Operating Systems Basics – 2.8.2 Quiz: Linux Overview
1. A system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this command?
- to change file permissions
- to process a new task
- to list the processes currently running in the system
- to display the contents of the current directory
2. Why would a rootkit be used by a hacker?
- to try to guess a password
- to gain access to a device without being detected
- to reverse engineer binary files
- to do reconnaissance
3. Which user can override file permissions on a Linux computer?
- any user that has ‘other’ permission to the file
- only the creator of the file
- any user that has ‘group’ permission to the file
- root user
4. Which method can be used to harden a device?
- Force periodic password changes.
- Allow USB auto-detection.
- Allow default services to remain enabled.
- Allow users to re-use old passwords.
5. What is a daemon?
- an application that monitors and analyzes suspicious activity
- a type of security attack
- a record to keep track of important events
- a background process that runs without the need for user interaction
6. A system administrator issues the apt-get upgrade command on a Linux operating system. What is the purpose of this command?
- Every application installed will update itself to the latest version.
- A specific application named upgrade will be installed.
- The remote repository of applications and dependencies will be updated to the latest version.
- Operating system updates are downloaded and will be installed.
7. In the context of a Linux operating system, which command can be used to display the syntax and parameters for a specific command?
8. A technician has captured packets on a network that has been running slowly when accessing the internet. Which port number should the technician look for within the captured material to locate HTTP packets?
9. Which file system is the primary file system used by Apple in current Macintosh computers?
10. Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?
- intrusion detection system
- malware analysis
11. Which Linux command can be used to display the name of the current working directory?
12. Why is Kali Linux a popular choice in testing the network security of an organization?
- It is a network scanning tool that prioritizes security risks.
- It can be used to test weaknesses by using only malicious software.
- It is an open source Linux security distribution containing many penetration tools.
- It can be used to intercept and log network traffic.
13. What are three benefits of using symbolic links over hard links in Linux? (Choose three.)
- They can be compressed.
- They can link to a file in a different file system.
- They can show the location of the original file.
- Symbolic links can be exported.
- They can be encrypted.
- They can link to a directory.
14. What is a benefit of Linux being an open source operating system?
- Linux distributions are maintained by a single organization.
- Linux distribution source code can be modified and then recompiled.
- Linux distributions are simpler operating systems since they are not designed to be connected to a network.
- Linux distributions must include free support without cost.
15. Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?
ls –l analyst.txt -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt
- read only
- read, write
- read, write, execute
- full access