Linux Essentials Final Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tomdedude23
T
Tomdedude23
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,561
| Attempts: 1,561 | Questions: 72
Please wait...
Question 1 / 72
0 %
0/100
Score 0/100
1. Which of the following are valid CPU types for intel-based platforms? (choose two)

Explanation

The valid CPU types for Intel-based platforms are 64 bit and 32 bit. These refer to the number of bits that the processor can handle at a time. A 64-bit processor can handle larger amounts of data and perform more complex calculations compared to a 32-bit processor. Intel-based platforms support both of these CPU types, allowing for a wide range of applications and software compatibility.

Submit
Please wait...
About This Quiz
Linux Essentials Final Exam - Quiz

The 'Linux Essentials Final Exam' assesses key knowledge areas of the Linux operating system, including kernel functions, Unix and Linux distinctions, programming languages used, and command line utilities. It provides a comprehensive evaluation of a learner's understanding of fundamental Linux concepts.

2. Select all the applications that provide access to the Command Line Interface (CLI)? (Choose two)  

Explanation

The Virtual Terminal and Terminal window are the correct answers because they both provide access to the Command Line Interface (CLI). The Virtual Terminal is a feature in Linux operating systems that allows users to access the CLI directly. The Terminal window is a similar feature in macOS and Linux that provides a command line interface for executing commands and running scripts. Firefox and Opera are web browsers and do not provide access to the CLI.

Submit
3. 64 bit platforms can acess more memory than 32 bit platforms

Explanation

This statement is true because 64-bit platforms have a larger address space compared to 32-bit platforms. In a 32-bit platform, the memory address is limited to 32 bits, allowing access to a maximum of 4GB of memory. On the other hand, a 64-bit platform has a 64-bit memory address, which allows for a much larger address space, theoretically up to 18.4 million TB of memory. Therefore, 64-bit platforms can indeed access more memory than 32-bit platforms.

Submit
4. One way to install new software on a Linux system is to use a package management system

Explanation

On a Linux system, one way to install new software is by using a package management system. This system allows users to easily search for, download, and install software packages from official repositories. It ensures that the software is compatible with the Linux distribution and handles dependencies automatically. This method is convenient and efficient as it simplifies the installation process and helps in managing software updates and removals.

Submit
5. A network packet contains... (choose two)

Explanation

A network packet contains the IP address of the destination machine and the IP address of the source machine. These two pieces of information are crucial for the packet to be properly routed and delivered to the intended recipient. The IP address of the destination machine helps the network infrastructure determine where the packet needs to be sent, while the IP address of the source machine allows the recipient to send a response back to the correct sender.

Submit
6. When you execute the dmesg command, the system displays messages that are generated by the kernel.

Explanation

The explanation for the given correct answer is that when the dmesg command is executed, it displays messages that are generated by the kernel. This means that the system will show any kernel-related messages or logs when the dmesg command is run. Therefore, the statement "True" is the correct answer as it accurately reflects the functionality of the dmesg command.

Submit
7. What option for the ls command will display all files, including hidden files?

Explanation

The option "-a" for the ls command is used to display all files, including hidden files. Hidden files in Unix-like operating systems are files that start with a dot (.) and are typically not shown in directory listings. By using the "-a" option, all files, including these hidden files, will be displayed in the output of the ls command.

Submit
8. Each user belongs to at least one group. True or False?

Explanation

This statement is true because it states that each user belongs to at least one group. This means that there are no users who do not belong to any group.

Submit
9. The chown command can be used to change the owner and group of a file. True or False?

Explanation

The chown command is a command-line utility in Unix-like operating systems that is used to change the owner and group of a file. By using this command, the user can modify the ownership and group of a file or directory to another user or group. Therefore, the given statement is true.

Submit
10. Hidden files are files that begin with what character?

Explanation

Hidden files are files that begin with a period (.) in their file name. This is a common convention in many operating systems, such as Unix and Unix-like systems, to indicate that a file is hidden and should not be displayed in normal file listings. The use of a period as the first character in a file name is a way to hide files from casual users and prevent accidental modification or deletion.

Submit
11. Only servers have hostnames.

