You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-1 (101-500) Practice Test 7 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-1 (101-500)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
What nice value can be used to tell the system that the process should have the lowest priority possible?
Correct
Nice values range from -20 to 19, where -20 gives the highest priority and 19 the lowest priority.
Incorrect
Nice values range from -20 to 19, where -20 gives the highest priority and 19 the lowest priority.
Unattempted
Nice values range from -20 to 19, where -20 gives the highest priority and 19 the lowest priority.
Question 2 of 60
2. Question
Which command will return only the name and ID of the last 5 users present in the /etc/passwd file?
Correct
The tail -5 (or -n5) command shows the last 5 lines of the file. The cut crop part of the information, -d sets the field delimiter, and -f specifies the fields to display.
Incorrect
The tail -5 (or -n5) command shows the last 5 lines of the file. The cut crop part of the information, -d sets the field delimiter, and -f specifies the fields to display.
Unattempted
The tail -5 (or -n5) command shows the last 5 lines of the file. The cut crop part of the information, -d sets the field delimiter, and -f specifies the fields to display.
Question 3 of 60
3. Question
Which of the following commands will parse the input.txt file and replace all the references of the word Linux with LINUX (all uppercase) in your output?
Correct
In sed, the statement must be enclosed in single quotation marks. Another importan point is the “g“, of global, at the end of the expression, without it only the first occurrence of each line would be replaced, not all occurrences.
Incorrect
In sed, the statement must be enclosed in single quotation marks. Another importan point is the “g“, of global, at the end of the expression, without it only the first occurrence of each line would be replaced, not all occurrences.
Unattempted
In sed, the statement must be enclosed in single quotation marks. Another importan point is the “g“, of global, at the end of the expression, without it only the first occurrence of each line would be replaced, not all occurrences.
Question 4 of 60
4. Question
Among the files below, which will be listed when using the ls command as follows:
Correct
In the shell‘s globbing file, [] determines a list of characters that can be used, just one of them. {} Makes it possible to define a list of possible strings.
Incorrect
In the shell‘s globbing file, [] determines a list of characters that can be used, just one of them. {} Makes it possible to define a list of possible strings.
Unattempted
In the shell‘s globbing file, [] determines a list of characters that can be used, just one of them. {} Makes it possible to define a list of possible strings.
Question 5 of 60
5. Question
Which ls parameters will cause all the details of the files and directories, including the hidden ones, to be displayed, sorted so that the most recently created/modified files appear at the bottom of the list?
Correct
In the “ls“ command, the “a“ option displays the hidden files, the “l“ shows the details, the “t“ command so that the older files appear at the end of the command and the “r“ reverses the file, making the newer files appear at the end of the listing.
Incorrect
In the “ls“ command, the “a“ option displays the hidden files, the “l“ shows the details, the “t“ command so that the older files appear at the end of the command and the “r“ reverses the file, making the newer files appear at the end of the listing.
Unattempted
In the “ls“ command, the “a“ option displays the hidden files, the “l“ shows the details, the “t“ command so that the older files appear at the end of the command and the “r“ reverses the file, making the newer files appear at the end of the listing.
Question 6 of 60
6. Question
Which command is able to determine the type of a file based on its text and format patterns?
Correct
The “file“ command can be used to determine the type of a file. The “type“ command is used to identify whether a command is internal or external to the shell. whatis shows only a description of the command.
Incorrect
The “file“ command can be used to determine the type of a file. The “type“ command is used to identify whether a command is internal or external to the shell. whatis shows only a description of the command.
Unattempted
The “file“ command can be used to determine the type of a file. The “type“ command is used to identify whether a command is internal or external to the shell. whatis shows only a description of the command.
Question 7 of 60
7. Question
Which options should be used in the find command to find all files modified in the last 7 days in the /etc directory?
Correct
The find has 3 types of time search: ctime (change time) = last change of content and/or properties (permissions, etc), mtime (modification time) = last change of content, atime (access time) = last time the file has been accessed. As for the values, consider the following to simplify, where n is the number of days: + n: more than n days ago, for example, +30 = Files changed for more than 30 days. -n: less than n days ago, for example, -30 = Files changed in the last 30 days. n: 1 day ago, for example 30 = Files changed exactly 30 days ago. 0: within the last 24 hours.
Incorrect
The find has 3 types of time search: ctime (change time) = last change of content and/or properties (permissions, etc), mtime (modification time) = last change of content, atime (access time) = last time the file has been accessed. As for the values, consider the following to simplify, where n is the number of days: + n: more than n days ago, for example, +30 = Files changed for more than 30 days. -n: less than n days ago, for example, -30 = Files changed in the last 30 days. n: 1 day ago, for example 30 = Files changed exactly 30 days ago. 0: within the last 24 hours.
Unattempted
The find has 3 types of time search: ctime (change time) = last change of content and/or properties (permissions, etc), mtime (modification time) = last change of content, atime (access time) = last time the file has been accessed. As for the values, consider the following to simplify, where n is the number of days: + n: more than n days ago, for example, +30 = Files changed for more than 30 days. -n: less than n days ago, for example, -30 = Files changed in the last 30 days. n: 1 day ago, for example 30 = Files changed exactly 30 days ago. 0: within the last 24 hours.
