should consider:(choose five)

                              • Which management tools are provided by the distribution

                              • Which distributions are supported by the software you need to run

                              • Popularity on social media.

                              • The maintenance cycle of the distribution

                              • If you need support on the distribution itself

                              • Whether or not the distribution is under active development

                              Correct Answer(s)
                              A. Which management tools are provided by the distribution
                              A. Which distributions are supported by the software you need to run
                              A. The maintenance cycle of the distribution
                              A. If you need support on the distribution itself
                              A. Whether or not the distribution is under active development
                            • 37. 

                              Permissive free software licenses:(choose three)

                              • Can allow software to be used inside closed source software

                              • Are not approved by the OSI

                              • Are not approved by the FSF

                              • Include the GPLv2 and BSD

                              • Don’t have a copyleft provision

                              Correct Answer(s)
                              A. Can allow software to be used inside closed source software
                              A. Are not approved by the FSF
                              A. Don’t have a copyleft provision
                            • 38. 

                              What are tradeoffs of increasing the level of privacy you have in your web browser?(choose two)

                              • You may get viruses

                              • Sites may not work properly

                              • Websites may load slower

                              • Images won’t load properly

                              • You may have to explicitly permit some cookies to be saved

                              Correct Answer(s)
                              A. Sites may not work properly
                              A. You may have to explicitly permit some cookies to be saved
                            • 39. 

                              Which of the following are properties of a strong password?(choose three)

                              • A mix of upper and lower case

                              • Long so that it can be reused on multiple sites

                              • Includes symbols

                              • At least 10 characters long

                              • Based on easy to remember items like birthdays

                              Correct Answer(s)
                              A. A mix of upper and lower case
                              A. Includes symbols
                              A. At least 10 characters long
                            • 40. 

                              What can be done to prevent remote people from running programs on your computer?(choose two) 

                                • Don’t use wireless networks – only wired

                                • Use strong passwords on all user accounts

                                • Turn on a firewall

                                • Block third party cookies

                                • Block all cookies

                                Correct Answer(s)
                                A. Use strong passwords on all user accounts
                                A. Turn on a firewall

                              Quiz Review Timeline (Updated): Mar 16, 2022 +

                              Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

                              • Current Version
                              • Mar 16, 2022
                                Quiz Edited by
                                ProProfs Editorial Team
                              • Oct 31, 2017
                                Quiz Created by
                                Stefke
                              Back to Top Back to top
                              Advertisement
                              ×

                              Wait!
                              Here's an interesting quiz for you.

                              We have other quizzes matching your interest.