Explanation

The statement "Only servers have hostnames" is incorrect. Hostnames are used to identify any device connected to a network, not just servers. Devices such as computers, laptops, smartphones, printers, and even IoT devices can have hostnames assigned to them. Therefore, the correct answer is False.

Submit
12. Which are appropriate editors for writing shell script? (choose two)

Explanation

The appropriate editors for writing shell script are nano and vi. Nano is a simple and user-friendly text editor that is commonly used for editing files in the terminal. Vi, on the other hand, is a powerful and versatile text editor that is widely used by experienced users. Both editors provide the necessary features and functionality for writing and editing shell scripts effectively. LibrOffice Writer, Firefox, and /bin/bash are not appropriate editors for writing shell scripts as they are not specifically designed for this purpose.

Submit
13. Which environment variable contains a list of directories that is searched for commands to execute?

Explanation

The PATH environment variable contains a list of directories that is searched for commands to execute. When a command is entered in the terminal, the system looks for the executable file in the directories listed in the PATH variable. If the command is found in one of the directories, it can be executed directly. This allows users to run commands from anywhere in the system without having to specify the full path to the executable file.

Submit
14. The /var directory has files that change over time. True or False?

Explanation

The /var directory in a computer system typically contains files that are subject to change over time. This directory is often used to store variable data files, such as log files, temporary files, and spool files. These files are constantly being updated or modified, reflecting the dynamic nature of the system's operations. Therefore, it can be concluded that the statement "The /var directory has files that change over time" is true.

Submit
15. The top-level directory on a Linux system is represented as:

Explanation

The top-level directory on a Linux system is represented as "/". This is because the forward slash (/) is used as the root directory in Linux. The root directory is the starting point for the file system hierarchy and contains all other directories and files in the system. The other options mentioned (/root, /home, C:) are not the top-level directory, but rather specific directories within the file system.

Submit
16. If you wanted to set up a blog, which software would be most helpful?

Explanation

WordPress would be the most helpful software for setting up a blog. WordPress is a popular content management system (CMS) specifically designed for creating and managing blogs. It provides an easy-to-use interface, a wide range of customizable themes and plugins, and extensive documentation and support. With WordPress, users can easily create and publish blog posts, manage media files, customize the appearance of their blog, and interact with readers through comments and social media integration. It is a widely used and trusted platform for bloggers of all levels of experience.

Submit
17. The echo command:

Explanation

The echo command is used to output text to the console. It allows the user to display messages or variables on the screen during the execution of a script or command. This can be useful for providing feedback or displaying information to the user.

Submit
18. If you wanted to create and print an invoice, which software could you use?

Explanation

LibreOffice is a software suite that includes various applications, such as Writer, Calc, and Impress. It provides a wide range of tools for creating and editing documents, spreadsheets, and presentations. One of the applications within LibreOffice is LibreOffice Writer, which can be used to create and print an invoice. It offers features like templates, formatting options, and the ability to insert tables and images, making it suitable for creating professional-looking invoices. Therefore, LibreOffice is the most appropriate software choice for creating and printing an invoice.

Submit
19. Which of the following are traits of a multiuser operating system? (Choose three)

Explanation

A multiuser operating system allows multiple users to access and use the system simultaneously with their unique accounts. This means that many users can log in at the same time, each with their own credentials. In such a system, resources like CPU, memory, and storage are shared between users, allowing them to perform tasks and run applications concurrently. Additionally, a multiuser operating system provides mechanisms for users to protect their information from other users, ensuring privacy and security.

Submit
20. Which of the following would be considered a host?

Explanation

A printer attached to the network via an IP address would be considered a host because it is a device connected to the network that can send and receive data. It has its own unique IP address, allowing it to communicate with other devices on the network.

Submit
21. A successful command will print output to STDOUT True or False?

Explanation

A successful command will print output to STDOUT. This means that when a command is executed successfully, it will display the desired output on the standard output stream. Therefore, the statement "A successful command will print output to STDOUT" is true.

