You are on page 1of 29

MODULE 3: QUIZ

Contents
WEEK 2: USERS, ADMINISTRATORS, GROUPS, PERMISSIONS ...................................................................... 1
WEEK 3: PACKAGE AND SOFTWARE MANAGEMENT.................................................................................... 7
WEEK 4: FILESYSTEMS ................................................................................................................................. 12
WEEK 5: PROCESS MANAGEMENT.............................................................................................................. 18
WEEK 6: OPERATING SYSTEM IN PRACTICE ................................................................................................ 24

WEEK 2: USERS, ADMINISTRATORS, GROUPS, PERMISSIONS

In Windows, what does UAC stand for?

User Administration Control


User Availability Checklist
User Access Control
User Access Console

Does an administrator user account on a computer have complete control over a machine?

Yes
No
Sometimes

In the Computer Management tool in Windows, what setting can an administrator enable if a user’s
password was compromised and they need to update it?

User must change password at next logon.


Password never expires
Password must be changed
User cannot change password
Which Windows PowerShell CLI command can be used to list the Users on a given computer?

Get-LocalGroupMember
Get-LocalGroup
Get-LocalUser
Get-GPOReport

On a Linux system, which file contains information about group memberships?

/etc/passwd
/etc/group
/etc/users
/etc/sudoers

What parameter can be used in the Windows CLI to force a user to change their password on the next
logon?

/passwordchg:yes
/passwordkeep:no
/newpassword:logon
/logonpasswordchg:yes

What is the name of the privileged file on Linux that stores scramble passwords?

/etc/passwords
/etc/shade
/passwords
/etc/shadow

Which of the following methods can Administrators use to add a user in Windows? (Choose all that
apply)

At the CLI, using the DOS style net computer computername/new command.
With Powershell, use the Create-LocalUser usernamecommand.
At the CLI, use the DOS style net user username * /add command.
In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and
select New User.

What does DACL stand for?

Discretionary Access Control List


Direct Access Control List
Discretionary Access Content List
Discretionary Admin Control List

When examining the permissions on a file in Linux you find the the first four bits are -rwx. What does
this mean?

It is a regular file and the owner has read, write, and execute permissions.
It is a regular file and the owner has read, write, but no execute permissions.
It is a directory file and the owner has read, write, and exchange permissions.
It is a directory file and the owner has read, write, and execute permissions

In Windows, when setting the basic permission “Read” which of the following special permissions
are enabled? (Choose all that apply)

Read Activity
Read Permissions
Read Attributes
Read Data

Which of the following locations and/or methods can Administrators find and/or use to change user
passwords on Windows systems? (Choose all that apply)

In the GUI, under Control Panel > System and Security > Change User Account Control Settings.
At the CLI, using the DOS style net user command.
In the GUI, under Local Users and Groups in the Computer Management tool.
At the CLI, using the DOS style net config command.

On Linux systems, which CLI command and flags are used to force a user to change their password
upon their next login? (Choose all that apply)

passwd -eusername
passwd --expire username
user -e username
password -changeusername

When adding a new user with the same name as a previously deleted user, will the newly created
user be able to access resources previously assigned to that user name?

No
Maybe
Yes

When examining the permissions on a file in Linux, how many bits are used to display this
information?

64
10
9
16

When using ICACL in the Windows CLI, what flag shows that a given user can create files?

S
CF
write
WD

Generally, what type of user has access to, but limited control over a computer?

Standard
Limited
General
Administrator

Which of the following methods can Administrators use to remove a user in Windows? (Choose all
that apply)

In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and
select Delete.
With Powershell, use the Remove-LocalUser usernamecommand.
At the CLI, using the DOS style net computer computername/del command.
At the CLI, use the DOS style net user username /del command.

When examining the permissions on a file in Linux you find the the first four bits are -rwx. What does
this mean?

