Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
87 Cards in this Set
- Front
- Back
When the _____________ is set for a program, the system tries to keep the executable code for the program in memory or the swap space after it finishes.
SUID bit sticky bit GUID bit None of the above. |
sticky bit
|
|
The root user has the authority to:
delete all user accounts (including management personnel) on the system without prior notification. delete any file on the system including those, that if deleted, would make the system inoperable. change or remove any password on the system without prior notification of the user. all of the above None of the above. |
all of the above
|
|
For the file with the name: solid, which of the following is not a valid use of the chmod command?
chmod 777 solid chmod ugo-rw solid chmod a+x solid chmod solid +read |
chmod solid +read
|
|
UNIX provides three mechanisms to protect files. These mechanisms include:
access privileges, password protection, and restricted physical access. encryption, restricted physical access, and virus protection software. encryption, password protection, and access privileges. encryption, spyware blocking software, and access privileges. |
encryption, password protection, and access privileges.
|
|
A file with the following permissions: -rwxr-xr-x
is readable by all users. is writeable by the owner only. is executable for other users. All of the above. |
All of the above.
|
|
The main challenge of a time-sharing operating system is to:
protect the hardware and software resources in it. fairly split time among users. keep track of all users and processes. all of the above. |
protect the hardware and software resources in it.
|
|
File access permissions include:
input/output, add/delete, and modify. owner access, group access, and others. read, write, and execute. none of these. |
read, write, and execute.
|
|
What is the result of the following command? chmod 700 *
sets access privileges for all files to read, write, and execute for the owner. removes access permissions for all users to files containing an asterisk. adds read, write and execute permission for the owner. All of the above. |
sets access privileges for all files to read, write, and execute for the owner.
|
|
When a file is encrypted it:
becomes undecipherable even if access is granted to read it. cannot be read by other users unless file permission is granted. consumes a much larger amount of disk space. is the best way to share a file with other users of the system. |
becomes undecipherable even if access is granted to read it.
|
|
When a user is given execute permission for a directory, he/she may:
read the directory contents. write files to the directory. search it. All of the above. |
search it.
|
|
Which of the following commands will remove all access permissions to file sample for the group and others?
chmod go=rwx sample chmod a-rw sample chmod go= sample chmod a= sample |
chmod go= sample
|
|
A file whose owner has read, write, and execute permissions has file permissions equivalent to an octal value of:
7 6 5 4 |
7
|
|
What command will allow a user to see the value of the bit mask used to set default file permissions for new files?
echo $MASK set permissions mask umask |
umask
|
|
A UNIX user's password:
is known to the user only (or those who get it from the user). prevents others from accessing the user's files. is stored in encrypted form in the system files. all of the above. |
all of the above.
|
|
The set-user-ID bit (SUID) allows an executable file to:
contain the user's id. be changed directly. take on the privileges of the owner of the file when it executes. All of the above. |
take on the privileges of the owner of the file when it executes.
|
|
What types of files are candidates for having the execution access permissions set for users?
data files. script files. configuration files. source files. |
script files.
|
|
A UNIX system administrator is:
commonly known as the superuser has the login name of root. has the user id of 0. all of the above |
all of the above
|
|
The output of the command: ls -l produces information about each file in the working directory including:
file name, file size, and time. file type, link count, and date. owner and owner's group. all of the above. |
all of the above.
|
|
If a UNIX system allows passwords to be made up of digits, lowercase and uppercase letters; and must contain at least 8 characters; how many possible passwords are possible?
62 to the power of 8 100 million 1 billion 1 trillion |
62 to the power of 8
|
|
UNIX users:
may be a member of a single group. may belong to multiple groups may be added or removed from groups only by the system administrator. All of the above |
All of the above
|
|
Which is not a manner of discovering a UNIX user's password?
Look it up in the password file. Guess it. Brute force through trial and error. Obtain it from the user by asking. |
Look it up in the password file.
|
|
For a directory, users granted read permission are allowed to:
write to the directory. delete files in the directory. execute files in the directory. read the directory's contents. |
read the directory's contents.
|
|
What command allows a user to set the default permissions for all new files and directories to read for all users with the owner given write and execute permissions as well?
umask 022 umask 033 chmod 744 * chmod a+rw |
umask 033
|
|
File access permissions are grouped into the categories:
user, group, and others. owner, group, and root. owner, others, and all. none of the above. |
user, group, and others.
|
|
Why is issuing the command umask 000 a bad idea?
It prevents all users from using new files. It removes permissions from new files. It creates excess security for files that don't need it. It permits all new directories and files to be read and changed by all users. |
It permits all new directories and files to be read and changed by all users.
|
|
The command: wc can be used to:
display the number of characters in a file. display the number of lines in a file. display the number of words in a file. all of the above. None of the above. |
all of the above.
|
|
What command searchs files in a file list for a given pattern, string, or expression?
grep egrep fgrep All of the above. A only. |
All of the above.
|
|
A hard link is:
A new file inode referring to the same data. A pointer to the inode of an existing file. A new file containing the path name to the original file. Any of the above can be a hard link. |
A pointer to the inode of an existing file.
|
|
In UNIX, what command can be used to compress files?
cmp backup compress cat -z filename > filename.z |
compress
|
|
Which command creates a link?
link ln cp -l None of the above is correct. |
ln
|
|
Question What command can be used to sort a file and remove duplicated lines in it?
sort filex | uniq sort < filex > unique uniq filex | sort sort > filex | uniq |
sort filex | uniq
|
|
What is the result of the following command? whereis -b ftp
searches for all binaries, source code, and manual pages for the commands in the file list. searches for the binary file for ftp locates the manual pages for ftp. all of the above. |
searches for the binary file for ftp
|
|
In a BSD UNIX system, fileA, fileB, and fileC and be sent to the printer with which command?
lpr fileA fileB fileC lp file* print file? all of the above. |
lpr fileA fileB fileC
|
|
Which type of link can be used to create a directory entry to a file in another file system?
hard link soft link cross system link any type of link will work |
soft link
|
|
Which command will combine files: address and cities in a new file called maillist?
cat address cities > maillist mv address cities > mailist cp address cities mailist more address cities >> mailist |
cat address cities > maillist
|
|
How do you remove a link to a file?
rm del delink ln -r |
rm
|
|
Which command will allow you to read the contents of file "letter.z"?
zcat letter.z cat -z letter.z uncompress letter.z uncat letter.z |
zcat letter.z
|
|
When you need to know the differences between two files you suspect of being equivalent, what command can you use?
difference compare show diff |
diff
|
|
What is the result of the following command? cat userlist phones demos
display the contents of all of the files in the list to stdout. truncates phones and demos and places the result in userlist. shows the content of userlist and ignores phones and demos. None of the above. |
display the contents of all of the files in the list to stdout.
|
|
When using vi, which command will find a line beginning with the word: "Yes"?
/^Yes/ /yes find Yes s/Yes |
/^Yes/
|
|
Which command can be used to encrypt files?
uuencode uudecode crypt None of the above. |
crypt
|
|
What is ther result of the following command? cut -d: -f5,1,6 /etc/passwd
Deletes fields 5, 1, and 6 from the ouput of the passwd file. Displays all fields from all of the lines from the passwd file Displays to stdout fields 2, 3, and 4 of the passwd file. Displays output containing fields 1, 5, and 6 from the passwd file. |
Displays output containing fields 1, 5, and 6 from the passwd file.
|
|
In UNIX, how can you rename file: "a.out" to "catalogit"?
cp a.out catalogit mv a.out catalogit cat a.out > catalogit rename a.out catalogit |
mv a.out catalogit
|
|
Which command searches a directory tree for a specific file?
grep find whereis ls |
find
|
|
Which command will append file "extra" to "customers"?
append extra to customers cat extra >> customers cp customers extra to customers mv customers extra to customers |
cat extra >> customers
|
|
What will be displayed as a result of the following command? grep -n sarwar students
The first line in file students containing sarwar. The line number of all lines in file students containing sarwar. All lines with their respective line numbers in file students containing sarwar. All lines in file sarwar containing students including line numbers. |
All lines with their respective line numbers in file students containing sarwar.
|
|
What command will make a copy of file: sample and name it as: sample.bak?
cp sample sample.bak copy sample sample.bak cp sample.bak sample copy sample.bak sample |
cp sample sample.bak
|
|
What command will delete all files with a ".cpp" extenstion?
rm *.cpp remove *.cpp rm ?.cpp del *.cpp |
rm *.cpp
|
|
What command will create a soft link named: "mypass" to /etc/passwd?
ln /etc/passwd mypass ln -s mypass /etc/passwd ln -s /etc/passwd mypass ln mypass /etc/passwd |
ln -s /etc/passwd mypass
|
|
If a file to which a soft link exists is deleted, what happens?
