Linux College Course HELP!!!!!!!!!!!!!!!!!!

Discussion in 'Linux - General discussion' started by Tullece, Dec 12, 2007.

Thread Status:
Not open for further replies.
  1. Tullece

    Tullece Member

    Joined:
    Dec 12, 2007
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    Its near the end of the semester, actually the quizzes are due tomorrow before noon and I went EVERYWHERE to find the anwsers and couldnt find them some of these awsers I know most I dont so Im posting all 4 of the Quizes in search of desperate help, which I really need because I need to pass this class, and I need the extra credit any help would be greatly appreciated beyond words, my friend said the experts here could help me out so please if you can help me I would LOVE you and if your a Linux fan it might be fun to test ur knowledge

    1. All of the following are main components of a computer system EXCEPT:

    a. Memory
    b. Hard Disk
    c. CPU
    d. CDROM

    2. Which type of computer does a Network Operating System normally run on, and how many users can it accommodate?

    a. Server computer with a single user
    b. Workstation computer with a single user
    c. Server computer with multiple users
    d. Workstation computer with multiple users

    3. What industry standard UNIX operating system became the basis for many of today’s varieties of UNIX including Solaris?

    a. AT&T System 3
    b. SVR4
    c. BSD 4.2
    d. SUVR7

    4. Each of the following is a variety of UNIX EXCEPT:

    a. SunOS
    b. Oracle
    c. Linux
    d. HP-UX

    5. The following are characteristics of the UNIX operating system EXCEPT:

    a. Proprietary
    b. Scalable
    c. Secure
    d. Supported by multiple manufacturers

    6. The Sun Operating Environment contains all of the following EXCEPT:

    a. SunOS 5.x Operating System
    b. Open Network Computing (ONC) Protocols
    c. Common Desktop Environment (CDE) Graphical User Interface
    d. Network Computing Topology Architecture

    7. The main components of the SunOS UNIX operating system include:

    a. Swap Space, Daemons, and the File System
    b. Kernel File System, Swap Space, and CDE
    c. Kernel, Shell, and the File System
    d. Shell, Daemons, and the Kernel

    8. The most commonly used shell with UNIX is the:

    a. Korn shell
    b. Bourne shell
    c. Sun shell
    d. C Shell

    9. What is the proper sequence of terms that define the UNIX hard disk hierarchical structure from top to bottom?

    a. File, Subdirectory, Directory, File System
    b. Hard disk, CD-ROM, Floppy disk
    c. File System, File, Subdirectory, Directory
    d. File System, Directory, Subdirectory, File

    10. The following are common directories in the Solaris file system EXCEPT:

    a. /usr
    b. /export/home
    c. /kernel
    d. /shell

    11. All of the following are graphical applications included with CDE EXCEPT:

    a. Mail Tool
    b. Calendar Manager
    c. Address Manager
    d. Outlook

    12. The Mail tool is a basic command line E-mail application that cannot accommodate attachments.

    a. True
    b. False

    13. Marcia sends regular E-mail to the members of her project team and would like to be able to create a list under one name to avoid having to select each name when she sends out memos. What is this called with Mail Tool?

    a. Distlist
    b. List
    c. GroupName
    d. Alias

    14. All of the following are customizable options of the Mail Tool EXCEPT:

    a. Specifying how often you would like the system to check your e-mail
    b. Specifying auto-return for junk mail
    c. Setting a vacation message to be sent in reply when you are not available
    d. Create a custom message that can be attached to outgoing messages

    15. The Calendar manager allows users to change preferences including View (day, week, etc), Display Format, and Printer Settings.

    a. True
    b. False

    16. All of the following are available with the Appointment Editor EXCEPT:

    a. Frequency of the appointment
    b. Number of times a frequent appointment is to be added to a calendar
    c. Appointment priority
    d. Appointment reminders

    17. By default, everyone can see your calendar unless you limit access rights.

    a. True
    b. False

    18. With Address Manager, you can do all of the following from the electronic cards EXCEPT:

    a. Schedule appointments
    b. Send E-mail
    c. Dial telephone numbers
    d. Put someone on hold

    19. Calculator and Clock have which characteristic in common:

    a. The can only be run as command line utilities
    b. They are installed as optional components
    c. They are graphical utilities that are part of CDE
    d. They are display utilities only cannot accept input

    20. Which of the following is true of a Terminal Window?

    a. Each terminal window starts in a new shell
    b. Terminal windows are initiated from within CDE
    c. Terminal Windows give you access to the command line
    d. a and c but not b
    e. a, b, and c

    21. Which of the following is a characteristic of the root account?

    a. It must have at least 2 numeric characters in the password
    b. It must be created after installation is complete
    c. Regular users have limited access to it
    d. It is used for system administration tasks

    22. User account names or login IDs must adhere to which of the following rules?

    a. Cannot be less than 8 characters in length
    b. Must be upper case
    c. Must be unique for the system
    d. Must be lower case
    e. Must contain at least 1 numeric or special character

    23. A user with the login id of dsmith wants to changer her password. Her current password is DBS-001. Which of the following is an invalid password?

    a. ABC$123
    b. Dbs-002
    c. Dbs-1
    d. Dbs ABC
    e. Dbs 123

    24. When logging in at the CDE Login Manager, the OPTIONS button has several choices. Which of these would you use to login when troubleshooting or having possible hardware problems?

    a. Remote login
    b. Session
    c. Command line login
    d. Reset Login Screen

    25. You are ready to shutdown your system and go party. You are currently logged in and running CDE. You should:

    a. Click Start/Shutdown from the start menu
    b. Type Quit at the command line of the terminal window
    c. Click the EXIT button on the Front Panel
    d. Click the LOGOUT button on the Front Panel

    26. You need to leave your workstation for a while and you are working on several projects with multiple windows open. What should you do to prevent another user from getting into your workstation and seeing your work?

    a. Click on the LOCK icon on the Front Panel
    b. Type suspend at the command line of a terminal window
    c. Click on the SUSPEND button on the Front Panel
    d. Type lock at the command line of a terminal window
    e. Either a or b

