Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Help!!! Please help answering these questions by using a Linux or any other virt

ID: 3574945 • Letter: H

Question

Help!!! Please help answering these questions by using a Linux or any other virtual machines (CentOS, Debian, or Solaris). Thank you!!!

Question1

Marks: 1

If you compute an MD5 checksum on a text file and then edit *one* character in that file, an MD5 checksum computed on the altered file will be

Choose one answer.

Question2

Marks: 1

This kill command stops the process identified by <pid>:

kill -SIGHUP <pid>

Answer:

A. True

B. False

Question3

Marks: 1

Which of the following commands mounts /dev/sda1 as /mnt/usb when /etc/fstab contains *no* entries referring to either /dev/sda1 or /mnt/usb.

Choose one answer.

Question4

Marks: 1

The lower the nice value, the lower the priority of operation

Answer:

A. True

B. False

Question5

Marks: 1

A normal user does not have permission to write to the passwd file (or the shadow file.) How then can a user change his or her password?

Choose one answer.

Question6

Marks: 1

If a man page exists in more than one section, you can specify a section number to retrieve the proper man page. Which of the following is the command you would use on Solaris to look up exec in section 2?

Choose one answer.

Question7

Marks: 1

It is possible to have multiple users with the same UID.

Answer:

A.True

B. False

Question8

Marks: 1

You should never document the configuration of your system. This way you are too valuable to be replaced by the company.

Answer:

A. True

B. False

Question9

Marks: 1

Choose ALL that are correct: In vi, to replace ALL instances of ; in a file with !, you would use:

Choose at least one answer.

Question10

Marks: 1

Who owns the spool directory in Debian?

Choose one answer.

Question11

Marks: 1

In order to use sudo, you must know the root password.

Answer:

A. True

B. False

Question12

Marks: 1

An ls -l on a file has the following information:

Which of the following is NOT true?

Choose one answer.

Question13

Marks: 1

There are two primary "flavors" of unix -- every current version of unix is some mix of these two types. Name them. You should choose exactly two.

Choose at least one answer.

Question14

Marks: 1

Logging in as root should be reserved for special situations, such as logging on in single user mode. Normally you should log in as yourself and either su or use sudo to access superuser privileges only when such privileges are necessary.

Answer:

A. True

B. False

Question15

Marks: 1

In vi, how do you get into command line mode?

Choose one answer.

Question16

Marks: 1

Match these ctrl sequences with their common bindings in a terminal.

Question17

Marks: 1

Unix was "invented" by

Choose one answer.

Question18

Marks: 1

Unix boots up in distinct stages. Match the following steps with the order in which they occur.

Question19

Marks: 1

A process is defined as an address space containing code, variables, stack, etc., and a set of data structures within the kernel

Answer:

A. True

B. False

Question20

Marks: 1

File and directory lengths are limited to 32 characters

Answer:

A. True

B. False

Question21

Marks: 1

The login shell must be listed in /etc/shells to allow users to log into the system.

Answer:

A.True

B. False

Question22

Marks: 1

Any user can change the mode (permissions) on any file owned by that user using the chmod command.

Answer:

A. True

B. False

Question23

Marks: 1

Sometimes when viewing a binary file, there is a sequence of bytes that the terminal interprets as commands, which typically results in the screen now printing gibberish instead of normal characters. When this happens, the only option is to kill the terminal.

Answer:

A. True

B. False

Question24

Marks: 1

Login names can only be alphanumeric characters.

Answer:

A. True

B. False

Question25

Marks: 1

Match the following components of a process with its description.

Question26

Marks: 1

A default umask of 022 will create files with which of the following permissions:

Choose one answer.

Question27

Marks: 1

Choose the best answer -- Group membership is defined in:

Choose one answer.

Question28

Marks: 1

Match the following functions in vi with the commands to invoke them:

Question29

Marks: 1

Choose everything that is true of DES hashes.

Choose at least one answer.

Question30

Marks: 1

What is the effect of issuing the following command at a shell prompt: /etc/init.d/K22httpd

Choose one answer.

Question31

Marks: 1

What is the action and order of execution of the following two startup scripts in /etc/rc3.d? S20inetd K28nfs.server

Choose one answer.

Question32

Marks: 1

A process can decrease its niceness.

Answer:

A. True

B. False

Question33

Marks: 1

Under Solaris, which command from the boot PROM will rebuild the disk configuration?

Choose one answer.

Question34

Marks: 1

Where are the startup scripts for run level 3 located on Debian?

Choose one answer.