Question 8 of 60
8. Question
Which symbol causes the default output of a first command to be used as input to the next command?
Correct
The symbol | (pipe), uses the output of the first command as the input of the next command. The & is used to execute a command in the background. O ; executes commands in sequence and > redirects the output to a file.
Incorrect
The symbol | (pipe), uses the output of the first command as the input of the next command. The & is used to execute a command in the background. O ; executes commands in sequence and > redirects the output to a file.
Unattempted
The symbol | (pipe), uses the output of the first command as the input of the next command. The & is used to execute a command in the background. O ; executes commands in sequence and > redirects the output to a file.
Question 9 of 60
9. Question
Which command should be used so that the result of the “ls -l“ command is written to the end of the log.out file, without deleting the previous contents of that file?
Correct
Unlike the >, the redirector >> makes an append at the end of the file informed, keeping what was written previously. The tee overwrites the file by default.
Incorrect
Unlike the >, the redirector >> makes an append at the end of the file informed, keeping what was written previously. The tee overwrites the file by default.
Unattempted
Unlike the >, the redirector >> makes an append at the end of the file informed, keeping what was written previously. The tee overwrites the file by default.
Question 10 of 60
10. Question
Which of the following commands will not display any results on the user‘s screen?
Correct
The redirector >> causes the output of the command, instead of being sent to the screen, to be sent to a file.
Incorrect
The redirector >> causes the output of the command, instead of being sent to the screen, to be sent to a file.
Unattempted
The redirector >> causes the output of the command, instead of being sent to the screen, to be sent to a file.
Question 11 of 60
11. Question
Which command will redirect the stout of the command to the file output.out and the sterr to the file output.err?
Correct
In Linux there are 3 main descriptors: stin = descriptor 0 = standard input, stdout = descriptor 1 = standard output, stderr = descriptor 2 = error output. The> and the >> redirect stdout, 2> and 2 >> redirect stderr, and
Incorrect
In Linux there are 3 main descriptors: stin = descriptor 0 = standard input, stdout = descriptor 1 = standard output, stderr = descriptor 2 = error output. The> and the >> redirect stdout, 2> and 2 >> redirect stderr, and
Unattempted
In Linux there are 3 main descriptors: stin = descriptor 0 = standard input, stdout = descriptor 1 = standard output, stderr = descriptor 2 = error output. The> and the >> redirect stdout, 2> and 2 >> redirect stderr, and
Question 12 of 60
12. Question
What is the signal sent to a process when it is interrupted by using the Ctrl C keys?
Correct
Signal 2, or SIGINT, is associated with Ctrl C, and stops executing a process.
Incorrect
Signal 2, or SIGINT, is associated with Ctrl C, and stops executing a process.
Unattempted
Signal 2, or SIGINT, is associated with Ctrl C, and stops executing a process.
Question 13 of 60
13. Question
Which command should precede the execution of a process so that it does not stop its execution after the user logs out of the system?
Correct
With nohup, a process in general runs as follows: nohup &. That way it starts in the background and will continue to run even if bash is closed. It will also not accept the SIGHUP signal.
Incorrect
With nohup, a process in general runs as follows: nohup &. That way it starts in the background and will continue to run even if bash is closed. It will also not accept the SIGHUP signal.
Unattempted
With nohup, a process in general runs as follows: nohup &. That way it starts in the background and will continue to run even if bash is closed. It will also not accept the SIGHUP signal.
Question 14 of 60
14. Question
Which command displays all processes in a tree form, including the PID of each process?
Correct
The pstree command displays the processes hierarchically, the -p option displays the PID of each process. In the ps command, the –forest option has a similar result.
Incorrect
The pstree command displays the processes hierarchically, the -p option displays the PID of each process. In the ps command, the –forest option has a similar result.
Unattempted
The pstree command displays the processes hierarchically, the -p option displays the PID of each process. In the ps command, the –forest option has a similar result.
Question 15 of 60
15. Question
When executing the command: nice -8 myapp What attribute and value is defined in the process?
Correct
The nice and renice commands change the NICE value of a process, and NICE impacts the priority set by the operating system for each process. The syntax of the nice command is: nice -Valor_Nice command, so if you used nice -8 command, the nice value associated with the command would be 8. Attention, because in the renice command the syntax is a little different: renice Node_value PID, this way the -8 would be the nice value -8.
Incorrect
The nice and renice commands change the NICE value of a process, and NICE impacts the priority set by the operating system for each process. The syntax of the nice command is: nice -Valor_Nice command, so if you used nice -8 command, the nice value associated with the command would be 8. Attention, because in the renice command the syntax is a little different: renice Node_value PID, this way the -8 would be the nice value -8.
Unattempted
The nice and renice commands change the NICE value of a process, and NICE impacts the priority set by the operating system for each process. The syntax of the nice command is: nice -Valor_Nice command, so if you used nice -8 command, the nice value associated with the command would be 8. Attention, because in the renice command the syntax is a little different: renice Node_value PID, this way the -8 would be the nice value -8.
