1.
(Linux) Which of the following commands can be used to read the manual for your applications?
Correct Answer
D. Man
Explanation
The "man" command in Linux is used to read the manual for various applications. It provides detailed information about the usage, options, and syntax of a particular command or program. By typing "man" followed by the name of the command or program, users can access the manual pages and get the necessary documentation and instructions. Therefore, "man" is the correct command to read the manual for applications in Linux.
2.
(Linux) Which of the following commands is NOT used in the management of files and directories?
Correct Answer
A. Ping
Explanation
Ping is a command used for network troubleshooting and testing connectivity between two devices. It is not used in the management of files and directories.
3.
(Linux) Which of the following files contains hashes of user passwords on most modern Linux distributions?
Correct Answer
D. /etc/shadow
Explanation
The correct answer is /etc/shadow. This file contains the hashed passwords of user accounts on most modern Linux distributions. It is used to enhance security by storing the password hashes instead of the actual passwords, making it harder for unauthorized users to access the passwords. The /etc/shadow file is only accessible by the root user, ensuring that only privileged users can access the password hashes.
4.
(Linux) What is the UID of the root user?
Correct Answer
A. 0
Explanation
The UID of the root user in Linux is 0. The root user is the superuser who has complete control over the system and all its resources. The UID (User ID) is a unique numerical identifier assigned to each user in the system, and the root user is assigned the UID 0. This allows the root user to have unrestricted access to all files, directories, and system operations.
5.
(Linux) What would the permissions be after running command "chmod 754 file"?
Correct Answer
B. -rwxr-xr--
Explanation
The command "chmod 754 file" sets the permissions for the file to read, write, and execute for the owner, read and execute for the group, and read-only for others. Therefore, the correct answer is "-rwxr-xr--", which represents these permission settings.
6.
(Linux) Which command will set the permission of a file to read only for all users?
Correct Answer
D. Chmod 444
Explanation
The command "chmod 444" will set the permission of a file to read-only for all users. In Linux, the "chmod" command is used to change the permissions of a file or directory. The three numbers represent the permissions for the owner, group, and others respectively. Each number can range from 0 to 7, with 0 indicating no permissions and 7 indicating full permissions. In this case, "444" means that the owner, group, and others have read-only permission, while no write or execute permissions are granted.
7.
(Linux) Which command will copy a file?
Correct Answer
A. Cp orig.txt copy.txt
Explanation
The correct answer is "cp orig.txt copy.txt". This command will copy the file named "orig.txt" and create a new file named "copy.txt" with the same content.
8.
(Linux) This command will change the current location to the user's home directory?
Correct Answer
C. Cd ~
Explanation
The command "cd ~" is used to change the current location to the user's home directory in Linux. The tilde (~) represents the home directory of the current user. Using this command will navigate to the home directory regardless of the current location.
9.
(Linux) Which of the following is NOT a standard I/O stream in Linux?
Correct Answer
D. STDREAD
Explanation
STDREAD is not a standard I/O stream in Linux. The standard I/O streams in Linux are STDIN, STDOUT, and STDERR. STDIN is the standard input stream, used for reading input from the user or from a file. STDOUT is the standard output stream, used for displaying output to the user or redirecting it to a file. STDERR is the standard error stream, used for displaying error messages. However, STDREAD is not a recognized standard I/O stream in Linux.
10.
(Linux) True/False the sudo command lets users switch to a full shell as a different user.
Correct Answer
B. False
Explanation
The sudo command does not let users switch to a full shell as a different user. Instead, it allows users to execute specific commands with administrative privileges. This means that users can run certain commands as a different user, but they do not have access to a full shell as that user.
11.
(Linux) Which directory contains configuration files?
Correct Answer
D. /etc
Explanation
The directory "/etc" contains configuration files in Linux. This directory is commonly used to store system-wide configuration files that are required by various applications and services. It is a standard convention to keep configuration files in this directory to ensure easy access and organization.
12.
(Linux) When multiple commands to be executed are on one line they must be seperated by what symbol?