Submit
22. Is the following path absolute or relative? Sysadmin/Documents

Explanation

The given path "Sysadmin/Documents" is a relative path. A relative path is a path that is relative to the current working directory or another given starting point. In this case, the path is relative to the current working directory, which means that it specifies the location of the "Documents" folder within the "Sysadmin" directory, relative to the current location of the user or program.

Submit
23. A service is...

Explanation

A service is a feature provided by one computer to another. This means that one computer offers a specific functionality or capability that can be accessed and utilized by another computer. It is not a file containing configuration information, another name for a computer's hostname, or like an IP address.

Submit
24. Which user can view the /etc/shadow file?

Explanation

The root user is the correct answer because the /etc/shadow file is a sensitive file that contains encrypted password hashes for user accounts. Only the root user, who has administrative privileges, can access and view this file. Other users, including members of the password group, do not have the necessary permissions to view the /etc/shadow file.

Submit
25. Is the following path absolute or relative? /etc/ppp

Explanation

The given path "/etc/ppp" is an absolute path because it starts with a forward slash ("/") which indicates the root directory. Absolute paths provide the complete and exact location of a file or directory in the file system, regardless of the current working directory.

Submit
26. A server is likely to be running a graphical mode. True or False?

Explanation

A server is typically designed to operate in a headless mode, without a graphical user interface (GUI). This is because servers are usually managed remotely and do not require a GUI for their primary functions. Instead, servers are often operated through command-line interfaces or accessed through remote management tools. Therefore, it is unlikely for a server to be running in a graphical mode.

Submit
27. Linux is written in:

Explanation

Linux is written in C because C is a low-level programming language that provides direct access to memory and hardware, making it suitable for developing an operating system like Linux. C is known for its efficiency, speed, and ability to handle system-level tasks. Additionally, C has a large community and extensive libraries that support Linux development.

Submit
28. UIDs 1-500 are usually reserved for what kind of users?

Explanation

UIDs 1-500 are typically reserved for system accounts, such as server processes. These accounts are used by the operating system to execute various tasks and manage system resources. They are not associated with log-in users or remote log-in accounts, which have different UID ranges. Group accounts also have their own separate range of UIDs and are not included in the 1-500 range.

Submit
29. Which of the following are examples of desktop software? (Choose Two)

Explanation

A web browser and a music player are examples of desktop software. A web browser is a software application used to access and view websites, while a music player is a software program used to play audio files on a computer. Both of these applications are typically installed and run on a desktop computer rather than being accessed through a web server or shared over a network like a file share.

Submit
30. Which of the following is true about graphical mode? (Choose three)

Explanation

In graphical mode, users are provided with menus and tools to assist them in finding what they are looking for. This mode is accessed by logging into a graphical display, and after logging in, users are provided with a desktop.

Submit
31. Which of the following commands sets "other" permissions on file to r-x?

Explanation

The correct answer is "chmod 775 file". In Linux, the chmod command is used to change the permissions of a file or directory. The first digit represents the owner's permissions, the second digit represents the group's permissions, and the third digit represents the permissions for others. The number "7" represents read, write, and execute permissions, while the number "5" represents read and execute permissions. Therefore, "chmod 775 file" sets the owner and group permissions to read, write, and execute, and the other permissions to read and execute.

Submit
32. Which of the following is provided by a graphical interface that isn't normally provided to a non graphical interface? (Choose four)

Explanation

A graphical interface provides a desktop, which is a visual representation of the computer screen that allows users to organize and access files and applications. It also provides windows, which are individual frames that contain the content of specific applications or files. Popups are small windows that appear temporarily on top of the main window, providing additional information or options. Menus are lists of options that appear when a user clicks on a specific area, providing a way to access various functions or commands. These features are not typically provided in a non-graphical interface, which relies on text-based commands and lacks visual elements.

Submit
33. Error messages generated by commands are sent where by default?

Explanation

When error messages are generated by commands, they are sent to the STDERR stream by default. STDERR is a standard stream used for error output, separate from the STDOUT stream which is used for regular output. This separation allows for easier identification and handling of errors. Log files are used to store logs and not specifically for error messages. STDIN is used for input, not output.

