SlideShare a Scribd company logo
1 of 16
· Question 1Question 19
2 out of 2 points
What file in the etc/ directory contains user’s hashed password?
Selected Answer:
etc/shadow file
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 20
1 out of 2 points
What file and file-field are read by the finger command?
Selected Answer:
Passwd file, it reads user id info like user name phone number
and so on
Correct Answer:
[None]
Response Feedback:
gecos field
· Question 21
0 out of 2 points
When a parent process dies, what happens to any child
processes that are still running?
Selected Answer:
They Child Processes keep running
Correct Answer:
[None]
Response Feedback:
process becomes child of init
· Question 22
1 out of 2 points
What is the effect of the command: $ killall root (Where root
is the root account of the system)
Selected Answer:
It canceles all the Processes that the user
Correct Answer:
[None]
Response Feedback:
shutdown
· Question 23
2 out of 2 points
List 4 shortcomings of root accounts.
Selected Answer:
1- Single Point of failure if compromised
2-The security model is not strong enough for a network
3-High security environments enforce rules that cannot be
implemented with traditional UNIX
4- Since some rules are implemented in command code,
modification requires rewrite and recompilation
5- Minimal support for auditing
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 24
1 out of 2 points
Write a BASH command that would force the OS into single-
user mode.
Selected Answer:
Root should run the init command to change the run level using
the letter s or the number 1 for example
Correct Answer:
[None]
Response Feedback:
telinit 1
· Question 25
0 out of 2 points
Explain when it would be necessary to use the non-rewinding
interface file of any backup device.
Selected Answer:
To implement permanent changes to the backup device
Correct Answer:
[None]
Response Feedback:
Only if multiple dumps were being made to the same tape
drive. Failure to use the non-rewind would cause successive
dumps to overwrite each other.
· Question 26
2 out of 2 points
What BASH shell command can send any signal level to a
running process?
Selected Answer:
Kill Command
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 27
2 out of 2 points
Which two inter-process signals cannot be caught or blocked?
Selected Answer:
Kill process
Stop Process
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 28
2 out of 2 points
What BASH shell utility allows you to monitor CPU and
memory usage?
Selected Answer:
Network Monitoring: Netstat, nethogs, iptraf, iftop
Disk I/O: iotop
CPU/ memory: top, Ps, htop, atop
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 29
0 out of 2 points
In the file permission listing drwxr-xr-x, what is the file type?
Selected Answer:
.sh
Correct Answer:
[None]
Response Feedback:
directory
· Question 30
0 out of 2 points
In the file permission listing –rwsr--r--, what does ‘s’ signify?
Selected Answer:
save
Correct Answer:
[None]
Response Feedback:
elevated privilege
· Question 31
2 out of 12 points
Create a BASH script that performs file system cleanup by
finding and removing all files in and below your home directory
that have a (.core) or (.tmp) extension.
Selected Answer:
#!/bin/bash
ls -al ~ > ~/ls.dat
ls -al ~ > ~/tree.dat
mkdir ~/backups
mv ~/ls.dat ~/tree.dat ~/backups
rename .dat .bu ~/backups/*.dat
Correct Answer:
[None]
Response Feedback:
#!/bin/bash
find / -type f -name ‘*.log’ | while read fname; do cp $fname
~/logFiles; done
find / -type f -name ‘*.log’ | while read fname; do cp $fname
~/logFiles; done
· Question 32
0 out of 3 points
Show the crontab file entry that would run the script from
question 1, every Monday, Wednesday, and Friday at 5:30
AM. Assume the name of the script is fileCleanup.sh and that it
is located in the ~/script directory.
Selected Answer:
[None Given]
Correct Answer:
[None]
Response Feedback:
minutehourday of monthmonthweek daycommand 30
05
* * 1,3,5 ~/scripts/fileClean
up.sh
· Question 33
2 out of 12 points
Create another script that asks a user to enter a search term
from the console & then uses that term with grep to search all
log files in the dev/logs directory for matching lines.
Selected Answer:
#!/bin/bash
echo "Enter a filename to Move Copy or Delete"
read fileName
if [ -f "$fileName" ]; then
echo "Enter C M or D to Move, Copy, or Delete"
read command
if [ "$command" = "C" ] || [ "$command" = "c" ]; then
echo "enter destination directory"
read dest
cp $fileName $dest/$fileName
elif [ "$command" = "M" ] || [ "$command" = "m" ]; then
echo "enter destination directory"
read dest
mv $fileName $dest/$fileName
elif [ "$command" = "D" ] || [ "$command" = "d" ]; then
rm $fileName
else
echo "Invalid entry, Please redo Script"
fi
else
echo "The File entered doesn't exist"
fi
Correct Answer:
[None]
Response Feedback:
#!/bin/bash
echo "Enter search term or REGEX"
read searchTerm
grep -E -r $searchTerm dev/logs/*
· Question 34
0 out of 4 points
What regular expression would you type into the script from
question 33 if you were looking for kernel errors in the category
or kern.alert, kern.crit, or kern.emerg ?
Selected Answer:
[None Given]
Correct Answer:
[None]
Response Feedback:
kern.(alert|crit|emerg)
· Question 35
0 out of 4 points
Write a regular expression that would find date fields of the
form: mm-dd-yyyy
and where the field is delineated with either tabs or spaces.
Selected Answer:
[None Given]
Correct Answer:
[None]
Response Feedback:
[0-9]{2}-[0-9]{2}-[0-9]{4} OR d{2}-d{2}-d{4}
· Question 36
10 out of 10 points
Compare and contrast the use of conventional hard-drives as a
primary storage medium against the newer Solid State Devices,
(SSDs).
Selected Answer:
(HDD)
Cost wise they cost only around $0.075 per gigabyte, very cheap
(buying a 4TB model)
Capacity wise Typically 500GB – 2TB for notebook size drives
Operating system boot time takes around 40 seconds average
bootup time
File copy / write speed The range can be anywhere from 50 –
120MB / s
Encryption Full Disk Encryption (FDE) Supported on some
models
when it comes to power they have more power draw, it averages
6 – 7 watts and therefore uses more battery.
Mean time between failure rate of 1.5 million hours
(SSD)
Cost wise they are expensive, $1.00 per gigabyte (based on
buying a 240GB drive)
Capacity Typically not larger than 512GB for notebook size
drives
Operating system boot time takes around 22 seconds average
bootup time
File copy / write speed generally above 200 MB/s and up to 500
MB/s for cutting edge drives
Encryption Full Disk Encryption (FDE) Supported on some
models
Power Draw / Battery Life, SSD's have less power draw,
averages 2 – 3 watts, resulting in 30+ minute battery boost
Mean time between failure rate of 2.0 million hours
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 37
5 out of 10 points
Describe the part of the boot process that locates and mounts an
Operating System to main memory.
Selected Answer:
The bootstrap loader is a small program that has a single
function: It loads the operating system into memory and allows
it to begin operation. In the most basic form, the bootstrap
loader sets up the small driver programs that interface with and
control the various hardware subsystems of the computer. It sets
up the divisions of memory that hold the operating system, user
information and applications. It establishes the data structures
that will hold the myriad signals, flags and semaphores that are
used to communicate within and between the subsystems and
applications of the computer. Then it turns control of the
computer over to the operating system.
Correct Answer:
[None]
Response Feedback:
a. POST of the Bios looks for attached storage devices and
performs some initialization
b. An internal table of the BIOS lists the order to search
attached devices by type and drive number.
i. Using that
table, the system bus is interrogated to see if the highest
priority devices are attached. If no attachment is detected, the
BIOS tries to detect the next lower device type. Usually Hard-
drives are at the bottom of the list.
ii. When a device
is detected, the BIOS searches the first storage sector of the
device, looking for a Master Boot Record, (MBR).
1. The MBR partition table is searched for an
active/bootable partition
2. The last two bytes of the MBR are read to verify the boot
signature
3. If conditions 1 & 2 are met, the boot code from the MBR
is loaded into main memory and run
4. If conditions 1 & 2 are not met, but a device is attached,
the system hangs
· Question 1Question 192 out of 2 pointsWhat file in the.docx

