How Much Do You Know Linux?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Themes
T
Themes
Community Contributor
Quizzes Created: 424 | Total Attempts: 1,037,059
| Attempts: 1,589 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. (Linux) Which of the following commands can be used to read the manual for your applications?

Explanation

The "man" command in Linux is used to read the manual for various applications. It provides detailed information about the usage, options, and syntax of a particular command or program. By typing "man" followed by the name of the command or program, users can access the manual pages and get the necessary documentation and instructions. Therefore, "man" is the correct command to read the manual for applications in Linux.

Submit
Please wait...
About This Quiz
How Much Do You Know Linux? - Quiz

Linux is an open source operating system (OS) that is a good alternative of Windows. If you are an expert of this OS, why not test your knowledge?... see moreTake our online quiz to show us how much you know and learn more along the way.
see less

2. (Linux) Which of the following commands is NOT used in the management of files and directories?

Explanation

Ping is a command used for network troubleshooting and testing connectivity between two devices. It is not used in the management of files and directories.

Submit
3. (Linux) Which command will copy a file?

Explanation

The correct answer is "cp orig.txt copy.txt". This command will copy the file named "orig.txt" and create a new file named "copy.txt" with the same content.

Submit
4. (Linux) Which of the following commands will search for a particular file in specified directory?

Explanation

The correct answer is "find." The find command is used in Linux to search for files and directories within a specified directory. It allows users to search for files based on various criteria such as name, size, type, and more. By using the find command followed by the directory path and search criteria, users can locate and retrieve specific files within a given directory.

Submit
5. (Linux) Which symbol represents comments in a BASH script?

Explanation

In a BASH script, the symbol "#" is used to represent comments. Comments are lines in the script that are not executed and are used to provide explanations or documentation about the code. These comments are ignored by the interpreter and are only for human readability.

Submit
6. (Linux) This command will change the current location to the user's home directory?

Explanation

The command "cd ~" is used to change the current location to the user's home directory in Linux. The tilde (~) represents the home directory of the current user. Using this command will navigate to the home directory regardless of the current location.

Submit
7. (Windows) Explicit file permissions take precedence over inherited file permissions.

Explanation

Explicit file permissions refer to the permissions that are specifically set for a file or folder, while inherited file permissions are those that are automatically inherited from the parent folder. In this case, the correct answer suggests that explicit file permissions take precedence over inherited file permissions. This means that if there are conflicting permissions between the explicit permissions set for a file and the inherited permissions from the parent folder, the explicit permissions will be prioritized and applied.

Submit
8. (Powershell) Curly braces ({}) are used in PowerShell for Script Blocks (i.e. commands inside of commands).

Explanation

Curly braces ({}) are indeed used in PowerShell for Script Blocks, which are essentially a way to group multiple commands together and treat them as a single unit. This allows for more complex and structured scripting in PowerShell. Therefore, the statement "Curly braces ({}) are used in PowerShell for Script Blocks" is true.

Submit
9. (Linux) True/False An environment variable is used by the system and applications to read settings from the system.

Explanation

An environment variable is a dynamic value that can affect the behavior of a system or application. It is used by the system and applications to read settings from the system. These variables provide a way for programs to interact with the operating system and access important information such as system paths, user preferences, and configuration settings. By using environment variables, the system and applications can easily adapt to different environments and user preferences without the need for hardcoding specific values. Therefore, the given statement that an environment variable is used by the system and applications to read settings from the system is true.

Submit
10. (Linux) What would the permissions be after running command "chmod 754 file"?

Explanation

The command "chmod 754 file" sets the permissions for the file to read, write, and execute for the owner, read and execute for the group, and read-only for others. Therefore, the correct answer is "-rwxr-xr--", which represents these permission settings.

Submit
11. (Linux) Which directory contains configuration files?

Explanation

The directory "/etc" contains configuration files in Linux. This directory is commonly used to store system-wide configuration files that are required by various applications and services. It is a standard convention to keep configuration files in this directory to ensure easy access and organization.

Submit
12. (Windows) Based on Mandatory Integrity Controls, a browser such as Internet Explorer can modify Operating System files.

Explanation

Based on Mandatory Integrity Controls, a browser such as Internet Explorer does not have the ability to modify Operating System files. Mandatory Integrity Controls enforce strict access controls, preventing lower integrity processes like browsers from modifying higher integrity files. Therefore, the statement is false.

Submit
13. (Linux) Which of the following is NOT a standard I/O stream in Linux?