Submit
34. A file begins with #!/bin/csh. This means:

Explanation

The correct answer is "Running the script will invoke /bin/csh to interpret the rest of the file." This is because the #!/bin/csh at the beginning of the file is known as a shebang or hashbang, and it specifies the interpreter that should be used to execute the script. In this case, it indicates that the script should be run using the C Shell (/bin/csh).

Submit
35. The Samba application is a:

Explanation

The Samba application is a file server. Samba is an open-source software suite that enables file and print services for Windows clients in a Linux/UNIX environment. It allows Windows clients to access files and printers on the server as if they were local resources. Samba implements the SMB/CIFS network protocol, which is used for file sharing and resource discovery on Windows networks. Therefore, Samba primarily functions as a file server, facilitating file sharing and storage between Windows and Linux/UNIX systems.

Submit
36. A pair of single quotes will prevent the shell from interpreting any metacharacter. True or False?

Explanation

A pair of single quotes will prevent the shell from interpreting any metacharacter. This means that any special characters or symbols within the single quotes will be treated as literal characters and not as commands or instructions by the shell. Therefore, the given statement is true.

Submit
37. Which of the following commands will direct error messages to the file, error.log? (choose one)

Explanation

The correct answer is "ls /root 2> error.log". This command uses the "2>" operator to redirect error messages to the file "error.log". The "2" represents the file descriptor for standard error, and the ">" symbol indicates that the output should be redirected to a file. Therefore, any error messages generated by the "ls /root" command will be saved in the "error.log" file.

Submit
38. Which command will display the UID, GID and grouops you current user belongs to?

Explanation

The command "id" is used to display the UID (User ID), GID (Group ID), and the groups that the current user belongs to. This command provides information about the user's identity and group memberships.

Submit
39. A pipe allows you to...

Explanation

A pipe allows you to redirect the output of one command and use it as the input for another command. This is useful when you want to perform a series of operations on the output of a command without saving it to a file first. By using a pipe, you can streamline your workflow and avoid unnecessary intermediate steps.

Submit
40. Channel 2 is:

Explanation

Channel 2 refers to STDERR, which stands for Standard Error. STDERR is a standard output stream that is used to display error messages and diagnostics from a program. It is separate from STDOUT (Standard Output), which is used for normal program output. By redirecting STDERR, error messages can be separated from regular output, allowing for better error handling and debugging.

Submit
41. Which command will display the users that are currently logged in to the system?

Explanation

The "who" command is used to display the users that are currently logged in to the system. It provides information such as the username, terminal, login time, and remote host. This command is helpful for system administrators to monitor user activity and manage resources effectively.

Submit
42. Only one set (user, group, other) of permission can be changed at once using the symbolic method.

Explanation

The given statement is false. In the symbolic method of changing permissions, it is possible to change multiple sets of permissions simultaneously. Each set (user, group, other) can be modified independently using symbols such as +, -, or =, allowing for the modification of multiple sets at once. Therefore, the statement that only one set of permission can be changed at once using the symbolic method is incorrect.

Submit
43. The command man -k is the same as the command apropos. True or false?

Explanation

The statement is true because both the "man -k" command and the "apropos" command serve the same purpose, which is to search for commands or keywords in the system's manual pages. They provide a list of relevant manual pages that contain the searched keyword or command, allowing users to find the appropriate documentation for their needs.

Submit
44. The /tmp directory is a temporary directory and will not exist on a system at all times. True or False?

Explanation

The statement is false. The /tmp directory is a standard directory in most Unix-like operating systems, including Linux. It is used for temporary storage and is typically available on a system at all times.

Submit
45. The "sticky bit" permission...

Explanation

The "sticky bit" permission prevents others from removing files they don't own from a common directory. This means that even if a user has write permissions in the directory, they cannot delete or remove files owned by other users. The sticky bit is commonly used for directories that are shared among multiple users, such as the /tmp directory, to ensure that files cannot be accidentally or maliciously deleted by unauthorized users.

Submit
46. Source code refers to:

Explanation

Source code refers to a human readable version of computer software. It is the original version of a program that is written in a programming language and can be understood by programmers. It is not the version that the computer runs on the CPU, the license that dictates how you may use and share the software, or the interface that software uses to talk to the kernel.