Question 16 of 60
16. Question
What shortcut keys can be used to run the last typed command again?
Correct
There are some options to repeat previous commands, among them !! executes the last command used. $$ returns the PID of the current shell and $? the exit code of the last command used.
Incorrect
There are some options to repeat previous commands, among them !! executes the last command used. $$ returns the PID of the current shell and $? the exit code of the last command used.
Unattempted
There are some options to repeat previous commands, among them !! executes the last command used. $$ returns the PID of the current shell and $? the exit code of the last command used.
Question 17 of 60
17. Question
Which of the following commands is not able to interpret regular expressions in shell?
Correct
The fgrep command only filters for text strings, but does not interpret regular expressions. All other commands accept regular expressions.
Incorrect
The fgrep command only filters for text strings, but does not interpret regular expressions. All other commands accept regular expressions.
Unattempted
The fgrep command only filters for text strings, but does not interpret regular expressions. All other commands accept regular expressions.
Question 18 of 60
18. Question
Considering the test.txt file with the following content: Class1 Class11 Class12 Class111 Class 2 Class 22 Class3 Class4 What is the output of the command: grep -c “Class.1“ test.txt?
Correct
The . determines a character, so the regular expression will find the occurrences that have “Class“, followed by any character and the number “1“. Grep will show the lines: Class11 and Class111
Incorrect
The . determines a character, so the regular expression will find the occurrences that have “Class“, followed by any character and the number “1“. Grep will show the lines: Class11 and Class111
Unattempted
The . determines a character, so the regular expression will find the occurrences that have “Class“, followed by any character and the number “1“. Grep will show the lines: Class11 and Class111
Question 19 of 60
19. Question
In the VI text editor, you have the cursor positioned on the last line of the file, and searching in the reverse order, from the end to the beginning, you want to find the next occurrence of the word LPI. Which command should be used?
Correct
The ? does the search from the end to the beginning, the / does the search from beginning to end.
Incorrect
The ? does the search from the end to the beginning, the / does the search from beginning to end.
Unattempted
The ? does the search from the end to the beginning, the / does the search from beginning to end.
Question 20 of 60
20. Question
In the vi text editor, which command copies the contents of the current line?
Correct
By pressing yy the current line is copied, to copy the current line and more 9 can be used y10y or 10yy. To paste, simply press p.
Incorrect
By pressing yy the current line is copied, to copy the current line and more 9 can be used y10y or 10yy. To paste, simply press p.
Unattempted
By pressing yy the current line is copied, to copy the current line and more 9 can be used y10y or 10yy. To paste, simply press p.
Question 21 of 60
21. Question
You are using the VI text editor and want to confirm the hostname of the machine. What command can be used inside the VI to check the information without leaving the file editing?
Correct
O :! followed by a command will execute this command, show the result and return to the same point of the text.
Incorrect
O :! followed by a command will execute this command, show the result and return to the same point of the text.
Unattempted
O :! followed by a command will execute this command, show the result and return to the same point of the text.
Question 22 of 60
22. Question
After creating a new swap partition, what is the next command that must be used by the system administrator before making it active?
Correct
After defining the partition, you still need to format it with the mkswap command so that after that it can be included in the swap area with the swapon command.
Incorrect
After defining the partition, you still need to format it with the mkswap command so that after that it can be included in the swap area with the swapon command.
Unattempted
After defining the partition, you still need to format it with the mkswap command so that after that it can be included in the swap area with the swapon command.
Question 23 of 60
23. Question
What commands below can be used to create a file system on a partition? (Select 3)
Correct
After defining a partition, using fdsisk, parted or gdisk, the partition must be formatted, that is, the file system must be created, for that the main command is mkfs or mkfs.type, mke2fs is used for filesystems ext2/3/4.
Incorrect
After defining a partition, using fdsisk, parted or gdisk, the partition must be formatted, that is, the file system must be created, for that the main command is mkfs or mkfs.type, mke2fs is used for filesystems ext2/3/4.
Unattempted
After defining a partition, using fdsisk, parted or gdisk, the partition must be formatted, that is, the file system must be created, for that the main command is mkfs or mkfs.type, mke2fs is used for filesystems ext2/3/4.
Question 24 of 60
24. Question
Which option in the fsck command will cause a partition to be parsed but no correction action is performed automatically?
Correct
In fsck, the -n (of no) option causes no changes to be made. The “-y“ (yes) accepts all recommended operations. The “-c“ checks for badblocks and “-f“ forces the check even though the filesystem is marked as clean/ok.
Incorrect
In fsck, the -n (of no) option causes no changes to be made. The “-y“ (yes) accepts all recommended operations. The “-c“ checks for badblocks and “-f“ forces the check even though the filesystem is marked as clean/ok.
Unattempted
In fsck, the -n (of no) option causes no changes to be made. The “-y“ (yes) accepts all recommended operations. The “-c“ checks for badblocks and “-f“ forces the check even though the filesystem is marked as clean/ok.