It is a directory file and the owner has read, write, and exchange permissions.
It is a regular file and the owner has read, write, but no execute permissions.
It is a regular file and the owner has read, write, and execute permissions.
It is a directory file and the owner has read, write, and execute permissions.
In Windows, a simple permission is actually a larger set of ___

partial permissions.
special permissions.
admin permissions.
user permissions.

As a Windows Administrator for a large company, you are asked to grant temporary software
installation permissions to the Sales department. Which of the following would be the most efficient
method for accomplishing this task?

Grant each employee in the Sales department temporary software installation permissions on their
individual User accounts.
Grant each employee in the Sales department temporary Local Administrator permissions on their
individual computers.
Grant temporary Administrator permissions to each employee in the Sales department.
Add the User account for each employee in the Sales department into a special Group, then grant
temporary software installation permissions to the Group.

What Windows CLI command can be used to change a local user password?
password command
net command
user command
new command

What flag can be used in Linux with the passwd command to force a user to change their password on
the next logon?

-new flag
-next flag
-e flag
-chg flag

Which of the following methods can Administrators use to add a user in Windows? (Choose all that
apply)

At the CLI, using the DOS style net computer computername/new command.
In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and
select New User.
With Powershell, use the Create-LocalUser usernamecommand.
At the CLI, use the DOS style net user username * /add command.
Imagine you are an IT administrator and you need to check that proper permissions are configured
on a file in Linux. The file’s owner should have full permissions. The file’s associated group members
should be able to read and write to the file, but not execute the file. Other users can only read the
file. How should these file permissions look when you check them in the CLI environment?

-rwerw-r- -
Drwxrw-r- -
-r- -rw-rwx
-rwxrw-r- -

WEEK 3: PACKAGE AND SOFTWARE MANAGEMENT

Which of the following package formats is used by the Windows Store to distribute universal
Windows platform apps?

Microsoft install packages


Windows executable files
Debian packages
appx packages

Which of the following file types is used to guide software installations in Ubuntu?

.deb files
.msi files
.mpg files
.exe files

What does the following command do in Ubuntu:dpkg -r UbuTestPackage?

Uninstall a Debian package named “UbuTestPackage”


Uninstall a Debian package named “DPKG”
Install a Debian package named “UbuTestPackage”
List all packages installed on your Linux system

Fill in the blank: _____ are a central managed marketplace for app developers to publish and sell
mobile apps.

Package managers
Debian packages
Windows executables
App stores

What does the following command do in Ubuntu:apt-get install NamePackage?

Uninstall a software package named “NamePackage”


Install a software package named “NamePackage” using a package manager
Search for a package named “NamePackage” on your Linux system
List all packages installed on your Linux system

What does the following command do in Ubuntu:apt-get install NamePackage?

Uninstall a software package named “NamePackage”


Install a software package named “NamePackage” using a package manager
Search for a package named “NamePackage” on your Linux system
List all packages installed on your Linux system

Which of the following Powershell commands will take all files from the desktop “TestArchive”
directory, and archive it in a “TestArchive.zip” file?

Archive -path C:\Users\testuser\Desktop\TestArchive.zip ~\Desktop\TestArchive\


*A: Compress-Archive -path C:\Users\testuser\Desktop\TestArchive\ ~\Desktop\TestArchive.zip
B: Expand-Archive -path C:\Users\testuser\Desktop\TestArchive\ ~\Desktop\TestArchive.zip
Create-Archive -path C:\Users\testuser\Desktop\TestArchive\ ~\Desktop\TestArchive.zip

Which of the following Powershell commands will create a directory called “TestArchive” on your
desktop by expanding the TestArchive.zip file?

*A: Expand-Archive -path C:\Users\testuser\Desktop\TestArchive.zip ~\Desktop\TestArchive\


Create-Archive -path C:\Users\testuser\Desktop\TestArchive.zip ~\Desktop\TestArchive\
Extract-Archive -path C:\Users\testuser\Desktop\TestArchive\ ~\Desktop\TestArchive.zip
Compress-Archive -path C:\Users\testuser\Desktop\TestArchive\ ~\Desktop\TestArchive.zip

Which of the following Powershell commands will verify that a software package called
“TestPackage” has been successfully installed on your system?

Get-Package -name TestPackage


Uninstall-Package -name TestPackage
Find-Package TestPackage -IncludeDependencies
Install-Package -name TestPackage

Which of the following Powershell commands will install a software package called “TestPackage”
on your system?

Get-Package -name TestPackage


Install-Package -name TestPackage
TestPackage-Install -Chocolatey
Find-Package TestPackage -IncludeDependencies

What is a software repository?

A package manager used in Windows


A server that acts like a central storage location for packages
A package manager used in Ubuntu
An open-source graphical editor

In Ubuntu, when a device is connected to your computer, a device file is created in the /dev directory.
What kind of device might create a file called /dev/sdc?

A printer
A memory stick
A keyboard
A monitor

When Windows notices that a new device has been connected, what’s the first thing it will do?

Scan the device for viruses


Ask for the new device’s hardware ID
Place the new device in an existing device category in Device Manager
Create a new device category in Device Manager

Which of the following Ubuntu device files was created by the first detected storage device?

/dev/sd0
/dev/sd1
/dev/sdc
/dev/sda
Which of the following commands will update your Linux application sources?

sudo apt full-upgrade


sudo apt update
install source.list
uname -r

Which of the following is the repository source file in Ubuntu?

/apt/repositories.lst
/etc/APT/sources.list
/etc/repository_sources
/etc/repsrc.lst

Which of the following actions will open Windows’ Device Manager console? Select all that apply.

Right-click on “This PC,” in the Windows file menu, then select “Manage”
Open the Run dialog box and type in devmgmt.msc
Restart your computer
Plug in a new device

Which of the following actions may update your Linux device drivers? Select all that apply.

Plugging in a new device


Updating the Linux kernel
Installing a kernel module
Updating the /dev directory

Which of the following commands will install a new version of the Linux kernel?

sudo apt update


sudo apt full-upgrade
install NewKernel
uname -r

Which of the following is a third party package manager for Windows?

Puppet
Chocolatey
SCCM
Windows installer

Which of the following actions can be done through right-clicking in Windows’ Device Manager
console? Select all that apply.

Installing a new device driver


Uninstalling a device driver
Disabling a device driver
Updating a device driver

Which of the following commands will update your Linux application sources?

uname -r
sudo apt update
sudo apt full-upgrade
install source.list

Which of the following file types are used to guide software installations in Windows? Select all that
apply.

deb files
.msi files
.exe files
.mpg files

Which of the following is the package manager used in Ubuntu?

APT
Puppet
Launchpad
Gimp

When Windows notices that a new device has been connected, what’s the first thing it will do?

Create a new device category in Device Manager


Place the new device in an existing device category in Device Manager
Ask for the new device’s hardware ID
Scan the device for viruses

Which of the following will appear as a character device in your Ubuntu /dev directory? Select all that
apply.

A mouse
A keyboard
A CD-ROM
A hard drive

Which of the following commands will show you what Linux kernel version you have?

show NewKernel
sudo apt full-upgrade
uname -r
sudo apt update

Some versions of Linux will automatically run fsck on your computer to check for issues and attempt
to auto-repair the file system. In these cases, when will your system automatically run fsck?

Only when the operating system sets a bit in a metadata file that indicates there's corruption.
At whatever time you schedule your system to run fsck.
Any time you boot your computer.
Only when you update your Linux kernel.

WEEK 4: FILESYSTEMS

Which of the following commands will run the check disk utility and fix any problems it finds?
fsck
chkdsk
chkdsk /F
chkfix

How does a Linux hardlink link to another file?

By referening a copy of the other file


By referencing the other file’s name
By referencing the other file’s inode
By referencing the other file’s physical location on the hard drive

What component of a disk tells the OS how the disk is partitioned?

