1.
The previous system administrator put useless messages at login, what file do you edit to change the system message?
Correct Answer
A. /etc/motd
Explanation
The correct answer is /etc/motd. The message of the day (motd) file is located in the /etc directory and is used to display a custom message to users when they log in to the system. By editing this file, the system administrator can change the system message and remove any useless messages that were previously added by the previous administrator.
2.
Users on your network cannot print to a Linux printer. You decide to restart the printer daemon, which command would achieve that?
Correct Answer
C. Restart printer-name
Explanation
The correct answer is "restart printer-name." To solve the problem of users on the network being unable to print to a Linux printer, restarting the printer daemon is a possible solution. The "restart" command followed by the name of the printer would initiate the restart process for the printer daemon, potentially resolving the printing issue.
3.
Which file does Linux use to resolve hostnames?
Correct Answer
C. /etc/host.conf
Explanation
Linux uses the /etc/host.conf file to resolve hostnames. This file contains configuration settings for the hostname resolution process. It allows the user to define the order in which the system should query different sources, such as DNS or the hosts file, to resolve a hostname to an IP address. By configuring the /etc/host.conf file, users can customize the hostname resolution behavior according to their specific requirements.
4.
What is "tin"?
Correct Answer
D. A newsreader
Explanation
"Tin" refers to a newsreader, which is a software application used to read and organize news articles from various sources. It allows users to subscribe to different news feeds, browse articles, and manage their news subscriptions. This term is commonly used in the context of internet news and online forums.
5.
What are the file attributes for executing Perl programs?
Correct Answer
B. 755
Explanation
The file attributes for executing Perl programs are 755. This means that the owner of the file has read, write, and execute permissions, while others only have read and execute permissions. This allows the owner to modify and execute the Perl program, while others can only read and execute it.
6.
What is bash?
Correct Answer
D. A command shell
Explanation
Bash is a command shell, which is a program that provides a command line interface for users to interact with the operating system. It is commonly used on Unix-based systems and is known for its powerful scripting capabilities. Bash allows users to execute commands, run scripts, and automate tasks, making it a fundamental tool for system administration and programming.
7.
What is the DOS LPT1 port in Linux?
Correct Answer
C. /dev/lp0
Explanation
The correct answer is /dev/lp0. In Linux, the DOS LPT1 port is represented by the /dev/lp0 device file. The /dev/lp0 device file is used to access the parallel port, which is typically used for connecting printers. This device file allows Linux users to interact with the parallel port and send data to connected devices such as printers.
8.
What is the minimum memory requirements for XFree86?
Correct Answer
C. 4MB
Explanation
XFree86, which is a historical implementation of the X Window System, typically requires a minimum of 4 MB (megabytes) of memory to run. This memory is primarily used for storing graphics buffers, managing display output, and supporting applications running on the X server. However, modern systems and successors to XFree86 may have different memory requirements based on their configuration and usage scenarios.
9.
You attempt to remove a directory, but Linux won't allow you, what is the most likely problem?
Correct Answer
D. The directory is not empty
Explanation
The most likely problem is that the directory is not empty. In Linux, you cannot remove a directory if it contains any files or subdirectories. You need to first remove all the contents within the directory before being able to remove the directory itself.
10.
From a command prompt, what does the command "ls" do?
Correct Answer
B. Lists the contents of the directory
Explanation
The command "ls" is used to list the contents of a directory from a command prompt. It displays the files and subdirectories present in the current working directory.
11.
Which command creates a file system?
Correct Answer
C. Mkfs
Explanation
The command "mkfs" is used to create a file system on a storage device. It is commonly used in Linux and Unix systems to format a partition or disk with a specific file system type, such as ext4 or NTFS. This command initializes the file system structures and metadata on the device, allowing it to be used for storing files and directories.
12.
What is the default administrator username?
Correct Answer
D. Root
Explanation
In Linux systems, the default administrator username is typically root. The root user has full administrative privileges, allowing them to control system settings, install software, and perform other critical tasks. Because of its powerful role, access to the root account should be managed carefully to maintain system security and prevent unauthorized changes. Other systems might use "admin" or similar, but "root" is the standard administrator account on new Linux installations.
13.
Which of the following are valid Linux wildcards? (Choose all that apply)
Correct Answer
A. * and ?
Explanation
The correct answer is "* and ?". In Linux, the asterisk (*) is a wildcard that represents any number of characters, while the question mark (?) represents a single character. These wildcards are commonly used in file and directory searches to match multiple filenames or patterns. The other options (/, ?, &, Z) are not valid Linux wildcards.
14.
What does the command "ps" do?
Correct Answer
B. Shows what processes are running
Explanation
The command "ps" is used to display information about the currently running processes on a system. It provides details such as process ID, CPU usage, memory usage, and other relevant information. By executing the "ps" command, users can get an overview of the processes that are currently active and running on their system.
15.
You are working in Linux when a program hits a flaw and stops running. Which command can be used to end the process?
Correct Answer
A. Kill
Explanation
The kill command in Linux can be used to terminate a process. It sends a signal to the specified process, causing it to stop running. This is a commonly used command to end a program that has encountered a flaw or is unresponsive.
16.
A user is logged into the Linux workstation, what is the best way to login to root from a shell prompt?
Correct Answer
C. Su
Explanation
The correct answer is "su". The "su" command stands for "switch user" and allows the user to switch to a different user account, in this case, the root user. By entering "su" followed by the root password, the user can gain root privileges and access the root account from the shell prompt. This is considered the best way to login to root as it provides a secure and controlled method of accessing the root account.
17.
Linux allows filenames up to what number of characters?
Correct Answer
C. 256
Explanation
Linux allows filenames up to 256 characters because it follows the POSIX standard, which specifies that the maximum length for a filename is 255 characters. This limitation is due to the way file systems are designed and the need to allocate space for storing the filename. Therefore, any filename in Linux that exceeds 256 characters will not be recognized or accessible.
18.
T/F: The command "pwd" displays the directory
Correct Answer
A. True
Explanation
The command "pwd" stands for "print working directory" and is used to display the current directory that the user is in. Therefore, the statement "The command 'pwd' displays the directory" is true.
19.
T/F: To move files, use the "move" command.
Correct Answer
B. False
Explanation
The correct answer is False because to move files, you should use the "mv" command in most operating systems, including Unix-like systems. The "move" command is not a recognized command for moving files.
20.
You forget the root password. You decide to reboot using a boot disk floppy. What do you need to do to recover the root password?
Correct Answer
B. Mount the root partition, edit the /etc/passwd file to remove the root password, reboot.
Explanation
To recover the root password after forgetting it, you need to mount the root partition and then edit the /etc/passwd file to remove the root password. After making this change, you can reboot the system. This is the correct answer because the /etc/passwd file contains the user account information, including the encrypted passwords. By removing the root password from this file, the system will allow you to login as root without a password, effectively recovering the root access.