Question35

Marks: 1

You wish to create a symbolic link with the name /etc/rc3.d/S85httpd which is linked to an actual file named /etc/init.d/httpd. You would use which command:

Choose one answer.

Help!!! Please help answering these questions by using a Linux or any other virtual machines (CentOS, Debian, or Solaris). Thank you!!!

Question1

Marks: 1

If you compute an MD5 checksum on a text file and then edit *one* character in that file, an MD5 checksum computed on the altered file will be

Choose one answer.

A. changed by one byte B. identical C. a completely different string

Question2

Marks: 1

This kill command stops the process identified by <pid>:

kill -SIGHUP <pid>

Answer:

A. True

B. False

Question3

Marks: 1

Which of the following commands mounts /dev/sda1 as /mnt/usb when /etc/fstab contains *no* entries referring to either /dev/sda1 or /mnt/usb.

Choose one answer.

A. mount /dev/sda1 /mnt/usb B. mount /dev/sda1 C. mount /mnt/usb /dev/sda1 D. mount /mnt/usb

Question4

Marks: 1

The lower the nice value, the lower the priority of operation

Answer:

A. True

B. False

Question5

Marks: 1

A normal user does not have permission to write to the passwd file (or the shadow file.) How then can a user change his or her password?

Choose one answer.

A. By using a program called passwd which is setgid to root. B. By using sudo to access limited permissions to change passwords. C. By using a program called passwd which is setuid to root.

Question6

Marks: 1

If a man page exists in more than one section, you can specify a section number to retrieve the proper man page. Which of the following is the command you would use on Solaris to look up exec in section 2?

Choose one answer.

A. man exec B. man 2 exec C. man -k exec D. man -s 2 exec

Question7

Marks: 1

It is possible to have multiple users with the same UID.

Answer:

A.True

B. False

Question8

Marks: 1

You should never document the configuration of your system. This way you are too valuable to be replaced by the company.

Answer:

A. True

B. False

Question9

Marks: 1

Choose ALL that are correct: In vi, to replace ALL instances of ; in a file with !, you would use:

Choose at least one answer.

A. :1,$s/;/!/ B. :1,$s/;/!/g C. :%s/;/!/g D. :s/;/!/g

Question10

Marks: 1

Who owns the spool directory in Debian?

Choose one answer.

A. daemon B. root C. system D. bin

Question11

Marks: 1

In order to use sudo, you must know the root password.

Answer:

A. True

B. False

Question12

Marks: 1

An ls -l on a file has the following information:

  -r-xr-xr-- root pauth 28088 2005-04-19 10:48 chsh  

Which of the following is NOT true?

Choose one answer.

A. A member of the group pauth can execute it B. root can execute it C. No one can write to it D. Anyone can execute it

Question13

Marks: 1

There are two primary "flavors" of unix -- every current version of unix is some mix of these two types. Name them. You should choose exactly two.

Choose at least one answer.

A. OSF/1 B. BSD C. AIX D. System V E. UnixWare

Question14

Marks: 1

Logging in as root should be reserved for special situations, such as logging on in single user mode. Normally you should log in as yourself and either su or use sudo to access superuser privileges only when such privileges are necessary.

Answer:

A. True

B. False

Question15

Marks: 1

In vi, how do you get into command line mode?

Choose one answer.

A. / B. : C. <ESC> key D.

Question16

Marks: 1

Match these ctrl sequences with their common bindings in a terminal.

CTRL-    Choose...   Erase one character of input   Sends the end of file indication   Suspend the current process   INT signal   QUIT signal CTRL-H    Choose...   Erase one character of input   Sends the end of file indication   Suspend the current process   INT signal   QUIT signal CTRL-C    Choose...   Erase one character of input   Sends the end of file indication   Suspend the current process   INT signal   QUIT signal CTRL-D    Choose...   Erase one character of input   Sends the end of file indication   Suspend the current process   INT signal   QUIT signal CTRL-Z    Choose...   Erase one character of input   Sends the end of file indication   Suspend the current process   INT signal   QUIT signal

Question17

Marks: 1

Unix was "invented" by

Choose one answer.

A. Novell B. AT & T C. Xerox PARC D. Santa Cruz Operation

Question18

Marks: 1

Unix boots up in distinct stages. Match the following steps with the order in which they occur.

Creation of spontaneous system processes    Choose...   2   1   4   5   3 Execution of system startup scripts    Choose...   2   1   4   5   3 Device detection and configuration    Choose...   2   1   4   5   3 Loading and initialization of the kernel    Choose...   2   1   4   5   3 Multiuser operation    Choose...   2   1   4   5   3

Question19

Marks: 1

A process is defined as an address space containing code, variables, stack, etc., and a set of data structures within the kernel

Answer:

A. True

B. False

Question20

Marks: 1

File and directory lengths are limited to 32 characters

Answer:

A. True

B. False

Question21

Marks: 1

The login shell must be listed in /etc/shells to allow users to log into the system.