The swap table


The master partition list
The filesystems grid
The partition table

What is the maximum volume size for an MBR partition?

One terabyte.
Two gigabytes.
Two terabytes.
1024 megabytes.

When partitioning a disk and formatting a filesystem, what happens if you choose the “full format”
option? Select all that apply.

The formatting process will take longer.


The allocation unit size will be larger.
The formatting process will complete in less time.
Windows will scan the target drive for errors and bad sections.

Fill in the blank: -------- Virtual memory dedicates an area of the hard drive to use a storage base for
blocks of data called _____.

pages
base storage
databases
RAM

What happens when you format a filesystem on a partition?

The partition becomes a volume.


You mount a new physical storage device.
You eject a storage device.
Your machine switches between operating systems.

How many GPT partitions can you have on a disk?

Sixteen
As many as you want
Five
Four

When partitioning a disk and formatting a filesystem, what happens if you enable
compression? Select all that apply.

The formatting process will complete in less time.


The computer’s processor will need to do less work.
Files and folders will take up less space on the disk.
Files will need to be expanded when you open them.

What can the Windows Memory Manager do? Select all that apply.

Stores the user’s favorite photo memories in a virtual album


Format and partition memory
Copy pages of memory to be read as needed by programs
Map virtual memory to physical memory

How does a shortcut link to another file?

By referencing the other file’s name


By referencing a copy of the other file
By referencing the other file’s location on the hard drive
By referencing the other file’s reference number

Which of the following are partition table schemes? Select all that apply.

GUID Partition Table (GPT)


Unified Extensible Firmware Interface (UEFI)
Master Boot Record (MBR)
New Technology Files System (NTFS)

The Windows Disk Management Utility provides which of the following? Select all that apply.

Information about a computer’s disks and disk partitions, as well as their file systems
A command line interface
A utility to make modifications to the disk and partitions on a computer
Information about the free and total capacity of disks and partitions on a computer

In Linux, what happens when you enter the command sudo mkfs -t ext4 /dev/sdb1?

You mount a partition on the selected disk.


You rename the selected disk.
You specify the file system format for a partition on the selected disk.
You specify a partition table type for the selected disk.

When managing memory, where does the operating system keep the most commonly accessed data
pages?

In a special hidden file on the root partition of a volume called page file dot sys
On the hard drive
In RAM
In the cloud

In Linux, when running parted in interactive mode, what happens when you enter the command
mkpart primary linux-swap 5GiB 100%? Select all that apply.

You mount a swap partition.


You format a disk partition for swap space.
You create a new disk partition.
You enable swap on the selected device.

What file attributes are stored in the Master File Table (MFT)? Select all that apply.

Whether or not a file is read-only


File data locations
Language used in the file data
File creation time stamps

What is the Linux equivalent to Window’s Master File Table (MFT)?

ipath table
inode table
ipod table
ilink table
Which of the following are common risks for file corruption?

Hitting the eject button in the OS


Sudden computer shut offs
Software bugs
System failures

What component of a disk tells the OS how the disk is partitioned?

The filesystems grid


The master partition list
The partition table
The swap table

What is the maximum volume size for an MBR partition?

1024 megabytes.
Two terabytes.
One terabyte.
Two gigabytes.

When partitioning a disk and formatting a filesystem, what happens if you enable compression?
Select all that apply.

Files and folders will take up less space on the disk.


The computer’s processor will need to do less work.
Files will need to be expanded when you open them.
The formatting process will complete in less time.

In Linux, what happens when you enter the command sudo mkfs -t ext4 /dev/sdb1?

You specify a partition table type for the selected disk.


You mount a partition on the selected disk.
You specify the file system format for a partition on the selected disk.
You rename the selected disk.

What can the Windows Memory Manager do? Select all that apply.
Copy pages of memory to be read as needed by programs
Format and partition memory
Map virtual memory to physical memory
Stores the user’s favorite photo memories in a virtual album

In Linux, what happens when you enter the command sudo swapon /dev/sdb1?

