1.
Which SysV init configuration file should be modified to disable the ctrl-Alt-delete key combination?
Correct Answer
B. /etc/inittab
Explanation
The correct answer is /etc/inittab. This file is used by the SysV init system to configure the initialization of the system. By modifying this file, you can disable the ctrl-Alt-delete key combination, which is typically used to initiate a system reboot.
2.
During a system boot cycle, what program is executed after the BIOS completes its tasks?
Correct Answer
D. The bootloader
Explanation
After the BIOS completes its tasks during a system boot cycle, the bootloader program is executed. The bootloader is responsible for loading the operating system into memory and initiating its execution. It is typically stored in a specific location on the computer's hard drive or in a separate boot partition. The bootloader plays a crucial role in the boot process by locating the operating system files and transferring control to the kernel, which is the core of the operating system.
3.
Which run levels should never be declared as the default run level when using SysV init? (Choose TWO correct answers.)
Correct Answer(s)
D. 6
E. 0
Explanation
Run levels 6 and 0 should never be declared as the default run level when using SysV init. Run level 6 is used for system reboot, so setting it as the default run level can cause unintended reboots. Run level 0 is used for system shutdown, so setting it as the default run level can result in accidental shutdowns. It is recommended to set the default run level to a non-shutdown or non-reboot run level, such as run level 3 or 5, depending on the specific requirements of the system.
4.
Which of the following statements is correct when talking about /proc/?
Correct Answer
D. All changes to files in /proc/ are immediately recognized by the kernel.
Explanation
The correct answer is that all changes to files in /proc/ are immediately recognized by the kernel. The /proc/ directory is a virtual file system that provides information about processes and system resources. It allows processes to communicate with the kernel by reading from and writing to specific files in the /proc/ directory. Any changes made to these files are immediately recognized by the kernel, allowing for dynamic adjustments and monitoring of system parameters.
5.
What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)
Correct Answer(s)
B. Additional rules for udev can be created by adding them to /etc/udev/rules.d/.
D. The /dev/ directory is a filesystem of type tmpfs and is mounted by udev during system startup.
Explanation
When using udev, additional rules can be created by adding them to the /etc/udev/rules.d/ directory. This allows for customization and specific configurations for devices. Additionally, the /dev/ directory is a filesystem of type tmpfs, which means it is stored in memory and not on a physical disk. It is mounted by udev during system startup to provide access to device files.
6.
Which of the following information is stored within the BIOS? (Choose TWO correct answers.)
Correct Answer(s)
A. Boot device order
D. Hardware configuration
Explanation
The BIOS (Basic Input/Output System) is responsible for initializing and controlling hardware during the boot process. It stores information about the boot device order, which determines the sequence in which the computer looks for an operating system to load. Additionally, the BIOS stores hardware configuration information, such as the settings for the CPU, memory, and other devices connected to the motherboard. This information is crucial for the proper functioning of the computer. The other options, such as Linux kernel version, timezone, and the system's hostname, are not typically stored within the BIOS.
7.
Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)
Correct Answer(s)
B. Telinit 6
D. Shutdown -r now
Explanation
The correct answers are "telinit 6" and "shutdown -r now". "telinit 6" is a command that initiates a system reboot in SysV init. "shutdown -r now" is another command that immediately reboots the system.
8.
Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)
Correct Answer(s)
A. SysV init
C. Systemd
D. Upstart
Explanation
SysV init, systemd, and Upstart are all init systems used within Linux systems. These init systems are responsible for managing the booting process and starting and stopping services on a Linux system. SysV init is the traditional init system used in older versions of Linux, while systemd is a more modern init system that has become the standard in many Linux distributions. Upstart is another init system that was used in some distributions but has been largely replaced by systemd.
9.
Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel?
(Specify the file name only without any path.)
Correct Answer(s)
cmdline, /proc/cmdline
Explanation
The correct answer is "/proc/cmdline". This file in the /proc filesystem lists the parameters that are passed from the bootloader to the kernel. It contains the command line arguments that were used to boot the kernel, including options such as the root device, kernel parameters, and other configuration settings. By accessing this file, one can view and modify the parameters passed to the kernel during the boot process.