Question 25 of 60
25. Question
In the /etc/fstab file, how the partition to be mounted can be referenced?
Correct
In addition to the device name, the partition can be informed by the Universally Unique Identifier (UUID), as the name says, a unique identifier defined for each system partition, or even by the Label, defined by the user at the time of partition creation.
Incorrect
In addition to the device name, the partition can be informed by the Universally Unique Identifier (UUID), as the name says, a unique identifier defined for each system partition, or even by the Label, defined by the user at the time of partition creation.
Unattempted
In addition to the device name, the partition can be informed by the Universally Unique Identifier (UUID), as the name says, a unique identifier defined for each system partition, or even by the Label, defined by the user at the time of partition creation.
Question 26 of 60
26. Question
Which option must be used in the /etc/fstab file so that a certain partition is not automatically mounted when the system starts?
Correct
The “noauto“ option says that the partition should always be mounted manually, “auto“ has the opposite effect. “ro“ sets the partition to read-only, umount is not a valid option.
Incorrect
The “noauto“ option says that the partition should always be mounted manually, “auto“ has the opposite effect. “ro“ sets the partition to read-only, umount is not a valid option.
Unattempted
The “noauto“ option says that the partition should always be mounted manually, “auto“ has the opposite effect. “ro“ sets the partition to read-only, umount is not a valid option.
Question 27 of 60
27. Question
What access bit allows a binary file to be executed by any user of the system as if it were the owner of the file?
Correct
The SUID implements the permission described, it is represented by the “s“ character at the “x“ permission position of the user who owns the file and can be implemented by the command “chown u + s file“
Incorrect
The SUID implements the permission described, it is represented by the “s“ character at the “x“ permission position of the user who owns the file and can be implemented by the command “chown u + s file“
Unattempted
The SUID implements the permission described, it is represented by the “s“ character at the “x“ permission position of the user who owns the file and can be implemented by the command “chown u + s file“
Question 28 of 60
28. Question
What command can be executed to enable the SGID in the “exam“ directory?
Correct
The SGID is represented by replacing the “x“ with the “s“ in the group permissions.
Incorrect
The SGID is represented by replacing the “x“ with the “s“ in the group permissions.
Unattempted
The SGID is represented by replacing the “x“ with the “s“ in the group permissions.
Question 29 of 60
29. Question
Which command will prevent any user other than the owner or members of the group associated with the /usr/dir directory from being able to read (with the ls command) or access (with the cd command) this directory?
Correct
In a directory, the “r“ permission allows you to read the files and subdirectories present in it, and the “x“ permission allows you to enter into this directory, using the ls command. When using o-rx in chmod, the administrator is removing the permissions r and x from the others level.
Incorrect
In a directory, the “r“ permission allows you to read the files and subdirectories present in it, and the “x“ permission allows you to enter into this directory, using the ls command. When using o-rx in chmod, the administrator is removing the permissions r and x from the others level.
Unattempted
In a directory, the “r“ permission allows you to read the files and subdirectories present in it, and the “x“ permission allows you to enter into this directory, using the ls command. When using o-rx in chmod, the administrator is removing the permissions r and x from the others level.
Question 30 of 60
30. Question
How will be set the size of a file that is a symbolic link?
Correct
A symbolic link is nothing more than a pointer to another file, so its content is just the way to its destination.
Incorrect
A symbolic link is nothing more than a pointer to another file, so its content is just the way to its destination.
Unattempted
A symbolic link is nothing more than a pointer to another file, so its content is just the way to its destination.
Question 31 of 60
31. Question
In a system that uses systemd, what command can be used to display the status of the httpd service?
Correct
The systemctl command is the command used for management in services on systemd. The syntax for operations in the services is: “systemctl
Incorrect
The systemctl command is the command used for management in services on systemd. The syntax for operations in the services is: “systemctl
Unattempted
The systemctl command is the command used for management in services on systemd. The syntax for operations in the services is: “systemctl
Question 32 of 60
32. Question
Which command will set user analyst1 and dev group as owners of file company_report?
Correct
Chown can be used to define the user and the owner group, accepting the following syntax: chown : ou chown . .
Incorrect
Chown can be used to define the user and the owner group, accepting the following syntax: chown : ou chown . .
Unattempted
Chown can be used to define the user and the owner group, accepting the following syntax: chown : ou chown . .
Question 33 of 60
33. Question
The file file1 is a physical link to the file2 file. Which of the following statements are true? (Select 3)
Correct
A physical link can be seen as a new file that points to the same volume of data, they are different files that use the same inode. In the hard link, the destination file and the link must be in the same partition (this is not mandatory in the symbolic link). Because the permissions settings are configured in inode, and the two files share the same inode, the two files share the same access permissions.
Incorrect
A physical link can be seen as a new file that points to the same volume of data, they are different files that use the same inode. In the hard link, the destination file and the link must be in the same partition (this is not mandatory in the symbolic link). Because the permissions settings are configured in inode, and the two files share the same inode, the two files share the same access permissions.
Unattempted
A physical link can be seen as a new file that points to the same volume of data, they are different files that use the same inode. In the hard link, the destination file and the link must be in the same partition (this is not mandatory in the symbolic link). Because the permissions settings are configured in inode, and the two files share the same inode, the two files share the same access permissions.
Question 34 of 60
34. Question
Which command will create a symbolic link called direct-access pointing to the /opt/system/file file?
Correct
The -s option of the ln command specifies the creation of a symbolic link and the main form of use is: ln s
Incorrect
The -s option of the ln command specifies the creation of a symbolic link and the main form of use is: ln s
Unattempted
The -s option of the ln command specifies the creation of a symbolic link and the main form of use is: ln s
Question 35 of 60
35. Question
Which command updates the database used by the locate command?
Correct
The locate command uses an internal Linux base that contains the location of all system files, allowing a quick response to the command, however that base needs to be updated by the updatedb command, usually executed at system startup, or regularly by scheduling.
Incorrect
The locate command uses an internal Linux base that contains the location of all system files, allowing a quick response to the command, however that base needs to be updated by the updatedb command, usually executed at system startup, or regularly by scheduling.
Unattempted
The locate command uses an internal Linux base that contains the location of all system files, allowing a quick response to the command, however that base needs to be updated by the updatedb command, usually executed at system startup, or regularly by scheduling.
Question 36 of 60
36. Question
According to the FHS, what is the best definition for the files contained in the /var directory?
Correct
The /var directory contains varying data that can be changed constantly, in addition to shared directories. The /sys and /proc directories contain system and hardware information generated directly by the kernel. The /tmp contains temporary files that are cleaned every time the system restarts. /Usr contains files and libraries that are shared between applications.
Incorrect
The /var directory contains varying data that can be changed constantly, in addition to shared directories. The /sys and /proc directories contain system and hardware information generated directly by the kernel. The /tmp contains temporary files that are cleaned every time the system restarts. /Usr contains files and libraries that are shared between applications.
Unattempted
The /var directory contains varying data that can be changed constantly, in addition to shared directories. The /sys and /proc directories contain system and hardware information generated directly by the kernel. The /tmp contains temporary files that are cleaned every time the system restarts. /Usr contains files and libraries that are shared between applications.
Question 37 of 60
37. Question
Which element has the function of improving the performance and usability of the Operating Systems used in the virtual machines, or S.O. Guest?
Correct
The Guest/Device Drivers are installed on the Hosts Operating Systems of the virtual machines to improve their performance and usability. As examples we have the “Guest Additions“ in VirtualBox and “Vmware Tools“ in VMWare.
Incorrect
The Guest/Device Drivers are installed on the Hosts Operating Systems of the virtual machines to improve their performance and usability. As examples we have the “Guest Additions“ in VirtualBox and “Vmware Tools“ in VMWare.
Unattempted
The Guest/Device Drivers are installed on the Hosts Operating Systems of the virtual machines to improve their performance and usability. As examples we have the “Guest Additions“ in VirtualBox and “Vmware Tools“ in VMWare.
Question 38 of 60
38. Question
What commands can be used to generate and verify file hashes to ensure their integrity (Select 3 Options)?
Correct
The md5sum, sha256sum and sha512sum commands are used to generate, based on different algorithms, a set of characters representing a particular file, in order to enable them to be checked later.
Incorrect
The md5sum, sha256sum and sha512sum commands are used to generate, based on different algorithms, a set of characters representing a particular file, in order to enable them to be checked later.
Unattempted
The md5sum, sha256sum and sha512sum commands are used to generate, based on different algorithms, a set of characters representing a particular file, in order to enable them to be checked later.
Question 39 of 60
39. Question
From the regular expressions below, which can be used to find records that begin with the time stamp (Hour: Minute), in 24-hour format, also known as military format, ie 02:30, 14:22, 21: 49, 9:49, even accepting that the time value starts with 0, for example 1:30 and 1:30.
Correct
Brackets [] define a list of possible values. The parentheses () define groups that can be separated by |, in the sense of or. The character? indicates that the previous character or group is optional. And ^ indicates that the expression must be at the beginning of a line. Remember that because it is an extended regular expression, the expression will only work with the use of the egrep or grep -E command.
Incorrect
Brackets [] define a list of possible values. The parentheses () define groups that can be separated by |, in the sense of or. The character? indicates that the previous character or group is optional. And ^ indicates that the expression must be at the beginning of a line. Remember that because it is an extended regular expression, the expression will only work with the use of the egrep or grep -E command.
Unattempted
Brackets [] define a list of possible values. The parentheses () define groups that can be separated by |, in the sense of or. The character? indicates that the previous character or group is optional. And ^ indicates that the expression must be at the beginning of a line. Remember that because it is an extended regular expression, the expression will only work with the use of the egrep or grep -E command.
Question 40 of 60
40. Question
Which command should be used to load a module and all its dependencies automatically?
Correct
The modprobe command is used to load and remove modules from the system, working with the files in / lib / modules can identify the dependencies of each module. The insmod is used to load a mode directly, but there is no handling of dependencies. Lsmod is used to list loaded modules.
Incorrect
The modprobe command is used to load and remove modules from the system, working with the files in / lib / modules can identify the dependencies of each module. The insmod is used to load a mode directly, but there is no handling of dependencies. Lsmod is used to list loaded modules.
Unattempted
The modprobe command is used to load and remove modules from the system, working with the files in / lib / modules can identify the dependencies of each module. The insmod is used to load a mode directly, but there is no handling of dependencies. Lsmod is used to list loaded modules.
Question 41 of 60
41. Question
Which sequence best represents a boot process on systems that use UEFI as firmware?
Correct
The UEFI obtains the BootLoader information directly from the ESP (EFI System Partition), which is by default mounted on /boot/efi, using FAT as the filesystem type. It is used in place of the BIOS and no longer uses an MBR area.
Incorrect
The UEFI obtains the BootLoader information directly from the ESP (EFI System Partition), which is by default mounted on /boot/efi, using FAT as the filesystem type. It is used in place of the BIOS and no longer uses an MBR area.
Unattempted
The UEFI obtains the BootLoader information directly from the ESP (EFI System Partition), which is by default mounted on /boot/efi, using FAT as the filesystem type. It is used in place of the BIOS and no longer uses an MBR area.
Question 42 of 60
42. Question
Which process is responsible for selecting and running the kernel and initrd during the boot process?
Correct
The BIOS locates and runs the MBR, the MBR loads the Bootloader (GRUB), Bootloader selects and runs the kernel and initrd, the kernel runs the Init process, and Init starts the services and programs according to the runlevel/target configured.
Incorrect
The BIOS locates and runs the MBR, the MBR loads the Bootloader (GRUB), Bootloader selects and runs the kernel and initrd, the kernel runs the Init process, and Init starts the services and programs according to the runlevel/target configured.
Unattempted
The BIOS locates and runs the MBR, the MBR loads the Bootloader (GRUB), Bootloader selects and runs the kernel and initrd, the kernel runs the Init process, and Init starts the services and programs according to the runlevel/target configured.
Question 43 of 60
43. Question
In the initial screen of the GRUB boot process, which parameter should be used to force the system boot in “single-user“ mode?
Correct
In the GRUB interface it is possible to include a series of parameters that will be used by the kernel at the moment of boot, among them the runlevel to be used (s, single, 1, 2, 3, 4, 5).
Incorrect
In the GRUB interface it is possible to include a series of parameters that will be used by the kernel at the moment of boot, among them the runlevel to be used (s, single, 1, 2, 3, 4, 5).
Unattempted
In the GRUB interface it is possible to include a series of parameters that will be used by the kernel at the moment of boot, among them the runlevel to be used (s, single, 1, 2, 3, 4, 5).
Question 44 of 60
44. Question
The system administrator wants to schedule a system reboot at 6:00 PM. Which command can be used?
Correct
The shutdown command can be used both to shut down and to restart the system, with the use of the -r option, with the advantage of the possibility of scheduling. The reboot command does not allow the reboot schedule.
Incorrect
The shutdown command can be used both to shut down and to restart the system, with the use of the -r option, with the advantage of the possibility of scheduling. The reboot command does not allow the reboot schedule.
Unattempted
The shutdown command can be used both to shut down and to restart the system, with the use of the -r option, with the advantage of the possibility of scheduling. The reboot command does not allow the reboot schedule.
Question 45 of 60
45. Question
Which daemon is responsible for handling events generated by pressing the hardware power key, or connecting or disconnecting the power cable from a notebook?
Correct
Modern computers support the Advanced Configuration and Power Interface, which enables intelligent power management in your system and queries battery status and configuration. The acpid daemon monitors these events by taking actions related to their internal rules and settings.
Incorrect
Modern computers support the Advanced Configuration and Power Interface, which enables intelligent power management in your system and queries battery status and configuration. The acpid daemon monitors these events by taking actions related to their internal rules and settings.
Unattempted
Modern computers support the Advanced Configuration and Power Interface, which enables intelligent power management in your system and queries battery status and configuration. The acpid daemon monitors these events by taking actions related to their internal rules and settings.
Question 46 of 60
46. Question
What is the result of using the special “Sticky“ bit in the permissions of a directory?
Correct
The best example of the Sticky bit is the /tmp directory, the /tmp permission is drwxrwxrwt, any user can create a file in /tmp, but only the one who created the file can remove it or change it.
Incorrect
The best example of the Sticky bit is the /tmp directory, the /tmp permission is drwxrwxrwt, any user can create a file in /tmp, but only the one who created the file can remove it or change it.
Unattempted
The best example of the Sticky bit is the /tmp directory, the /tmp permission is drwxrwxrwt, any user can create a file in /tmp, but only the one who created the file can remove it or change it.