The soft link points to a non-existent file. The soft link is automatically removed. A file can not be deleted if a soft link to it exists. The original file can be accessed via the softlink even if the original file entry is removed. |
The soft link points to a non-existent file.
|
|
What command permits splitting stdout into two streams which can be directed to a file and a command simultaneously?
tee split <> >> |
tee
|
|
The C shell does not permit:
redirection pipes file descriptors appending to a file with the >> operator |
file descriptors
|
|
What does the following command accomplish? sort customernames > orderlist
creates a newfile named orderlist. redirects stdout from the console to a file. sorts customer list in reverse order. All of the above. A and B only. |
A and B only.
|
|
Which of the following is an example of input redirection?
grep John < namelist cat names > printfile sort | customers cut -d: f1 | /etc/password |
grep John < namelist
|
|
Which of the following will sort file: "course.dat"?
sort course.dat cat course.dat | sort sort < course.dat All of the above. |
All of the above.
|
|
Which command sorts the output of the who command and stores the result in file: "who.data"?
who | sort > who.data sort < who > who.data who | sort | who.data who > who.data | sort |
who | sort > who.data
|
|
How can you sort the contents of inventory, remove duplicate lines, and save the result in new.inventory?
sort inventory | uniq > new.inventory cat inventory | uniq | sort > new.inventory uniq inventory | sort < new.inventory cat inventory >uniq > sort > new.inventory |
sort inventory | uniq > new.inventory
|
|
UNIX automatically opens three files for every command, including:
input, output, and errors stdin, stdout, and stderr monitor, keyboard, and printer prn, con, and kybd |
stdin, stdout, and stderr
|
|
What is not the result of the following command? who | sort | grep "John" | mail -S "John's Terminal" doe@hotmail.com
The output of who is sorted. The output of who is searched for lines with "John's Terminal" embedded in them. The output of who is given the email subject line of "John's Terminal" . Email is sent to doe@hotmail.com |
The output of who is searched for lines with "John's Terminal" embedded in them.
|
|
The standard error output of a command can be redirected to a file with which of the following operators?
2> >1 <0 > |
2>
|
|
Standard input, standard output and standard error are automatically associated with:
hard drive, printer, and console. keyboard, hard drive, and printer. network card, printer, and monitor. keyboard, console monitor and console monitor. |
keyboard, console monitor and console monitor.
|
|
What does the following command do?"sort 2> sort.error 0< students 1> students.sorted"
sorts students creates sort.error reads students.sorted All of the above. A and B only. |
A and B only.
|
|
How can you see the long listing of a lengthy directory one page at a time?
ls -l -n ls -a> temp; cat temp ls -al| more ls -al > more |
ls -al| more
|
|
What is the result of the following command? sort < namelist > students
A syntax error message is produced. The sorted contents of namelist and students are displayed on stdout. The contents of students are sorted and stored in namelist. The contents of namelist are sorted and stored in students. |
The contents of namelist are sorted and stored in students.
|
|
After setting the noclobber option under the C shell, what operator permits overwriting the file to which output is redirected?