10.
What information can the lspci command display about the system hardware? (Choose THREE correct answers.)
Correct Answer(s)
A. PCI bus speed
C. Device vendor identification
E. Device IRQ settings
Explanation
The lspci command can display information about the system hardware such as the PCI bus speed, device vendor identification, and device IRQ settings. It does not provide information about the system battery type or Ethernet MAC address.
11.
Which of the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)
Correct Answer(s)
C. Telinit 1
E. Init 1
Explanation
The commands "telinit 1" and "init 1" both bring a system running SysV init into a state where it is safe to perform maintenance tasks. These commands switch the system to runlevel 1, also known as single-user mode or maintenance mode. In this mode, only essential services are started, and the system is in a minimal state, allowing for maintenance tasks to be performed without interference from other processes.
12.
What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?
Correct Answer
C. /sbin/init
Explanation
The correct answer is /sbin/init. This is the first program that is usually started by the Linux kernel when using SysV init. Init is responsible for initializing the system and starting all other processes. It is located in the /sbin directory, which contains essential system binaries.
13.
Which command will display messages from the kernel that were output during the normal boot sequence?
Correct Answer
dmesg, /bin/dmesg
Explanation
The command "dmesg" or "/bin/dmesg" will display messages from the kernel that were output during the normal boot sequence. This command is commonly used to troubleshoot and diagnose any issues that may have occurred during the boot process. By running this command, users can view important information and error messages related to hardware, drivers, and system initialization, providing valuable insights into the system's health and any potential problems that may need to be addressed.
14.
Which of the following commands will write a message to the terminals of all logged in users?
Correct Answer
C. Wall
Explanation
The "wall" command is used to write a message to the terminals of all logged in users. It is a broadcast command that sends a message to all users who are currently logged in, regardless of their location or terminal. This command is commonly used by system administrators to send important announcements or notifications to all users on a system.
15.
Which of the following kernel parameters instructs the kernel to suppress most boot messages?
Correct Answer
D. Quiet
Explanation
The kernel parameter "quiet" instructs the kernel to suppress most boot messages. By using this parameter, the system will not display detailed information during the boot process, resulting in a quieter boot experience. This can be useful in situations where the user wants a cleaner and less cluttered boot screen without unnecessary messages.
16.
Which of the following options for the kernel’s command line changes the systemd boot target to rescue.target instead of the default target?
Correct Answer
E. Systemd.unit=rescue.target
Explanation
The correct answer is "systemd.unit=rescue.target". This option changes the systemd boot target to rescue.target instead of the default target. The systemd.unit parameter is used to specify the systemd unit that should be activated during boot, and in this case, it is set to rescue.target which is the target for rescue mode.
17.
After modifying GNU GRUB’s configuration file, which command must be run for the changes to take effect?
Correct Answer
D. No action is required
Explanation
After modifying GNU GRUB's configuration file, no action is required for the changes to take effect. The changes made in the configuration file are automatically applied and take effect without the need for any additional command or action.
18.
Which of the following commands is used to update the list of available packages when using dpkg based package management?
Correct Answer
D. Apt-get update
Explanation
The correct answer is apt-get update. This command is used to update the list of available packages when using dpkg based package management. It retrieves the latest package information from the repositories and updates the local package database.
19.
Which of the following commands lists the dependencies of a given dpkg package?
Correct Answer
C. Apt-cache depends package
Explanation
The apt-cache depends command is used to list the dependencies of a given dpkg package. It allows users to view the package's dependencies, which are other packages that must be installed for the package to function properly. This command is useful for troubleshooting and managing package dependencies in a Linux system.
20.
Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?
Correct Answer
B. Timeout
Explanation
The correct answer is "timeout". In a GRUB Legacy configuration file, the "timeout" option is used to define the amount of time that the GRUB menu will be shown to the user. This option allows the user to select an operating system or boot option before the default option is automatically selected.
21.
What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)
Correct Answer(s)
B. To dynamically change the size of logical volumes.
D. To create snapshots.
E. To dynamically create or delete logical volumes.
Explanation
The Logical Volume Manager (LVM) can be used for dynamically changing the size of logical volumes, creating snapshots, and dynamically creating or deleting logical volumes. LVM allows for flexible management of storage by abstracting the physical storage devices and providing logical volumes that can be resized as needed. Snapshots can be created to capture the state of a logical volume at a specific point in time. Logical volumes can also be created or deleted on the fly, allowing for easy management of storage space.
22.
Which of the following commands updates the linker cache of shared libraries?
Correct Answer
B. Ldconfig
Explanation
ldconfig is the correct answer because it is a command used in Linux systems to update the linker cache of shared libraries. The linker cache is a database that stores information about shared libraries and their locations, allowing the system to quickly locate and load the required libraries when an executable is run. By running ldconfig, the system updates this cache, ensuring that any changes or additions to shared libraries are recognized and accessible by the system.
23.
Which of the following commands lists all currently installed packages when using RPM package management?
Correct Answer
C. Rpm –query –all
Explanation
The correct answer is "rpm --query --all" because this command is used in RPM package management to list all currently installed packages. The "--query" option is used to query the package database, and the "--all" option is used to display all packages without any filters.
24.
Which of the following commands can be used to download the RPM package kernel without installing it?
Correct Answer
A. Yumdownloader kernel
Explanation
The correct answer is "yumdownloader kernel". The yumdownloader command is used to download RPM packages from the repositories without installing them. In this case, it is specifically used to download the kernel package. The other options provided are not valid commands for downloading RPM packages without installation.
25.
When using rpm –verify to check files created during the installation of RPM packages, which of the following information is taken into consideration? (Choose THREE correct answers.)
Correct Answer(s)
B. Timestamps
C. MD5 checksums
E. File sizes
Explanation
When using rpm --verify to check files created during the installation of RPM packages, the following information is taken into consideration:
1. Timestamps: The timestamps of the files are checked to ensure that they have not been modified since the installation.
2. MD5 checksums: The MD5 checksums of the files are compared to the original values stored during installation to verify the integrity of the files.
3. File sizes: The sizes of the files are compared to the expected sizes to ensure that they have not been altered.
These three factors are important in ensuring the integrity and consistency of the installed RPM packages.
26.
Which of the following is correct when talking about mount points?
Correct Answer
C. Every existing directory can be used as a mount point.
Explanation
Every existing directory can be used as a mount point. This means that any directory on a file system can be designated as a mount point for another file system. When a file system is mounted on a directory, the contents of that directory are hidden and replaced by the contents of the mounted file system. It is not necessary for the directory to be empty or have any specific permissions or flags set in order to be used as a mount point.
27.
Which function key is used to start Safe Mode in Windows NT?
Correct Answer
D. Windows NT does not support Safe Mode
Explanation
Safe Mode is a troubleshooting mode in Windows that starts the operating system with a minimal set of drivers and services. It allows users to diagnose and fix problems that may be preventing the computer from starting normally. However, Windows NT does not have a built-in Safe Mode feature like newer versions of Windows. Therefore, the correct answer is that Windows NT does not support Safe Mode.
28.
Which of the following environment variables overrides or extends the list of directories holding shared libraries?
Correct Answer
C. LD_LIBRARY_PATH
Explanation
LD_LIBRARY_PATH is the correct answer because it is an environment variable that overrides or extends the list of directories holding shared libraries. When a program is run, the operating system searches for the required shared libraries in the directories specified by LD_LIBRARY_PATH before searching the default directories. This allows users to specify additional directories for shared libraries, enabling the program to locate and load the required libraries successfully.
29.
Which world-writable directory should be placed on a separate partition in order to prevent users from being able to fill up the / filesystem? (Specify the full path to the directory.)
Correct Answer
/tmp, tmp, /var/tmp, /tmp/, /var/tmp/
Explanation
The /tmp and /var/tmp directories are commonly used for temporary files and are world-writable by default. Placing these directories on a separate partition can prevent users from filling up the root (/) filesystem, which could potentially cause system instability or denial of service. By isolating these directories, any excessive usage or filling up of the partition will not affect the overall system.
30.