You enable swap on the selected device.


You create a new disk partition.
You format a disk partition for swap space.
You mount a swap partition.

What file attributes are stored in the Master File Table (MFT)? Select all that apply.

Whether or not a file is read-only


Language used in the file data
File data locations
File creation time stamps

What is the Linux equivalent to symbolic links Windows?

inodes
hardlinks
filenames
softlinks

What might occur if you were to run fsck on a mounted partition?

It might rename the partition.


It may change the files on the partition to read-only.
It could damage the file system.
It will repair the partition 100% of the time.

Disk partitions can be used for which of the following purposes? Select all that apply.

To use different file systems on the same hard drive


To be able to select from two different operating systems at boot up
To expand the storage space on a hard drive
To create volumes
In Linux, what information will be displayed about a computer’s disks when the sudo parted -l
command is executed in the CLI? Select all that apply.

The security permissions for each partition


The partition table types for each disk
The sizes of the disk partitions
The number of partitions on each of the computer’s disks

What is a swap file or swap space?

An online forum for swapping files


A file that acts as a drive partition
An Exchange file
A dedicated area of the hard drive used for virtual memory

What is the identifier that indexes a file’s entry in the MFT?

The volume
The filename
The file record number
The creation timestamp

Which features of Windows NTFS filesystem help minimize file corruption?

The chkdsk /F command


The fsck command
The fsutil self-healing utility
The NTFS log journaling process

WEEK 5: PROCESS MANAGEMENT

Which of the following Linux commands lists open files and what processes are using them?

uptime
top
ps -ef
lsof

Which of the following tools or commands can be used to monitor resources in Windows? Select all
that apply.

The Resource Monitoring tool


The msinfo32 command entered in the CLI
The PowerShell Get-Processcommandlet
Control Panel

You launch notepad.exe from a PowerShell command prompt. Later, you use Process Explorer to
restart the notepad.exe process? After restart, what is the parent process of notepad.exe?

Process Explorer (procexp.exe)


notepad.exe
smss.exe
PowerShell (powershell.exe)

Which of the following represents a signal in Linux?

PING
SUDO
SIGPROF
TOUCH

When using the ps -ef command to read process information in Linux, what is the process’ PPID?

Its Process Identification number


The ID of the person who launched the process
The Process Identification number of its parent
The terminal associated with the process

Which of the following methods can be used to get information on processes that are running in
Windows? Select all that apply.

From the CLI, use the tasklist command.


Use the Windows Task Manager.
From the PowerShell prompt, use the Get-Process commandlet.
From the CLI, use the ps command.
You launch notepad.exe from a Powershell command line. Which of the following is true?

The Powershell process will terminate when the notepad.exe process terminates.
The notepad.exe process will terminate when the Powershell process terminates.
The Powershell process is the parent process for notepad.exe.
The notepad.exe process is the parent process for Powershell.

In the following Linux command, which is the parent process and which is the child?

$ less /etc/myfile | grep Hello


The parent is less and the child is grep.
The parent is less and the child is /etc/myfile.
The parent is /etcand the child is myfile.
The parent is grep and the child is less.

How do you find a process PID number in Windows Task Manager?

Click the Details tab.


Click on the Processes tab.
Select a process from the process list.
Task Manager will not show PID numbers (you have to use the tasklist command or the Get-Process
commandlet).

Which of the following methods will provide information on processes that are running in Linux?
Select all that apply.

List the contents of the /proc directory.


Use the ls command.
List the contents of the /etc directory.
Use the ps -x command.

What is the default action of the SIGINT signal?

To terminate the process that is signaled


To put the process that is signaled into a sleep state
To restart the process that is signaled
To suspend the process that is signaled

Which of the following options in Process Explorer will terminate a selected process? Select all that
apply.
Kill Process Tree
Restart
Suspend
Kill Process

What are the two most common ways to terminate a process in Linux at the CLI? Select two options.

