Linux Quiz - Chapters 1-6

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jgimer
J
Jgimer
Community Contributor
Quizzes Created: 1 | Total Attempts: 397
Questions: 11 | Attempts: 397

SettingsSettingsSettings
Linux Quiz - Chapters 1-6 - Quiz

.


Questions and Answers
  • 1. 

    The "man" command on a Linux system can be used for what?

    • A.

      To find out who logged into the system last sorted by username.

    • B.

      To find detailed help information about another command or system component.

    • C.

      To allow you to find very brief help information about another command or system component.

    Correct Answer
    B. To find detailed help information about another command or system component.
    Explanation
    The "man" command on a Linux system is used to find detailed help information about another command or system component. It allows users to access the manual pages (or man pages) that provide comprehensive documentation on various commands, utilities, and system functions. These manual pages contain detailed explanations, usage instructions, and examples to help users understand and utilize the specific command or component effectively.

    Rate this question:

  • 2. 

    What does GRUB stand for and what is its primary purpose?

    • A.

      GRUB is the Global RedHat User Base. It is a group of people that provide Red Hat support to the community.

    • B.

      GRUB is the Generic Run-time User Browser. It is what is used to browse system files in the GUI.

    • C.

      GRUB is the Grand Unified Boot Loader. It is used to boot the Red Hat Linux operating system.

    Correct Answer
    C. GRUB is the Grand Unified Boot Loader. It is used to boot the Red Hat Linux operating system.
    Explanation
    GRUB stands for Grand Unified Boot Loader and its primary purpose is to boot the Red Hat Linux operating system.

    Rate this question:

  • 3. 

    Init has several different run-levels that is can operate under. Run-level 6 is generally used for what?

    • A.

      Run-level 6 is the reboot run-level.

    • B.

      Run-level 6 is the shutdown run-level.

    • C.

      Run-level 6 is the graphical desktop run-level

    Correct Answer
    A. Run-level 6 is the reboot run-level.
    Explanation
    Run-level 6 is the reboot run-level. In the Unix-like operating systems, run-level 6 is specifically designated for system reboot. When the system enters run-level 6, it initiates the process of shutting down all services and processes, unmounts file systems, and finally reboots the system. This run-level is used when a complete restart of the system is required, such as after installing updates or making significant configuration changes. It ensures a clean and orderly reboot of the system, allowing it to start fresh with all necessary services and processes.

    Rate this question:

  • 4. 

    What is the name of the tool that can be used to allow a user to run commands under the context of another user without knowing the users password? What is the name of the configuration file for this command?

    • A.

      Su is the name of the command and /etc/shadow is the name of its configuration file.

    • B.

      Sudo is the name of the command and /etc/sudoers is the name of its configuration file.

    • C.

      Init is the name of the command and /etc/inittab is the name of its configuration file.

    Correct Answer
    B. Sudo is the name of the command and /etc/sudoers is the name of its configuration file.
    Explanation
    The correct answer is "Sudo is the name of the command and /etc/sudoers is the name of its configuration file." The sudo command is used to allow a user to run commands under the context of another user without knowing the user's password. The /etc/sudoers file is the configuration file for sudo, where the rules and permissions for executing commands as another user are defined.

    Rate this question:

  • 5. 

    What is the difference between a processes UID and EUID?

    • A.

      The UID of a process is the user identification number of the person who created it (owner). The EUID of a process is the "effective" user ID which is what is used to determine the permissions that he process has on the system.

    • B.

      The UID of a process is the unit identification number of the system that the process is running on (host). The EUID of a process is the "effective" unit ID which is what is used to determine what system the process is running on when executing command remotely.

    • C.

      The UID of a process is the unique identification number of the process itself. The EUID of a process is the "parent" unique ID which shows the UID of the process that invoked it.

    Correct Answer
    A. The UID of a process is the user identification number of the person who created it (owner). The EUID of a process is the "effective" user ID which is what is used to determine the permissions that he process has on the system.
    Explanation
    The UID of a process represents the user identification number of the person who created it, also known as the owner. This UID is used to identify the owner of the process. On the other hand, the EUID (effective user ID) of a process is used to determine the permissions that the process has on the system. It is the user ID that is actually used to check access rights and permissions when the process attempts to perform certain actions or access certain resources.

    Rate this question:

  • 6. 

    Signals can be sent to a process using which command?

    • A.

      The init command.

    • B.

      The signal command.

    • C.

      The kill command.

    Correct Answer
    C. The kill command.
    Explanation
    The kill command is used to send signals to a process. Signals are used to communicate with processes and can be used to request a process to terminate, pause, or perform other actions. The init command is responsible for initializing the system and managing processes, but it is not specifically used for sending signals. The signal command does not exist and is not a valid command for sending signals. Therefore, the correct answer is the kill command.

    Rate this question:

  • 7. 

    The "niceness" of a process is used to....

    • A.

      Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for CPU.

    • B.

      Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for memory.

    • C.

      Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for disk.

    Correct Answer
    A. Provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for CPU.
    Explanation
    The "niceness" of a process is used to provide a numeric hint to the kernel about how the process should be treated in relationship to other processes contending for CPU. This means that a higher "niceness" value indicates a lower priority for the process, allowing other processes with lower "niceness" values to have more CPU time. Conversely, a lower "niceness" value indicates a higher priority for the process, giving it more CPU time compared to other processes with higher "niceness" values.

    Rate this question:

  • 8. 

    What would the Octal and Mnemonic syntax of then following permission set be? User=Read, Execute; Group=Read; Other=ReadExtra Credit: What would the umask be?

  • 9. 

    The "setattr" command is used to change extended file attributes.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The "setattr" command is not used to change extended file attributes. It is actually used to set the value of an object's attribute in Python. Therefore, the correct answer is False.

    Rate this question:

  • 10. 

    Why is there an inconsistency in the group permissions below?[root@sandbox ~]# ls -l file-rw-rw-r--+ 1 root root 0 Oct 19 13:49 file[root@sandbox ~]# getfacl file# file: file# owner: root# group: rootuser::rw-user:jgimer:rw-group::r--mask::rw-other::r--

    • A.

      The user jgimer's ACL entry overwrote the group permissions, thus causing the inconsistency.

    • B.

      POSIX ACL data is stored in the group portion of the permission set of a file within the filesystem, thus causing the inconsistency.

    • C.

      There isn't any inconsistency.

    Correct Answer
    B. POSIX ACL data is stored in the group portion of the permission set of a file within the filesystem, thus causing the inconsistency.
    Explanation
    The correct answer is: POSIX ACL data is stored in the group portion of the permission set of a file within the filesystem, thus causing the inconsistency.

    In this scenario, the group permissions of the file are set to "r--" (read-only), but the user "jgimer" has been given read and write permissions through an Access Control List (ACL) entry. ACLs allow for more fine-grained control over file permissions and can override the traditional group permissions. Therefore, the ACL entry for "jgimer" is causing an inconsistency with the group permissions, as it grants additional access rights to the user.

    Rate this question:

  • 11. 

    What symbol is used to signify that an ACL is in use on a file when performing a long listing with "ls -l"?

    • A.

      *

    • B.

      -

    • C.

      +

    Correct Answer
    C. +
    Explanation
    The plus symbol (+) is used to signify that an ACL (Access Control List) is in use on a file when performing a long listing with "ls -l". This means that the file has additional permissions and restrictions beyond the traditional owner, group, and other permissions. The plus symbol indicates that there are extended permissions associated with the file, allowing for more granular control over access and security.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 20, 2010
    Quiz Created by
    Jgimer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.