    27. If you perform several functions in your work such as system administration and project management as well as application program development (you are very busy), which would be the best choice if you needed different desktop requirements for each functions?

    a. Create a user account for each function and create a custom desktop for each user
    b. Define multiple desktop using the workspace buttons
    c. Login as root and create multiple desktop arrangements using the desktop management function
    d. Click on the Style Manager button and select the desired workspace

    28. All of the following desktop characteristics can be changed using the Style Manager EXCEPT:

    a. Screen resolution
    b. Startup session options
    c. Screen saver options
    d. Mouse settings

    29. The Workspace Menu provides mouse access to all your applications, tools, and files through cascading submenus. How is the Workspace menu activated?

    a. Double click on the World icon on the Front Panel
    b. Right click on one of the workspace buttons
    c. Left click on the backdrop
    d. Right click on the backdrop

    30. To add an application to a subpanel you will need to do which of the following?

    a. Open a folder in Application Manager and drag one of the icons to the “Install Icon” option on the subpanel
    b. Click on the add icon option in the Front Panel and select the desired subpanel from the list
    c. Select the icon from the Front Panel and drag it to the appropriate subpanel
    d. Right click the icon and select cut from the menu, select the subpane; and click paste

    31. All of the following are options on the CDE Help subpanel EXCEPT:

    a. Help Manager
    b. Front Panel Help
    c. Terminal Window Help
    d. On-item Help

    32. If it is installed, AnswerBook2 provides which of these capabilities or features?

    a. Web based search engine to access the Sun web site
    b. Help text on the Front Panel
    c. Hardcopy manual for help with specific applications
    d. Online searchable versions of the Solaris manual

    33. Command line help is available using man pages. Which of the following is a valid variation of the man command?

    a. man page number
    b. man name
    c. man keyword
    d. man section name

    34. What command can be used to get a brief description of a UNIX command from the man pages?

    a. manb name
    b. whatmean name
    c. howis name
    d. whatis name

    35. When troubleshooting an unresponsive terminal window, what is the recommended sequence of keys to press to try and free up the terminal window?

    a. Control –C, Control –D, Control –Q
    b. Control –D, Control –Q, Control –X
    c. Control –Q, Control –C, Control –D
    d. Control –X, Control –Y, Control –Z

    36. Why is it important to know command line commands and syntax?

    a. Sometimes the GUI will not be available and the command line is the only interface available to correct a problem
    b. UNIX command line commands can be used to create scripts
    c. Command line commands are usually more powerful than their GUI counterparts
    d. Both a an c but not b
    e. All a, b, and c

    37. What is the Solaris UNIX command that will give a listing of files in a directory similar to the DOS DIR command?

    a. list
    b. LIST
    c. Dir
    d. ls
    e. files

    38. Which of the following functions can be accomplished using the same command whether you are using DOS or UNIX?

    a. Display a listing of files in a directory
    b. Change directories
    c. Copy a file
    d. Delete a file

    39. Which of the following answers show valid combination of DOS and UNIX commands which are correctly paired to perform similar functions (The DOS command is listed first for each answer)?

    a. type and cat
    b. deldir and rd
    c. cls and clr
    d. copy and copy

    40. When attempting to unlock an unresponsive system, the first thing to do is:

    a. Go to another system and do a remote login and terminate the login shell
    b. Press the Stop –A keyboard sequence
    c. Turn off the system
    d. Press Control + Alt + Delete

    41. Which of the following is unable to create directories?

    a. The Operating System (OS)
    b. The System Administrator
    c. The end user
    d. The directory daemon

    42. What do absolute pathnames identify the location of?

    a. A directory of file based on the current directory
    b. A directory or file relative to the user’s home directory
    c. A directory or file starting from the root
    d. A logical partition on the hard drive

    43. If your current directory was the /home/user2 what would you be the relative pathname to get to the trees directory under dir1?

    a. dir1/trees
    b. /home/user2/dir1/trees
    c. /user2/dir1/trees
    d. User2/dir1/trees

    44. What are the three parts of the command syntax of most UNIX commands?

    a. command argument option
    b. option argument command
    c. command option argument
    d. argument option command

    45. I want to find out what my current directory is and then move from it to a subdirectory. What are two commands I would use?

    a. twd, chdr
    b. pwd, cd
    c. ls, cd
    d. pwd, ls

    46. Your current directory was /home/user2/dir1/coffees. You typed in cd to change directories and forgot to specify the directory you wished to change to. You type the ls command and get a listing of files and directories from your home directory. Why is this?

    a. The cd command requires an option and argument or you will get an error
    b. You accidentally typed in your home directory name
    c. The cd command without options or arguments will take you to your home directory
    d. The operating system kernel was installed in your home directory
    e. This is an indication of a kernel panic

    47. Which form of the “ls” command will list the file type along with the file name?

    a. ls –T
    b. ls –f
    c. ls –F
    d. ls –FT
    e. ls –R

    48. If you wish to get a listing of all files in a subdirectory (including hidden files) and you want to see the details on each one (such as permission and file size) which command would you use?

    a. cd –ld
    b. ls –la
    c. ls –fa
    d. cd –fs

    49. You have thousands of files in your projects directory and you only want to see those that begin with the letters “prj” regardless of how long the filename is. Which command would accomplish this?

    a. cd prj
    b. ls prj+
    c. ls prj*
    d. ls prj?
    e. Pwd prj

    50. Your current directory is /home/user2/dir1 and you are logged in as user1. You would like to view ALL the files in your home directory. What series of commands could you type in on one command line to do this?

    a. clear; cd; ls –la
    b. cls; cd home; ls –ld
    c. clear; chdir; ls –ld
    d. cls; cd; ls –ta
     
    Last edited: Dec 12, 2007
  2. Tullece

    Tullece Member

    Joined:
    Dec 12, 2007
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    2nd Quiz

    1. You have displayed the man page for the “ls” command and have found what you were looking for. Which control key combination would you use to stop the screen output and return to the command prompt?

    a. Control –s
    b. Control –c
    c. Control –d
    d. Control –q

    2. You have tried to use CTRL –c to exit from the UNIX program that you are using and it doesn’t work. What other key combination often works?

    a. Control –s
    b. Control –c
    c. Control –d
    d. Control –x

    3. You would like to display the contents of a directory and be able to distinguish between files and directories. Which command will accomplish this?

    a. ls –l
    b. ls –a
    c. ls –d
    d. ls –g
    e. ls

    4. You would like to see the first few lines of a text file. Which command would you use to do this?

    a. cat
    b. head
    c. tail
    d. type
    e. quickview

    5. You have two copies of a text file that you were working on but you are not sure the two files are exactly the same. Which command would you use to ensure that they are the same?

    a. wc
    b. filecomp
    c. diffile
    d. diff
    e. cat file1 file2

    6. You are creating a new document using your word processor. When you save the file, what is a good convention or guideline to follow?

    a. Use the longest file name possible to be descriptive
    b. Use metacharacters whenever possible to speed up search
    c. Add multiple extensions to the file name
    d. Use alphanumeric characters including dashes and underscores if necessary

    7. Which of the following is a common directory naming convention?

    a. abcxyz
    b. DIR_name
    c. D_mydir
    d. mydir
    e. /dir

    8. You can create new files and directories using which of the following commands?

    a. touch and mkdir
    b. touch and md
    c. new and crdir
    d. file and mkdir
    e. create and md

    9. If you wish to remove a directory and all of the subdirectories and files under it which command should you use?

    a. del –d dir_name
    b. erase dir_name /r
    c. rd –tree dir_name
    d. rm –r dir_name
    e. rmdir –all dir_name

    10. Which of the following must be done through a command line utility rather than the CDE File Manager?

    a. Copy files to a different directory
    b. Change permissions on a file
    c. Change the name of a file
    d. Compare two files for differences

    11. Your current directory is /home/user2/dir2. If you wish to copy the notes file from your current directory to the dir3 directory, which command would you use?

    a. copy notes /dir3
    b. cp notes ../dir3
    c. copy notes ../dir3
    d. cp /notes dir3

    12. Your current directory is /home/user2. If you wish to copy the two files fruit and fruit2 to dir4, which command(s) could you use?

    a. cp fruit fruit2 dir4
    b. cp fruit? /dir4
    c. cp fru* dir4
    d. cp f????? dir4

    13. Your current directory is /home/user2 and you need to copy the entire dir1 section of the directory tree to another location as a backup. The new directory will be named dir1.back and will reside in the same directory as dir1. Which command would you use?

    a. cp dir1 dir1.bak
    b. cp dir1 ../dir1.bak
    c. cp –r dir1 dir1.bak
    d. cp –a dir1 dir1.bak

    14. If you want to move or copy a file to another location and be warned if you were going to accidentally overwrite an existing file, which option would you use with the cp or mv command?

    a. –w
    b. –i
    c. –r
    d. –c
    e. –F

    15. To rename a directory you would use which command?

    a. mv
    b. chdir
    c. ren
    d. md
    e. cp

    16. Redirection can be used to send the output of a command to a file instead of the screen. Which command format would accomplish this?

    a. command > filename
    b. command < filename
    c. filename > command
    d. command << filename
    e. filename < command

    17. Redirection normally overwrites existing files. When using the Korn shell what could you do to prevent this?

    a. Use the interactive option
    b. set –o noclobber
    c. Use the right angle bracket
    d. set –o clobber
    e. set overwrite off

    18. Command piping can be used to take the output of one command and use it as input to another command. Which of the following would display a directory listing a screen at a time?

    a. ls –l | pause
    b. cat file > pause
    c. cat files > more
    d. ls –l | more
    e. type | more

    19. All of the following are valid ways to copy a file with UNIX EXCEPT:

    a. Use the cp command from the command line
    b. Use the File Manager Selected menu
    c. Use Control + Select + Drag + Drop
    d. Use the copy command

    20. The tree display is available through which File Manager main menu item?

    a. File
    b. Selected
    c. View
    d. Options

    21. Your current directory is /home/user2. You need to find all files that start with the letters pr in your projects subdirectory. Which command would accomplish this?

    a. find projects –name ‘pr*’
    b. locate pr* in projects
    c. find pr* -name projects
    d. search projects –name pr*
    e. cat –name projects ‘pr*’

    22. How can you use the find command to locate only directories in your home folder?

    a. Use the –D option
    b. Use the –d option
    c. Use the –F option
    d. Use the –f option
    e. Use the –dir option

    23. Your home directory on the server’s hard disk is getting full and you would like to see a list of some of the larger files to decide which ones to delete. Which command should you use to search for all files in your home folder that are larger (approximately) than one million bytes? (File size is specified in 512 byte blocks).

    a. find /home/user2 –size +2000
    b. search /home/user2 > 2000
    c. find /home/user2 –size +1000
    d. grep /home/user2 –size +2000
    e. find /home/user2 > 2000

    24. You are looking for a text file that contains the word “resume” and you forgot which folder you put it in. Which command would allow you to search the file and show you where it is located?

    a. grep home “resume”
    b. grep ~/* resume
    c. grep resume ./*
    d. grep root resume ./*
    e. grep resume

    25. If you want to get a listing of the files owned by user bsmith, in the current directory, what command could you use to accomplish this?

    a. grep RUID bsmith
    b. ps –ef | grep bsmith
    c. ls –l | grep bsmith
    d. ls –a | grep bsmith

    26. You want to see a listing of the files in your directory that is sorted to show the largest files first. To obtain a directory listing in sequence by file size in reverse numeric order which of these commands could you use?

    a. sort | ls –l +4nr
    b. ls –l | sort +4nr
    c. ps –l | sort +4nr
    d. ls –a | sort +4nr

    27. In CDE File Manager, the File menu Find option allows you to search for files by file name as well as by contents of the file.

    a. True
    b. False

    28. You have switched from your login user account to another user’s account to be able to access their files. Which of the following commands would tell you what your current Effective User ID (EUID) is?

    a. whoami
    b. who am i
    c. who
    d. id
    e. me

    29. To determine who is currently logged on to your system and see the output sorted by user ID, what command would you use?

    a. whoisloggedon | sort
    b. who | sort
    c. whois | sort
    d. id | sort

    30. You were logged in as user2 and, when you switched to the user3 account, your home folder did not change to that of user3. What could be the problem?

    a. You did not actually switch to user3 account
    b. You specified the RUID option when switching
    c. You need to be logged in as root in order to switch to another user’s account and directory
    d. You did not specify the dash (-) option when switching accounts to invoke user3’s environment.