<> >! unset noclobber |> |
>!
|
|
The files stdin, stdout, and stderr are given the following integer file descriptors:
0, 1, and 2 1, 2, and 3 1, 2, and 0 1, 2 and -1 |
0, 1, and 2
|
|
In the C shell, the noclobber variable can be unset with the command:
unset noclobber reset noclobber set -n noclobber set clobber=no |
unset noclobber
|
|
What are the contents of the files created by the following command? cat long file list 1> file1 2> file2
Error messages are stored in file1 and standard output is stored in file2. error messages are stored in file2 and standard output in file1. standard output is stored in both files. standard output and error messages are both lost because of syntax errors. |
error messages are stored in file2 and standard output in file1.
|
|
In the C shell, stderr may be redirected separately form stdout with the operator:
>& 2> >>& None of the above. |
None of the above.
|
|
What single command line can be used to replace the following sequence of command lines?
cat namelist | sort > newlist uniq newlist > uniquelist cat namelist | sort | uniq > uniquelist sort namelist | uniq > uniquelist sort < namelist | uniq > uniquelist Any of the above |
sort namelist | uniq > uniquelist
|
|
How can you modify the following command to append it's stderr output to file: "error.log"?: ls -l /home/rbass
ls -l /home/rbass 1>> error.log ls -l /home/rbass 2> error.log ls -l /home/rbass 2>> error.log ls -l /home/rbass <<2 error.log |
ls -l /home/rbass 2> error.log
|
|
What connects the standard output of a command to the standard input of another command?
A pipe. A redirection operator. A connector. None of the above. |
A pipe.
|
|
Redirection refers to:
taking input from a source other than the keyboard. sending output to some location other than the monitor screen. sending error messages to some location other than the monitor. All of the above. A and B only. |
All of the above.
|
|
The standard output and standard input of UNIX commands are in the form of:
text (ascii) characters binary both binary and text depending upon the command specially encrypted codes |
text (ascii) characters
|
|
FIFO's are:
named pipes. used for communicating between separately run commands. created on the disk and not as a memory buffer. All of the above. None of the above. |
All of the above.
|
|
What is the result of the following command? head sample memo phonelist
View the first 12 lines of sample, memo, and phonelist. View the first 10 lines of sample. View the first 10 lines of each file in the list of files. None of the above. |
View the first 10 lines of each file in the list of files.
|
|
After creating a hard link to a file, the file is deleted, what happens to the hard link?
It is automatically removed. It still points to the file but the original name is deleted. It will point to nothing. You cannot delete a file which has a hard link. |
It still points to the file but the original name is deleted.
|
|
Regular expressions allow the user to:
evaluate algebraic expressions. specify a set of items by using a single character string. choose between two or more alternatives. all of the above. |
specify a set of items by using a single character string.
|
|
Which command will uncompress file: "t1.z"?
zcat t2.z uncmp t2.z uncompress -v t1.z cat -uz t2.z > t2 |
uncompress -v t1.z
|
|
What is the result of the following command? sort +3 -r -b students
sorts the file in reverse order using the fourth field as the sort key and ignoring blanks. sorts the file on the third field as the sort key and ignoring blanks. sorts the file on the third field as the sort key ignoring the uppercase/lowercase differences. sorts the file in reverse order using the first three fields as sort keys. |
sorts the file in reverse order using the fourth field as the sort key and ignoring blanks.
|
|
What is the most common and preferred method of sharing files among selected UNIX users?
Duplicate files. Common logins. Common group for slelected users. links |
links
|
|
What is a soft link?
A pointer to another file's inode. A new file containing the path name to another file. A copy of the original file. A file with a file node which is a duplicate of the original file's inode. |
A new file containing the path name to another file.
|
|
The more command allows the user to:
add another another login session. view files in multiple simultaneous console windows. display a list of users currently logged in to the UNIX server. view a file one page at a time. |
view a file one page at a time.
|
|
A pipe is called:
an interprocess communication an IPC mechanism a special interupt A and B only |
A and B only
|
|
What command can be used to remove duplicated lines from a sorted file?
unique uniq compare join |
uniq
|
|
What does the following command do? find /usr/include -name socket.h -print
starts searching from the /usr/include directory. searches for the socket.h file. prints the results of the search to stdout. All of the above. A and B only. |
All of the above.
|
|
What is the result of the following command? mkfifo -m 600 newfifo
Create a file: newfifo with read, write and execute permissions. Create a new FIFO: newfifo with read and write permissions for the owner only. Create a FIFO: newfifo with read and write permissions for all users. This is an invalid command since the new FIFO has no process to perform when it is used as a pipe. |
Create a new FIFO: newfifo with read and write permissions for the owner only.
|