Submit
47. Most of nano's commands take the form of:

Explanation

The correct answer is "Control and another character" because in nano, most commands are executed by pressing the Control key along with another character on the keyboard. This combination allows users to perform various actions such as saving the file, copying and pasting text, searching for specific words, and many more. By using the Control key in combination with another character, users can navigate and manipulate the text efficiently within the nano text editor.

Submit
48. What does this shell cript do? FOO=/tmp/foo if [ ! –d $FOO ]; then mkdir $FOO fi

Explanation

The given shell script checks if the directory "/tmp/foo" does not exist. If it does not exist, the script creates the directory. Therefore, the correct answer is "Creates /tmp/foo if it does not exist".

Submit
49. Which files contain user account information? (choose two)

Explanation

The correct answer is /etc/passwd and /etc/shadow. The /etc/passwd file contains basic user account information such as username, user ID, home directory, and login shell. The /etc/shadow file, on the other hand, stores the encrypted passwords for user accounts. These two files are commonly used in Unix-based systems to manage user accounts and authentication. The /etc/group file, mentioned as an option in the question, contains information about system groups and their members, but it does not specifically contain user account information.

Submit
50. Which of the following commands will set the "sticky bit" on /shared?

Explanation

The correct answer is "chmod 1777 /shared". The sticky bit is a permission that can be set on a directory. When the sticky bit is set on a directory, only the owner of a file can delete or rename it within that directory, even if other users have write permissions on the directory. The command "chmod 1777 /shared" sets the sticky bit on the /shared directory by adding the value 1 to the leftmost digit of the permissions, which represents the sticky bit.

Submit
51. What does the acronym RPM mean?

Explanation

RPM stands for RPM Package Management. RPM is a package management system used in many Linux distributions. It is responsible for managing the installation, upgrading, and removal of software packages on a system. RPM Package Management allows users to easily install, update, and remove software packages using the RPM command-line tool or graphical package managers.

Submit
52. Select the command that can report the location of a command:

Explanation

The "which" command is used to report the location of a command in the system. It helps in identifying the exact path of the command's executable file. By using the "which" command, users can determine which version of a command will be executed when it is invoked. This command is particularly useful in cases where multiple versions of a command are installed on the system.

Submit
53. If a user is deleted, the files and directories that the user owned....

Explanation

When a user is deleted, the files and directories that the user owned will still exist. However, the ownership of these files and directories will be changed to a unique identifier (UID), which is a numeric value used to represent the user. The user name associated with the UID will no longer be displayed, but the UID itself will be shown as the owner of the files and directories.

Submit
54. Unix is: (Choose two)

Explanation

Unix is an operating system that was developed in the 1960s and is still widely used today. It is known for its stability, security, and scalability. Additionally, Unix is also a trademark, indicating that it is a specific implementation of the operating system. However, Unix is not a type of hardware, a distribution of Linux, or a text editor.

Submit
55. Which of the following options for the useradd command allows root to specify the UID to be associated with the account?

Explanation

The option "-u" for the useradd command allows root to specify the UID (User ID) to be associated with the account. This option is used to assign a specific numerical value to identify the user. By using this option, root can have control over the UID assigned to the account, ensuring it meets any specific requirements or preferences.

Submit
56. Compressing on a file works by:

Explanation

Compressing a file involves removing redundant information. Redundant information refers to data that is repetitive or unnecessary for the file's intended purpose. By eliminating this redundant information, the file size is reduced, making it easier to store, transmit, or process. This process can be achieved through various compression algorithms that identify and remove patterns, repetitions, or unused data within the file, resulting in a more efficient representation of the original data.

Submit
57. One of the jobs of the kernel is to:

Explanation

The kernel is responsible for managing the system's resources, such as memory, CPU, and input/output devices. It allocates and deallocates resources to different processes, ensuring efficient utilization and preventing conflicts. This includes managing memory allocation, scheduling processes, handling interrupts, and controlling device drivers. Therefore, managing the system's resources is one of the primary tasks of the kernel.

Submit
58. The directory where additional documentation for software packages most likely can be found is:

Explanation

The correct answer is /usr/share/doc. This directory is commonly used to store additional documentation for software packages in many Linux distributions. It is a standard location where users can find documentation files, such as manuals, guides, and README files, related to installed software packages.