Correct Answer
D. ;
Explanation
When multiple commands need to be executed on one line in Linux, they must be separated by the semicolon symbol (;). This symbol acts as a command separator, allowing each command to be executed sequentially. Using the semicolon ensures that each command is executed independently without any dependencies or conditions.
13.
(Linux) Which of the following commands can be used to grab portions of text out of a string?
Correct Answer
A. Cut
Explanation
The cut command in Linux can be used to grab portions of text out of a string. It allows you to specify a delimiter and select specific fields or columns from a text file or input stream. This is useful when you want to extract specific data from a larger set of information.
14.
(Linux) Which of the following commands will search for a particular file in specified directory?
Correct Answer
B. Find
Explanation
The correct answer is "find." The find command is used in Linux to search for files and directories within a specified directory. It allows users to search for files based on various criteria such as name, size, type, and more. By using the find command followed by the directory path and search criteria, users can locate and retrieve specific files within a given directory.
15.
(Linux) Which symbol represents comments in a BASH script?
Correct Answer
B. #
Explanation
In a BASH script, the symbol "#" is used to represent comments. Comments are lines in the script that are not executed and are used to provide explanations or documentation about the code. These comments are ignored by the interpreter and are only for human readability.
16.
(Linux) What will the following command in a BASH script output to the screen? echo "$#"
Correct Answer
B. The number of parameters is printered
Explanation
The command "echo "$#"" in a BASH script will output the number of parameters to the screen.
17.
(Linux) True/False An environment variable is used by the system and applications to read settings from the system.
Correct Answer
A. True
Explanation
An environment variable is a dynamic value that can affect the behavior of a system or application. It is used by the system and applications to read settings from the system. These variables provide a way for programs to interact with the operating system and access important information such as system paths, user preferences, and configuration settings. By using environment variables, the system and applications can easily adapt to different environments and user preferences without the need for hardcoding specific values. Therefore, the given statement that an environment variable is used by the system and applications to read settings from the system is true.
18.
(Linux) True/False The operator -ne can be used to compare strings.
Correct Answer
B. False
Explanation
The operator -ne in Linux is used to compare numerical values, not strings. To compare strings, the operator to be used is !=. Therefore, the given statement is false.
19.
(Linux) What are the two types of loops used in BASH scripting?
Correct Answer
C. For, while
Explanation
BASH scripting in Linux supports two types of loops: "for" and "while". The "for" loop is used to iterate over a set of values or elements, executing a block of code for each iteration. On the other hand, the "while" loop is used to repeatedly execute a block of code as long as a specified condition is true. These two types of loops provide flexibility and control in executing repetitive tasks in BASH scripting.
20.
(Linux) Which of the following regular expressions would find Orville or Wilbur Wright on a line by itself?
Correct Answer
C. ^(Orville | Wilbur) Wright$
Explanation
The correct regular expression is ^(Orville | Wilbur) Wright$. This regular expression will match a line that starts with either "Orville" or "Wilbur", followed by a space, and then "Wright" at the end of the line. The ^ symbol represents the start of the line, the $ symbol represents the end of the line, and the | symbol represents the OR operator.
21.
(Networking) What would the subnet mask be for the IP range 172.16.0.0/8?
Correct Answer
A. 255.0.0.0
Explanation
The subnet mask for the IP range 172.16.0.0/8 would be 255.0.0.0. This is because the /8 notation indicates that the first 8 bits of the IP address are the network portion, and the remaining 24 bits are the host portion. The subnet mask is used to divide the IP address into network and host portions, and in this case, the first 8 bits are masked with 255, while the remaining bits are masked with 0, resulting in a subnet mask of 255.0.0.0.
22.
(Networking) True or False: In order to communicate with devices on the same subnet, a computer must communicate with its Default Gateway.
Correct Answer
B. False
Explanation
False. In order to communicate with devices on the same subnet, a computer does not need to communicate with its Default Gateway. The Default Gateway is only required when the computer needs to communicate with devices on a different subnet or outside of its local network. Within the same subnet, devices can communicate directly with each other using their IP addresses and subnet masks without involving the Default Gateway.
23.
(Networking) Fragmentation occurs at which layer(s) of the OSI Model?
