Interesting Quiz On Basic Input/Output System

120 Questions | Total Attempts: 40

SettingsSettingsSettings
Please wait...
Input Output Quizzes & Trivia

This quiz will test your knowledge on Basic Input/Output System.


Questions and Answers
  • 1. 
    Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?
    • A. 

      /proc/keys

    • B. 

      /etc/inittab

    • C. 

      /proc/inittab

    • D. 

      /etc/reboot

    • E. 

      /etc/keys

  • 2. 
    During a system boot cycle, what program is executed after the BIOS completes its tasks?
    • A. 

      The init program

    • B. 

      The kernel

    • C. 

      The inetd program

    • D. 

      The bootloader

  • 3. 
    Which run levels should never be declared as the default run level when using SysV init?(Choose TWO correct answers.)
    • A. 

      1

    • B. 

      3

    • C. 

      5

    • D. 

      6

    • E. 

      0

  • 4. 
    Which of the following statements is correct when talking about /proc/?
    • A. 

      All changes to files in /proc/ are stored in /etc/proc.d/ and restored on reboot.

    • B. 

      All files within /proc/ are only readable by the root user.

    • C. 

      All files within /proc/ are read-only and their contents cannot be changed.

    • D. 

      All changes to files in /proc/ are immediately recognized by the kernel.

  • 5. 
    What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)
    • A. 

      Entries for all possible devices get created on boot even if those devices are not connected

    • B. 

      Additional rules for udev can be created by adding them to /etc/udev/rules.d/.

    • C. 

      When using udev, it is not possible to create block or character devices in /dev/ using mknod.

    • D. 

      The /dev/ directory is a filesystem of type tmpfs and is mounted by udev during system startup.

    • E. 

      The content of /dev/ is stored in /etc/udev/dev and is restored during system startup.

  • 6. 
    Which of the following information is stored within the BIOS? (Choose TWO correct answers.)
    • A. 

      Boot device order

    • B. 

      Linux kernel version

    • C. 

      Timezone

    • D. 

      Hardware configuration

    • E. 

      The system’s hostname

  • 7. 
    Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)
    • A. 

      Telinit 0

    • B. 

      Telinit 6

    • C. 

      Shutdown -r “rebooting”

    • D. 

      Shutdown -r now

    • E. 

      Shutdown -k now “rebooting”

  • 8. 
    Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)
    • A. 

      SysV init

    • B. 

      Startd

    • C. 

      Systemd

    • D. 

      Upstart

    • E. 

      SysInit

  • 9. 
    Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel?(Specify the file name only without any path.)
  • 10. 
    What information can the lspci command display about the system hardware? (Choose THREE correct answers.)
    • A. 

      PCI bus speed

    • B. 

      System battery type

    • C. 

      Device vendor identification

    • D. 

      Ethernet MAC address

    • E. 

      Device IRQ settings

  • 11. 
    Which of the following commands brings a system running SysV init into a state in which itis safe to perform maintenance tasks? (Choose TWO correct answers.)
    • A. 

      Shutdown -single now

    • B. 

      Runlevel 1

    • C. 

      Telinit 1

    • D. 

      Shutdown -R 1 now

    • E. 

      Init 1

  • 12. 
    What is the first program that is usually started, at boot time, by the Linux kernel when usingSysV init?
    • A. 

      /boot/init

    • B. 

      /lib/init.so

    • C. 

      /sbin/init

    • D. 

      /etc/rc.d/rcinit

    • E. 

      /proc/sys/kernel/init

  • 13. 
    Which command will display messages from the kernel that were output during the normalboot sequence?
  • 14. 
    Which of the following commands will write a message to the terminals of all logged inusers?
    • A. 

      Mesg

    • B. 

      Print

    • C. 

      Wall

    • D. 

      Yell

    • E. 

      Bcast

  • 15. 
    Which of the following kernel parameters instructs the kernel to suppress most bootmessages?
    • A. 

      Verbose=0

    • B. 

      Nomesg

    • C. 

      Silent

    • D. 

      Quiet

  • 16. 
    Which of the following options for the kernel’s command line changes the systemd boottarget to rescue.target instead of the default target?
    • A. 

      Systemd.target=rescue.target

    • B. 

      Systemd.runlevel=rescue.target

    • C. 

      Systemd.service=rescue.target

    • D. 

      Systemd.default=rescue.target

    • E. 

