• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/87

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

87 Cards in this Set

  • Front
  • Back
When the _____________ is set for a program, the system tries to keep the executable code for the program in memory or the swap space after it finishes.

SUID bit
sticky bit
GUID bit
None of the above.
sticky bit
The root user has the authority to:

delete all user accounts (including management personnel) on the system without prior notification.
delete any file on the system including those, that if deleted, would make the system inoperable.
change or remove any password on the system without prior notification of the user.
all of the above
None of the above.
all of the above
For the file with the name: solid, which of the following is not a valid use of the chmod command?

chmod 777 solid
chmod ugo-rw solid
chmod a+x solid
chmod solid +read
chmod solid +read
UNIX provides three mechanisms to protect files. These mechanisms include:

access privileges, password protection, and restricted physical access.
encryption, restricted physical access, and virus protection software.
encryption, password protection, and access privileges.
encryption, spyware blocking software, and access privileges.
encryption, password protection, and access privileges.
A file with the following permissions: -rwxr-xr-x

is readable by all users.
is writeable by the owner only.
is executable for other users.
All of the above.
All of the above.
The main challenge of a time-sharing operating system is to:

protect the hardware and software resources in it.
fairly split time among users.
keep track of all users and processes.
all of the above.
protect the hardware and software resources in it.
File access permissions include:

input/output, add/delete, and modify.
owner access, group access, and others.
read, write, and execute.
none of these.
read, write, and execute.
What is the result of the following command? chmod 700 *

sets access privileges for all files to read, write, and execute for the owner.
removes access permissions for all users to files containing an asterisk.
adds read, write and execute permission for the owner.
All of the above.
sets access privileges for all files to read, write, and execute for the owner.
When a file is encrypted it:

becomes undecipherable even if access is granted to read it.
cannot be read by other users unless file permission is granted.
consumes a much larger amount of disk space.
is the best way to share a file with other users of the system.
becomes undecipherable even if access is granted to read it.
When a user is given execute permission for a directory, he/she may:

read the directory contents.
write files to the directory.
search it.
All of the above.
search it.
Which of the following commands will remove all access permissions to file sample for the group and others?

chmod go=rwx sample
chmod a-rw sample
chmod go= sample
chmod a= sample
chmod go= sample
A file whose owner has read, write, and execute permissions has file permissions equivalent to an octal value of:

7
6
5
4
7
What command will allow a user to see the value of the bit mask used to set default file permissions for new files?

echo $MASK
set permissions
mask
umask
umask
A UNIX user's password:

is known to the user only (or those who get it from the user).
prevents others from accessing the user's files.
is stored in encrypted form in the system files.
all of the above.
all of the above.
The set-user-ID bit (SUID) allows an executable file to:

contain the user's id.
be changed directly.
take on the privileges of the owner of the file when it executes.
All of the above.
take on the privileges of the owner of the file when it executes.
What types of files are candidates for having the execution access permissions set for users?

data files.
script files.
configuration files.
source files.
script files.
A UNIX system administrator is:

commonly known as the superuser
has the login name of root.
has the user id of 0.
all of the above
all of the above
The output of the command: ls -l produces information about each file in the working directory including:

file name, file size, and time.
file type, link count, and date.
owner and owner's group.
all of the above.
all of the above.
If a UNIX system allows passwords to be made up of digits, lowercase and uppercase letters; and must contain at least 8 characters; how many possible passwords are possible?

62 to the power of 8
100 million
1 billion
1 trillion
62 to the power of 8
UNIX users:

may be a member of a single group.
may belong to multiple groups
may be added or removed from groups only by the system administrator.
All of the above
All of the above
Which is not a manner of discovering a UNIX user's password?

Look it up in the password file.
Guess it.
Brute force through trial and error.
Obtain it from the user by asking.
Look it up in the password file.
For a directory, users granted read permission are allowed to:

write to the directory.
delete files in the directory.
execute files in the directory.
read the directory's contents.
read the directory's contents.
What command allows a user to set the default permissions for all new files and directories to read for all users with the owner given write and execute permissions as well?

umask 022
umask 033
chmod 744 *
chmod a+rw
umask 033
File access permissions are grouped into the categories:

user, group, and others.
owner, group, and root.
owner, others, and all.
none of the above.
user, group, and others.
Why is issuing the command umask 000 a bad idea?