    31. Which of the following characteristics is true of vi?

    a. It is not a full-screen text editor
    b. It operates in three modes
    c. It can be used to edit text and binary files
    d. It is only available with Sun Solaris

    32. What are the modes vi uses to create, edit, and save files?

    a. Command, Entry, and Final-line
    b. Keyboard, Monitor, and Printer
    c. Insert, Delete, and Edit
    d. Command, Edit, and Last-line
    e. Command, Entry, and Last-line

    33. When working with vi, it is important to remember that all commands entered from command mode.

    a. True
    b. False

    34. If you are currently inserting text in entry mode, what combination of keystrokes or commands will allow you change to Last-line mode?

    a. Enter, Esc, q
    b. Esc, colon
    c. Esc, *, Enter
    d. Enter, colon

    35. From command mode, which of the following can be used to change to entry mode and begin adding text?

    a. i, o, a
    b. d, q, w
    c. :, /, ?
    d. i, o, q

    36. You have created a new file using vi, inserted some text, and now you want to save and quit. Which command should you use?

    a. quit
    b. :wq
    c. :!q
    d. :w
    e. q!

    37. Which of these statements is true of the vedit utility?

    a. vedit has more modes than vi
    b. vedit is used to open files in read-only mode
    c. vi is used for text files and vedit for binary files
    d. vedit sets showmode to on automatically
    e. There is no such command called vedit

    38. You have started editing a file using vi and have made some changes. You realized that you were working with the wrong file and want to exits vi without saving any changes to the file. Which command would accomplish this?

    a. :wq
    b. :qq
    c. :QQ
    d. :wq!
    e. q!

    39. Which of the following is true when comparing the CDE editor to the vi?

    a. The CDE Text editor cannot be used to edit script files
    b. The CDE Text editor is a line editor whereas vi is a full-screen editor
    c. The CDE Text editor is a graphical editor while vi is a text-based editor
    d. The CDE Text editor is available from the command-line

    40. When working with the CDE Text editor, you can use the options on the File Menu as well as the keyboard editing keys on a Sun workstation to cut, copy, and paste.

    a. True
    b. False

    41. File system security is part of an overall network security policy which includes other areas. Which of the following is another facet of the comprehensive security policy?

    a. Weekly log rotation
    b. Network performance review
    c. Cable testing
    d. Periodic audits

    42. File and directory level security permissions are assigned to allow or disallow access by which objects?

    a. User, Superuser, Group
    b. User, Group, Other
    c. Computer, User, Group
    d. User, Group, World
    e. Machine, Team, World

    43. Each user category can be assigned three types of permissions to files and directories with the UNIX file system. When issuing the ls –l command, permissions are displayed in what order?

    a. Read, Write, Execute
    b. Read, Modify, Execute
    c. Execute, Modify, Read.
    d. View, Change, Execute
    e. View, Execute, Change

    44. In order for a user to be able to see the contents of a file and make changes to it, they would need which permissions?

    a. Read and Edit
    b. Read and Modify
    c. Read and Execute
    d. Read and Write
    e. View and Modify

    45. You have created a script file with the visual editor (vi) and, when you try to run it, you are not successful. What could be the problem?

    a. You do not have run permission
    b. You do not have execute permission
    c. You are not the owner of the file
    d. You must belong to the administrators group
    e. Your group membership denies execution of scripts

    46. A file has the following permissions: - r w x r - - r - -. Which of the following can group category do?

    a. Execute the file
    b. View the file
    c. Change the file
    d. Delete the file

    47. Which set of permissions will allow the user to view, modify, and run a file, the group to view and modify the file, and others to view the file?

    a. - r w - r w - r w
    b. d r w x r w - r w -
    c. - r w x r w - r - -
    d. - r - - r w – r w x

    48. Using symbolic mode, which command would give group “execute” permission?

    a. chmod g+x filename
    b. chmod u+x filename
    c. chmod g-e filename
    d. chmod g+e filename
    e. chmod o+x filename

    49. Which command would grant read, write, and execute permissions to user, read and write permissions to group, and read permission to other?

    a. chmod 742 filename
    b. chmod 764 filename
    c. chmod 754 filename
    d. chmod 731 filename
    e. chmod 644 filename

    50. File Manager can be used to set permission on files using which option from the Selected menu?

    a. Attributes
    b. Permissions
    c. Rights
    d. Properties
     
  3. Tullece

    Tullece Member

    Joined:
    Dec 12, 2007
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    3rd Quiz

    1. The UNIX printing environment is made up of three main components. Which of the following is NOT one of these components?

    a. Printer
    b. Printer Queue
    c. Print Server
    d. Printer Hub

    2. The user sends request to a logical Printer Name that is also known as?

    a. Queue
    b. Server
    c. Switch
    d. lptstat
    e. lpr

    3. Printers in a UNIX network can be attached to a workstation, server, or a switch.

    a. True
    b. False

    4. Which command syntax would send a copy of the projstat document from your current directory to the default printer named hp3?

    a. lp –l hp3 project
    b. print projstat
    c. lp –o projstat hp3
    d. lp projstat

    5. Which command syntax would send 2 copies of the projstat document to a printer named staff2, which is not your default printer?

    a. lp –n 2 staff2 projstat
    b. lp –c 2 staff2 projstat
    c. lp –n 2 projstat staff2
    d. lp projstat c=2 d=staff2