      Systemd.unit=rescue.target

  • 17. 
    After modifying GNU GRUB’s configuration file, which command must be run for thechanges to take effect?
    • A. 

      Kill -HUP $(pidof grub)

    • B. 

      Grub-install

    • C. 

      Grub

    • D. 

      No action is required

  • 18. 
    Which of the following commands is used to update the list of available packages whenusing dpkg based package management?
    • A. 

      Apt-get refresh

    • B. 

      Apt-cache upgrade

    • C. 

      Apt-get upgrade

    • D. 

      Apt-get update

    • E. 

      Apt-cache update

  • 19. 
    Which of the following commands lists the dependencies of a given dpkg package?
    • A. 

      Apt-cache depends-on package

    • B. 

      Apt-cache dependencies package

    • C. 

      Apt-cache depends package

    • D. 

      Apt-cache requires package

  • 20. 
    Which of the following options is used in a GRUB Legacy configuration file to define theamount of time that the GRUB menu will be shown to the user?
    • A. 

      Splash

    • B. 

      Timeout

    • C. 

      Hidemenu

    • D. 

      Showmenu

  • 21. 
    What can the Logical Volume Manager (LVM) be used for?(Choose THREE correct answers.)
    • A. 

      To create RAID 9 arrays.

    • B. 

      To dynamically change the size of logical volumes

    • C. 

      To encrypt logical volumes.

    • D. 

      To create snapshots.

    • E. 

      To dynamically create or delete logical volumes.

  • 22. 
    Which of the following commands updates the linker cache of shared libraries?
    • A. 

      Soconfig

    • B. 

      Ldconfig

    • C. 

      Mkldconfig

    • D. 

      Mkcache

    • E. 

      Lddconfig

  • 23. 
    Which of the following commands lists all currently installed packages when using RPMpackage management?
    • A. 

      Yum –query –all

    • B. 

      Yum –list –installed

    • C. 

      Rpm –query –all

    • D. 

      Rpm –list –installed

  • 24. 
    Which of the following commands can be used to download the RPM package kernel without installing it?
    • A. 

      Yumdownloader kernel

    • B. 

      Rpm –download –package kernel

    • C. 

      Yum download –no-install kernel

    • D. 

      Rpmdownload kernel

  • 25. 
    When using rpm –verify to check files created during the installation of RPM packages,which of the following information is taken into consideration? (Choose THREE correct answers.)
    • A. 

      GnuPG signatures

    • B. 

      Timestamps

    • C. 

      MD5 checksums

    • D. 

      Inodes

    • E. 

      File sizes

  • 26. 
    Which of the following is correct when talking about mount points?
    • A. 

      Files within a directory are deleted when the directory is used as a mount point.

    • B. 

      Directories need to have the SetUID flag set to be used as a mount point.

    • C. 

      Every existing directory can be used as a mount point.

    • D. 

      Only empty directories can be used as a mount point.

  • 27. 
    Which function key is used to start Safe Mode in Windows NT?
    • A. 

      F10

    • B. 

      F8

    • C. 

      F6

    • D. 

      Windows NT does not support Safe Mode

  • 28. 
    Which of the following environment variables overrides or extends the list of directoriesholding shared libraries?
    • A. 

      LD_LOAD_PATH

    • B. 

      LD_LIB_PATH

    • C. 

      LD_LIBRARY_PATH

    • D. 

      LD_SHARE_PATH

    • E. 

      LD_RUN_PATH

  • 29. 
    Which world-writable directory should be placed on a separate partition in order to preventusers from being able to fill up the / filesystem? (Specify the full path to the directory.)
  • 30. 
    Which RPM command will output the name of the package which supplied the file/etc/exports?
    • A. 

      Rpm -qf /etc/exports

    • B. 

      Rpm -qi /etc/exports

    • C. 

      Rpm -F /etc/exports

    • D. 

      Rpm -qp /etc/exports

    • E. 

      Rpm -Kl /etc/exports

  • 31. 
    In which directory must definition files be placed to add additional repositories to yum?
  • 32. 
    What is the name of the main configuration file for GNU GRUB? (Specify the file name only without any path.)
  • 33. 
    When removing a package, which of the following dpkg options will completely remove thefiles including configuration files?
    • A. 

      –clean

    • B. 

      –delete

    • C. 

      –purge

    • D. 

