Help!!! Please help answering these questions by using a Linux or any other virt
ID: 3574945 • Letter: H
Question
Help!!! Please help answering these questions by using a Linux or any other virtual machines (CentOS, Debian, or Solaris). Thank you!!!
Question1
Marks: 1
If you compute an MD5 checksum on a text file and then edit *one* character in that file, an MD5 checksum computed on the altered file will be
Choose one answer.
Question2
Marks: 1
This kill command stops the process identified by <pid>:
kill -SIGHUP <pid>
Answer:
A. True
B. False
Question3
Marks: 1
Which of the following commands mounts /dev/sda1 as /mnt/usb when /etc/fstab contains *no* entries referring to either /dev/sda1 or /mnt/usb.
Choose one answer.
Question4
Marks: 1
The lower the nice value, the lower the priority of operation
Answer:
A. True
B. False
Question5
Marks: 1
A normal user does not have permission to write to the passwd file (or the shadow file.) How then can a user change his or her password?
Choose one answer.
Question6
Marks: 1
If a man page exists in more than one section, you can specify a section number to retrieve the proper man page. Which of the following is the command you would use on Solaris to look up exec in section 2?
Choose one answer.
Question7
Marks: 1
It is possible to have multiple users with the same UID.
Answer:
A.True
B. False
Question8
Marks: 1
You should never document the configuration of your system. This way you are too valuable to be replaced by the company.
Answer:
A. True
B. False
Question9
Marks: 1
Choose ALL that are correct: In vi, to replace ALL instances of ; in a file with !, you would use:
Choose at least one answer.
Question10
Marks: 1
Who owns the spool directory in Debian?
Choose one answer.
Question11
Marks: 1
In order to use sudo, you must know the root password.
Answer:
A. True
B. False
Question12
Marks: 1
An ls -l on a file has the following information:
Which of the following is NOT true?
Choose one answer.
Question13
Marks: 1
There are two primary "flavors" of unix -- every current version of unix is some mix of these two types. Name them. You should choose exactly two.
Choose at least one answer.
Question14
Marks: 1
Logging in as root should be reserved for special situations, such as logging on in single user mode. Normally you should log in as yourself and either su or use sudo to access superuser privileges only when such privileges are necessary.
Answer:
A. True
B. False
Question15
Marks: 1
In vi, how do you get into command line mode?
Choose one answer.
Question16
Marks: 1
Match these ctrl sequences with their common bindings in a terminal.
Question17
Marks: 1
Unix was "invented" by
Choose one answer.
Question18
Marks: 1
Unix boots up in distinct stages. Match the following steps with the order in which they occur.
Question19
Marks: 1
A process is defined as an address space containing code, variables, stack, etc., and a set of data structures within the kernel
Answer:
A. True
B. False
Question20
Marks: 1
File and directory lengths are limited to 32 characters
Answer:
A. True
B. False
Question21
Marks: 1
The login shell must be listed in /etc/shells to allow users to log into the system.
Answer:
A.True
B. False
Question22
Marks: 1
Any user can change the mode (permissions) on any file owned by that user using the chmod command.
Answer:
A. True
B. False
Question23
Marks: 1
Sometimes when viewing a binary file, there is a sequence of bytes that the terminal interprets as commands, which typically results in the screen now printing gibberish instead of normal characters. When this happens, the only option is to kill the terminal.
Answer:
A. True
B. False
Question24
Marks: 1
Login names can only be alphanumeric characters.
Answer:
A. True
B. False
Question25
Marks: 1
Match the following components of a process with its description.
Question26
Marks: 1
A default umask of 022 will create files with which of the following permissions:
Choose one answer.
Question27
Marks: 1
Choose the best answer -- Group membership is defined in:
Choose one answer.
Question28
Marks: 1
Match the following functions in vi with the commands to invoke them:
Question29
Marks: 1
Choose everything that is true of DES hashes.
Choose at least one answer.
Question30
Marks: 1
What is the effect of issuing the following command at a shell prompt: /etc/init.d/K22httpd
Choose one answer.
Question31
Marks: 1
What is the action and order of execution of the following two startup scripts in /etc/rc3.d? S20inetd K28nfs.server
Choose one answer.
Question32
Marks: 1
A process can decrease its niceness.
Answer:
A. True
B. False
Question33
Marks: 1
Under Solaris, which command from the boot PROM will rebuild the disk configuration?
Choose one answer.
Question34
Marks: 1
Where are the startup scripts for run level 3 located on Debian?
Choose one answer.
