Test Your Technical Skills Here

40 Questions | Total Attempts: 34

Settings
Please wait...
Test Your Technical Skills Here

Questions and Answers
  • 1. 
    To go to the end of an info page, press:
    • A. 

      END

    • B. 

      N

    • C. 

      N

    • D. 

      ]

  • 2. 
    To go to the next match of a search on a man page, press:
    • A. 

      ]

    • B. 

      (n)

    • C. 

      N

    • D. 

      }

  • 3. 
    When interpreting the SYNOPSIS of a command found on a man page, the “|” means:
    • A. 

      The items it separates can be used together

    • B. 

      The items it separates cannot be used together

  • 4. 
    After performing a search, you can use the ____ key to return to a previously found match:
    • A. 

      (n)

    • B. 

      N

    • C. 

      D

    • D. 

      U

  • 5. 
    To move a page forward one at a time while viewing a man page, press the following:
    • A. 

      Spacebar

    • B. 

      M

    • C. 

      A

    • D. 

      Enter

  • 6. 
    The ls command without options or arguments…
    • A. 

      …lists the contents of the current directory.

    • B. 

      …prompts for a directory to list.

    • C. 

      …lists the contents of a user’s home directory.

    • D. 

      …generates an error as this command requires arguments.

  • 7. 
    Which option can be used with the rm command to prompt before deleting?
    • I
    • A. 

      -P

    • B. 

      A

    • C. 

      I

    • D. 

      -i

  • 8. 
    Which of the following commands can be used to rename a file?
    • A. 

      Name

    • B. 

      Rn

    • C. 

      Mv

    • D. 

      Cp

  • 9. 
    The touch command can be used to:(choose two)
    • A. 

      Update the time stamp of existing files

    • B. 

      Create new files

    • C. 

      Change a file’s name

    • D. 

      Change ownership of a file

  • 10. 
    You try to compress a file that is already compressed. Which of the following statements is true? 
      • A. 

        The file will not be compressed any further than it already was

      • B. 

        The file changed while you were compressing it

      • C. 

        The file will actually be uncompressed

      • D. 

        The compression algorithm needs to be set to the “currently compressed” mode for it to be compressed further

      • E. 

        The file will be deleted

    • 11. 
      Which of the following commands can be used to compress a file?(choose three)
      • A. 

        Bunzip2

      • B. 

        Zip

      • C. 

        Bzip2

      • D. 

        Cat

      • E. 

        Gzip

    • 12. 
      The three main modes of tar are:(choose three)
      • A. 

        Extract

      • B. 

        Copy

      • C. 

        Compress

      • D. 

        List

      • E. 

        Create

    • 13. 
      In the command tar –czf foo.tar.gz bar, what is the purpose of the f flag? 
        • A. 

          Tells tar to copy only files, and not directories

        • B. 

          Tells tar to read from the file that follows the flag

        • C. 

          Tells tar to print the name of each file as it is processed

        • D. 

          Specifies extra compression is to be used

        • E. 

          Tells tar to write to the file that follows the flag

      • 14. 
        Which two commands do the same thing?(choose two)
        • A. 

          Tar –xzf foo.tar.gz

        • B. 

          Tar –x foo | gzip

        • C. 

          Tar –c foo | gzip > foo.tar.gz

        • D. 

          Tar –tzf foo.tar.gz

        • E. 

          Tar –czf foo.tar.gz foo

      • 15. 
        Which option for the wc command will print the total number of words in a file? 
          • A. 

            -l

          • B. 

            -L

          • C. 

            -w

          • D. 

            -c

        • 16. 
          Which command can be used to print line numbers?
            • A. 

              Num

            • B. 

              Ln

            • C. 

              Nl

            • D. 

              Sort

          • 17. 
            The command echo “text” > file.txt will create file.txt if it does not already exist.
            • A. 

              True

            • B. 

              False

          • 18. 
            The command echo “text” > file.txt will not overwrite file.txt if it already exists.
            • A. 

              True

            • B. 

              False

          • 19. 
            The command echo “text” >> file.txt will not overwrite file.txt if it already exists.
            • A. 

              True

            • B. 

              False

          • 20. 
            Software is backward compatible if: 
              • A. 

                It still supports old file formats or applications

              • B. 

                If the next version still works the same way

              • C. 

                People still use old versions

              • D. 

                It works across Linux/Mac/Windows

              • E. 

                It can be upgraded without downtime

            • 21. 
              Apple’s OS X is:(choose three)
              • A. 

                Derived from Linux

              • B. 

                Only compatible with Apple hardware

              • C. 

                Able to natively run Windows binaries

              • D. 

                Derived from FreeBSD

              • E. 

                Certified as UNIX compatible

              • F. 

                Primarily used to manage network services

            • 22. 
              Microsoft Windows:(choose three)
              • A. 

                Has a short maintenance cycle

              • B. 

                Comes in desktop and server variants

              • C. 

                Has built in virtualization

              • D. 