Explanation

STDREAD is not a standard I/O stream in Linux. The standard I/O streams in Linux are STDIN, STDOUT, and STDERR. STDIN is the standard input stream, used for reading input from the user or from a file. STDOUT is the standard output stream, used for displaying output to the user or redirecting it to a file. STDERR is the standard error stream, used for displaying error messages. However, STDREAD is not a recognized standard I/O stream in Linux.

Submit
14. (Linux) Which command will set the permission of a file to read only for all users?

Explanation

The command "chmod 444" will set the permission of a file to read-only for all users. In Linux, the "chmod" command is used to change the permissions of a file or directory. The three numbers represent the permissions for the owner, group, and others respectively. Each number can range from 0 to 7, with 0 indicating no permissions and 7 indicating full permissions. In this case, "444" means that the owner, group, and others have read-only permission, while no write or execute permissions are granted.

Submit
15. (Powershell) Using the output from one cmdlet as an input in another cmdlet is called in PowerShell?

Explanation

In PowerShell, using the output from one cmdlet as an input in another cmdlet is called a pipeline. The pipeline allows the output of one command to be passed directly as input to another command, creating a continuous flow of data processing. This enables efficient and concise scripting by allowing multiple cmdlets to be combined in a single command line, enhancing the power and flexibility of PowerShell.

Submit
16. (Linux) What is the UID of the root user?

Explanation

The UID of the root user in Linux is 0. The root user is the superuser who has complete control over the system and all its resources. The UID (User ID) is a unique numerical identifier assigned to each user in the system, and the root user is assigned the UID 0. This allows the root user to have unrestricted access to all files, directories, and system operations.

Submit
17. (Powershell) What is the term used in PowerShell for the short names for commands?

Explanation

In PowerShell, the term used for the short names for commands is "Aliases". Aliases are alternative names or shortcuts for commands, allowing users to execute commands using a shorter or more familiar name. This helps to save time and increase productivity when working with PowerShell commands.

Submit
18. (Windows) What tool on windows manages and applies patches on your system?

Explanation

Windows Update is the correct answer because it is the tool on Windows that manages and applies patches on the system. It is a built-in feature of Windows operating systems that allows users to download and install updates for the operating system, drivers, and other Microsoft software. Windows Update ensures that the system is up to date with the latest security patches, bug fixes, and feature enhancements released by Microsoft. It is an essential tool for maintaining the security and stability of a Windows system.

Submit
19. (Windows) The netstat -n command will provide what information?

Explanation

The netstat -n command in Windows provides information about active network connections with numeric port numbers and IP addresses. It does not give the number of network interfaces on the system, the number of active users on the system, or connections that are not active.

Submit
20. (Networking) Which of the following network IP addresses must use NAT to access resources on the internet?

Explanation

All of the given network IP addresses (10.5.4.2, 172.16.52.4, and 192.168.1.4) must use NAT (Network Address Translation) to access resources on the internet. This is because these IP addresses fall under private IP address ranges, which are not routable on the internet. NAT allows these private IP addresses to be translated into a single public IP address, allowing them to communicate with resources on the internet.

Submit
21. (Netoworking) Select the following statement that is true:

Explanation

Transferring data over UDP is less reliable than over TCP. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee the delivery of data packets, whereas TCP (Transmission Control Protocol) is a reliable protocol that ensures the delivery of data packets by using acknowledgments and retransmissions. Therefore, TCP is considered more reliable for data transfer compared to UDP.

Submit
22. (Linux) What are the two types of loops used in BASH scripting?

Explanation

BASH scripting in Linux supports two types of loops: "for" and "while". The "for" loop is used to iterate over a set of values or elements, executing a block of code for each iteration. On the other hand, the "while" loop is used to repeatedly execute a block of code as long as a specified condition is true. These two types of loops provide flexibility and control in executing repetitive tasks in BASH scripting.

Submit
23. (Linux) True/False  The operator -ne  can be used to compare strings.

Explanation

The operator -ne in Linux is used to compare numerical values, not strings. To compare strings, the operator to be used is !=. Therefore, the given statement is false.

Submit
24. (Networking) As a packet travels from the source to destination, it may travel across networks that support different maximum packet sizes. If a network router has a packet that is 1500 bytes long and the destination interface for that packet can onlly accept packet that is 1400 bytes, _________ will occur.

