New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following shell commands makes the already defined variable TEST visible to new child processes? (Choose two.)

A.

visible TEST

B.

declare +x TEST

C.

declare –x TEST

D.

export TEST

E.

export –v TEST

Full Access
Question # 5

Which of the following commands can be used to create a new file that is 100kB in size?

A.

dd

B.

file

C.

mkfile

D.

touch

Full Access
Question # 6

What is the process ID number of the init process on a SysV init based system?

A.

-1

B.

0

C.

1

D.

It is different with each reboot.

E.

It is set to the current run level.

Full Access
Question # 7

After successfully creating a hard link called bar to the ordinary file foo, foo is deleted from the filesystem. Which of the following describes the resulting situation?

A.

foo and bar would both be removed.

B.

foo would be removed while bar would remain accessible.

C.

foo would be removed. bar would still exist but would be unusable.

D.

Both foo and bar would remain accessible.

E.

The user is prompted whether bar should be removed, too.

Full Access
Question # 8

In compliance with the FHS, in which of the directories are man pages found?

A.

/usr/share/man

B.

/opt/man

C.

/usr/doc/

D.

/var/pkg/man

E.

/var/man

Full Access
Question # 9

What is the purpose of the Bash built-in export command?

A.

It allows disks to be mounted remotely.

B.

It runs a command as a process in a subshell.

C.

It makes the command history available to subshells.

D.

It sets up environment variables for applications.

E.

It shares NFS partitions for use by other systems on the network.

Full Access
Question # 10

Which of the following commands moves and resumes in the background the last stopped shell job?

A.

run

B.

bg

C.

fg

D.

back

Full Access
Question # 11

What is the difference between the i and a commands of the vi editor?

A.

i (interactive) requires the user to explicitly switch between vi modes whereas a (automatic) switches modesautomatically.

B.

i (insert) inserts text before the current cursor position whereas a (append) inserts text after the cursor.

C.

i (independent rows) starts every new line at the first character whereas a (aligned rows) keeps the indentation of the previous line.

D.

i (interrupt) temporarily suspends editing of a file to the background whereas a (abort) terminates editing.

Full Access
Question # 12

Which of the following commands prints a list of usernames (first column) and their primary group (fourth column) from the /etc/passwd file?

A.

fmt -f 1,4 /etc/passwd

B.

split -c 1,4 /etc/passwd

C.

cut -d : -f 1,4 /etc/passwd

D.

paste -f 1,4 /etc/passwd

Full Access
Question # 13

Which of the following files, located in the user home directory, is used to store the Bash history?

A.

.bash_history

B.

.bash_histfile

C.

.history

D.

.bashrc_history

E.

.history_bash

Full Access
Question # 14

What command will generate a list of user names from /etc/passwd along with their login shell?

A.

column -s : 1,7 /etc/passwd

B.

chop -c 1,7 /etc/passwd

C.

colrm 1,7 /etc/passwd

D.

cut -d: -f1,7 /etc/passwd

Full Access
Question # 15

What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

A.

To create RAID 9 arrays.

B.

To dynamically change the size of logical volumes.

C.

To encrypt logical volumes.

D.

To create snapshots.

E.

To dynamically create or delete logical volumes.

Full Access
Question # 16

Which function key is used to start Safe Mode in Windows NT?

A.

F10

B.

F8

C.

F6

D.

Windows NT does not support Safe Mode

Full Access
Question # 17

Which of the following is correct when talking about mount points?

A.

Every existing directory can be used as a mount point.

B.

Only empty directories can be used as a mount point.

C.

Directories need to have the SetUID flag set to be used as a mount point.

D.

Files within a directory are deleted when the directory is used as a mount point.

Full Access
Question # 18

When using rpm --verify to check files created during the installation of RPM packages, which of the following information is taken into consideration? (Choose THREE correct answers.)

A.

Timestamps

B.

MD5 checksums

C.

Inodes

D.

File sizes

E.

GnuPG signatures

Full Access
Question # 19

Which of the following commands lists the dependencies of a given dpkg package?

A.

apt-cache depends-onpackage

B.

apt-cache dependencies package

C.

apt-cache depends package

D.

apt-cache requires package

Full Access
Question # 20

What is the name of the main configuration file for GNU GRUB? (Specify the file name only without any path.)

Full Access
Question # 21

Which file should be edited to select the network locations from which Debian installation package files are loaded?

A.

/etc/dpkg/dpkg.cfg

B.

/etc/apt/apt.conf

C.

/etc/apt/apt.conf.d

D.

/etc/apt/sources.list

E.

/etc/dpkg/dselect.cfg

Full Access
Question # 22

Which of the following options for the kernel's command line changes the systemd boot target to rescue.target instead of the default target?

A.

systemd.target=rescue.target

B.

systemd.runlevel=rescue.target

C.

systemd.service=rescue.target

D.

systemd.default=rescue.target

E.

systemd.unit=rescue.target

Full Access
Question # 23

Which of the following commands will write a message to the terminals of all logged in users?

A.

bcast

B.

mesg

C.

print

D.

wall

E.

yell

Full Access
Question # 24

During a system boot cycle, what program is executed after the BIOS completes its tasks?

A.

The bootloader

B.

The inetd program

C.

The init program

D.

The kernel

Full Access
Question # 25

Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)

A.

startd

B.

systemd

C.

Upstart

D.

SysInit

E.

SysV init

Full Access
Question # 26

Which of the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)

A.

shutdown -R 1 now

B.

shutdown -single now

C.

init 1

D.

telinit 1

E.

runlevel 1

Full Access