Submit
59. In graphical mode, you can get to a shell by running which applications? (Choose two)

Explanation

In graphical mode, the user can access a shell by running the "terminal" and "xterm" applications. These applications provide a command-line interface where users can execute commands and interact with the system. "Guiterm," "gbash," and "xconsole" are not valid applications for accessing a shell in graphical mode.

Submit
60. The whatis command is the same as man -w.

Explanation

The statement is true because the "whatis" command in a Unix-like operating system is used to display a brief description of a command or function. Similarly, the "man -w" command is used to display the location of the manual page for a command or function. Both commands serve a similar purpose of providing information about commands or functions in a Unix-like operating system.

Submit
61. Which of the following are methods for setting permissions using the chmod command? (Choose two)

Explanation

The chmod command is used to set permissions in Unix-like operating systems. One method for setting permissions is using octal notation, where each digit represents the permissions for the owner, group, and others. Another method is using symbolic notation, where specific permissions are assigned using letters such as "u" for the owner, "g" for the group, and "o" for others, along with symbols like "+" for adding permissions and "-" for removing permissions. Both octal and symbolic methods can be used with the chmod command to set permissions.

Submit
62. What is the standard option to provide a command line program to view its documentation?

Explanation

The standard option to provide a command line program to view its documentation is "-help". This option is commonly used in command line interfaces to display a brief summary of the available commands and their usage. By using the "-help" option, users can quickly access the documentation and get information on how to use the program effectively.

Submit
63. Which of the following options for the useradd command allows root to specify supplementary groups the user will be a member of?

Explanation

The option "-G" for the useradd command allows root to specify supplementary groups that the user will be a member of. This option is used to add the user to additional groups apart from the default group. By using this option, root can assign the user to multiple groups, granting them access and permissions associated with those groups.

Submit
64. In general, for which of the following would you want to use lossless compression?

Explanation

Lossless compression is preferred for a log file because it ensures that no data is lost during the compression process. Log files contain important information that needs to be preserved accurately, such as system events, errors, and user activities. By using lossless compression, the log file can be reduced in size without sacrificing any details or compromising the integrity of the data. This is crucial for analyzing and troubleshooting purposes, where every piece of information in the log file is valuable.

Submit
65. Which of the following pieces of software deal with file sharing? (Choose three)

Explanation

NFS, Netatalk, and Samba are all pieces of software that deal with file sharing. NFS (Network File System) is a distributed file system protocol that allows a user on a client computer to access files over a network as if they were on their own local computer. Netatalk is an open-source software suite that enables file sharing between Macintosh computers and Unix/Linux systems. Samba is a free software implementation of the SMB/CIFS networking protocol, which allows file and print sharing between Windows, Unix, and Linux systems.

Submit
66. Lossy compression: (choose three)

Explanation

Lossy compression is a technique that sacrifices some quality in order to achieve better compression than lossless methods. It is often used with images because the human eye is less sensitive to certain types of quality loss in visual data. However, it is not typically used with documents, as it may result in the loss of important information. When decompressed, the file may not be identical to the original, as some data has been permanently discarded during the compression process.

Submit
67. Which of the following are package management commands for distributions with software distributed in files ending in .deb? (Choose three)

Explanation

The correct answer is apt-get, dpkg, and aptitude. These three commands are package management commands specifically used for distributions with software distributed in files ending in .deb. rpm is not a package management command for .deb files, it is used for distributions with software distributed in files ending in .rpm.

Submit
68. Which of the following commands set "other" permissions on file to r-x?

Explanation

The correct answer is "chmod o=rx file". This command sets the "other" permissions on the file to r-x. The "o" represents the "other" user category, "=" sets the permissions to the specified value, and "rx" means read and execute permissions are granted. Therefore, this command sets the "other" permissions to read and execute, while removing any other permissions.

Submit
69. You type gzip myfile.tar. What happens? (choose two)

Explanation

not-available-via-ai

Submit
70. The "setuid" permission...