Correct Answer
A. Fragmentation occurs at Layer 3 only
Explanation
Fragmentation occurs at Layer 3 only because it is the network layer of the OSI model. Fragmentation is the process of dividing a packet into smaller fragments to fit the maximum transmission unit (MTU) of a network. This process is necessary when the packet size exceeds the MTU of the network. Layer 2, which is the data link layer, is responsible for framing and error checking, but it does not handle fragmentation. Layer 4, the transport layer, is responsible for segmenting and reassembling data, but it does not handle fragmentation either. Therefore, fragmentation occurs only at Layer 3, the network layer.
24.
(Networking) Which of the following network IP addresses must use NAT to access resources on the internet?
Correct Answer
D. All of the above
Explanation
All of the given network IP addresses (10.5.4.2, 172.16.52.4, and 192.168.1.4) must use NAT (Network Address Translation) to access resources on the internet. This is because these IP addresses fall under private IP address ranges, which are not routable on the internet. NAT allows these private IP addresses to be translated into a single public IP address, allowing them to communicate with resources on the internet.
25.
(Networking) You want to configure your firewall to allow people inside your network to ping anyone, but not allow anyone outside your network to traceroute anything behind your firewall, How should you configure it?
Correct Answer
D. Block all outbound ICMP Time Exceeded In Transit
Explanation
By blocking all outbound ICMP Time Exceeded In Transit, the firewall will prevent anyone outside the network from tracerouting anything behind the firewall. This means that external users will not be able to determine the path or hops to reach destinations behind the firewall. However, allowing people inside the network to ping anyone indicates that ICMP Echo requests and responses are allowed. Therefore, blocking all other types of ICMP traffic, such as ICMP Echo responses or all outbound ICMP, will not interfere with this configuration.
26.
(Networking) The three packets (In order) responsible for establishing a connection over TCP are:
Correct Answer
C. SYN, SYN-ACK, ACK
Explanation
The correct answer is SYN, SYN-ACK, ACK. In TCP (Transmission Control Protocol), the process of establishing a connection between two devices is known as the TCP handshake. It involves a three-way handshake where the client sends a SYN (synchronize) packet to the server, the server responds with a SYN-ACK (synchronize-acknowledge) packet, and finally, the client acknowledges the server's response with an ACK (acknowledge) packet. This three-step process ensures that both devices agree on the initial sequence numbers and establishes a reliable connection for data transmission.
27.
(Networking) VAlid TCP ports are within the range:
Correct Answer
B. 0-65535
Explanation
The valid TCP ports range from 0 to 65535. TCP (Transmission Control Protocol) is a communication protocol used for transmitting data over networks. The port number is used to identify a specific process or service running on a device. In TCP, port numbers range from 0 to 65535, with ports 0 to 1023 being well-known ports reserved for common services like HTTP (port 80) or FTP (port 21). Ports 1024 to 65535 are available for general use by applications and services.
28.
(Netoworking) Select the following statement that is true:
Correct Answer
B. Transferring data over UDP is less reliable than over TCP
Explanation
Transferring data over UDP is less reliable than over TCP. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee the delivery of data packets, whereas TCP (Transmission Control Protocol) is a reliable protocol that ensures the delivery of data packets by using acknowledgments and retransmissions. Therefore, TCP is considered more reliable for data transfer compared to UDP.
29.
(Networking) Identify the commands used to obtain the routing table information on a windows machine (Select all that are correct)
Correct Answer(s)
A. Route print
D. Netstat -r
Explanation
The correct commands to obtain the routing table information on a Windows machine are "route print" and "netstat -r". The "route print" command displays the routing table information, including the network destination, netmask, gateway, interface, and metric. The "netstat -r" command also displays the routing table information, showing the network destination, netmask, gateway, interface, and metric, along with additional information such as the source and destination IP addresses. The other options, "ip -a", "ip -r", and "ifconfig /a", are not valid commands for obtaining the routing table information on a Windows machine.
30.
(Networking) As a packet travels from the source to destination, it may travel across networks that support different maximum packet sizes. If a network router has a packet that is 1500 bytes long and the destination interface for that packet can onlly accept packet that is 1400 bytes, _________ will occur.