Explanation

When a network router receives a packet that is larger than the maximum packet size allowed by the destination interface, it needs to break down or fragment the packet into smaller pieces that can be accommodated by the interface. This process is known as fragmentation. The router will divide the original packet into smaller fragments and add necessary headers to each fragment. These fragments will then be sent individually to the destination, where they will be reassembled to form the original packet.

Submit
25. (Powershell) The Get-ChildItem cmdlet in PowerShell can only be used to list files and directories.

Explanation

The statement is false because the Get-ChildItem cmdlet in PowerShell can be used to list not only files and directories, but also other items such as registry keys, certificates, and other PowerShell providers. It provides a way to retrieve information about various types of items in a specified location.

Submit
26. (Windows) What registry Hive contains the settings for each user of the system?

Explanation

The HKEY_Users registry hive contains the settings for each user of the system. This hive stores user-specific configuration data such as preferences, desktop settings, and application settings. It allows multiple users to have their own unique settings and configurations on a Windows system.

Submit
27. (Linux) True/False the sudo command lets users switch to a full shell as a different  user.

Explanation

The sudo command does not let users switch to a full shell as a different user. Instead, it allows users to execute specific commands with administrative privileges. This means that users can run certain commands as a different user, but they do not have access to a full shell as that user.

Submit
28. (Linux) Which of the following files contains hashes of user passwords on most modern Linux distributions?

Explanation

The correct answer is /etc/shadow. This file contains the hashed passwords of user accounts on most modern Linux distributions. It is used to enhance security by storing the password hashes instead of the actual passwords, making it harder for unauthorized users to access the passwords. The /etc/shadow file is only accessible by the root user, ensuring that only privileged users can access the password hashes.

Submit
29. (Windows) What command allows you to run a program as a different user?

Explanation

The command "runas.exe" allows you to run a program as a different user in Windows. This command is used to launch applications or commands with different user credentials, providing the ability to execute programs with elevated privileges or as a different user account. By using "runas.exe", users can temporarily switch to another user account without logging off, which is useful for performing administrative tasks or running programs that require different permissions.

Submit
30. (Networking) Fragmentation occurs at which layer(s) of the OSI Model?

Explanation

Fragmentation occurs at Layer 3 only because it is the network layer of the OSI model. Fragmentation is the process of dividing a packet into smaller fragments to fit the maximum transmission unit (MTU) of a network. This process is necessary when the packet size exceeds the MTU of the network. Layer 2, which is the data link layer, is responsible for framing and error checking, but it does not handle fragmentation. Layer 4, the transport layer, is responsible for segmenting and reassembling data, but it does not handle fragmentation either. Therefore, fragmentation occurs only at Layer 3, the network layer.

Submit
31. (Networking) What would the subnet mask be for the IP range 172.16.0.0/8?

Explanation

The subnet mask for the IP range 172.16.0.0/8 would be 255.0.0.0. This is because the /8 notation indicates that the first 8 bits of the IP address are the network portion, and the remaining 24 bits are the host portion. The subnet mask is used to divide the IP address into network and host portions, and in this case, the first 8 bits are masked with 255, while the remaining bits are masked with 0, resulting in a subnet mask of 255.0.0.0.

Submit
32. (Networking) VAlid TCP ports are within the range:

Explanation

The valid TCP ports range from 0 to 65535. TCP (Transmission Control Protocol) is a communication protocol used for transmitting data over networks. The port number is used to identify a specific process or service running on a device. In TCP, port numbers range from 0 to 65535, with ports 0 to 1023 being well-known ports reserved for common services like HTTP (port 80) or FTP (port 21). Ports 1024 to 65535 are available for general use by applications and services.

Submit
33. (Windows) What command will display the processes that are currently running on the local system?

Explanation

The correct answer is "tasklist". This command is used in Windows to display a list of all the processes that are currently running on the local system. It provides information such as the process ID, memory usage, and CPU usage of each process. By using this command, users can easily monitor and manage the processes running on their computer.

Submit
34. (Windows) What command is used to list the files and subdirectories in a directory?

Explanation

The correct answer is "dir". The "dir" command is used in Windows to list the files and subdirectories in a directory. It displays the names, sizes, and timestamps of the files and directories present in the specified location. The "ls" command is used in Unix-based systems like Linux for the same purpose. "list" and "showfiles" are not valid commands in Windows.

Submit
35. (Windows) Which of the following will NOT provide you a listing of all services  running on the Windows System?