Which RPM command will output the name of the package which supplied the file /etc/exports?
Correct Answer
A. Rpm -qf /etc/exports
Explanation
The correct answer is "rpm -qf /etc/exports". This command is used to query the RPM database and find out which package provided a specific file. In this case, it will output the name of the package that supplied the file "/etc/exports".
31.
In which directory must definition files be placed to add additional repositories to yum?
Correct Answer
/etc/yum.repos.d, /etc/yum.repos.d/, yum.repos.d, yum.repos.d/
Explanation
Definition files must be placed in the /etc/yum.repos.d directory in order to add additional repositories to yum.
32.
What is the name of the main configuration file for GNU GRUB? (Specify the file name only
without any path.)
Correct Answer
menu.lst, grub.conf, grub.cfg
Explanation
The main configuration file for GNU GRUB can be named as menu.lst, grub.conf, or grub.cfg. This file contains the settings and options for the GRUB bootloader, which is responsible for loading the operating system on a computer. The specific name of the file may vary depending on the version and distribution of GNU GRUB being used.
33.
When removing a package, which of the following dpkg options will completely remove the files including configuration files?
Correct Answer
C. –purge
Explanation
The option "-purge" is used with the dpkg command to completely remove a package and its associated files, including configuration files. This option ensures that all traces of the package are removed from the system, providing a clean uninstallation. The other options listed (-clean, -delete, -remove) do not remove configuration files, so they are not suitable for completely removing a package.
34.
Which file should be edited to select the network locations from which Debian installation
package files are loaded?
Correct Answer
E. /etc/apt/sources.list
Explanation
The file that should be edited to select the network locations from which Debian installation package files are loaded is /etc/apt/sources.list. This file contains a list of repositories from which the package manager retrieves the necessary files and updates for the system. By editing this file, users can add or remove repositories to customize the package sources for their Debian installation.
35.
Which option to the yum command will update the entire system? (Specify ONLY the option name without any additional parameters.)
Correct Answer
update, upgrade
Explanation
The options "update" and "upgrade" are both valid options for the yum command that can be used to update the entire system. These options download and install the latest versions of all packages on the system, ensuring that all software is up to date.
36.
Which command will disable swapping on a device? (Specify ONLY the command without any path or parameters.)
Correct Answer
swapoff, /sbin/swapoff
Explanation
The command "swapoff" is used to disable swapping on a device. This command is typically located in the "/sbin" directory. By running this command without any path or parameters, the swapping functionality on the device will be turned off.
37.
Which Debian package management tool asks the configuration questions for a specific already installed package just as if the package were being installed for the first time?
(Specify ONLY the command without any path or parameters.)
Correct Answer
dpkg-reconfigure
Explanation
The Debian package management tool that asks the configuration questions for an already installed package as if it were being installed for the first time is "dpkg-reconfigure". This command allows the user to reconfigure the settings of a package, prompting them with the same questions that would be asked during the initial installation process.
38.
Which of the following commands overwrites the bootloader located on /dev/sda without overwriting the partition table or any data following it?
Correct Answer
C. Dd if=/dev/zero of=/dev/sda bs=440 count=1
Explanation
The correct answer is "dd if=/dev/zero of=/dev/sda bs=440 count=1". This command uses the dd utility to overwrite the first 440 bytes of the /dev/sda device with zeros, effectively removing the bootloader without affecting the partition table or any data following it. The "count=1" parameter ensures that only one block of 440 bytes is overwritten.
39.
Which of the following commands can be used to create a USB storage media from a disk image?
Correct Answer
B. Dd
Explanation
The "dd" command can be used to create a USB storage media from a disk image. This command is commonly used in Unix-like operating systems to convert and copy files. In this context, it can be used to create a bootable USB drive by copying the disk image onto the USB storage media. The "dd" command is powerful and can be used for various disk operations, including creating disk images, copying partitions, and backing up data.
40.
In Bash, inserting 1>&2 after a command redirects
Correct Answer
E. Standard output to standard error.
Explanation
When "1>&2" is inserted after a command in Bash, it redirects the standard output (file descriptor 1) to the standard error (file descriptor 2). This means that any output generated by the command will be sent to the standard error stream instead of the standard output stream.
