LinkedIn: Linux | Skill Assessment Quiz Solutions

Linux | LinkedIn Skill Assessment Quiz Solutions

LinkedIn: Linux | Skill Assessment Quiz Solutions
Recommended Linux Courses:
1. Udemy: Linux Courses
2. Udemy: Linux Mastery: Master Linux Command Line
3. Udemy: Linux Command Line Basics
4. Coursera: Create User Directory and Files with Linux Commands
5. LinkedIn: Learning Linux Command Line
6. edX: Linux Basics: The Command Line Interface
7. edureka: Linux Courses
8. Eduonix: Ultimate Linux Learning Path

  1. To mount a drive by its ID, what command would you use first to retrieve it?

    • df -h
    • listid
    • ls -l
    • blkid

  1. Linux file access control lists (ACLs) are ___.

    • discretionary access control system permissions layered over standard Linux permissions
    • mandatory access control system permissions layered over standard Linux permissions
    • a type of firewall for Linux
    • the same as standard Linux permissions

  1. When using iproute2, how do you show routing information for an IPv6 network?

    • route -ipv6
    • route
    • ip -6 route show
    • ip route show

  1. What does this command string do?
    find / -size +10M -exec ls -l {} ;

    • It finds all files using ls -l and hands them off to the find command to display.
    • It finds all files older than 10 minutes and long lists them using the ls command.
    • It finds all files larger than 10 MB and long lists them using the ls command.
    • It uses the ls command to find all files in the filesystem matching the {} wildcard.

  1. What would this locate command show?
    locate --regexp '^/usr.*pixmaps.*jpg$'

    • all files in a directory named pixmaps
    • all files ending in “.jpg”
    • all file paths that start with “/usr”, include the word “pixmaps”, and end with ".jpg"
    • all file paths that include “/usr/pixmaps” and end with “.jpg”

  1. Which command allows you to do packet analysis from the command line?

    • wireshark
    • ethtool
    • netstat
    • tcpdump

  1. Which command will tell you how long a system has been running?

    • log
    • uptime
    • runtime
    • access

  1. How would you describe PCP (Performance Co-Pilot)?

    • It is an application testing suite used to profile programming code.
    • It is a local command used for monitoring local system resources in real time.
    • It is a set of tools, services, and libraries for gathering and analyzing performance measures.
    • It is a tool designed to change system configuration for purposes of optimization.

  1. You want to resolve a long list of DNS names using dig. What should you do?

    • Create a text file including all names and use the -f option of dig.
    • Type in each query manually.
    • Write a shell script to send multiple dig queries to the DNS server.
    • Save the DNS names in an SQL database and process it with dig.

  1. What would this command output?
    ps -e --format uid,pid,ppid,%cpu,cmd

    • the user ID, process ID, parent process ID, CPU usage, and command name of a process
    • the user ID, group ID, parent process ID, CPU usage, and command name of a process
    • the UUID, process ID, parent process ID, CPU usage, and command name of a process
    • all of these answers

  1. Which command in Bash executes the last line in the shell history that starts with ls?

    • !
    • !!
    • !*
    • !ls

  1. The ssh-copy-id command copies ____ to the remote host.

    • both private and public keys
    • the ssh public key
    • the ssh private key
    • a fingerprint file

  1. What command is used to determine the amount of disk usage for a directory?

    • find
    • fdisk
    • du
    • df

  1. A backup drive was created using dd to make a bit-for-bit copy. When the drive is inserted into an iSCSI target before it is booted up, the data appears to be missing. What happened?

    • The backup drive is corrupted and needs to be re-created.
    • When the backup drive was duplicated, the label was as well. When booted, the system mounted the old duplicated drive by its identical label.
    • There is a conflict between the physical location of the backup drive and the original drive.
    • The backup process went wrong, and the old drive was duplicated over the original drive.

  1. What is the key difference between a redirect (>) and piping to the tee command?

    • The tee command sends output only to STDOUT and STDERR.
    • A redirect sends output to STDOUT and a file, whereas a tee sends output only to STDOUT.
    • Nothing, they are the same.
    • The tee command sends output to STDOUT and a file, whereas a redirect sends output only to a file.