Question 47 of 60
47. Question
A system has the following partitions: /dev/sda1 /dev/sda2 /dev/sda3 /dev/sda5 /dev/sda6 Considering a system using a MBR partition table, it is possible to state that: (Select 2)
Correct
MBR partitioning allows a maximum of 4 primary partitions, or 3 primary partitions and 1 primary partition. In the extended partition, the logical partitions are associated. Primary or extended partitions are numbered from 1 to 4, logical partitions are numbered from 5. Thus, the existence of partitions 5 and 6 means that there are 2 logical partitions, and consequently 1 of partitions 1, 2 or 3 is necessarily a logical partition. It is not mandatory that all partitions 1, 2, 3, and 4 exist, there may be only partitions 1 and 3 for example, but logical partitions should follow the sequence from 5.
Incorrect
MBR partitioning allows a maximum of 4 primary partitions, or 3 primary partitions and 1 primary partition. In the extended partition, the logical partitions are associated. Primary or extended partitions are numbered from 1 to 4, logical partitions are numbered from 5. Thus, the existence of partitions 5 and 6 means that there are 2 logical partitions, and consequently 1 of partitions 1, 2 or 3 is necessarily a logical partition. It is not mandatory that all partitions 1, 2, 3, and 4 exist, there may be only partitions 1 and 3 for example, but logical partitions should follow the sequence from 5.
Unattempted
MBR partitioning allows a maximum of 4 primary partitions, or 3 primary partitions and 1 primary partition. In the extended partition, the logical partitions are associated. Primary or extended partitions are numbered from 1 to 4, logical partitions are numbered from 5. Thus, the existence of partitions 5 and 6 means that there are 2 logical partitions, and consequently 1 of partitions 1, 2 or 3 is necessarily a logical partition. It is not mandatory that all partitions 1, 2, 3, and 4 exist, there may be only partitions 1 and 3 for example, but logical partitions should follow the sequence from 5.
Question 48 of 60
48. Question
By default, in which directory is the ESP (EFI System Partition) mounted?
Correct
Systems that use UEFI as firmare have a special partition called ESP (EFI System Partition), which is mounted in the /boot/efi/ directory. In this directory are located the bootloaders that will be used in the boot process. This partition must always use FAT as filesystem type.
Incorrect
Systems that use UEFI as firmare have a special partition called ESP (EFI System Partition), which is mounted in the /boot/efi/ directory. In this directory are located the bootloaders that will be used in the boot process. This partition must always use FAT as filesystem type.
Unattempted
Systems that use UEFI as firmare have a special partition called ESP (EFI System Partition), which is mounted in the /boot/efi/ directory. In this directory are located the bootloaders that will be used in the boot process. This partition must always use FAT as filesystem type.
Question 49 of 60
49. Question
What commands can be used to update the configuration file used during the boot process by GRUB 2? (Select 3)
Correct
The grub-mkconfig and update-grub commands are used to obtain the information defined in the /etc/default/grub and /etc/grub.d/* configuration files and create the /boot/grub/grub.cfg file, which will be effectively used by GRUB to boot. They can be used with the -o option to set the output, or simply redirect the output with the use of >.
Incorrect
The grub-mkconfig and update-grub commands are used to obtain the information defined in the /etc/default/grub and /etc/grub.d/* configuration files and create the /boot/grub/grub.cfg file, which will be effectively used by GRUB to boot. They can be used with the -o option to set the output, or simply redirect the output with the use of >.
Unattempted
The grub-mkconfig and update-grub commands are used to obtain the information defined in the /etc/default/grub and /etc/grub.d/* configuration files and create the /boot/grub/grub.cfg file, which will be effectively used by GRUB to boot. They can be used with the -o option to set the output, or simply redirect the output with the use of >.
Question 50 of 60
50. Question
In the /boot/grub/grub.cfg file, which parameter indicates which kernel file should be used during the boot process?
Correct
The grub.cfg file is used by GRUB2, so the parameter that indicates the kernel is “linux“. In the case of GRUB Legacy it would be the configuration file menu.lst and the “kernel“ parameter would indicate the file.
Incorrect
The grub.cfg file is used by GRUB2, so the parameter that indicates the kernel is “linux“. In the case of GRUB Legacy it would be the configuration file menu.lst and the “kernel“ parameter would indicate the file.
Unattempted
The grub.cfg file is used by GRUB2, so the parameter that indicates the kernel is “linux“. In the case of GRUB Legacy it would be the configuration file menu.lst and the “kernel“ parameter would indicate the file.
Question 51 of 60
51. Question
Which environment variable can be configured to temporarily set the location of a library on the system?
Correct
By defining and exporting the LD_LIBRARY_PATH environment variable with a particular directory or set of them, applications will search the libraries in those directories instead of just the default/lib and /usr/lib.
Incorrect
By defining and exporting the LD_LIBRARY_PATH environment variable with a particular directory or set of them, applications will search the libraries in those directories instead of just the default/lib and /usr/lib.
Unattempted
By defining and exporting the LD_LIBRARY_PATH environment variable with a particular directory or set of them, applications will search the libraries in those directories instead of just the default/lib and /usr/lib.
Question 52 of 60
52. Question
In a Debian distribution, which of the following commands should be used to remove the gedit package, including all its configuration files?