Question35
Marks: 1
You wish to create a symbolic link with the name /etc/rc3.d/S85httpd which is linked to an actual file named /etc/init.d/httpd. You would use which command:
Choose one answer.
Help!!! Please help answering these questions by using a Linux or any other virtual machines (CentOS, Debian, or Solaris). Thank you!!!
Question1
Marks: 1
If you compute an MD5 checksum on a text file and then edit *one* character in that file, an MD5 checksum computed on the altered file will be
Choose one answer.
A. changed by one byte B. identical C. a completely different stringQuestion2
Marks: 1
This kill command stops the process identified by <pid>:
kill -SIGHUP <pid>
Answer:
A. True
B. False
Question3
Marks: 1
Which of the following commands mounts /dev/sda1 as /mnt/usb when /etc/fstab contains *no* entries referring to either /dev/sda1 or /mnt/usb.
Choose one answer.
A. mount /dev/sda1 /mnt/usb B. mount /dev/sda1 C. mount /mnt/usb /dev/sda1 D. mount /mnt/usbQuestion4
Marks: 1
The lower the nice value, the lower the priority of operation
Answer:
A. True
B. False
Question5
Marks: 1
A normal user does not have permission to write to the passwd file (or the shadow file.) How then can a user change his or her password?
Choose one answer.
A. By using a program called passwd which is setgid to root. B. By using sudo to access limited permissions to change passwords. C. By using a program called passwd which is setuid to root.Question6
Marks: 1
If a man page exists in more than one section, you can specify a section number to retrieve the proper man page. Which of the following is the command you would use on Solaris to look up exec in section 2?
Choose one answer.
A. man exec B. man 2 exec C. man -k exec D. man -s 2 execQuestion7
Marks: 1
It is possible to have multiple users with the same UID.
Answer:
A.True
B. False
Question8
Marks: 1
You should never document the configuration of your system. This way you are too valuable to be replaced by the company.
Answer:
A. True
B. False
Question9
Marks: 1
Choose ALL that are correct: In vi, to replace ALL instances of ; in a file with !, you would use:
Choose at least one answer.
A. :1,$s/;/!/ B. :1,$s/;/!/g C. :%s/;/!/g D. :s/;/!/gQuestion10
Marks: 1
Who owns the spool directory in Debian?
Choose one answer.
A. daemon B. root C. system D. binQuestion11
Marks: 1
In order to use sudo, you must know the root password.
Answer:
A. True
B. False
Question12
Marks: 1
An ls -l on a file has the following information:
-r-xr-xr-- root pauth 28088 2005-04-19 10:48 chsh
Which of the following is NOT true?
Choose one answer.
A. A member of the group pauth can execute it B. root can execute it C. No one can write to it D. Anyone can execute itQuestion13
Marks: 1
There are two primary "flavors" of unix -- every current version of unix is some mix of these two types. Name them. You should choose exactly two.
Choose at least one answer.
A. OSF/1 B. BSD C. AIX D. System V E. UnixWareQuestion14
Marks: 1
Logging in as root should be reserved for special situations, such as logging on in single user mode. Normally you should log in as yourself and either su or use sudo to access superuser privileges only when such privileges are necessary.
Answer:
A. True
B. False
Question15
Marks: 1
In vi, how do you get into command line mode?
Choose one answer.
A. / B. : C. <ESC> key D.Question16
Marks: 1
Match these ctrl sequences with their common bindings in a terminal.
CTRL- Choose... Erase one character of input Sends the end of file indication Suspend the current process INT signal QUIT signal CTRL-H Choose... Erase one character of input Sends the end of file indication Suspend the current process INT signal QUIT signal CTRL-C Choose... Erase one character of input Sends the end of file indication Suspend the current process INT signal QUIT signal CTRL-D Choose... Erase one character of input Sends the end of file indication Suspend the current process INT signal QUIT signal CTRL-Z Choose... Erase one character of input Sends the end of file indication Suspend the current process INT signal QUIT signalQuestion17
Marks: 1
Unix was "invented" by
Choose one answer.
A. Novell B. AT & T C. Xerox PARC D. Santa Cruz OperationQuestion18
Marks: 1
Unix boots up in distinct stages. Match the following steps with the order in which they occur.
Creation of spontaneous system processes Choose... 2 1 4 5 3 Execution of system startup scripts Choose... 2 1 4 5 3 Device detection and configuration Choose... 2 1 4 5 3 Loading and initialization of the kernel Choose... 2 1 4 5 3 Multiuser operation Choose... 2 1 4 5 3Question19
Marks: 1
A process is defined as an address space containing code, variables, stack, etc., and a set of data structures within the kernel
Answer:
A. True
B. False
Question20
Marks: 1
File and directory lengths are limited to 32 characters
Answer:
A. True
B. False
Question21
Marks: 1
The login shell must be listed in /etc/shells to allow users to log into the system.