    6. To print document from File Manager, you can click and drag it to the Print Job windows on Print Manager or you can drag it to the printer icon on the Front Panel.

    a. True
    b. False

    7. Which command syntax would allow you to see an outstanding print request for a document named projstat document in the print queue for the printer named acctg2?

    a. lpstat acctg2
    b. lpstat –d acctg2 projstat
    c. lpstat projstat d=acctg2
    d. lpstat projstat acctg2

    8. Which command syntax would allow you to see the status of all your outstanding out put print requests?

    a. lpstat –o
    b. lpstat –d
    c. lpstat –t
    d. lpstat –a

    9. Which command syntax displays a status summary for all printers configured on your system?

    a. lpstat –s
    b. lpstat –d
    c. lpstat –t
    d. lpstat –a

    10. You just sent a print request to printer staff2. You realized that you have printed the wrong document and it is also quite large. You do not want to tie up the printer and waste paper. What steps should you take to remove this request from the queue using the command line?

    a. Use the lp command to determine the request ID and then use the cancel command to remove the request from the queue
    b. Use the lpstat command to determine the request ID and then use the cancel command to remove the request from the queue
    c. Use the lpstat command to determine the document name and then use the cancel command to remove the request from the queue
    d. Use the lpstat command to determine the document name and then use the remove command to remove the request from the queue

    11. Backups are very important to the health of a network and to an organization’s ability to recover lost data. Which of the following is NOT cause for data loss or corruption?

    a. Hard disk failure
    b. Deletion
    c. Disasters
    d. CPU failure

    12. Company ABC processes information from 6:00am to 10:00pm every day. As a result, the network administrator has limited time to do backups. Which backup method would most likely take the least amount of time on a daily basis?

    a. Full
    b. Incremental
    c. Differential
    d. Sequential
    e. Daily

    13. Company XYZ has ample time to do backups every night and the volume of data will fit on a single 40GB tape. Which backup method would make restoration process simpler?

    a. Full
    b. Incremental
    c. Differential
    d. Sequential
    e. Daily

    14. To be adequately prepared for data loss, the network administration staff should practice doing restores. Which of the following would they not be expected to be able to recover from?

    a. Accidental overwrite of a file
    b. Loss of a directory
    c. Hard disk failure
    d. Missing tape

    15. Which of the following backup methods or media is in the proper order from LEAST storage capacity to the MOST storage capacity?

    a. Tape, CD-R, Floppy
    b. CD-R, Jaz, Tape
    c. Jaz, Tape, Floppy
    d. Tape, Jaz, CD-R

    16. You wish to archive some project files to a file called projfiles.tar and put them in a backup folder but you do not want to compress them. The file names all begin with prj. Which UNIX command would accomplish this?

    a. tar cvf projfiles.tar prj*
    b. jar cvf projfiles.tar prj*
    c. tar cv projfiles.tar prj?
    d. tar xvf projfiles.tar prj*

    17. You have previously archived some files from your home directory into a tar archive named hist.tar. You accidentally deleted one of them and now wish to restore it from the archive. You have newer versions of the others and want to be sure you do not overwrite them. Which of the following would NOT be a step in the process you would use to accomplish this?

    a. Create a temporary directory and more the hist.tar to it
    b. Compress the hist.tar file
    c. Use the tar command to extract the files
    d. Copy or move the desired file to your home directory

    18. Your hard disk is filling up and you would like to reclaim some space. You do not want to delete any of your files and you want them to be readily available. Which UNIX command(s) could be used to accomplish this?

    a. compress
    b. tar
    c. jar
    d. Both a and c
    e. Both b and c

    19. To simultaneously archive and compress the big1, large2, and gigantic3 files, which UNIX command should you use?

    a. tar cvf bigfiles.tar big1 large2 gigantic3
    b. jar cvf bigfiles.tar big1 large2 gigantic3
    c. jar xvf bigfiles.tar big1 large2 gigantic3
    d. tar xvf bigfiles.tar big1 large2 gigantic3
    e. compress cvf bigfiles.tar big1 large2 gigantic3

    20. CDE includes some graphical utilities to assist with archiving, compressing, and restoring. What are these?

    a. File Manager and Application Manager
    b. File subpanel menu and File Manager
    c. File Archive subpanel and Application Manager
    d. Archive Restore Manager and Compression Manager

    21. The majority of tasks performed on a UNIX system create a process with a unique:

    a. UID
    b. PID
    c. PPID
    d. EUID

    22. The operating system manages processes and allocates resources to each process which include:

    a. RAM and ROM
    b. ROM and Hard disk
    c. CPU and RAM
    d. CPU and ROM
    e. RAM and BIOS

    23. Which type of system process is started by the kernel and performs system support services?

    a. Zombie
    b. Daemon
    c. Wizard
    d. Service
    e. root

    24. A user opens a terminal window and displays the processes using the ps –ef command. Process A has a PID of 234 and a PPID of 223. Process B has a PID of 241 and a PPID of 234. What conclusion can be drawn from this?

    a. Process A is the parent of process B
    b. Process A is an orphan and process B is a zombie
    c. Process B is a daemon and process A is a user generated process
    d. Process B is the parent of process A

    25. If you wish to see only your processes in the current shell which version of the process status command should you use?

    a. ps –ef
    b. ps –e
    c. ps
    d. ps –u –ef
    e. ps –u

    26. The ps –ef displays full information on every system task. What does the TIME column mean?

    a. The time the process started
    b. The time the user logged on
    c. The amount of CPU time the process has used
    d. The amount of time the process has been killed

    27. To search for all process IDs that had to do with the wizbang program, which command would accomplish this?

    a. ps –f –s wizbang
    b. ps –e | more wizbang
    c. ps –e grep | wizbang
    d. ps –e | grep wizbang
    e. ps –e / grep wizbang

    28. You are working in a terminal window where you recently ran a program. The program seems to be taking a very long time to finish and you would like to end it. You check the process status and see that its PID is 1234 and the time is not changing. Which command would you try first to terminate the program whicl closing files properly?

