· Question 1Question 19
2 out of 2 points
What file in the etc/ directory contains user’s hashed password?
Selected Answer:
etc/shadow file
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 20
1 out of 2 points
What file and file-field are read by the finger command?
Selected Answer:
Passwd file, it reads user id info like user name phone number and so on
Correct Answer:
[None]
Response Feedback:
gecos field
· Question 21
0 out of 2 points
When a parent process dies, what happens to any child processes that are still running?
Selected Answer:
They Child Processes keep running
Correct Answer:
[None]
Response Feedback:
process becomes child of init
· Question 22
1 out of 2 points
What is the effect of the command: $ killall root (Where root is the root account of the system)
Selected Answer:
It canceles all the Processes that the user
Correct Answer:
[None]
Response Feedback:
shutdown
· Question 23
2 out of 2 points
List 4 shortcomings of root accounts.
Selected Answer:
1- Single Point of failure if compromised
2-The security model is not strong enough for a network
3-High security environments enforce rules that cannot be implemented with traditional UNIX
4- Since some rules are implemented in command code, modification requires rewrite and recompilation
5- Minimal support for auditing
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 24
1 out of 2 points
Write a BASH command that would force the OS into single-user mode.
Selected Answer:
Root should run the init command to change the run level using the letter s or the number 1 for example
Correct Answer:
[None]
Response Feedback:
telinit 1
· Question 25
0 out of 2 points
Explain when it would be necessary to use the non-rewinding interface file of any backup device.
Selected Answer:
To implement permanent changes to the backup device
Correct Answer:
[None]
Response Feedback:
Only if multiple dumps were being made to the same tape drive. Failure to use the non-rewind would cause successive dumps to overwrite each other.
· Question 26
2 out of 2 points
What BASH shell command can send any signal level to a running process?
Selected Answer:
Kill Command
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 27
2 out of 2 points
Which two inter-process signals cannot be caught or blocked?
Selected Answer:
Kill process
Stop Process
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 28
2 out of 2 points
What BASH shell utility allows you to monitor CPU and memory usage?
Selected Answer:
Network Monitoring: Netstat, nethogs, iptraf, iftop
Disk I/O: iotop
CPU/ memory: top, Ps, htop, atop
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 29
0 out of 2 points
In the file permission listing drwxr-xr-x, what is the file type?
Selected Answer:
.sh
Correct Answer:
[None]
Response Feedback:
directory
· .
· Question 1Question 192 out of 2 pointsWhat file in the.docx
1. · Question 1Question 19
2 out of 2 points
What file in the etc/ directory contains user’s hashed password?
Selected Answer:
etc/shadow file
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 20
1 out of 2 points
What file and file-field are read by the finger command?
Selected Answer:
Passwd file, it reads user id info like user name phone number
and so on
Correct Answer:
2. [None]
Response Feedback:
gecos field
· Question 21
0 out of 2 points
When a parent process dies, what happens to any child
processes that are still running?
Selected Answer:
They Child Processes keep running
Correct Answer:
[None]
Response Feedback:
process becomes child of init
· Question 22
1 out of 2 points
What is the effect of the command: $ killall root (Where root
is the root account of the system)
3. Selected Answer:
It canceles all the Processes that the user
Correct Answer:
[None]
Response Feedback:
shutdown
· Question 23
2 out of 2 points
List 4 shortcomings of root accounts.
Selected Answer:
1- Single Point of failure if compromised
2-The security model is not strong enough for a network
3-High security environments enforce rules that cannot be
implemented with traditional UNIX
4- Since some rules are implemented in command code,
modification requires rewrite and recompilation
5- Minimal support for auditing
Correct Answer:
[None]
Response Feedback:
[None Given]
4. · Question 24
1 out of 2 points
Write a BASH command that would force the OS into single-
user mode.
Selected Answer:
Root should run the init command to change the run level using
the letter s or the number 1 for example
Correct Answer:
[None]
Response Feedback:
telinit 1
· Question 25
0 out of 2 points
Explain when it would be necessary to use the non-rewinding
interface file of any backup device.
5. Selected Answer:
To implement permanent changes to the backup device
Correct Answer:
[None]
Response Feedback:
Only if multiple dumps were being made to the same tape
drive. Failure to use the non-rewind would cause successive
dumps to overwrite each other.
· Question 26
2 out of 2 points
What BASH shell command can send any signal level to a
running process?
Selected Answer:
Kill Command
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 27
2 out of 2 points
6. Which two inter-process signals cannot be caught or blocked?
Selected Answer:
Kill process
Stop Process
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 28
2 out of 2 points
What BASH shell utility allows you to monitor CPU and
memory usage?
Selected Answer:
Network Monitoring: Netstat, nethogs, iptraf, iftop
Disk I/O: iotop
CPU/ memory: top, Ps, htop, atop
Correct Answer:
[None]
7. Response Feedback:
[None Given]
· Question 29
0 out of 2 points
In the file permission listing drwxr-xr-x, what is the file type?
Selected Answer:
.sh
Correct Answer:
[None]
Response Feedback:
directory
· Question 30
0 out of 2 points
In the file permission listing –rwsr--r--, what does ‘s’ signify?
8. Selected Answer:
save
Correct Answer:
[None]
Response Feedback:
elevated privilege
· Question 31
2 out of 12 points
Create a BASH script that performs file system cleanup by
finding and removing all files in and below your home directory
that have a (.core) or (.tmp) extension.