Use the end process command.


Use the terminate process command.
Use the kill pidcommand.
Use the kill -KILL pidcommand.

Which of the following Powershell commands will sort processes by amount of non-paged memory,
in descending order?

Get-Process| Sort CPU -descending | Select -property ID, ProcessName


Get-Process| Sort NPM -descending | Select -property ID, ProcessName
Get-Process| Sort -property ID, ProcessName
Get-Process| Sort WS -ascending | Select -property ID, ProcessName

Which of the following Linux commands shows information about the current time, how long your
system's been running, how many users are logged on, and what the load average of your machine
is?

top
uptime
lsof
ps -ef

When Windows boots up, what is the first non-kernel process that starts?

The csrss.exe process.


Powershell.
The winlogon process.
The smss.exe process

In Linux, what process has the PID of 1?

kernel
less
grep
init

Which of the following process information can you find in Windows Task Manager? Select all that
apply.

The CPU resources the process is using


What application or image the process is running
The memory resources the process is using
What time the process started

When using the ps -x command to check the status of a process in Linux, how would you know if a
process is suspended (stopped)?

There is a letter S under the STAT field.


There is a letter R under the STAT field.
There is a letter T under the STAT field.
There is a letter S under the COMMAND field.

What is the default action of the SIGINT signal?

To restart the process that is signaled


To suspend the process that is signaled
To terminate the process that is signaled
To put the process that is signaled into a sleep state

You launch notepad.exe from a PowerShell command prompt. Later, you use Process Explorer to
restart the notepad.exe process? After restart, what is the parent process of notepad.exe?

smss.exe
PowerShell (powershell.exe)
notepad.exe
Process Explorer (procexp.exe)

In Linux, what signal is sent when you enter the kill pidcommand?

SIGTSTP
SIGTERM
SIGINT
SIGKILL

Which of the following Powershell commands will sort processes by amount of non-paged memory,
in descending order?

Get-Process| Sort NPM -descending | Select -property ID, ProcessName


Get-Process| Sort WS -ascending | Select -property ID, ProcessName
Get-Process| Sort -property ID, ProcessName
Get-Process| Sort CPU -descending | Select -property ID, ProcessName

When using the ps -ef command to read process information in Linux, what is the process’ PPID?

The ID of the person who launched the process


The terminal associated with the process
The Process Identification number of its parent
Its Process Identification number

Which of the following statements are true about child processes in Windows? Select all that apply.

A child process inherits environment variables and settings from its parent.
A child process is dependent on its parent process until the child process is terminated.
A child process can be terminated by clicking on the X button in the top right corner of the application.
A child process can be terminated by running the taskkill /pidcommand in the CLI.

Which of the following statements are true about SIGINT? Select all that apply.

It can be sent at the CLI by typing the sigint command.


It can be sent at the CLI by pressing the CTRL+C keys.
It is a signal that exists in both Windows and Linux.
It is an interrupt signal that can be sent to a process that is running.

Which of the following options are available in Process Explorer after right-clicking a running process
in the top window pane? Select all that apply.

Remove Process Tree


Suspend
Kill Process
Restart
What happens to background apps while a foreground app is in use on iOS and Android?

The OS will terminate the background apps.


The background apps continue to run normally.
The OS will suspend background mobile apps.
The background apps will take turns running in the background to use less processing power.

In Windows, what information is displayed by the Resource Monitoring tool? Select all that apply.

Information about particular resources on the system (like CPU, Memory, and Network usage)
System hardware properties
Process information along with data about the resources that the process is consuming
Information about current time and how long your system’s been running

What does the top command do in Linux? Select all that apply.

It lists the top ten largest files on the system.


It provides information on process CPU and memory usage.
It provides a snapshot of total tasks currently running or idling.
It lists the top processes that are using the most resources on a machine.

WEEK 6: OPERATING SYSTEM IN PRACTICE

What remote connection tool is built into the command line after PuTTY is installed on a Windows
computer?