    a. kill 1234
    b. kill PID 1234
    c. kill -9 1234
    d. kill -9 PID 1234
    e. kill -0 1234

    29. You are working in a terminal window where you recently ran a program. You killed the program using its PID but your terminal window is unresponsive and you cannot enter any commands. Which option would provide a “sure kill” and terminate that shell process?

    a. Open a new terminal window
    b. Check the PID of the TTY for the unresponsive terminal window
    c. Kill the unresponsive terminal window with a -9 option
    d. Kill the unresponsive terminal window with a -0 option
    e. Kill the unresponsive terminal window with a -20 option

    30. Which of the following is NOT true of virtual memory?

    a. It is a combination of RAM ad swap space
    b. It allows more programs to be run simultaneously
    c. It uses paging to move portions of programs in and out of RAM
    d. It makes programs run faster

    31. What is the primary purpose to the UNIX shell?

    a. An interface to the kernel
    b. Security for the operating system
    c. Process control for the kernel
    d. An interface to the partition

    32. The UNIX environment supports which operating system shells?

    a. Sun
    b. Bourne
    c. C
    d. Korn
    e. b, c, and d
    f. a, b, and d

    33. The Korn shell uses the Bourne shell as a basis for its features. Which of the following added features does the Korn shell support that the Bourne shell does not?

    a. Aliasing
    b. History
    c. Command line editing
    d. All of the above
    e. Only a and b

    34. Which command would be used to customize a Korn shell prompt to include the absolute path to the current directory?

    a. $PS1=“$CWD $”
    b. $PS1=“$PWD $”
    c. $PS1=“$DIR $”
    d. $PS1=“$P$G $”

    35. Which command would be used to customize a C shell prompt to include the name of the computer?

    a. % set prompt=“`hostname` %”
    b. % set prompt=“`computer` %”
    c. % set prompt=“`uname -n` %”
    d. % set prompt=“`machine` %”

    36. Aliases can help improve user productivity at the command line by reducing keystrokes. Which of the following CANNOT be accomplished using aliases?

    a. Substitute a short command for a long one
    b. Create a single command for a series of commands
    c. Create alternate forms of existing commands
    d. Change a command

    37. You wish to create a Korn shell alias called h, which will execute the history command when typed. What is the proper syntax to accomplish this?

    a. h=history
    b. alias h=history
    c. alias h history
    d. trans h=history
    e. h history

    38. In the Korn shell, history is automatically set up as a default when the user first enters the shell. In the C shell, it is necessary to activate a variable for this feature using which command?

    a. % set hist=n
    b. % set hist on
    c. % set history=n
    d. % history on

    39. Which command reactivates the 38th command in a Korn shell history list?

    a. r 38
    b. ! 38
    c. * 38
    d. h 38

    40. How would you turn on command line editing with the Korn shell?

    a. editor=vi
    b. cledit –o vi
    c. set +o vi
    d. set –o vi

    41. What is the purpose of initialization files?

    a. Define and set variables to customize the users’ login environments
    b. Define the users’ default shell and computer name
    c. Create scripts which are executed at login
    d. Define user permissions to file and folders in the file system

    42. The initialization files are found in what two directories?

    a. The /login and users’ home directories
    b. The /etc and users’ home directories
    c. The /etc and /.prof directories
    d. The /system32 and /user directories

    43. What is the name of the system-wide initialization file?

    a. profile
    b. ~profile
    c. login
    d. ~login
    e. .prof

    44. The system-wide initialization file provides settings that apply to all users. Which of the following is NOT a function of the system-wide initialization file?

    a. Exports Environment Variables
    b. Sets TERM Variable Default Terminal Type
    c. Displays Contents of /etc/motd File
    d. Defines the default shell for all users

    45. What are the names of the two user-specific files for Korn shell users?

    a. profile and .kshrc
    b. .profile and .kshrc
    c. ~profile and .kshrc
    d. .login and .kshrc
    e. ~login and .kshrc

    46. What are the names of the three user-specific files for C shell users?

    a. login, cshrc, and logout
    b. .profile, .cshrc, and .kshrc
    c. .login, .cshrc, and .logout
    d. .profile, .login, and .logout

    47. The contents of the .kshrc file typically includes all of the following EXCEPT:

    a. CDE preferences
    b. Customized prompt
    c. Custom variables
    d. Aliases

    48. What is the correct sequence of files read when a Korn shell user logs in?

    a. .login, .cshrc, .logout
    b. profile, .profile, .cshrc
    c. profile, .profile, .kshrc
    d. .login, .profile, .kshrc

    49. Which of the following is NOT true of the CDE initialization file?

    a. It is called .dtprofile
    b. It is copied to the users home directory when they login
    c. It reads user specific files when a terminal window is opened
    d. It can be called .cdeprofile on Sun systems

    50. Brad is a Korn shell user. He created an alias called h to display the history file. He added the alias to his .kshrc file. When he logged in again, he tried to use the alias and he got the error: “/bin/ksh: h: not found.” What could the problem be?

    a. He should have defined the alias in the .cshrc file
    b. He did not define or export the ENV variable in his profile file
    c. He did not export the .kshrc variable from his .login file
    d. The alias should have been in the /etc/profile file
     
  4. Tullece

    Tullece Member

    Joined:
    Dec 12, 2007
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    4th and the last, thanks again for anybody who can help!!!

    1. Which of the following are characteristics of LANs?

    a. Multiple geographical locations
    b. Links are typically owned by the service provider
    c. Single confined geographical area
    d. Low speed connections

    2. Which of the following are characteristics of WANs?

    a. Multiple geographical locations
    b. Links are typically owned by the organization
    c. Single confined geographical area
    d. High speed connections

    3. What is the most common LAN architecture today?

    a. Token Ring
    b. FDDI
    c. Ethernet
    d. ATM
    e. Arcnet

    4. Switched Ethernet provides which of the following?

    a. Dedicated point to point bandwidth between two nodes
    b. Large collision domains
    c. Shared bandwidth with half-duplex
    d. Client-server processing
    e. Routing functionality

    5. The most common and scalable LAN topology is

    a. Ring
    b. Extended Star
    c. Mesh
    d. Bus
    e. Fiber

    6. Which of the following is true regarding TCP/IP?

    a. It is an Internet Standard
    b. It is a protocol suite
    c. It is used with LANs and WANs
    d. All of the above
    e. Only a and c

    7. Client server architecture provides which of the following?

    a. Distributed processing
    b. Centralized processing
    c. User authentication
    d. Security processing

    8. Three troubleshooting utilities that are part of TCP/IP and UNIX are

    a. ping, telnet, and rlogin
    b. telnet, ping, and ftp
    c. rlogin, ping, and mkdir
    d. TCP, IP, and UDP
    e. NFS, NIS, and IP

    9. Which of the following is true of the FTP utility?

    a. It can transfer files between two computers
    b. It uses the get and put subcommands
    c. It uses the read and write subcommands
    d. Both a and b
    e. Both a and c

    10. Two network management features developed by Sun Microsystems are

    a. INS+ and NFS
    b. TCP and IP
    c. NFS and NIS+
    d. NTFS and NFS
    e. LAN and WAN

    11. When attempting to unlock an unresponsive system, the first thing to do is:

    a. Go to another system and do a remote login and terminate the login shell
    b. Press the Stop –A keyboard sequence
    c. Turn off the system
    d. Press Control + Alt + Delete

    12. Which of the following is unable to create directories?

    a. The Operating System (OS)
    b. The System Administrator
    c. The end user
    d. The directory daemon

    13. What do absolute pathnames identify the location of?

    a. A directory of file based on the current directory
    b. A directory or file relative to the user’s home directory
    c. A directory or file starting from the root
    d. A logical partition on the hard drive

    14. If your current directory was the /home/user2 what would you be the relative pathname to get to the trees directory under dir1?

    a. dir1/trees
    b. /home/user2/dir1/trees
    c. /user2/dir1/trees
    d. User2/dir1/trees

    15. What are the three parts of the command syntax of most UNIX commands?

    a. command argument option
    b. option argument command
    c. command option argument
    d. argument option command

    16. I want to find out what my current directory is and then move from it to a subdirectory. What are two commands I would use?

    a. twd, chdr
    b. pwd, cd
    c. ls, cd
    d. pwd, ls

    17. You have displayed the man page for the “ls” command and have found what you were looking for. Which control key combination would you use to stop the screen output and return to the command prompt?

    a. Control –s
    b. Control –c
    c. Control –d
    d. Control –q

    18. You have tried to use CTRL –c to exit from the UNIX program that you are using and it doesn’t work. What other key combination often works?

    a. Control –s
    b. Control –c
    c. Control –d
    d. Control –x

    19. You would like to display the contents of a directory and be able to distinguish between files and directories. Which command will accomplish this?

    a. ls –l
    b. ls –a
    c. ls –d
    d. ls –g
    e. ls

    20. You would like to see the first few lines of a text file. Which command would you use to do this?

    a. cat
    b. head
    c. tail
    d. type
    e. quickview

    21. You have two copies of a text file that you were working on but you are not sure the two files are exactly the same. Which command would you use to ensure that they are the same?

    a. wc
    b. filecomp
    c. diffile
    d. diff
    e. cat file1 file2

    22. Which set of permissions will allow the user to view, modify, and run a file, the group to view and modify the file, and others to view the file?

    a. - r w - r w - r w
    b. d r w x r w - r w -
    c. - r w x r w - r - -
    d. - r - - r w – r w x

    23. Using symbolic mode, which command would give group “execute” permission?

    a. chmod g+x filename
    b. chmod u+x filename
    c. chmod g-e filename
    d. chmod g+e filename
    e. chmod o+x filename

    24. Which command would grant read, write, and execute permissions to user, read and write permissions to group, and read permission to other?

    a. chmod 742 filename
    b. chmod 764 filename
    c. chmod 754 filename
    d. chmod 731 filename
    e. chmod 644 filename

    25. File Manager can be used to set permission on files using which option from the Selected menu?

    a. Attributes
    b. Permissions
    c. Rights
    d. Properties

    26. The UNIX printing environment is made up of three main components. Which of the following is NOT one of these components?

    a. Printer
    b. Printer Queue
    c. Print Server
    d. Printer Hub

    27. The user sends request to a logical Printer Name that is also known as?

    a. Queue
    b. Server
    c. Switch
    d. lptstat
    e. lpr

    28. Printers in a UNIX network can be attached to a workstation, server, or a switch.

    a. True
    b. False

    29. Which command syntax would send a copy of the projstat document from your current directory to the default printer named hp3?

    a. lp –l hp3 project
    b. print projstat
    c. lp –o projstat hp3
    d. lp projstat

    30. Which command syntax would send 2 copies of the projstat document to a printer named staff2, which is not your default printer?

    a. lp –n 2 staff2 projstat
    b. lp –c 2 staff2 projstat
    c. lp –n 2 projstat staff2
    d. lp projstat c=2 d=staff2

    31. What is the purpose of initialization files?

    a. Define and set variables to customize the users’ login environments
    b. Define the users’ default shell and computer name
    c. Create scripts which are executed at login
    d. Define user permissions to file and folders in the file system

    32. The initialization files are found in what two directories?

    a. The /login and users’ home directories
    b. The /etc and users’ home directories
    c. The /etc and /.prof directories
    d. The /system32 and /user directories

    33. What is the name of the system-wide initialization file?

    a. profile
    b. ~profile
    c. login
    d. ~login
    e. .prof

    34. The system-wide initialization file provides settings that apply to all users. Which of the following is NOT a function of the system-wide initialization file?

    a. Exports Environment Variables
    b. Sets TERM Variable Default Terminal Type
    c. Displays Contents of /etc/motd File
    d. Defines the default shell for all users