It prevents all users from using new files.
It removes permissions from new files.
It creates excess security for files that don't need it.
It permits all new directories and files to be read and changed by all users.
It permits all new directories and files to be read and changed by all users.
The command: wc can be used to:

display the number of characters in a file.
display the number of lines in a file.
display the number of words in a file.
all of the above.
None of the above.
all of the above.
What command searchs files in a file list for a given pattern, string, or expression?

grep
egrep
fgrep
All of the above.
A only.
All of the above.
A hard link is:

A new file inode referring to the same data.
A pointer to the inode of an existing file.
A new file containing the path name to the original file.
Any of the above can be a hard link.
A pointer to the inode of an existing file.
In UNIX, what command can be used to compress files?

cmp
backup
compress
cat -z filename > filename.z
compress
Which command creates a link?

link
ln
cp -l
None of the above is correct.
ln
Question What command can be used to sort a file and remove duplicated lines in it?

sort filex | uniq
sort < filex > unique
uniq filex | sort
sort > filex | uniq
sort filex | uniq
What is the result of the following command? whereis -b ftp

searches for all binaries, source code, and manual pages for the commands in the file list.
searches for the binary file for ftp
locates the manual pages for ftp.
all of the above.
searches for the binary file for ftp
In a BSD UNIX system, fileA, fileB, and fileC and be sent to the printer with which command?

lpr fileA fileB fileC
lp file*
print file?
all of the above.
lpr fileA fileB fileC
Which type of link can be used to create a directory entry to a file in another file system?

hard link
soft link
cross system link
any type of link will work
soft link
Which command will combine files: address and cities in a new file called maillist?

cat address cities > maillist
mv address cities > mailist
cp address cities mailist
more address cities >> mailist
cat address cities > maillist
How do you remove a link to a file?

rm
del
delink
ln -r
rm
Which command will allow you to read the contents of file "letter.z"?

zcat letter.z
cat -z letter.z
uncompress letter.z
uncat letter.z
zcat letter.z
When you need to know the differences between two files you suspect of being equivalent, what command can you use?

difference
compare
show
diff
diff
What is the result of the following command? cat userlist phones demos

display the contents of all of the files in the list to stdout.
truncates phones and demos and places the result in userlist.
shows the content of userlist and ignores phones and demos.
None of the above.
display the contents of all of the files in the list to stdout.
When using vi, which command will find a line beginning with the word: "Yes"?

/^Yes/
/yes
find Yes
s/Yes
/^Yes/
Which command can be used to encrypt files?

uuencode
uudecode
crypt
None of the above.
crypt
What is ther result of the following command? cut -d: -f5,1,6 /etc/passwd

Deletes fields 5, 1, and 6 from the ouput of the passwd file.
Displays all fields from all of the lines from the passwd file
Displays to stdout fields 2, 3, and 4 of the passwd file.
Displays output containing fields 1, 5, and 6 from the passwd file.
Displays output containing fields 1, 5, and 6 from the passwd file.
In UNIX, how can you rename file: "a.out" to "catalogit"?

cp a.out catalogit
mv a.out catalogit
cat a.out > catalogit
rename a.out catalogit
mv a.out catalogit
Which command searches a directory tree for a specific file?

grep
find
whereis
ls
find
Which command will append file "extra" to "customers"?

append extra to customers
cat extra >> customers
cp customers extra to customers
mv customers extra to customers
cat extra >> customers
What will be displayed as a result of the following command? grep -n sarwar students

The first line in file students containing sarwar.
The line number of all lines in file students containing sarwar.
All lines with their respective line numbers in file students containing sarwar.
All lines in file sarwar containing students including line numbers.
All lines with their respective line numbers in file students containing sarwar.
What command will make a copy of file: sample and name it as: sample.bak?

cp sample sample.bak
copy sample sample.bak
cp sample.bak sample
copy sample.bak sample
cp sample sample.bak
What command will delete all files with a ".cpp" extenstion?

rm *.cpp
remove *.cpp
rm ?.cpp
del *.cpp
rm *.cpp
What command will create a soft link named: "mypass" to /etc/passwd?

ln /etc/passwd mypass
ln -s mypass /etc/passwd
ln -s /etc/passwd mypass
ln mypass /etc/passwd
ln -s /etc/passwd mypass
If a file to which a soft link exists is deleted, what happens?

The soft link points to a non-existent file.
The soft link is automatically removed.
A file can not be deleted if a soft link to it exists.
The original file can be accessed via the softlink even if the original file entry is removed.
The soft link points to a non-existent file.
What command permits splitting stdout into two streams which can be directed to a file and a command simultaneously?

tee
split
<>
>>
tee
The C shell does not permit:

redirection
pipes
file descriptors
appending to a file with the >> operator
file descriptors
What does the following command accomplish? sort customernames > orderlist

creates a newfile named orderlist.
redirects stdout from the console to a file.
sorts customer list in reverse order.
All of the above.
A and B only.
A and B only.
Which of the following is an example of input redirection?

grep John < namelist
cat names > printfile
sort | customers
cut -d: f1 | /etc/password
grep John < namelist
Which of the following will sort file: "course.dat"?

sort course.dat
cat course.dat | sort
sort < course.dat
All of the above.
All of the above.
Which command sorts the output of the who command and stores the result in file: "who.data"?

who | sort > who.data
sort < who > who.data
who | sort | who.data
who > who.data | sort
who | sort > who.data
How can you sort the contents of inventory, remove duplicate lines, and save the result in new.inventory?

sort inventory | uniq > new.inventory
cat inventory | uniq | sort > new.inventory
uniq inventory | sort < new.inventory
cat inventory >uniq > sort > new.inventory
sort inventory | uniq > new.inventory
UNIX automatically opens three files for every command, including:

input, output, and errors
stdin, stdout, and stderr
monitor, keyboard, and printer
prn, con, and kybd
stdin, stdout, and stderr
What is not the result of the following command? who | sort | grep "John" | mail -S "John's Terminal" doe@hotmail.com

The output of who is sorted.
The output of who is searched for lines with "John's Terminal" embedded in them.
The output of who is given the email subject line of "John's Terminal" .
Email is sent to doe@hotmail.com
The output of who is searched for lines with "John's Terminal" embedded in them.
The standard error output of a command can be redirected to a file with which of the following operators?

2>
>1
<0
>
2>
Standard input, standard output and standard error are automatically associated with:

hard drive, printer, and console.
keyboard, hard drive, and printer.
network card, printer, and monitor.
keyboard, console monitor and console monitor.
keyboard, console monitor and console monitor.
What does the following command do?"sort 2> sort.error 0< students 1> students.sorted"

sorts students
creates sort.error
reads students.sorted
All of the above.
A and B only.
A and B only.
How can you see the long listing of a lengthy directory one page at a time?

ls -l -n
ls -a> temp; cat temp
ls -al| more
ls -al > more
ls -al| more
What is the result of the following command? sort < namelist > students

A syntax error message is produced.
The sorted contents of namelist and students are displayed on stdout.
The contents of students are sorted and stored in namelist.
The contents of namelist are sorted and stored in students.
The contents of namelist are sorted and stored in students.
After setting the noclobber option under the C shell, what operator permits overwriting the file to which output is redirected?