Answer:
A.True
B. False
Question22
Marks: 1
Any user can change the mode (permissions) on any file owned by that user using the chmod command.
Answer:
A. True
B. False
Question23
Marks: 1
Sometimes when viewing a binary file, there is a sequence of bytes that the terminal interprets as commands, which typically results in the screen now printing gibberish instead of normal characters. When this happens, the only option is to kill the terminal.
Answer:
A. True
B. False
Question24
Marks: 1
Login names can only be alphanumeric characters.
Answer:
A. True
B. False
Question25
Marks: 1
Match the following components of a process with its description.
Inverse priority of the process Choose... PPID EUID/EGID PID UID/GID niceness Process ID number Choose... PPID EUID/EGID PID UID/GID niceness Parent process ID number Choose... PPID EUID/EGID PID UID/GID niceness Effective user/group IDs Choose... PPID EUID/EGID PID UID/GID niceness Real user/group IDs Choose... PPID EUID/EGID PID UID/GID nicenessQuestion26
Marks: 1
A default umask of 022 will create files with which of the following permissions:
Choose one answer.
A. -rw-r----- B. -rwx--x--x C. -r-xr-xr-x D. -rwxr-xr-xQuestion27
Marks: 1
Choose the best answer -- Group membership is defined in:
Choose one answer.
A. /etc/group B. /etc/passwd C. /etc/shadow D. Both /etc/passwd and /etc/groupQuestion28
Marks: 1
Match the following functions in vi with the commands to invoke them:
Delete from the cursor to the end of the line Choose... d$ i x dw dd Delete a line Choose... d$ i x dw dd Start insert mode Choose... d$ i x dw dd Delete a word Choose... d$ i x dw dd Delete a character Choose... d$ i x dw ddQuestion29
Marks: 1
Choose everything that is true of DES hashes.
Choose at least one answer.
A. It has no limit to the password length (there is a 255 character implementation length due to limits in the handling utilities) B. The hash is 31 characters long C. The hash is 13 characters long D. It can be in /etc/passwd or in /etc/shadow E. It has an 8 character maximum usable password lengthQuestion30
Marks: 1
What is the effect of issuing the following command at a shell prompt: /etc/init.d/K22httpd
Choose one answer.
A. nothing -- that command is not legal from a shell B. httpd is stopped C. httpd is started D. nothing -- you must add a "start" or a "stop" parameterQuestion31
Marks: 1
What is the action and order of execution of the following two startup scripts in /etc/rc3.d? S20inetd K28nfs.server
Choose one answer.
A. nfs.server is stopped, then inetd is started B. inetd is started, then nfs.server is stopped C. nfs.server is started, then inetd is stopped D. inetd is stopped, then nfs.server is startedQuestion32
Marks: 1
A process can decrease its niceness.
Answer:
A. True
B. False
Question33
Marks: 1
Under Solaris, which command from the boot PROM will rebuild the disk configuration?
Choose one answer.
A. probe-scsi B. boot -s C. boot -r D. boot -aQuestion34
Marks: 1
Where are the startup scripts for run level 3 located on Debian?
Choose one answer.
A. /etc/rc3.d B. /etc/rc.d/rc3.dQuestion35
Marks: 1
You wish to create a symbolic link with the name /etc/rc3.d/S85httpd which is linked to an actual file named /etc/init.d/httpd. You would use which command:
Choose one answer.
A. ln -s /etc/rc3.d/S85httpd /etc/init.d/httpd B. ls -l /etc/rc3.d/S85httpd /etc/init.d/httpd C. ls -l /etc/init.d/httpd /etc/rc3.d/S85httpd D. ln -s /etc/init.d/httpd /etc/rc3.d/S85httpdExplanation / Answer
Answer :
Question2
Marks: 1
This kill command stops the process identified by <pid>:
kill -SIGHUP <pid>
Answer:
A. True
B. False
Answer :
A.True
...............
Question4
The lower the nice value, the lower the priority of operation
Answer:
A. True
B. False
Answer :
B. False
.............
Question7
Marks: 1
It is possible to have multiple users with the same UID.
Answer:
A.True
B. False
Answer :
B.False
..............
Question 10
Who owns the spool directory in Debian?
Answer :
B.root
..............
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.