Explanation

Regedit is the Windows Registry Editor, which is used to view and modify the Windows Registry. The Windows Registry contains configuration settings for the Windows operating system and installed applications, but it does not provide a listing of all services running on the system. Therefore, regedit will not provide a listing of all services running on the Windows system.

Submit
36. (Linux) Which of the following regular expressions would find Orville or Wilbur Wright on a line by itself?

Explanation

The correct regular expression is ^(Orville | Wilbur) Wright$. This regular expression will match a line that starts with either "Orville" or "Wilbur", followed by a space, and then "Wright" at the end of the line. The ^ symbol represents the start of the line, the $ symbol represents the end of the line, and the | symbol represents the OR operator.

Submit
37. (Networking) True or False: In order to communicate with devices on the same subnet, a computer must communicate with its Default Gateway.

Explanation

False. In order to communicate with devices on the same subnet, a computer does not need to communicate with its Default Gateway. The Default Gateway is only required when the computer needs to communicate with devices on a different subnet or outside of its local network. Within the same subnet, devices can communicate directly with each other using their IP addresses and subnet masks without involving the Default Gateway.

Submit
38. (Networking) The three packets (In order) responsible for establishing a connection over TCP are:

Explanation

The correct answer is SYN, SYN-ACK, ACK. In TCP (Transmission Control Protocol), the process of establishing a connection between two devices is known as the TCP handshake. It involves a three-way handshake where the client sends a SYN (synchronize) packet to the server, the server responds with a SYN-ACK (synchronize-acknowledge) packet, and finally, the client acknowledges the server's response with an ACK (acknowledge) packet. This three-step process ensures that both devices agree on the initial sequence numbers and establishes a reliable connection for data transmission.

Submit
39. (Linux) When multiple commands to be executed are on one line they must be seperated by what symbol?

Explanation

When multiple commands need to be executed on one line in Linux, they must be separated by the semicolon symbol (;). This symbol acts as a command separator, allowing each command to be executed sequentially. Using the semicolon ensures that each command is executed independently without any dependencies or conditions.

Submit
40. (Linux) What will the following command in a BASH script output to the screen? echo "$#"

Explanation

The command "echo "$#"" in a BASH script will output the number of parameters to the screen.

Submit
41. (Powershell) Which of the following is NOT a common cmdlet used in PowerShell?

Explanation

The cmdlet "Pull-Processes" is not a common cmdlet used in PowerShell. The other three cmdlets, "Format-Table", "Get-Content", and "Sort-Object", are commonly used in PowerShell for various tasks.

Submit
42. (Networking) Identify the commands used to obtain the routing table information on a windows machine (Select all that are correct)

Explanation

The correct commands to obtain the routing table information on a Windows machine are "route print" and "netstat -r". The "route print" command displays the routing table information, including the network destination, netmask, gateway, interface, and metric. The "netstat -r" command also displays the routing table information, showing the network destination, netmask, gateway, interface, and metric, along with additional information such as the source and destination IP addresses. The other options, "ip -a", "ip -r", and "ifconfig /a", are not valid commands for obtaining the routing table information on a Windows machine.

Submit
43. (Powershell) Square Brackets are used in PowerShell for all of the following EXCEPT:

Explanation

Square brackets are used in PowerShell for type declaration, accessing a property, and working with arrays. However, they are not used for accessing a property. In PowerShell, properties of an object are accessed using dot notation, such as $object.property. Square brackets are used for indexing and accessing elements within an array or collection.

Submit
44. (Linux) Which of the following commands can be used to grab portions of text out of a string?

Explanation

The cut command in Linux can be used to grab portions of text out of a string. It allows you to specify a delimiter and select specific fields or columns from a text file or input stream. This is useful when you want to extract specific data from a larger set of information.

Submit
45. (Networking) You want to configure your firewall to allow people inside your network to ping anyone, but not allow anyone outside your network to traceroute anything behind your firewall, How should you configure it?

Explanation

By blocking all outbound ICMP Time Exceeded In Transit, the firewall will prevent anyone outside the network from tracerouting anything behind the firewall. This means that external users will not be able to determine the path or hops to reach destinations behind the firewall. However, allowing people inside the network to ping anyone indicates that ICMP Echo requests and responses are allowed. Therefore, blocking all other types of ICMP traffic, such as ICMP Echo responses or all outbound ICMP, will not interfere with this configuration.

Submit
46. (Windows) Which of the following commands is used to connect or disconnect from remote resources?