Answer:

A.True

B. False

Question22

Marks: 1

Any user can change the mode (permissions) on any file owned by that user using the chmod command.

Answer:

A. True

B. False

Question23

Marks: 1

Sometimes when viewing a binary file, there is a sequence of bytes that the terminal interprets as commands, which typically results in the screen now printing gibberish instead of normal characters. When this happens, the only option is to kill the terminal.

Answer:

A. True

B. False

Question24

Marks: 1

Login names can only be alphanumeric characters.

Answer:

A. True

B. False

Question25

Marks: 1

Match the following components of a process with its description.

Inverse priority of the process    Choose...   PPID   EUID/EGID   PID   UID/GID   niceness Process ID number    Choose...   PPID   EUID/EGID   PID   UID/GID   niceness Parent process ID number    Choose...   PPID   EUID/EGID   PID   UID/GID   niceness Effective user/group IDs    Choose...   PPID   EUID/EGID   PID   UID/GID   niceness Real user/group IDs    Choose...   PPID   EUID/EGID   PID   UID/GID   niceness

Question26

Marks: 1

A default umask of 022 will create files with which of the following permissions:

Choose one answer.

A. -rw-r----- B. -rwx--x--x C. -r-xr-xr-x D. -rwxr-xr-x

Question27

Marks: 1

Choose the best answer -- Group membership is defined in:

Choose one answer.

A. /etc/group B. /etc/passwd C. /etc/shadow D. Both /etc/passwd and /etc/group

Question28

Marks: 1

Match the following functions in vi with the commands to invoke them:

Delete from the cursor to the end of the line    Choose...   d$   i   x   dw   dd Delete a line    Choose...   d$   i   x   dw   dd Start insert mode    Choose...   d$   i   x   dw   dd Delete a word    Choose...   d$   i   x   dw   dd Delete a character    Choose...   d$   i   x   dw   dd

Question29

Marks: 1

Choose everything that is true of DES hashes.

Choose at least one answer.

A. It has no limit to the password length (there is a 255 character implementation length due to limits in the handling utilities) B. The hash is 31 characters long C. The hash is 13 characters long D. It can be in /etc/passwd or in /etc/shadow E. It has an 8 character maximum usable password length

Question30

Marks: 1

What is the effect of issuing the following command at a shell prompt: /etc/init.d/K22httpd

Choose one answer.

A. nothing -- that command is not legal from a shell B. httpd is stopped C. httpd is started D. nothing -- you must add a "start" or a "stop" parameter

Question31

Marks: 1

What is the action and order of execution of the following two startup scripts in /etc/rc3.d? S20inetd K28nfs.server

Choose one answer.

A. nfs.server is stopped, then inetd is started B. inetd is started, then nfs.server is stopped C. nfs.server is started, then inetd is stopped D. inetd is stopped, then nfs.server is started

Question32

Marks: 1

A process can decrease its niceness.

Answer:

A. True

B. False

Question33

Marks: 1

Under Solaris, which command from the boot PROM will rebuild the disk configuration?

Choose one answer.

A. probe-scsi B. boot -s C. boot -r D. boot -a

Question34

Marks: 1

Where are the startup scripts for run level 3 located on Debian?

Choose one answer.

A. /etc/rc3.d B. /etc/rc.d/rc3.d

Question35

Marks: 1

You wish to create a symbolic link with the name /etc/rc3.d/S85httpd which is linked to an actual file named /etc/init.d/httpd. You would use which command:

Choose one answer.

A. ln -s /etc/rc3.d/S85httpd /etc/init.d/httpd B. ls -l /etc/rc3.d/S85httpd /etc/init.d/httpd C. ls -l /etc/init.d/httpd /etc/rc3.d/S85httpd D. ln -s /etc/init.d/httpd /etc/rc3.d/S85httpd

Explanation / Answer

Answer :

Question2

Marks: 1

This kill command stops the process identified by <pid>:

kill -SIGHUP <pid>

Answer:

A. True

B. False

Answer :

A.True

...............

Question4

The lower the nice value, the lower the priority of operation

Answer:

A. True

B. False

Answer :

B. False

.............

Question7

Marks: 1

It is possible to have multiple users with the same UID.

Answer:

A.True

B. False

Answer :

B.False

..............

Question 10

Who owns the spool directory in Debian?

Answer :

B.root

..............

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote