Question 1.1. (TCO 1) _____ is a type of license for software for which the source code is released along with the actual software, enabling the knowledgeable user to modify the software. (Points : 6)
Source code Closed source Shareware Open source
Question 2.2. (TCO 2) _____ consists of the physical components inside a computer that are electrical in nature. (Points : 6)
Hardware Firmware Software Linux kernel
Question 3.3. (TCO 2) _____ divides a hard disk into adjacent sections, each of which can contain a separate file system used to store data. (Points : 6)
Slicing Swapping Partitioning Selecting
Question 4.4. (TCO 3) After a user logs in to a terminal, he or she receives a user interface called _____. (Points : 6)
shell user profile user env interpreter
Question 5.5. (TCO 3) The _____ command displays the last five lines of a text file. (Points : 6)
end -5 head -5 stop -5 tail -5
Question 6.6. (TCO 3) The Linux command that is used to display the contents of one or more text files (similar to the MSDOS Type command) is _____. (Points : 6)
ls cat lpr show cc
Question 7.7. (TCO 3) In UNIX, runlevel _____ is also known as multiuser mode. (Points : 6)
3 4 5 6 0
Question 8.8. (TCO 3) The Linux wildcard "P?G" will select which of the following files? (Points : 6)
PIGS Peg PuG PinG
Question 9.9. (TCO 3) A user interface that can also interpret commands is called _____. (Points : 6)
shell user profile user env interpreter
Question 1.1. (TCO 6) Host name resolution is performed by which service? (Points : 6)
DNS DHCP FTP nslookup
Question 2.2. (TCO 6) Name a protocol listed below that is connection oriented. (Points : 6)
UDP IP TCP Ping
Question 3.3. (TCO 6) After connecting to an FTP site, the _____ command will upload multiple files. (Points : 6)
mget get mput put read
Question 4.4. (TCO 5) The utility program _____ can be used to verify all well-known ports that might be inadvertently left open when not in use. (Points : 6)
nmap snort netstat ping
Question 5.5. (TCO 5) What is the name of the stable and reliable firewall daemon that is freely available in every version of Linux? (Points : 6)
ipfirewall ipnat ipchains iptables
Question 6.6. (TCO 5) Which secure shell command allows one network host to securely copy a file to another network host without requiring a user login? (Points : 6)
ftp scp sftp tftp
Question 7.7. (TCO 5) Select the correct shell command line below that will set up a secure shell (ssh) connection between user jonesj and server 10.0.1.10. (Points : 6)
ssh -l jonesj 10.0.1.10 ssh -s jonesj 10.0.1.10 ssh -c 10.0.1.10 jonesj ssh -i 10.0.1.10 jonesj
Question 8.8. (TCO 4) For security reasons, _____ is the name of the file that holds each user’s actual encrypted password. (Points : 6)
/etc/passwd /etc/group /etc/sysconfig /etc/shadow
Question 9.9. (TCO 4) Given the permissions -rwxrwxr-x, the _____ will not be able to delete the specified file. (Points : 6)
current owner or creator root user owner or creator's primary group unspecified (other) users and groups
Question 10.10. (TCO 4) After the user is created, the content of the _____ directory is copied to the new users' home directory. (Points : 6)
/usr directory /etc/skel /home /root
Question 11.11. (TCO 4) The chgrp command takes _____ argument(s) at minimum. (Points : 6)
one two three four
Question 1.1. (TCO 7) What TCP/IP protocol can be configured to automatically manage and assign static IP addresses to network hosts? (Points : 6)
Dynamic hub configuration protocol Dynamic interface configuration protocol Dynamic host configuration protocol Dynamic configured host protocol
Question 2.2. (TCO 7) In the Linux sudoers configuration file, which of the following lines will give all of the users in the group students the right to execute the service command? (Points : 6)
%students ALL=/sbin/service $students ALL=/sbin/service students -g ALL=/sbin/service group students ALL=/sbin/service
Question 3.3. (TCO 8) Which X component controls the position and manipulation of the windows in a GUI? (Points : 6)
Graphical library Window manager X client X server
Short answer
Question 4.4. (TCO 7) What is the path and filename for the file that allows standard users or groups to execute specific commands normally reserved for the root user (superuser)? (Points : 16)
Question 5.5. (TCO 6) What is the name of the TCP/IP protocol that is used to view web pages, and what is the well-known TCP port number for this protocol? (Points : 16)
Question 6.6. (TCO 5) What is the command required to create a set of public and private keys that can be used by SSH (secure shell)? (Points : 16)
Question 7.7. (TCO 4) What is the command that will create a new user named johnsmith? (Points : 16)
Question 8.8. (TCO 3) What is the single command that will display all files in the /bin directory that begin with the letters a, b, or c, assuming /root is the current directory? (Points : 16)
Question 9.9. (TCO 2) What is the documentation that specifies which computer manufacturers and models Linux has been successfully installed on? (Points : 16)
Question 10.10. (TCO 1) For companies that are using Linux, what is the greatest expense that may be incurred? (Points : 16)
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Blog
Archive
Contact
google+twitterfacebook
Copyright © 2019 HomeworkMarket.com