Explanation

The command "net use" is used to connect or disconnect from remote resources in Windows. This command allows users to map a network drive to a local drive letter, connecting to shared folders or network resources on remote computers. It can also be used to disconnect from a network resource when it is no longer needed.

Submit
47. (Powershell) Which of the following will provide you with a list of PowerShell cmdlets used to manage services?

Explanation

The correct answer is "Get-Command --Noun Services" because the Get-Command cmdlet is used to retrieve all available cmdlets in PowerShell, and the "--Noun Services" parameter filters the results to only display cmdlets related to managing services.

Submit
48. (Powershell) Which setting is NOT a valid Execution Policy for PowerShell scripts?

Explanation

The CASigned setting is not a valid Execution Policy for PowerShell scripts. The valid Execution Policies are AllSigned, RemoteSigned, and Restricted. CASigned is not a recognized Execution Policy in PowerShell.

Submit
49. (Powershell) Which of the following is a valid comparison  operator in PowerShell?

Explanation

The "-ge" operator in PowerShell is used for numerical comparison and stands for "greater than or equal to". It checks if the value on the left is greater than or equal to the value on the right. It is a valid comparison operator in PowerShell and is commonly used in conditional statements to evaluate numerical values.

Submit
50. (Powershell) the cmlet to filter which object is passed further down the pipeline in PowerShell is:

Explanation

The correct answer is "Where-Object". In PowerShell, the "Where-Object" cmdlet is used to filter objects based on a specified condition. It allows you to select only the objects that meet the specified criteria and pass them further down the pipeline for further processing. This cmdlet is commonly used for filtering data in PowerShell scripts and commands.

Submit
View My Results

Quiz Review Timeline (Updated): Sep 16, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 16, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2021
    Quiz Created by
    Themes
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(Linux) Which of the following commands can be used to read the manual...
(Linux) Which of the following commands is NOT used in the management...
(Linux) Which command will copy a file?
(Linux) Which of the following commands will search for a particular...
(Linux) Which symbol represents comments in a BASH script?
(Linux) This command will change the current location to the...
(Windows) Explicit file permissions take precedence over inherited...
(Powershell) Curly braces ({}) are used in PowerShell for Script...
(Linux) True/False An environment variable is used by the system and...
(Linux) What would the permissions be after running command...
(Linux) Which directory contains configuration files?
(Windows) Based on Mandatory Integrity Controls, a browser such as...
(Linux) Which of the following is NOT a standard I/O stream in Linux?
(Linux) Which command will set the permission of a file to read only...
(Powershell) Using the output from one cmdlet as an input in another...
(Linux) What is the UID of the root user?
(Powershell) What is the term used in PowerShell for the short names...
(Windows) What tool on windows manages and applies patches on your...
(Windows) The netstat -n command will provide what information?
(Networking) Which of the following network IP addresses must use NAT...
(Netoworking) Select the following statement that is true:
(Linux) What are the two types of loops used in BASH scripting?
(Linux) True/False  The operator -ne  can be used to compare...
(Networking) As a packet travels from the source to destination, it...
(Powershell) The Get-ChildItem cmdlet in PowerShell can only be used...
(Windows) What registry Hive contains the settings for each user of...
(Linux) True/False the sudo command lets users switch to a full shell...
(Linux) Which of the following files contains hashes of user passwords...
(Windows) What command allows you to run a program as a different...
(Networking) Fragmentation occurs at which layer(s) of the OSI Model?
(Networking) What would the subnet mask be for the IP range...
(Networking) VAlid TCP ports are within the range:
(Windows) What command will display the processes that are currently...
(Windows) What command is used to list the files and subdirectories in...
(Windows) Which of the following will NOT provide you a listing of all...
(Linux) Which of the following regular expressions would find Orville...
(Networking) True or False: In order to communicate with devices on...
(Networking) The three packets (In order) responsible for establishing...
(Linux) When multiple commands to be executed are on one line they...
(Linux) What will the following command in a BASH script output to the...
(Powershell) Which of the following is NOT a common cmdlet used in...
(Networking) Identify the commands used to obtain the routing table...
(Powershell) Square Brackets are used in PowerShell for all of the...
(Linux) Which of the following commands can be used to grab portions...
(Networking) You want to configure your firewall to allow people...
(Windows) Which of the following commands is used to connect or...
(Powershell) Which of the following will provide you with a list of...
(Powershell) Which setting is NOT a valid Execution Policy for...
(Powershell) Which of the following is a valid comparison ...
(Powershell) the cmlet to filter which object is passed further down...
Alert!

Advertisement