      –remove

  • 34. 
    Which file should be edited to select the network locations from which Debian installationpackage files are loaded?
    • A. 

      /etc/dpkg/dselect.cfg

    • B. 

      /etc/dpkg/dpkg.cfg

    • C. 

      /etc/apt/apt.conf

    • D. 

      /etc/apt/apt.conf.d

    • E. 

      /etc/apt/sources.list

  • 35. 
    Which option to the yum command will update the entire system? (Specify ONLY the option name without any additional parameters.)
  • 36. 
    Which command will disable swapping on a device?(Specify ONLY the command without any path or parameters.)
  • 37. 
    Which Debian package management tool asks the configuration questions for a specificalready installed package just as if the package were being installed for the first time?(Specify ONLY the command without any path or parameters.)
  • 38. 
    Which of the following commands overwrites the bootloader located on /dev/sda withoutoverwriting the partition table or any data following it?
    • A. 

      Dd if=/dev/zero of=/dev/sda bs=512

    • B. 

      Dd if=/dev/zero of=/dev/sda bs=512 count=1

    • C. 

      Dd if=/dev/zero of=/dev/sda bs=440 count=1

    • D. 

      Dd if=/dev/zero of=/dev/sda bs=440

  • 39. 
    Which of the following commands can be used to create a USB storage media from a diskimage?
    • A. 

      Gdisk

    • B. 

      Dd

    • C. 

      Cc

    • D. 

      Fdisk

    • E. 

      Mount

  • 40. 
    In Bash, inserting 1>&2 after a command redirects
    • A. 

      Standard output to standard input.

    • B. 

      Standard error to standard output.

    • C. 

      Standard input to standard error.

    • D. 

      Standard error to standard input.

    • E. 

      Standard output to standard error.

  • 41. 
    What command will generate a list of user names from /etc/passwd along with their loginshell?
    • A. 

      Column -s : 1,7 /etc/passwd

    • B. 

      Chop -c 1,7 /etc/passwd

    • C. 

      Colrm 1,7 /etc/passwd

    • D. 

      Cut -d: -f1,7 /etc/passwd

  • 42. 
    In a nested directory structure, which find command line option would be used to restrict thecommand to searching down a particular number of subdirectories?
    • A. 

      -dirmax

    • B. 

      -maxdepth

    • C. 

      -maxlevels

    • D. 

      -n

    • E. 

      -s

  • 43. 
    Which of the following statements is correct regarding the command foo 1> bar?
    • A. 

      The command foo receives its stdin from the stdout of the command bar.

    • B. 

      The stderr from the command foo is saved to the file bar.

    • C. 

      The stdout from the command foo overwrites the file bar.

    • D. 

      The stdout from the command foo is appended to the file bar.

    • E. 

      The command foo receives its stdin from the file bar.

  • 44. 
    Which of the following commands kills the process with the PID 123 but allows the processto “clean up” before exiting?
    • A. 

      Kill -KILL 123

    • B. 

      Kill -STOP 123

    • C. 

      Kill -TERM 123

    • D. 

      Kill -PIPE 123

  • 45. 
    Which signal is missing from the following command that is commonly used to instruct adaemon to reinitialize itself, including reading configuration files? killall -s _______ daemon
  • 46. 
    What is the maximum niceness value that a regular user can assign to a process with thenice command when executing a new process?
    • A. 

      9

    • B. 

      99

    • C. 

      19

    • D. 

      49

  • 47. 
    Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, whichsingle character command will insert the deleted content below the current line?
    • A. 

      I (lowercase)

    • B. 

      P (uppercase)

    • C. 

      P (lowercase)

    • D. 

      U (uppercase)

    • E. 

      U (lowercase)

  • 48. 
    A user accidentally created the subdirectory \dir in his home directory. Which of thefollowing commands will remove that directory?
    • A. 

      Rmdir ~/’dir’

    • B. 

      Rmdir ~/\dir

    • C. 

      Rmdir ‘~/\dir’

    • D. 

      Rmdir “~/\dir”

    • E. 

      Rmdir ~/\\dir

  • 49. 
    In compliance with the FHS, in which of the directories are man pages found?
    • A. 

      /usr/share/man

    • B. 

      /opt/man

    • C. 

      /usr/doc/

    • D. 

      /var/pkg/man

    • E. 

      /var/man

  • 50. 
    Which of the following commands will send output from the program myapp to bothstandard output (stdout) and the file file1.log?
    • A. 