Correct Answer
C. Fragmentation
Explanation
When a network router receives a packet that is larger than the maximum packet size allowed by the destination interface, it needs to break down or fragment the packet into smaller pieces that can be accommodated by the interface. This process is known as fragmentation. The router will divide the original packet into smaller fragments and add necessary headers to each fragment. These fragments will then be sent individually to the destination, where they will be reassembled to form the original packet.
31.
(Windows) What tool on windows manages and applies patches on your system?
Correct Answer
A. Windows Update
Explanation
Windows Update is the correct answer because it is the tool on Windows that manages and applies patches on the system. It is a built-in feature of Windows operating systems that allows users to download and install updates for the operating system, drivers, and other Microsoft software. Windows Update ensures that the system is up to date with the latest security patches, bug fixes, and feature enhancements released by Microsoft. It is an essential tool for maintaining the security and stability of a Windows system.
32.
(Windows) What command is used to list the files and subdirectories in a directory?
Correct Answer
A. Dir
Explanation
The correct answer is "dir". The "dir" command is used in Windows to list the files and subdirectories in a directory. It displays the names, sizes, and timestamps of the files and directories present in the specified location. The "ls" command is used in Unix-based systems like Linux for the same purpose. "list" and "showfiles" are not valid commands in Windows.
33.
(Windows) What command will display the processes that are currently running on the local system?
Correct Answer
A. Tasklist
Explanation
The correct answer is "tasklist". This command is used in Windows to display a list of all the processes that are currently running on the local system. It provides information such as the process ID, memory usage, and CPU usage of each process. By using this command, users can easily monitor and manage the processes running on their computer.
34.
(Windows) The netstat -n command will provide what information?
Correct Answer
C. Active network connections with numeric port numbers and ip address
Explanation
The netstat -n command in Windows provides information about active network connections with numeric port numbers and IP addresses. It does not give the number of network interfaces on the system, the number of active users on the system, or connections that are not active.
35.
(Windows) Based on Mandatory Integrity Controls, a browser such as Internet Explorer can modify Operating System files.
Correct Answer
B. False
Explanation
Based on Mandatory Integrity Controls, a browser such as Internet Explorer does not have the ability to modify Operating System files. Mandatory Integrity Controls enforce strict access controls, preventing lower integrity processes like browsers from modifying higher integrity files. Therefore, the statement is false.
36.
(Windows) Explicit file permissions take precedence over inherited file permissions.
Correct Answer
A. True
Explanation
Explicit file permissions refer to the permissions that are specifically set for a file or folder, while inherited file permissions are those that are automatically inherited from the parent folder. In this case, the correct answer suggests that explicit file permissions take precedence over inherited file permissions. This means that if there are conflicting permissions between the explicit permissions set for a file and the inherited permissions from the parent folder, the explicit permissions will be prioritized and applied.
37.
(Windows) What command allows you to run a program as a different user?
Correct Answer
A. Runas.exe
Explanation
The command "runas.exe" allows you to run a program as a different user in Windows. This command is used to launch applications or commands with different user credentials, providing the ability to execute programs with elevated privileges or as a different user account. By using "runas.exe", users can temporarily switch to another user account without logging off, which is useful for performing administrative tasks or running programs that require different permissions.
38.
(Windows) What registry Hive contains the settings for each user of the system?
Correct Answer
B. HKEY_Users
Explanation
The HKEY_Users registry hive contains the settings for each user of the system. This hive stores user-specific configuration data such as preferences, desktop settings, and application settings. It allows multiple users to have their own unique settings and configurations on a Windows system.
39.
(Windows) Which of the following will NOT provide you a listing of all services running on the Windows System?
Correct Answer
D. Regedit
Explanation
Regedit is the Windows Registry Editor, which is used to view and modify the Windows Registry. The Windows Registry contains configuration settings for the Windows operating system and installed applications, but it does not provide a listing of all services running on the system. Therefore, regedit will not provide a listing of all services running on the Windows system.
40.
(Windows) Which of the following commands is used to connect or disconnect from remote resources?