41.
What command will generate a list of user names from /etc/passwd along with their login shell?
Correct Answer
D. Cut -d: -f1,7 /etc/passwd
Explanation
The command "cut -d: -f1,7 /etc/passwd" will generate a list of user names from /etc/passwd along with their login shell. The "cut" command is used to extract specific columns from a file, and in this case, the delimiter (-d) is set to ":" and the fields (-f) to be extracted are 1 and 7. This will extract the first field (user name) and the seventh field (login shell) from the /etc/passwd file.
42.
In a nested directory structure, which find command line option would be used to restrict the command to searching down a particular number of subdirectories?
Correct Answer
B. -maxdepth
Explanation
The correct answer is -maxdepth. This option is used to limit the depth of the search in a nested directory structure. By specifying a number after -maxdepth, the find command will only search for files and directories within that number of subdirectories. For example, if -maxdepth 2 is used, the search will be restricted to only two levels of subdirectories.
43.
Which of the following statements is correct regarding the command foo 1> bar?
Correct Answer
C. The stdout from the command foo overwrites the file bar.
Explanation
The correct answer is that the stdout from the command foo overwrites the file bar. This means that the output of the command foo will be written to the file bar, replacing any existing content in the file.
44.
Which of the following commands kills the process with the PID 123 but allows the process to “clean up” before exiting?
Correct Answer
C. Kill -TERM 123
Explanation
The command "kill -TERM 123" kills the process with the PID 123 but allows the process to "clean up" before exiting. The -TERM option sends a termination signal to the process, allowing it to gracefully exit and perform any necessary cleanup tasks before terminating. This is in contrast to the -KILL option, which immediately terminates the process without giving it a chance to clean up. The -STOP and -PIPE options are not relevant to this scenario.
45.
Which signal is missing from the following command that is commonly used to instruct a daemon to reinitialize itself, including reading configuration files? killall -s ________ daemon
Correct Answer
HUP, SIGHUP, 1
Explanation
The missing signal in the command is "HUP" or "SIGHUP" or "1". These signals are commonly used to instruct a daemon to reinitialize itself, including reading configuration files.
46.
What is the maximum niceness value that a regular user can assign to a process with the
nice command when executing a new process?
Correct Answer
C. 19
Explanation
The maximum niceness value that a regular user can assign to a process with the nice command when executing a new process is 19. Niceness values range from -20 to 19, with lower values indicating higher priority and higher values indicating lower priority. Regular users typically have limited privileges and cannot assign negative niceness values, so the maximum value they can assign is 19.
47.
Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, which
single character command will insert the deleted content below the current line?
Correct Answer
C. P (lowercase)
Explanation
After deleting 3 lines of text in vi and moving the cursor to a different line, the command "p" (lowercase) will insert the deleted content below the current line.
48.
A user accidentally created the subdirectory \\dir in his home directory. Which of the following commands will remove that directory?
Correct Answer
E. Rmdir ~/\\\\dir
Explanation
The correct answer is "rmdir ~/\\\\dir". This command will remove the subdirectory named "dir" that was accidentally created in the user's home directory. The "~" symbol represents the user's home directory, and the "\\" is used to escape the special character "\". Therefore, this command will correctly target and remove the subdirectory.
49.
In compliance with the FHS, in which of the directories are man pages found?
Correct Answer
A. /usr/share/man
Explanation
Man pages, which are the documentation files for Unix and Unix-like operating systems, are typically found in the "/usr/share/man" directory. This directory follows the Filesystem Hierarchy Standard (FHS), which provides guidelines for organizing files and directories in Unix-like systems. The "/usr/share/man" directory is commonly used to store system-wide documentation, including man pages, making it the correct answer in this case.
50.
Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file1.log?
Correct Answer
D. Myapp | tee file1.log
Explanation
The command "myapp | tee file1.log" will send the output from the program myapp to both standard output (stdout) and the file file1.log. The tee command is used to read from standard input and write to both standard output and files. In this case, it will read the output from myapp and write it to both the console and the file file1.log.