      Cat < myapp | cat > file1.log

    • B. 

      Myapp 0>&1 | cat > file1.log

    • C. 

      Myapp | cat > file1.log

    • D. 

      Myapp | tee file1.log

    • E. 

      Tee myapp file1.log

  • 51. 
    What is the purpose of the Bash built-in export command?
    • A. 

      It makes the command history available to subshells.

    • B. 

      It sets up environment variables for applications.

    • C. 

      It runs a command as a process in a subshell.

    • D. 

      It allows disks to be mounted remotely.

    • E. 

      It shares NFS partitions for use by other systems on the network.

  • 52. 
    What is the output of the following command? echo “Hello World” | tr -d aieou
    • A. 

      Hello World

    • B. 

      Eoo

    • C. 

      Hll Wrld

    • D. 

      Eoo Hll Wrld

  • 53. 
    Which of the following characters can be combined with a separator string in order to readfrom the current input source until the separator string, which is on a separate line andwithout any trailing spaces, is reached? (Disregard the quotes)
    • A. 

      "

    • B. 

      "!

    • C. 

      "

    • D. 

      "&

  • 54. 
    Which of the following commands will NOT update the modify timestamp on the file/tmp/myfile.txt?
    • A. 

      File /tmp/myfile.txt

    • B. 

      Echo “Hello” >/tmp/myfile.txt

    • C. 

      Sed -ie “s/1/2/” /tmp/myfile.txt

    • D. 

      Echo -n “Hello” >>/tmp/myfile.txt

    • E. 

      Touch /tmp/myfile.txt

  • 55. 
    What is the default nice level when a process is started using the nice command?
    • A. 

      -10

    • B. 

      0

    • C. 

      10

    • D. 

      20

  • 56. 
    What is the default action of the split command on an input file?
    • A. 

      It will break the file into new files of 1,024 byte pieces each.

    • B. 

      It will break the file into new files of 1,000 line pieces each.

    • C. 

      It will break the file into new files of 1,024 kilobyte pieces each.

    • D. 

      It will break the file into new files that are no more than 5% of the size of the original file.

  • 57. 
    What is the difference between the i and a commands of the vi editor?
    • A. 

      I (insert) inserts text before the current cursor position whereas a (append) inserts text after the cursor.

    • B. 

      I (independent rows) starts every new line at the first character whereas a (aligned rows) keeps the indentation of the previous line.

    • C. 

      I (interactive) requires the user to explicitly switch between vi modes whereas a (automatic) switches modes automatically.

    • D. 

      I (interrupt) temporarily suspends editing of a file to the background whereas a (abort) terminates editing.

  • 58. 
    Which command displays a list of all background tasks running in the current shell? (SpecifyONLY the command without any path or parameters.)
  • 59. 
    Which of the following commands moves and resumes in the background the last stoppedshell job?
    • A. 

      Back

    • B. 

      Run

    • C. 

      Bg

    • D. 

      Fg

  • 60. 
    What is the effect of the egrep command when the -v option is used?
    • A. 

      It changes the output order showing the last matching line first.

    • B. 

      It shows the command’s version information.

    • C. 

      It enables color to highlight matching parts.

    • D. 

      It only outputs non-matching lines.

  • 61. 
    What does the ? symbol within regular expressions represent?
    • A. 

      Match the preceding qualifier one or more times.

    • B. 

      Match the preceding qualifier zero or more times.

    • C. 

      Match the preceding qualifier zero or one times.

    • D. 

      Match a literal ? character.

  • 62. 
    In the vi editor, how can commands such as moving the cursor or copying lines into thebuffer be issued multiple times or applied to multiple rows?
    • A. 

      By using the command :repeat followed by the number and the command.

    • B. 

      By specifying the number right in front of a command such as 4l or 2yj.

    • C. 

      By selecting all affected lines using the shift and cursor keys before applying the command.

    • D. 

      By issuing a command such as :set repetition=4 which repeats every subsequent command 4 times.

  • 63. 
    Which of the following files, located in the user home directory, is used to store the Bashhistory?
    • A. 

      .history_bash

    • B. 

      .bash_history

    • C. 

      .bash_histfile

    • D. 

      .bashrc_history

    • E. 

      .history

  • 64. 
    Which Bash environment variable defines in which file the user history is stored whenexiting a Bash process? (Specify ONLY the variable name.)
  • 65. 
    Which of the following commands displays the contents of a gzip compressed tar archive?
    • A. 

      Gzip archive.tgz | tar xvf –

    • B. 

      Tar ztf archive.tgz

    • C. 

      Gzip -d archive.tgz | tar tvf –

    • D. 

      Tar cf archive.tgz

  • 66. 
    Which grep command will print only the lines that do not end with a / in the file foo?
    • A. 

      Grep ‘/#’ foo

    • B. 

      Grep -v ‘/$’ foo

    • C. 

      Grep ‘/$’ foo

    • D. 

      Grep -v ‘/#’ foo

  • 67. 
    Which of the following commands is used to change options and positional parameters for arunning Bash?
    • A. 

      Envsetup

    • B. 

      History

    • C. 

      Set

    • D. 

      Bashconf

    • E. 

      Setsh

  • 68. 
    Which of the following commands replaces each occurrence of ‘bob’ in the file letter with‘Bob’ and writes the result to the file newletter?
    • A. 

      Sed ‘s/bob/Bob/g’ letter > newletter

    • B. 

      Sed ‘s/bob, Bob/’ letter > newletter

    • C. 

      Sed ‘s/bob/Bob’ letter > newletter

    • D. 

      Sed ‘/bob/Bob’ letter > newletter

    • E. 

      Sed s/bob/Bob/ letter < newletter

  • 69. 
    From a Bash shell, which of the following commands directly executes the instruction fromthe file /usr/local/bin/runme.sh without starting a subshell? (Please select TWO answers.)
    • A. 

      Source /usr/local/bin/runme.sh

    • B. 

      . /usr/local/bin/runme.sh

    • C. 

      /bin/bash /usr/local/bin/runme.sh

    • D. 

      /usr/local/bin/runme.sh

    • E. 

      Run /usr/local/bin/runme.sh

  • 70. 
    Regarding the command: nice -5 /usr/bin/prog Which of the following statements is correct?
    • A. 

      /usr/bin/prog is executed with a nice level of -5.

    • B. 

      /usr/bin/prog is executed with a nice level of 5.

    • C. 

      /usr/bin/prog is executed with a priority of -5.

    • D. 

      /usr/bin/prog is executed with a priority of 5.

  • 71. 
    Which shell command is used to continue background execution of a suspendedcommand?
    • A. 

      Exec

    • B. 

      Cont

    • C. 

      Bg

    • D. 

      &

    • E. 

      :&

  • 72. 
    Which of the following shell redirections will write standard output and standard error outputto a file named filename?
    • A. 

      2>&1 >filename

    • B. 

      >filename 2>&1

    • C. 

      1>&2>filename

    • D. 

      >>filename

    • E. 

      1&2>filename

  • 73. 
    In the vi editor, which of the following commands will copy the current line into the vi buffer?
    • A. 

      C

    • B. 

      Cc

    • C. 

      1c

    • D. 

      Yy

    • E. 

      1y

  • 74. 
    Which of the following sequences in the vi editor saves the opened document and exits theeditor? (Choose TWO correct answers.)
    • A. 

      Esc :wq!

    • B. 

      Ctrl XX

    • C. 

      Ctrl :w!

    • D. 

      Esc ZZ

    • E. 

      Esc zz

  • 75. 
    When starting a program with the nice command without any additional parameters, whichnice level is set for the resulting process?
    • A. 

      0

    • B. 

      10

    • C. 

      20

    • D. 

      -10

  • 76. 
    Which of the following commands will reduce all consecutive spaces down to a singlespace?
    • A. 

      Tr -c ‘ ‘ < a.txt > b.txt

    • B. 

      Tr -s ‘ ‘ < a.txt > b.txt

    • C. 

      Tr -d ‘ ‘ < a.txt > b.txt

    • D. 

      Tr ‘\s’ ‘ ‘ < a.txt > b.txt

    • E. 

      Tr -r ‘ ‘ ‘\n’ < a.txt > b.txt

  • 77. 
    Which character, added to the end of a command, runs that command in the background asa child process of the current shell? (disregard the quotes
    • A. 

      " # "

    • B. 

      " ! "

    • C. 

      " + "

    • D. 

      " & "

    • E. 

      " % "

  • 78. 
    Which of the following commands will print the last 10 lines of a text file to the standard output?
    • A. 

      Tail -n 10 filename

    • B. 

      Head -n 10 filename

    • C. 

      Cat -n 10 filename

    • D. 

      Dump -n 10 filename

  • 79. 
    Which of the following commands prints a list of usernames (first column) and their primarygroup (fourth column) from the /etc/passwd file?
    • A. 

      Fmt -f 1,4 /etc/passwd

    • B. 

      Split -c 1,4 /etc/passwd

    • C. 

      Cut -d : -f 1,4 /etc/passwd

    • D. 

      Paste -f 1,4 /etc/passwd

  • 80. 
    Which of the following signals is sent to a process when the key combination CTRL+C is pressed on the keyboard?
    • A. 

      SIGINT

    • B. 

      SIGSTOP

    • C. 

      SIGTERM

    • D. 

      SIGKILL

  • 81. 
    What happens after issuing the command vi without any additional parameters?
    • A. 

      Vi starts and loads the last file used and moves the cursor to the position where vi was when it last exited.

    • B. 

      Vi starts and requires the user to explicitly either create a new or load an existing file.

    • C. 

      Vi exits with an error message as it cannot be invoked without a file name to operate on.

    • D. 

      Vi starts in command mode and opens a new empty file.

    • E. 

      Vi starts and opens a new file which is filled with the content of the vi buffer if the buffer contains text.

  • 82. 
    Which of the following command sets the Bash variable named TEST with the content FOO?
    • A. 

      Set TEST=”FOO”

    • B. 

      TEST=”FOO”

    • C. 

      TEST = “FOO”

    • D. 

      Var TEST=”FOO”

  • 83. 
    Which variable defines the directories in which a Bash shell searches for executable commands?
    • A. 

      BASHEXEC

    • B. 

      BASHRC

    • C. 

      PATH

    • D. 

      EXECPATH

    • E. 

      PATHRC

  • 84. 
    Which of the following commands determines the type of a file by using a definitiondatabase file which contains information about all common file types?
    • A. 

      Magic

    • B. 

      Hash

    • C. 

      Pmagic

    • D. 

      Type

    • E. 

      File

  • 85. 
    Which command is used in a Linux environment to create a new directory? (Specify ONLYthe command without any path or parameters.)
  • 86. 
    Which of the following commands prints all files and directories within the /tmp directory orits subdirectories which are also owned by the user root? (Choose TWO correct answers.)
    • A. 

      Find /tmp -uid root -print

    • B. 

      Find -path /tmp -user root –print

    • C. 

      Find /tmp -user root

    • D. 

      Find /tmp -user root -print

    • E. 

      Find -path /tmp -uid root

  • 87. 
    When running the command sed -e “s/a/b/” /tmp/file >/tmp/file While /tmp/file contains data,why is /tmp/file empty afterwards?
    • A. 

      The file order is incorrect. The destination file must be mentioned before the command to ensure redirection.

    • B. 

      The command sed did not match anything in that file therefore the output is empty.

    • C. 

      When the shell establishes the redirection it overwrites the target file before the redirected command starts and opens it for reading.

    • D. 

      Redirection for shell commands do not work using the > character. It only works using the | character instead.

  • 88. 
    When given the following command line. echo “foo bar” | tee bar | cat Which of the followingoutput is created?
    • A. 

      Cat

    • B. 

      Foo bar

    • C. 

      Tee bar

    • D. 

      Bar

    • E. 

      Foo

  • 89. 
    Which of the following commands can be used to determine how long the system has been running? (Choose TWO correct answers.)
    • A. 

      Top

    • B. 

      Uname -u

    • C. 

      Uptime

    • D. 

      Up

    • E. 

      Time –up

  • 90. 
    Which of the following are valid stream redirection operators within Bash? (Choose THREE correct answers and disregard the quotes)
    • A. 

      "%>"

    • B. 

      "

    • C. 

      "

    • D. 

      ">"

    • E. 

      ">>>"

  • 91. 
    After successfully creating a hard link called bar to the ordinary file foo, foo is deleted from the filesystem.Which of the following describes the resulting situation?
    • A. 

      The user is prompted whether bar should be removed, too.

    • B. 

      Both foo and bar would remain accessible.

    • C. 

      Foo would be removed. bar would still exist but would be unusable.

    • D. 

      Foo and bar would both be removed.

    • E. 

      Foo would be removed while bar would remain accessible.

  • 92. 
    After moving data to a new filesystem, how can the former path of the data be kept intact inorder to avoid reconfiguration of existing applications?(Choose TWO correct answers.)
    • A. 

      By creating an ACL redirection from the old to the new path of the data.

    • B. 

      By mounting the new filesystem on the original path of the data.

    • C. 

      By running the command touch on the old path.

    • D. 

      By creating a symbolic link from the old to the new path of the data.

    • E. 

      By creating a hard link from the old to the new path of the data.

  • 93. 
    Which of the following commands changes the ownership of file.txt to the user dan and thegroup staff?
    • A. 

      Chown dan/staff file.txt

    • B. 

      Chown dan:staff file.txt

    • C. 

      Chown -u dan -g staff file.txt

    • D. 

      Chown dan -g staff file.txt

  • 94. 
    Which of the following commands makes /bin/foo executable by everyone but writable onlyby its owner?
    • A. 

      Chmod o+rwx,a+rx /bin/foo

    • B. 

      Chmod 577 /bin/foo

    • C. 

      Chmod u=rwx,go=rx /bin/foo

    • D. 

      Chmod 775 /bin/foo

  • 95. 
    Which of the following commands can be used to search for the executable file foo when ithas been placed in a directory not included in $PATH?
    • A. 

      Whereis

    • B. 

      Apropos

    • C. 

      Which

    • D. 

      Find

    • E. 

      Query

  • 96. 
    What does the command mount -a do?
    • A. 

      It ensures that all file systems listed in /etc/fstab are mounted regardless of their options.

    • B. 

      It ensures that all file systems listed with the option auto in /etc/fstab are mounted.

    • C. 

      It opens an editor with root privileges and loads /etc/fstab for editing.

    • D. 

      It ensures that all file systems listed with the option noauto in /etc/fstab are mounted.

    • E. 

      It shows all mounted file systems that have been automatically mounted.

  • 97. 
    Which of the following settings for umask ensures that new files have the defaultpermissions -rw-r– — ?
    • A. 

      0017

    • B. 

      0640

    • C. 

      0038

    • D. 

      0027

  • 98. 
    Which of the following is the device file name for the second partition on the only SCSIdrive?
    • A. 

      /dev/hda1

    • B. 

      /dev/sda2

    • C. 

      /dev/sd0a2

    • D. 

      /dev/sd1p2

  • 99. 
    In order to display all currently mounted filesystems, which of the following commands couldbe used? (Choose TWO correct answers.)
    • A. 

      Free

    • B. 

      Cat /proc/filesystems

    • C. 

      Cat /proc/self/mounts

    • D. 

      Lsmounts

    • E. 

      Mount

  • 100. 
    Which of the following commands can be used to locate programs and their correspondingman pages and configuration files?
    • A. 

      Dirname

    • B. 

      Which

    • C. 

      Base name

    • D. 

      Query

    • E. 

      Where is

  • 101. 
    Which of the following commands changes the number of days before the ext3 filesystemon /dev/sda1 has to run through a full filesystem check while booting?
    • A. 

      Tune2fs -d 200 /dev/sda1

    • B. 

      Tune2fs -c 200 /dev/sda1

    • C. 

      Tune2fs -i 200 /dev/sda1

    • D. 

      Tune2fs -n 200 /dev/sda1

    • E. 

      Tune2fs –days 200 /dev/sda1

  • 102. 
    Which type of filesystem is created by mkfs when it is executed with the block device nameonly and without any additional parameters?
    • A. 

      Ext3

    • B. 

      VFAT

    • C. 

      Ext4

    • D. 

      Ext2

    • E. 

      XFS

  • 103. 
    How many fields are in a syntactically correct line of /etc/fstab?
    • A. 

      3

    • B. 

      4

    • C. 

      5

    • D. 

      6

    • E. 

      7

  • 104. 
    104. Which command is used to create and initialize the files used to store quota information?(Specify ONLY the command without any path or parameters.)
  • 105. 
    Which of the following file permissions belong to a symbolic link?
    • A. 

      -rwxrwxrwx

    • B. 

      +rwxrwxrwx

    • C. 

      Lrwxrwxrwx

    • D. 

      Srwxrwxrwx

  • 106. 
    Creating a hard link to an ordinary file returns an error. What could be the reason for this?
    • A. 

      The source file is a shell script.

    • B. 

      The source file is already a hard lin

    • C. 

      The source file is hidden.