Premote
Plink
PuTTYPwrShell
PuTTYcmd

What is one reason you might avoid sharing a folder with everyone on your network in Windows?

It removes anything you’ve already placed in the folder.


It’s resource intensive.
It’s not very secure.
It means your computer always needs to be on.
What is one benefit of using a virtual machine vs a physical one?

Virtual machines are free to use on the cloud


Virtual machines don’t require passwords
It’s very simple to change virtual hardware resource allocation
Multiple users can use one virtual machine

What happens when you type the following command in the Linux command line: sudo dd if=/dev/sdd
of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.

You will delete a file called “USBcopy.imge.”


You will create a file called “100M.”
You will create an image file on your desktop
You will make a copy of all data located on an sdd device.

When using the SCP command, what information will you need to complete the transfer? (Choose all that
apply)
Destination IP address
Source hostname
Source IP address
Destination user

What does SSH stand for?

Solid State Handshake


Secure Service Handler
Secure Shell
Single Server Hold

What happens when you type the following command in the Powershell command line: putty.exe -
ssh alex-chi@104.131.122.215 22?

Your computer connects to an SSH located at IP address 104.131.122.215


You will establish a chat connection with someone called “auser”
You will download a package called “putty.exe” from IP address 104.131.122.215
You will search for a user called “alex-chi” logged into your local area network

Which of the following is the Windows command line tool that enables file sharing from the CLI?
net share
share file
share to net
file share

What is Virtual Box?

A virtual machine
A VPN network
A cloud-based file hosting service
Software for managing virtual instances

Is it possible to run a virtual instance with Linux on a physical machine that is running Windows?

Maybe
Yes
No

What event grouping can be used in the Windows Event Viewer to filter specific types of events?

Error View
Custom Views
Filter Views
Sorted Logs

It is important that log are regularly cleaned out to make room for new ones. In Linux, what utility
manages this?

logswap
cleanlog
delnewlog
logrotate

What happens when you type the following command in the Linux command line: sudo dd
if=/dev/sdd of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.

You will create a file called “100M.”


You will delete a file called “USBcopy.imge.”
You will make a copy of all data located on an sdd device.
You will create an image file on your desktop

What does SCP stand for in Linux?

Secure copy
Sent, copied, pasted
Send copied parameters
Secure ping

What is the Microsoft Terminal Services Client used for?

Locating terminals running on a computer.


Creating RDP connections to remote computers.
Connecting with Linux computers outside of the local network.
Enabling terminal connections on a remote computer.

What is a virtual instance?

A virtual machine that only runs in the CLI


A program for creating virtual machines
A single virtual machine
A virtual machine that has been copied

Alex is trying to start an Ubuntu virtual machine for the first time. They’ve already installed Virtual
Box on their Windows computer, which of the following is a good next step?

Download the Ubuntu OS image


Download a Windows OS image
Restart the virtual instance
Add more physical RAM

In Linux, which of the following log files usually contains the most comprehensive list of events?

The /var/log/dmesg file


The /var/log/kern.log file
The /var/log/syslog file
The /var/log/uber.log file
You’ve found a log file with a long list of errors in it. Where in the log would be a good place to start
searching for the problem?

The top
The middle
The bottom

When using the SCP command, what information will you need to complete the transfer? (Choose all
that apply)

Destination IP address
Source hostname
Destination user
Source IP address

Which of the following can be used to connect securely to a remote computer? (Choose all that apply)

A VPN connection
dynamic-link library
An SSD client
An SSH client

In the Windows Event viewer, what is the highest logging level for an event?

High
Critical
Top
Warning

In Linux, what type of messages are stored in the /var/log/dmesg file?

Direct messages
Diagnostic messages
System startup messages
System messages

What is disk cloning used for? Select two that apply.

To back up a machine
To copy files from remote computers using the Secure Copy protocol (SCP)
To set up a remote desktop
To image a computer system

You might also like