Question: IASC 3350 Linux System Admin Make Up Test 1 Name: _____________________________ The test has two sections, the Multiple Choice Section and the Short Answer Section.

IASC 3350 Linux System Admin Make Up

Test 1 Name: _____________________________

The test has two sections, the Multiple Choice Section and the Short Answer Section. Each multiple-choice is worth two points and there are 30 of them. There are three short-answer questions and these are worth five points each. So the total is 75.

Multiple Choice Section

For the first few questions, I have the following output from ls il:

total 0

37924674 -rw-rw---- 1 aparakh aparakh 0 Sep 27 11:12 f1

37924678 lrwxrwxrwx 1 aparakh aparakh 2 Sep 27 11:14 f2 -> f1

37924676 -rw-rw---- 1 aparakh aparakh 0 Sep 27 11:12 f3

37924677 -rw-rw---- 1 aparakh aparakh 0 Sep 27 11:12 f4

4. File has a size of 2. Why?

It contains two blank lines.

It contains the string f1.

It contains the string f2.

It contains the inode number.

There is no way to tell without catting out the file

5. To get help on a command that is built into the shell, use

man xxx

info xxx

xxx --help

help xxx

xx-then hit the tab key.

8. Weve played off and on with the file. One particular entry looks like this:

Which statement is true?

The userid for this account is 118.

The password for this account is x.

The shell that is used for this account is the postfix shell in /var/spool

The user cannot log on to this account.

The account has no home directory.

9. Executing will

Create a shell variable called DATE and set it to $(date).

Create a shell variable called DATE and set it to the current date and time.

Create a shell variable called DATE and set it to $(date), then add it to the environment.

Create a shell variable called DATE and set it to the current date and time, then add it to the environment.

Create an alias called DATE and set it to run the date command. (Good for folks with caps lock on.)

10. Modify by adding to the end because

you want any system commands with the same name to be found first.

the variable is last-in-first-out like a stack.

the PATH variable can only expand; you cant just reset it to be an empty string, for example.

it is exported, so you want to make sure the exported string is larger.

adding it to the beginning is just what my cybercriminal friends would expect me to do.

12. I have a few settings that I want to be active whenever I log in. I do not have the root password nor can I do a or a .

Put them in .bashrc

Put them in .bash_profile

Put them in /etc/profile

Put them in /etc/bash.bashrc

Put them in your head and type them in over and over every time you log on to the system.

13. What does the bit do?

It makes the program owned by you when you run the program.

It makes the permissions act as if you are the owner of the program.

It makes the permissions act as if you are the user that owns the file.

It makes the permissions act as if you are in the same group as the program.

Nothing this is an old setting that used to be important for efficiency reasons.

Take a look at these (incomplete) results of ls l

User1@loki:~$ ls -l

total 460

drwx------ 2 user1 user1 4096 Aug 28 2015 C-class

drwx------ 9 user1 user1 4096 Mar 7 2016 CSCI1840

drwxr-xr-x 10 user1 user1 4096 Oct 30 2015 CSCI4220

drwx------ 3 user1 user1 4096 Jul 22 2013 CSCI4500

drwx------ 7 user1 user1 4096 Sep 6 2014 CSCI4700

16. Executing will

copy all of CSCI4500 into a new file named New.

copy all of CSCI4500 into a new directory called New if that directory did not exist, or fail if it did exist.

copy all of CSCI4500 into a new directory called New if that directory did not exist, or it will copy it all into New/CSCI4500 if it did exist.

copy all of CSCI4500 into a new directory called New if that directory did not exist, or it will copy it all into New/CSCI4500 if it did exist, asking about each file as it copies them.

Give a permission error since you cannot write to the current directory.

Look the following output:

-rw-r--r-- 1 user1 user1 1508994 Dec 8 2015 access_log

drwxr-xr-x 2 user1 user1 4096 Dec 5 2013 BigFiles

drwxr-xr-x 2 user1 user1 4096 Nov 3 2014 EnvDemo

-rwsr-sr-x 1 user1 user1 120 Nov 18 2013 question

-rw-r--r-- 1 user1 user1 1918067 Nov 19 2015 zdata

27. In this directory, what is special about the file ?

It is a block device.

It is a character device.

It is a super user (root) shell script.

It has the setuid and setgid bits on.

It is a hard link.

Short Answer!

31. There is a command which according to the man page will do nothing, unsuccessfully. Thus, it is sometimes specified as the login shell for accounts that should never be used for login. I want to count how many user accounts are set to run this program as their shell. Give me one command it can include pipes of course that will tell me how many accounts are using this program as their shell.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!