    • D. 

      The source file is read-only.

    • E. 

      The source and the target are on different filesystems.

  • 107. 
    Which of the following commands creates an ext3 filesystem on /dev/sdb1? (Choose TWO correct answers.)
    • A. 

      /sbin/mke2fs -j /dev/sdb1

    • B. 

      /sbin/mkfs -t ext3 /dev/sdb1

    • C. 

      /sbin/mkfs -c ext3 /dev/sdb1

    • D. 

      /sbin/mke3fs -j /dev/sdb1

  • 108. 
    Which of the following commands will change the quota for a specific user?
    • A. 

      Repquota

    • B. 

      Quota -e

    • C. 

      Edquota

    • D. 

      Quota

  • 109. 
    Which utility would be used to change how often a filesystem check is performed on an ext2filesystem without losing any data stored on that filesystem?
    • A. 

      Fixe2fs

    • B. 

      Mod2fs

    • C. 

      Fsck

    • D. 

      Tune2fs

    • E. 

      Mke2fs

  • 110. 
    Which of the following Linux filesystems preallocates a fixed number of inodes at thefilesystem’s make/creation time and does NOT generate them as needed? (Choose TWOcorrect answers.)
    • A. 

      Procfs

    • B. 

      XFS

    • C. 

      Ext2

    • D. 

      Ext3

    • E. 

      JFS

  • 111. 
    What is the purpose of the Filesystem Hierarchy Standard?
    • A. 

      It is a security model used to ensure files are organized according to their permissions and accessibility.

    • B. 

      It provides unified tools to create, maintain and manage multiple filesystems in a common way.

    • C. 

      It defines a common internal structure of inodes for all compliant filesystems.

    • D. 

      It is a distribution neutral description of locations of files and directories.

  • 112. 
    Which umask value will result in the default access permissions of 600 (rw——-) for filesand 700 (rwx——) for directories? 
  • 113. 
    Instead of supplying an explicit device in /etc/fstab for mounting, what other options may beused to identify the intended partition? (Choose TWO correct answers.)
    • A. 

      UUID

    • B. 

      FIND

    • C. 

      ID

    • D. 

      LABEL

    • E. 

      NAME

  • 114. 
    After running the command umount /mnt, the following error message is displayed: umount:/mnt: device is busy. What is a common reason for this message?
    • A. 

      The kernel thinks that a process is about to open a file in /mnt for reading.

    • B. 

      The files in /mnt have been scanned and added to the locate database.

    • C. 

      The kernel has not finished flushing disk writes to the mounted device.

    • D. 

      A user has a file open in the /mnt directory.

    • E. 

      Another file system still contains a symlink to a file inside /mnt.

  • 115. 
    What does the command mount -a do?
    • A. 

      It mounts all available filesystems onto the current directory.

    • B. 

      It shows all mounted filesystems.

    • C. 

      It mounts all user mountable filesystems for the current user.

    • D. 

      It mounts all filesystems listed in /etc/fstab which have the option auto set.

    • E. 

      It mounts all filesystems listed in /etc/fstab which have the option no auto set.

  • 116. 
    Which of the following commands set the sticky bit for the directory /tmp? (Choose TWOcorrect answers.)
    • A. 

      Chmod +s /tmp

    • B. 

      Chmod +t /tmp

    • C. 

      Chmod 1775 /tmp

    • D. 

      Chmod 4775 /tmp

    • E. 

      Chmod 2775 /tmp

  • 117. 
    Which of the following commands can be used to display the inode number of a given file?
    • A. 

      Ls

    • B. 

      Ln

    • C. 

      Inode

    • D. 

      Cp

  • 118. 
    What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?
    • A. 

      The command is SetUID and it will be executed with the effective rights of the owner.

    • B. 

      The command will be executed with the effective rights of the group instead of the owner.

    • C. 

      The execute flag is not set for the owner. Therefore the SetUID flag is ignored.

    • D. 

      The command will be executed with the effective rights of the owner and group.

  • 119. 
    Which of the following pieces of information of an existing file is changed when a hard linkpointing to that file is created?
    • A. 

      Permissions

    • B. 

      File size

    • C. 

      Link count

    • D. 

      Inode number

  • 120. 
    Which of the following commands shows the definition of a given shell command?
    • A. 

      Where

    • B. 

      Stat

    • C. 

      Type

    • D. 

      Case