Selected Answer:
#!/bin/bash
ls -al ~ > ~/ls.dat
ls -al ~ > ~/tree.dat
mkdir ~/backups
mv ~/ls.dat ~/tree.dat ~/backups
rename .dat .bu ~/backups/*.dat
Correct Answer:
9. [None]
Response Feedback:
#!/bin/bash
find / -type f -name ‘*.log’ | while read fname; do cp $fname
~/logFiles; done
find / -type f -name ‘*.log’ | while read fname; do cp $fname
~/logFiles; done
· Question 32
0 out of 3 points
Show the crontab file entry that would run the script from
question 1, every Monday, Wednesday, and Friday at 5:30
AM. Assume the name of the script is fileCleanup.sh and that it
is located in the ~/script directory.
Selected Answer:
[None Given]
Correct Answer:
[None]
Response Feedback:
minutehourday of monthmonthweek daycommand 30
05
* * 1,3,5 ~/scripts/fileClean
up.sh
10. · Question 33
2 out of 12 points
Create another script that asks a user to enter a search term
from the console & then uses that term with grep to search all
log files in the dev/logs directory for matching lines.
Selected Answer:
#!/bin/bash
echo "Enter a filename to Move Copy or Delete"
read fileName
if [ -f "$fileName" ]; then
echo "Enter C M or D to Move, Copy, or Delete"
read command
if [ "$command" = "C" ] || [ "$command" = "c" ]; then
echo "enter destination directory"
read dest
cp $fileName $dest/$fileName
elif [ "$command" = "M" ] || [ "$command" = "m" ]; then
11. echo "enter destination directory"
read dest
mv $fileName $dest/$fileName
elif [ "$command" = "D" ] || [ "$command" = "d" ]; then
rm $fileName
else
echo "Invalid entry, Please redo Script"
fi
else
echo "The File entered doesn't exist"
fi
Correct Answer:
[None]
Response Feedback:
#!/bin/bash
echo "Enter search term or REGEX"
read searchTerm
grep -E -r $searchTerm dev/logs/*
· Question 34
0 out of 4 points
12. What regular expression would you type into the script from
question 33 if you were looking for kernel errors in the category
or kern.alert, kern.crit, or kern.emerg ?
Selected Answer:
[None Given]
Correct Answer:
[None]
Response Feedback:
kern.(alert|crit|emerg)
· Question 35
0 out of 4 points
Write a regular expression that would find date fields of the
form: mm-dd-yyyy
and where the field is delineated with either tabs or spaces.
Selected Answer:
[None Given]
Correct Answer:
[None]
13. Response Feedback:
[0-9]{2}-[0-9]{2}-[0-9]{4} OR d{2}-d{2}-d{4}
· Question 36
10 out of 10 points
Compare and contrast the use of conventional hard-drives as a
primary storage medium against the newer Solid State Devices,
(SSDs).
Selected Answer:
(HDD)
Cost wise they cost only around $0.075 per gigabyte, very cheap
(buying a 4TB model)
Capacity wise Typically 500GB – 2TB for notebook size drives
Operating system boot time takes around 40 seconds average
bootup time
File copy / write speed The range can be anywhere from 50 –
120MB / s
Encryption Full Disk Encryption (FDE) Supported on some
models
when it comes to power they have more power draw, it averages
6 – 7 watts and therefore uses more battery.
Mean time between failure rate of 1.5 million hours
(SSD)
Cost wise they are expensive, $1.00 per gigabyte (based on
buying a 240GB drive)
14. Capacity Typically not larger than 512GB for notebook size
drives
Operating system boot time takes around 22 seconds average
bootup time
File copy / write speed generally above 200 MB/s and up to 500
MB/s for cutting edge drives
Encryption Full Disk Encryption (FDE) Supported on some
models
Power Draw / Battery Life, SSD's have less power draw,
averages 2 – 3 watts, resulting in 30+ minute battery boost
Mean time between failure rate of 2.0 million hours
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 37
5 out of 10 points
Describe the part of the boot process that locates and mounts an
Operating System to main memory.
Selected Answer:
The bootstrap loader is a small program that has a single
function: It loads the operating system into memory and allows
it to begin operation. In the most basic form, the bootstrap
loader sets up the small driver programs that interface with and
15. control the various hardware subsystems of the computer. It sets
up the divisions of memory that hold the operating system, user
information and applications. It establishes the data structures
that will hold the myriad signals, flags and semaphores that are
used to communicate within and between the subsystems and
applications of the computer. Then it turns control of the
computer over to the operating system.
Correct Answer:
[None]
Response Feedback:
a. POST of the Bios looks for attached storage devices and
performs some initialization
b. An internal table of the BIOS lists the order to search
attached devices by type and drive number.
i. Using that
table, the system bus is interrogated to see if the highest
priority devices are attached. If no attachment is detected, the
BIOS tries to detect the next lower device type. Usually Hard-
drives are at the bottom of the list.
ii. When a device
is detected, the BIOS searches the first storage sector of the
device, looking for a Master Boot Record, (MBR).
1. The MBR partition table is searched for an
active/bootable partition
2. The last two bytes of the MBR are read to verify the boot
signature
3. If conditions 1 & 2 are met, the boot code from the MBR
is loaded into main memory and run
4. If conditions 1 & 2 are not met, but a device is attached,
the system hangs