Explanation

The "setuid" permission allows a command to be run as the file owner. This means that when a user executes a program with the "setuid" permission, the program will run with the same privileges as the owner of the file, rather than the privileges of the user executing it. This is commonly used for system programs that need to perform certain actions with elevated privileges, such as changing system settings or accessing restricted files. By allowing the command to run as the file owner, it ensures that the program has the necessary permissions to perform its intended tasks.

Submit
71. Which of the following commands is used to list the contents of a directory in Linux?

Explanation

The ls command is a fundamental Linux command used to display the files and directories within a specified directory. It provides various options for customizing the output, such as listing files in long format (ls -l), showing hidden files (ls -a), or sorting files by modification time (ls -t).

Submit
72. On a system that does not use UPG, the useradd command will also create a user group. For example, user bob, group bob. True or false?

Explanation

On a system that does not use UPG, the useradd command will not create a user group. The useradd command is used to create a new user account, but it does not automatically create a corresponding user group. To create a user group, a separate command like groupadd needs to be used.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 15, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 15, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 22, 2018
    Quiz Created by
    Tomdedude23
Cancel
  • All
    All (72)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following are valid CPU types for intel-based platforms? ...
Select all the applications that provide access to the Command Line...
64 bit platforms can acess more memory than 32 bit platforms
One way to install new software on a Linux system is to use a package...
A network packet contains... (choose two)
When you execute the dmesg command, the system displays messages that...
What option for the ls command will display all files, including...
Each user belongs to at least one group. True or False?
The chown command can be used to change the owner and group of a...
Hidden files are files that begin with what character?
Only servers have hostnames.
Which are appropriate editors for writing shell script? (choose two)
Which environment variable contains a list of directories that is...
The /var directory has files that change over time. True or False?
The top-level directory on a Linux system is represented as:
If you wanted to set up a blog, which software would be most helpful?
The echo command:
If you wanted to create and print an invoice, which software could you...
Which of the following are traits of a multiuser operating system? ...
Which of the following would be considered a host?
A successful command will print output to STDOUT True or False?
Is the following path absolute or relative? Sysadmin/Documents
A service is...
Which user can view the /etc/shadow file?
Is the following path absolute or relative? /etc/ppp
A server is likely to be running a graphical mode. True or False?
Linux is written in:
UIDs 1-500 are usually reserved for what kind of users?
Which of the following are examples of desktop software? (Choose Two)
Which of the following is true about graphical mode? (Choose three)
Which of the following commands sets "other" permissions on...
Which of the following is provided by a graphical interface that...
Error messages generated by commands are sent where by default?
A file begins with #!/bin/csh. This means:
The Samba application is a:
A pair of single quotes will prevent the shell from interpreting any...
Which of the following commands will direct error messages to the...
Which command will display the UID, GID and grouops you current user...
A pipe allows you to...
Channel 2 is:
Which command will display the users that are currently logged in to...
Only one set (user, group, other) of permission can be changed at once...
The command man -k is the same as the command apropos. True or false?
The /tmp directory is a temporary directory and will not exist on a...
The "sticky bit" permission...
Source code refers to:
Most of nano's commands take the form of:
What does this shell cript do? ...
Which files contain user account information? (choose two)
Which of the following commands will set the "sticky bit" on...
What does the acronym RPM mean?
Select the command that can report the location of a command:
If a user is deleted, the files and directories that the user...
Unix is: (Choose two)
Which of the following options for the useradd command allows root to...
Compressing on a file works by:
One of the jobs of the kernel is to:
The directory where additional documentation for software packages...
In graphical mode, you can get to a shell by running which...
The whatis command is the same as man -w.
Which of the following are methods for setting permissions using the...
What is the standard option to provide a command line program to view...
Which of the following options for the useradd command allows root to...
In general, for which of the following would you want to use lossless...
Which of the following pieces of software deal with file sharing? ...
Lossy compression: (choose three)
Which of the following are package management commands for...
Which of the following commands set "other" permissions on...
You type gzip myfile.tar. What happens? (choose two)
The "setuid" permission...
Which of the following commands is used to list the contents of a...
On a system that does not use UPG, the useradd command will also...
Alert!

Advertisement