Correct Answer
B. Net use
Explanation
The command "net use" is used to connect or disconnect from remote resources in Windows. This command allows users to map a network drive to a local drive letter, connecting to shared folders or network resources on remote computers. It can also be used to disconnect from a network resource when it is no longer needed.
41.
(Powershell) Using the output from one cmdlet as an input in another cmdlet is called in PowerShell?
Correct Answer
B. Pipeline
Explanation
In PowerShell, using the output from one cmdlet as an input in another cmdlet is called a pipeline. The pipeline allows the output of one command to be passed directly as input to another command, creating a continuous flow of data processing. This enables efficient and concise scripting by allowing multiple cmdlets to be combined in a single command line, enhancing the power and flexibility of PowerShell.
42.
(Powershell) Which of the following is NOT a common cmdlet used in PowerShell?
Correct Answer
A. Pull-Processes
Explanation
The cmdlet "Pull-Processes" is not a common cmdlet used in PowerShell. The other three cmdlets, "Format-Table", "Get-Content", and "Sort-Object", are commonly used in PowerShell for various tasks.
43.
(Powershell) Which of the following will provide you with a list of PowerShell cmdlets used to manage services?
Correct Answer
C. Get-Command --Noun Services
Explanation
The correct answer is "Get-Command --Noun Services" because the Get-Command cmdlet is used to retrieve all available cmdlets in PowerShell, and the "--Noun Services" parameter filters the results to only display cmdlets related to managing services.
44.
(Powershell) The Get-ChildItem cmdlet in PowerShell can only be used to list files and directories.
Correct Answer
B. False
Explanation
The statement is false because the Get-ChildItem cmdlet in PowerShell can be used to list not only files and directories, but also other items such as registry keys, certificates, and other PowerShell providers. It provides a way to retrieve information about various types of items in a specified location.
45.
(Powershell) Which setting is NOT a valid Execution Policy for PowerShell scripts?
Correct Answer
B. CASigned
Explanation
The CASigned setting is not a valid Execution Policy for PowerShell scripts. The valid Execution Policies are AllSigned, RemoteSigned, and Restricted. CASigned is not a recognized Execution Policy in PowerShell.
46.
(Powershell) Curly braces ({}) are used in PowerShell for Script Blocks (i.e. commands inside of commands).
Correct Answer
A. True
Explanation
Curly braces ({}) are indeed used in PowerShell for Script Blocks, which are essentially a way to group multiple commands together and treat them as a single unit. This allows for more complex and structured scripting in PowerShell. Therefore, the statement "Curly braces ({}) are used in PowerShell for Script Blocks" is true.
47.
(Powershell) Square Brackets are used in PowerShell for all of the following EXCEPT:
Correct Answer
B. Accessing a Property
Explanation
Square brackets are used in PowerShell for type declaration, accessing a property, and working with arrays. However, they are not used for accessing a property. In PowerShell, properties of an object are accessed using dot notation, such as $object.property. Square brackets are used for indexing and accessing elements within an array or collection.
48.
(Powershell) Which of the following is a valid comparison operator in PowerShell?
Correct Answer
A. -ge
Explanation
The "-ge" operator in PowerShell is used for numerical comparison and stands for "greater than or equal to". It checks if the value on the left is greater than or equal to the value on the right. It is a valid comparison operator in PowerShell and is commonly used in conditional statements to evaluate numerical values.
49.
(Powershell) What is the term used in PowerShell for the short names for commands?
Correct Answer
C. Aliases
Explanation
In PowerShell, the term used for the short names for commands is "Aliases". Aliases are alternative names or shortcuts for commands, allowing users to execute commands using a shorter or more familiar name. This helps to save time and increase productivity when working with PowerShell commands.
50.
(Powershell) the cmlet to filter which object is passed further down the pipeline in PowerShell is:
Correct Answer
C. Where-Object
Explanation
The correct answer is "Where-Object". In PowerShell, the "Where-Object" cmdlet is used to filter objects based on a specified condition. It allows you to select only the objects that meet the specified criteria and pass them further down the pipeline for further processing. This cmdlet is commonly used for filtering data in PowerShell scripts and commands.