More Related Content

Similar to · Question 1Question 192 out of 2 pointsWhat file in the.docx

RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationIsabella789
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationIsabella789
 
Big Java Chapter 1
Big Java Chapter 1Big Java Chapter 1
Big Java Chapter 1Maria Joslin
 
Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programmingMohit Aggarwal
 
Rh202 q&a-demo-cert magic
Rh202 q&a-demo-cert magicRh202 q&a-demo-cert magic
Rh202 q&a-demo-cert magicEllina Beckman
 
Interview questions
Interview questionsInterview questions
Interview questionsxavier john
 
Bc0056 unix operating system
Bc0056   unix operating systemBc0056   unix operating system
Bc0056 unix operating systemsmumbahelp
 
systems_administrator test
systems_administrator  testsystems_administrator  test
systems_administrator testHunde Regasa
 
Chapter 8 memory-updated
Chapter 8 memory-updatedChapter 8 memory-updated
Chapter 8 memory-updatedDelowar hossain
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systemssmumbahelp
 
Performance Analysis of Idle Programs
Performance Analysis of Idle ProgramsPerformance Analysis of Idle Programs
Performance Analysis of Idle Programsgreenwop
 
operating system question bank
operating system question bankoperating system question bank
operating system question bankrajatdeep kaur
 
A character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdfA character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdfaptind
 
A character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdfA character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdfaptind
 
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)Isabella789
 
Logical volume manager xfs
Logical volume manager xfsLogical volume manager xfs
Logical volume manager xfsSarwar Javaid
 
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...DataStax
 

Similar to · Question 1Question 192 out of 2 pointsWhat file in the.docx (20)

RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
 
RH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux CertificationRH302 Exam-Red Hat Linux Certification
RH302 Exam-Red Hat Linux Certification
 
Measuring Firebird Disk I/O
Measuring Firebird Disk I/OMeasuring Firebird Disk I/O
Measuring Firebird Disk I/O
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Big Java Chapter 1
Big Java Chapter 1Big Java Chapter 1
Big Java Chapter 1
 
Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programming
 
Rh202 q&a-demo-cert magic
Rh202 q&a-demo-cert magicRh202 q&a-demo-cert magic
Rh202 q&a-demo-cert magic
 
Interview questions
Interview questionsInterview questions
Interview questions
 
Bc0056 unix operating system
Bc0056   unix operating systemBc0056   unix operating system
Bc0056 unix operating system
 
systems_administrator test
systems_administrator  testsystems_administrator  test
systems_administrator test
 
Chapter 8 memory-updated
Chapter 8 memory-updatedChapter 8 memory-updated
Chapter 8 memory-updated
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systems
 
Performance Analysis of Idle Programs
Performance Analysis of Idle ProgramsPerformance Analysis of Idle Programs
Performance Analysis of Idle Programs
 
101 350
101 350101 350
101 350
 
operating system question bank
operating system question bankoperating system question bank
operating system question bank
 
A character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdfA character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdf
 
A character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdfA character device typically transfers data to and from a user appli.pdf
A character device typically transfers data to and from a user appli.pdf
 
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
RH-302 Exam-Red Hat Certified Engineer on Redhat Enterprise Linux 4 (Labs)
 
Logical volume manager xfs
Logical volume manager xfsLogical volume manager xfs
Logical volume manager xfs
 
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
 

More from LynellBull52

· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docxLynellBull52
 
·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docxLynellBull52
 
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docxLynellBull52
 
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docxLynellBull52
 
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docxLynellBull52
 
· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docxLynellBull52
 
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docxLynellBull52
 
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docxLynellBull52
 
· Unit Interface-User Interaction· Assignment Objectives Em.docx
· Unit  Interface-User Interaction· Assignment Objectives Em.docx· Unit  Interface-User Interaction· Assignment Objectives Em.docx
· Unit Interface-User Interaction· Assignment Objectives Em.docxLynellBull52
 
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docxLynellBull52
 
· Question 1· · How does internal environmental analy.docx
· Question 1· ·        How does internal environmental analy.docx· Question 1· ·        How does internal environmental analy.docx
· Question 1· · How does internal environmental analy.docxLynellBull52
 
· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docxLynellBull52
 
· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docxLynellBull52
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docxLynellBull52
 
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docxLynellBull52
 
· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docxLynellBull52
 
· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docxLynellBull52
 
· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docxLynellBull52
 
· Select and respond to 3 posts listed below. Advance the conversa.docx
· Select and respond to 3 posts listed below. Advance the conversa.docx· Select and respond to 3 posts listed below. Advance the conversa.docx
· Select and respond to 3 posts listed below. Advance the conversa.docxLynellBull52
 

More from LynellBull52 (20)

· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx
 
·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx
 
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
 
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
 
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
 
· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx
 
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
 
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
 
· Unit Interface-User Interaction· Assignment Objectives Em.docx
· Unit  Interface-User Interaction· Assignment Objectives Em.docx· Unit  Interface-User Interaction· Assignment Objectives Em.docx
· Unit Interface-User Interaction· Assignment Objectives Em.docx
 
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
 
· Question 1· · How does internal environmental analy.docx
· Question 1· ·        How does internal environmental analy.docx· Question 1· ·        How does internal environmental analy.docx
· Question 1· · How does internal environmental analy.docx
 
· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx
 
· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx
 
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
 
· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx
 
· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx
 
· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx
 
· Select and respond to 3 posts listed below. Advance the conversa.docx
· Select and respond to 3 posts listed below. Advance the conversa.docx· Select and respond to 3 posts listed below. Advance the conversa.docx
· Select and respond to 3 posts listed below. Advance the conversa.docx
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

· Question 1Question 192 out of 2 pointsWhat file in the.docx

  • 1. · Question 1Question 19 2 out of 2 points What file in the etc/ directory contains user’s hashed password? Selected Answer: etc/shadow file Correct Answer: [None] Response Feedback: [None Given] · Question 20 1 out of 2 points What file and file-field are read by the finger command? Selected Answer: Passwd file, it reads user id info like user name phone number and so on Correct Answer:
  • 2. [None] Response Feedback: gecos field · Question 21 0 out of 2 points When a parent process dies, what happens to any child processes that are still running? Selected Answer: They Child Processes keep running Correct Answer: [None] Response Feedback: process becomes child of init · Question 22 1 out of 2 points What is the effect of the command: $ killall root (Where root is the root account of the system)
  • 3. Selected Answer: It canceles all the Processes that the user Correct Answer: [None] Response Feedback: shutdown · Question 23 2 out of 2 points List 4 shortcomings of root accounts. Selected Answer: 1- Single Point of failure if compromised 2-The security model is not strong enough for a network 3-High security environments enforce rules that cannot be implemented with traditional UNIX 4- Since some rules are implemented in command code, modification requires rewrite and recompilation 5- Minimal support for auditing Correct Answer: [None] Response Feedback: [None Given]
  • 4. · Question 24 1 out of 2 points Write a BASH command that would force the OS into single- user mode. Selected Answer: Root should run the init command to change the run level using the letter s or the number 1 for example Correct Answer: [None] Response Feedback: telinit 1 · Question 25 0 out of 2 points Explain when it would be necessary to use the non-rewinding interface file of any backup device.
  • 5. Selected Answer: To implement permanent changes to the backup device Correct Answer: [None] Response Feedback: Only if multiple dumps were being made to the same tape drive. Failure to use the non-rewind would cause successive dumps to overwrite each other. · Question 26 2 out of 2 points What BASH shell command can send any signal level to a running process? Selected Answer: Kill Command Correct Answer: [None] Response Feedback: [None Given] · Question 27 2 out of 2 points
  • 6. Which two inter-process signals cannot be caught or blocked? Selected Answer: Kill process Stop Process Correct Answer: [None] Response Feedback: [None Given] · Question 28 2 out of 2 points What BASH shell utility allows you to monitor CPU and memory usage? Selected Answer: Network Monitoring: Netstat, nethogs, iptraf, iftop Disk I/O: iotop CPU/ memory: top, Ps, htop, atop Correct Answer: [None]
  • 7. Response Feedback: [None Given] · Question 29 0 out of 2 points In the file permission listing drwxr-xr-x, what is the file type? Selected Answer: .sh Correct Answer: [None] Response Feedback: directory · Question 30 0 out of 2 points In the file permission listing –rwsr--r--, what does ‘s’ signify?
  • 8. Selected Answer: save Correct Answer: [None] Response Feedback: elevated privilege · Question 31 2 out of 12 points Create a BASH script that performs file system cleanup by finding and removing all files in and below your home directory that have a (.core) or (.tmp) extension. Selected Answer: #!/bin/bash ls -al ~ > ~/ls.dat ls -al ~ > ~/tree.dat mkdir ~/backups mv ~/ls.dat ~/tree.dat ~/backups rename .dat .bu ~/backups/*.dat Correct Answer:
  • 9. [None] Response Feedback: #!/bin/bash find / -type f -name ‘*.log’ | while read fname; do cp $fname ~/logFiles; done find / -type f -name ‘*.log’ | while read fname; do cp $fname ~/logFiles; done · Question 32 0 out of 3 points Show the crontab file entry that would run the script from question 1, every Monday, Wednesday, and Friday at 5:30 AM. Assume the name of the script is fileCleanup.sh and that it is located in the ~/script directory. Selected Answer: [None Given] Correct Answer: [None] Response Feedback: minutehourday of monthmonthweek daycommand 30 05 * * 1,3,5 ~/scripts/fileClean up.sh