                Has a new desktop version every year.

              • E. 

                Has a Linux compatibility mode

              • F. 

                Has powerful scripting capabilities

            • 23. 
              Other commercial Unixes:(choose two)
              • A. 

                Are almost obsolete

              • B. 

                Are tied to their vendor’s hardware

              • C. 

                Use completely different commands than Linux

              • D. 

                Are UNIX certified

              • E. 

                Do not run the GNU tools

            • 24. 
              When choosing a distribution of Linux, you should consider:(choose five)
              • A. 

                Which management tools are provided by the distribution

              • B. 

                Which distributions are supported by the software you need to run

              • C. 

                Popularity on social media.

              • D. 

                The maintenance cycle of the distribution

              • E. 

                If you need support on the distribution itself

              • F. 

                Whether or not the distribution is under active development

            • 25. 
              The difference between the GPL and LGPL licenses are: 
                • A. 

                  LGPL allows you to distribute the software in binary-only form

                • B. 

                  LGPL is shorter than GPL

                • C. 

                  LGPL allows linking to non GPLed software

                • D. 

                  LGPL applies to web service

                • E. 

                  LGPL was made by the OSI while GPL was made by the FSF

              • 26. 
                Permissive free software licenses:(choose three)
                • A. 

                  Can allow software to be used inside closed source software

                • B. 

                  Are not approved by the OSI

                • C. 

                  Are not approved by the FSF

                • D. 

                  Include the GPLv2 and BSD

                • E. 

                  Don’t have a copyleft provision

              • 27. 
                The Creative Commons version of Public Domain licensing is: 
                  • A. 

                    Attribution-NonCommercial-ShareAlike

                  • B. 

                    Attribution-NonCommercial

                  • C. 

                    NoAttribution-ShareAlike

                  • D. 

                    No Rights Reserved

                  • E. 

                    Attribution

                • 28. 
                  Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2? 
                    • A. 

                      There are no requirements

                    • B. 

                      You must make the source to your custom web interface available

                    • C. 

                      You must make your hardware designs available

                    • D. 

                      You must make the source to your kernel available

                    • E. 

                      You must ensure your custom kernel runs on a regular Intel machine

                  • 29. 
                    Participating in open source projects can improve your technical skills, even if it is not your day job.
                    • A. 

                      True

                    • B. 

                      False

                  • 30. 
                    What are tradeoffs of increasing the level of privacy you have in your web browser?(choose two)
                    • A. 

                      You may get viruses

                    • B. 

                      Sites may not work properly

                    • C. 

                      Websites may load slower

                    • D. 

                      Images won’t load properly

                    • E. 

                      You may have to explicitly permit some cookies to be saved

                  • 31. 
                    Which of the following is a tool that helps you anonymize your Internet browsing? 
                      • A. 

                        CookieCleaner

                      • B. 

                        Web proxy

                      • C. 

                        The onion router

                      • D. 

                        AnonFirefox

                      • E. 

                        Iptables

                    • 32. 
                      Social network “like” buttons can track your activity across the Internet.
                      • A. 

                        True

                      • B. 

                        False

                    • 33. 
                      Which of the following are properties of a strong password?(choose three)
                      • A. 

                        A mix of upper and lower case

                      • B. 

                        Long so that it can be reused on multiple sites

                      • C. 

                        Includes symbols

                      • D. 

                        At least 10 characters long

                      • E. 

                        Based on easy to remember items like birthdays

                    • 34. 
                      What can be done to prevent remote people from running programs on your computer?(choose two) 
                        • A. 

                          Don’t use wireless networks – only wired

                        • B. 

                          Use strong passwords on all user accounts

                        • C. 

                          Turn on a firewall

                        • D. 

                          Block third party cookies

                        • E. 

                          Block all cookies

                      • 35. 
                        The acronym CLI stands for: 
                          • A. 

                            Computer Link Interpreter

                          • B. 

                            Command Line Interpreter

                          • C. 

                            Computer Line Interface

                          • D. 

                            Command Line Interface

                        • 36. 
                          Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like –all. 
                            • A. 

                              LINUX

                            • B. 

                              Kernel

                            • C. 

                              GNU

                            • D. 

                              Shell

                          • 37. 
                            The acronym GNU stands for: 
                              • A. 

                                Gnu’s Not Unix

                              • B. 

                                Go Next Unit

                              • C. 

                                Gnu’s Nearly Unix

                              • D. 

                                Good News Unix

                            • 38. 
                              What one character treats the character that follows it as if it was surrounded by single quotes? 
                                • A. 

                                  /

                                • B. 

                                  %

                                • C. 

                                  Option 3

                                • D. 

                                  #

                              • 39. 
                                The main purpose of using glob characters is to be able to provide a command a list of filenames.​
                                • A. 

                                  True

                                • B. 

                                  False

                              • 40. 
                                The rm command can delete multiple files at once.
                                • A. 

                                  True

                                • B. 

                                  False