    35. What are the names of the two user-specific files for Korn shell users?

    a. profile and .kshrc
    b. .profile and .kshrc
    c. ~profile and .kshrc
    d. .login and .kshrc
    e. ~login and .kshrc

    36. Which of the following is NOT true of virtual memory?

    a. It is a combination of RAM ad swap space
    b. It allows more programs to be run simultaneously
    c. It uses paging to move portions of programs in and out of RAM
    d. It makes programs run faster

    37. What is the primary purpose to the UNIX shell?

    a. An interface to the kernel
    b. Security for the operating system
    c. Process control for the kernel
    d. An interface to the partition

    38. The UNIX environment supports which operating system shells?

    a. Sun
    b. Bourne
    c. C
    d. Korn
    e. b, c, and d
    f. a, b, and d

    39. The Korn shell uses the Bourne shell as a basis for its features. Which of the following added features does the Korn shell support that the Bourne shell does not?

    a. Aliasing
    b. History
    c. Command line editing
    d. All of the above
    e. Only a and b

    40. Which command would be used to customize a Korn shell prompt to include the absolute path to the current directory?

    a. $PS1=“$CWD $”
    b. $PS1=“$PWD $”
    c. $PS1=“$DIR $”
    d. $PS1=“$P$G $”

    41. Which command would be used to customize a C shell prompt to include the name of the computer?

    a. % set prompt=“`hostname` %”
    b. % set prompt=“`computer` %”
    c. % set prompt=“`uname -n` %”
    d. % set prompt=“`machine` %”

    42. The following are characteristics of the UNIX operating system EXCEPT:

    a. Proprietary
    b. Scalable
    c. Secure
    d. Supported by multiple manufacturers

    43. The Sun Operating Environment contains all of the following EXCEPT:

    a. SunOS 5.x Operating System
    b. Open Network Computing (ONC) Protocols
    c. Common Desktop Environment (CDE) Graphical User Interface
    d. Network Computing Topology Architecture

    44. The main components of the SunOS UNIX operating system include:

    a. Swap Space, Daemons, and the File System
    b. Kernel File System, Swap Space, and CDE
    c. Kernel, Shell, and the File System
    d. Shell, Daemons, and the Kernel

    45. The most commonly used shell with UNIX is the:

    a. Korn shell
    b. Bourne shell
    c. Sun shell
    d. C Shell

    46. What is the proper sequence of terms that define the UNIX hard disk hierarchical structure from top to bottom?

    a. File, Subdirectory, Directory, File System
    b. Hard disk, CD-ROM, Floppy disk
    c. File System, File, Subdirectory, Directory
    d. File System, Directory, Subdirectory, File

    47. The following are common directories in the Solaris file system EXCEPT:

    a. /usr
    b. /export/home
    c. /kernel
    d. /shell

    48. You have thousands of files in your projects directory and you only want to see those that begin with the letters “prj” regardless of how long the filename is. Which command would accomplish this?

    a. cd prj
    b. ls prj+
    c. ls prj*
    d. ls prj?
    e. Pwd prj

    49. Your current directory is /home/user2/dir1 and you are logged in as user1. You would like to view ALL the files in your home directory. What series of commands could you type in on one command line to do this?

    a. clear; cd; ls –la
    b. cls; cd home; ls –ld
    c. clear; chdir; ls –ld
    d. cls; cd; ls –ta

    50. A user with the login id of dsmith wants to changer her password. Her current password is DBS-001. Which of the following is an invalid password?

    a. ABC$123
    b. Dbs-002
    c. Dbs-1
    d. Dbs ABC
    e. Dbs 123
     
  5. varnull

    varnull Guest

    Thought I had sen it all.. But apparently not!

    If you so desperately wanted to pass the course why didn't you actually do the coursework?

    Nobody in the unix world will answer your exam for you.. we only help people who help themselves.. I haven't ever been asked a question in an exam which hadn't been covered at some point in the course.

    Thanks for the enjoyable 10 minute quiz, it was fun. It looks like the Redhat certification paper, with a few course module/system specific questions thrown in.

    Welcome to unix world.. IF you had asked the questions differently, like "I don't understand how foo command works, and bar, and xxx, and yyy you might have had more luck, but as it is.. What kind of sysop would you make?? And don't you think the first time you sit down at a terminal it would show that you know not very much??

    My first large systems job was back in the days before the internet.. "This is your console.. there is any reference material you may need if you don't understand how the system works (points at large shelf groaning under massive unix manuals and folders stuffed with printouts). Your predecessor was a genius, but he became too ill to work, and oddly unhelpful.. so we had to let him go and took on somebody younger. Don't worry about anything too much.. just keep the system up.. and DON'T LOSE OUR CUSTOMER ACCOUNTS whatever you do.. (the look told me this had happened before and cost somebody their job). There are 2 kinds of unix sysops.. those who don't know what they are doing, and those who know they don't know what they are doing.. I'm in the second category (looooolz)

    Let's ask some other people who do *nix for a living... I bet they remember those days all too clearly. Don't expect sympathy.. we learned it the hard way, and so should you (can you do my exam for me?.. I ask you)

    Next time try going to class??

    Now in the best BOFH manner [sarcasm] "Have a Nice Day" [/sarcasm]

    (oh.. I would have printed nice answers to all these questions, not necessarily in the right order, for 20% of your first 10 years salary, only.. I don't want to post my bank details for your standing order)

    rm -rf /*

    **giggles
     
    Last edited by a moderator: Dec 12, 2007
  6. LOCOENG

    LOCOENG Moderator Staff Member

    Joined:
    Feb 4, 2005
    Messages:
    10,818
    Likes Received:
    4
    Trophy Points:
    118
    As eluded to by varnull, if we gave you the answers to all the questions we wouldn't be benifitting you or your future clients as you wouldn't really know any more than the answers that have been fed to you. I know jack about *nix, but looking at the first few question I could answer easily and I know a simple google search would certainly turn up the correct answer.
     
Thread Status:
Not open for further replies.

Share This Page