<>
>!
unset noclobber
|>
>!
The files stdin, stdout, and stderr are given the following integer file descriptors:

0, 1, and 2
1, 2, and 3
1, 2, and 0
1, 2 and -1
0, 1, and 2
In the C shell, the noclobber variable can be unset with the command:

unset noclobber
reset noclobber
set -n noclobber
set clobber=no
unset noclobber
What are the contents of the files created by the following command? cat long file list 1> file1 2> file2

Error messages are stored in file1 and standard output is stored in file2.
error messages are stored in file2 and standard output in file1.
standard output is stored in both files.
standard output and error messages are both lost because of syntax errors.
error messages are stored in file2 and standard output in file1.
In the C shell, stderr may be redirected separately form stdout with the operator:

>&
2>
>>&
None of the above.
None of the above.
What single command line can be used to replace the following sequence of command lines?

cat namelist | sort > newlist
uniq newlist > uniquelist

cat namelist | sort | uniq > uniquelist
sort namelist | uniq > uniquelist
sort < namelist | uniq > uniquelist
Any of the above
sort namelist | uniq > uniquelist
How can you modify the following command to append it's stderr output to file: "error.log"?: ls -l /home/rbass

ls -l /home/rbass 1>> error.log
ls -l /home/rbass 2> error.log
ls -l /home/rbass 2>> error.log
ls -l /home/rbass <<2 error.log
ls -l /home/rbass 2> error.log
What connects the standard output of a command to the standard input of another command?

A pipe.
A redirection operator.
A connector.
None of the above.
A pipe.
Redirection refers to:

taking input from a source other than the keyboard.
sending output to some location other than the monitor screen.
sending error messages to some location other than the monitor.
All of the above.
A and B only.
All of the above.
The standard output and standard input of UNIX commands are in the form of:

text (ascii) characters
binary
both binary and text depending upon the command
specially encrypted codes
text (ascii) characters
FIFO's are:

named pipes.
used for communicating between separately run commands.
created on the disk and not as a memory buffer.
All of the above.
None of the above.
All of the above.
What is the result of the following command? head sample memo phonelist

View the first 12 lines of sample, memo, and phonelist.
View the first 10 lines of sample.
View the first 10 lines of each file in the list of files.
None of the above.
View the first 10 lines of each file in the list of files.
After creating a hard link to a file, the file is deleted, what happens to the hard link?

It is automatically removed.
It still points to the file but the original name is deleted.
It will point to nothing.
You cannot delete a file which has a hard link.
It still points to the file but the original name is deleted.
Regular expressions allow the user to:

evaluate algebraic expressions.
specify a set of items by using a single character string.
choose between two or more alternatives.
all of the above.
specify a set of items by using a single character string.
Which command will uncompress file: "t1.z"?

zcat t2.z
uncmp t2.z
uncompress -v t1.z
cat -uz t2.z > t2
uncompress -v t1.z
What is the result of the following command? sort +3 -r -b students

sorts the file in reverse order using the fourth field as the sort key and ignoring blanks.
sorts the file on the third field as the sort key and ignoring blanks.
sorts the file on the third field as the sort key ignoring the uppercase/lowercase differences.
sorts the file in reverse order using the first three fields as sort keys.
sorts the file in reverse order using the fourth field as the sort key and ignoring blanks.
What is the most common and preferred method of sharing files among selected UNIX users?

Duplicate files.
Common logins.
Common group for slelected users.
links
links
What is a soft link?

A pointer to another file's inode.
A new file containing the path name to another file.
A copy of the original file.
A file with a file node which is a duplicate of the original file's inode.
A new file containing the path name to another file.
The more command allows the user to:

add another another login session.
view files in multiple simultaneous console windows.
display a list of users currently logged in to the UNIX server.
view a file one page at a time.
view a file one page at a time.
A pipe is called:

an interprocess communication
an IPC mechanism
a special interupt
A and B only
A and B only
What command can be used to remove duplicated lines from a sorted file?

unique
uniq
compare
join
uniq
What does the following command do? find /usr/include -name socket.h -print

starts searching from the /usr/include directory.
searches for the socket.h file.
prints the results of the search to stdout.
All of the above.
A and B only.
All of the above.
What is the result of the following command? mkfifo -m 600 newfifo

Create a file: newfifo with read, write and execute permissions.
Create a new FIFO: newfifo with read and write permissions for the owner only.
Create a FIFO: newfifo with read and write permissions for all users.
This is an invalid command since the new FIFO has no process to perform when it is used as a pipe.
Create a new FIFO: newfifo with read and write permissions for the owner only.