  • 10. · Question 33 2 out of 12 points Create another script that asks a user to enter a search term from the console & then uses that term with grep to search all log files in the dev/logs directory for matching lines. Selected Answer: #!/bin/bash echo "Enter a filename to Move Copy or Delete" read fileName if [ -f "$fileName" ]; then echo "Enter C M or D to Move, Copy, or Delete" read command if [ "$command" = "C" ] || [ "$command" = "c" ]; then echo "enter destination directory" read dest cp $fileName $dest/$fileName elif [ "$command" = "M" ] || [ "$command" = "m" ]; then
  • 11. echo "enter destination directory" read dest mv $fileName $dest/$fileName elif [ "$command" = "D" ] || [ "$command" = "d" ]; then rm $fileName else echo "Invalid entry, Please redo Script" fi else echo "The File entered doesn't exist" fi Correct Answer: [None] Response Feedback: #!/bin/bash echo "Enter search term or REGEX" read searchTerm grep -E -r $searchTerm dev/logs/* · Question 34 0 out of 4 points
  • 12. What regular expression would you type into the script from question 33 if you were looking for kernel errors in the category or kern.alert, kern.crit, or kern.emerg ? Selected Answer: [None Given] Correct Answer: [None] Response Feedback: kern.(alert|crit|emerg) · Question 35 0 out of 4 points Write a regular expression that would find date fields of the form: mm-dd-yyyy and where the field is delineated with either tabs or spaces. Selected Answer: [None Given] Correct Answer: [None]
  • 13. Response Feedback: [0-9]{2}-[0-9]{2}-[0-9]{4} OR d{2}-d{2}-d{4} · Question 36 10 out of 10 points Compare and contrast the use of conventional hard-drives as a primary storage medium against the newer Solid State Devices, (SSDs). Selected Answer: (HDD) Cost wise they cost only around $0.075 per gigabyte, very cheap (buying a 4TB model) Capacity wise Typically 500GB – 2TB for notebook size drives Operating system boot time takes around 40 seconds average bootup time File copy / write speed The range can be anywhere from 50 – 120MB / s Encryption Full Disk Encryption (FDE) Supported on some models when it comes to power they have more power draw, it averages 6 – 7 watts and therefore uses more battery. Mean time between failure rate of 1.5 million hours (SSD) Cost wise they are expensive, $1.00 per gigabyte (based on buying a 240GB drive)
  • 14. Capacity Typically not larger than 512GB for notebook size drives Operating system boot time takes around 22 seconds average bootup time File copy / write speed generally above 200 MB/s and up to 500 MB/s for cutting edge drives Encryption Full Disk Encryption (FDE) Supported on some models Power Draw / Battery Life, SSD's have less power draw, averages 2 – 3 watts, resulting in 30+ minute battery boost Mean time between failure rate of 2.0 million hours Correct Answer: [None] Response Feedback: [None Given] · Question 37 5 out of 10 points Describe the part of the boot process that locates and mounts an Operating System to main memory. Selected Answer: The bootstrap loader is a small program that has a single function: It loads the operating system into memory and allows it to begin operation. In the most basic form, the bootstrap loader sets up the small driver programs that interface with and
  • 15. control the various hardware subsystems of the computer. It sets up the divisions of memory that hold the operating system, user information and applications. It establishes the data structures that will hold the myriad signals, flags and semaphores that are used to communicate within and between the subsystems and applications of the computer. Then it turns control of the computer over to the operating system. Correct Answer: [None] Response Feedback: a. POST of the Bios looks for attached storage devices and performs some initialization b. An internal table of the BIOS lists the order to search attached devices by type and drive number. i. Using that table, the system bus is interrogated to see if the highest priority devices are attached. If no attachment is detected, the BIOS tries to detect the next lower device type. Usually Hard- drives are at the bottom of the list. ii. When a device is detected, the BIOS searches the first storage sector of the device, looking for a Master Boot Record, (MBR). 1. The MBR partition table is searched for an active/bootable partition 2. The last two bytes of the MBR are read to verify the boot signature 3. If conditions 1 & 2 are met, the boot code from the MBR is loaded into main memory and run 4. If conditions 1 & 2 are not met, but a device is attached, the system hangs