Correct
In apt-get and apt, the “purge“ option will remove the application and its configuration files, using only the “remove“ configuration files will be kept. In dpkg the same feature is triggered by the -P or -purge options.
Incorrect
In apt-get and apt, the “purge“ option will remove the application and its configuration files, using only the “remove“ configuration files will be kept. In dpkg the same feature is triggered by the -P or -purge options.
Unattempted
In apt-get and apt, the “purge“ option will remove the application and its configuration files, using only the “remove“ configuration files will be kept. In dpkg the same feature is triggered by the -P or -purge options.
Question 53 of 60
53. Question
On a Debian system, the administrator wants to identify the package that installed the /etc/pam.conf file. Which command should be used?
Correct
With “dpkg -S“ (or –search) it is possible to inform a file and identify the package “owner“ of this file.
Incorrect
With “dpkg -S“ (or –search) it is possible to inform a file and identify the package “owner“ of this file.
Unattempted
With “dpkg -S“ (or –search) it is possible to inform a file and identify the package “owner“ of this file.
Question 54 of 60
54. Question
Which of the following commands will update all packages from a Debian distribution?
Correct
The apt-get/apt “upgrade“ option will update all packages on the system. The “update“ option only updates the repositories information base, but does not update any packages. There is also the “dist-upgrade“ option which, in addition to updating, may also remove packages considered obsolete.
Incorrect
The apt-get/apt “upgrade“ option will update all packages on the system. The “update“ option only updates the repositories information base, but does not update any packages. There is also the “dist-upgrade“ option which, in addition to updating, may also remove packages considered obsolete.
Unattempted
The apt-get/apt “upgrade“ option will update all packages on the system. The “update“ option only updates the repositories information base, but does not update any packages. There is also the “dist-upgrade“ option which, in addition to updating, may also remove packages considered obsolete.
Question 55 of 60
55. Question
What commands can be used to remove a package on a standard Red Hat system? (Select 3)
Correct
In the rpm command the -e or –erase options can be used to remove a package. In the yum the “erase“ and “remove“ options can be used for the same function.
Incorrect
In the rpm command the -e or –erase options can be used to remove a package. In the yum the “erase“ and “remove“ options can be used for the same function.
Unattempted
In the rpm command the -e or –erase options can be used to remove a package. In the yum the “erase“ and “remove“ options can be used for the same function.
Question 56 of 60
56. Question
Which of the following commands should be used to update all rpm packages on a system that uses DNF as the package manager ,regardless of packages marked as obsolete?
Correct
In DNF and YUM, the “update“ option updates one or all of the packages on the system, the “upgrade“ option does the same as “update“ but considers the packages obsolete, removing them if necessary.
Incorrect
In DNF and YUM, the “update“ option updates one or all of the packages on the system, the “upgrade“ option does the same as “update“ but considers the packages obsolete, removing them if necessary.
Unattempted
In DNF and YUM, the “update“ option updates one or all of the packages on the system, the “upgrade“ option does the same as “update“ but considers the packages obsolete, removing them if necessary.
Question 57 of 60
57. Question
On a system that uses RPM packages, which command will display all the files installed by the vim-minimal package?
Correct
In the rpm command the -q option enables the “query“ mode and the “l“ option allows to inform a package and to return all packages installed by it.
Incorrect
In the rpm command the -q option enables the “query“ mode and the “l“ option allows to inform a package and to return all packages installed by it.
Unattempted
In the rpm command the -q option enables the “query“ mode and the “l“ option allows to inform a package and to return all packages installed by it.
Question 58 of 60
58. Question
Which variable built into Bash returns the PID value of the current shell?
Correct
By typing $$ the user receives the PID (Process ID) of the current shell. $! is the PID of the last process in the backgroud (job) run. $? is the exit code of the last executed command. $ ~ does not exist.
Incorrect
By typing $$ the user receives the PID (Process ID) of the current shell. $! is the PID of the last process in the backgroud (job) run. $? is the exit code of the last executed command. $ ~ does not exist.
Unattempted
By typing $$ the user receives the PID (Process ID) of the current shell. $! is the PID of the last process in the backgroud (job) run. $? is the exit code of the last executed command. $ ~ does not exist.
Question 59 of 60
59. Question
Which environment variable contains the file name used to store the last commands used by a user?
Correct
The HISTFILE environment variable stores the path and file name that will store the command history, by default /home/
Incorrect
The HISTFILE environment variable stores the path and file name that will store the command history, by default /home/
Unattempted
The HISTFILE environment variable stores the path and file name that will store the command history, by default /home/
Question 60 of 60
60. Question
The variable NAME was declared with the name of the student “Linus Torvalds“. Which command below will display the phrase “Student Linus Torvalds has been Approved!“
Correct
In the echo command the use of double quotation marks is optional in most cases. Single quotes do not interpret the variables.
Incorrect
In the echo command the use of double quotation marks is optional in most cases. Single quotes do not interpret the variables.
Unattempted
In the echo command the use of double quotation marks is optional in most cases. Single quotes do not interpret the variables.
X
Use Page numbers below to navigate to other practice tests