  1. What does the /etc/nsswitch.conf file manage?

    • priority of one DNS server over another
    • per network interface DNS server configuration
    • alternative DNS services
    • sources for name service information

  1. Assume the variable myNumber holds a string consisting of 10 digits. What will this command output?
    echo \$myNumber | sed -e 's/^[[:digit:]][[:digit:]][[:digit:]]/(&)/g'

    • It will only match digits—and since the string has only digits, the command will output the same number without changes.
    • It will output the same 10-digit number, but every digit will be inside parentheses.
    • It will output the entire 10-digit number inside parentheses.
    • It will output the same 10-digit number, but the first 3 digits will be inside parentheses.

  1. Packages can be downloaded but not installed with yum or dnf by specifying which option?

    • None of these answers. yum does not support downloading packages without installing them.
    • –downloaddir
    • -d
    • –downloadonly

  1. What character class is equal to this set?

    • [[:alnum:]]
    • [[:digit:]]
    • [[:alpha:]]
    • [[:num:]]

  1. When archiving files, which command will preserve all file attributes including ACLs and SELinux security context?
    • zip
    • tar
    • archive
    • gzip

  1. In a systemd-based OS, you can change the system hostname by editing /etc/hostname manually and then doing what?

    • Restart dhcpd.
    • Run /etc/hostname.
    • Nothing, the system notices automatically.
    • Notify systemd to update it by restarting the systemd-hostnamed service.

  1. What command would you use to resize an LVM volume group to include an additional physical volume?

    • vgadd
    • vgresize
    • vgappend
    • vgextend

  1. When would this system cron job run its task?
    0 1 * * *

    • every minute of the hour
    • every hour of every day
    • every day at 1:00 AM
    • only on Mondays

  1. ifconfig has been deprecated. What command is now recommended for changing IP addresses in the live config?

    • netconf
    • ipconfig
    • ipman
    • ip

  1. You are managing an Apache web server on a system using SELinux. By default it cannot read personal webpages in users’ home directories. What SELinux boolean would you set to allow this?

    • apache_enable_homedirs
    • httpd_enable_userdirs
    • httpd_enable_homedirs
    • httpd_enable_userhome_dirs

  1. Why doesn’t passwd -l keep a user from logging in via other methods?

    • The passwd command is not used for locking passwords.
    • There is no password -l option.
    • It locks only the password, not the account, so users can still authenticate with keys or other methods.
    • It does lock the account, keeping users from logging in even if they are using other authentication methods.

  1. In the Bash shell, what is the difference between piping into | and piping into |&?

    • Piping into | pipes both stdout and stderr. Piping into |& pipes only stderr.
    • Piping into | pipes stdout. Piping into |& pipes stdout and stderr.
    • Piping into | pipes both stdout and stderr. Piping into |& pipes only stdout.
    • Piping into | pipes stdout. Piping into |& pipes all open file descriptors.

  1. Why is the passwd command able to modify the /etc/passwd file?

    • The kernel identifies it as one of the names of extended commands.
    • It has the same name as the file it modifies.
    • It has the SUID permission mode and is owned by root.
    • It is a system administration command.

  1. When a user deletes a file using the rm command, Linux will ____.

    • always ask for confirmation
    • back up the file before it deletes the file
    • ask for confirmation if configured to do so
    • never ask for confirmation

  1. What is a major advantage of using Logical Volume Management (LVM)?

    • Access to a drive is faster than with standard partitions.
    • Volumes can be resized smaller without unmounting them.
    • Repairing filesystem errors is easier than with standard partitions.
    • Volumes can be resized even if the free space is not contiguous.

  1. What is one major difference between brace expansion and globs?

    • Globs create a list; brace expansion matches pattern.
    • Brace expansion requires files to exist; globs do not.
    • Brace expansion creates a list; globs mart the list of pathnames.
    • Globs get processes first and brace expansion later.

  1. To remove all ACLs from a directory , use setfacl with which options?

    • -d
    • -k
    • -b
    • -x

  1. Which choice will not print “Hello World” in the terminal?

    • option-1
      [[ $myVar -lt 10 ]] && echo " Hello World"

    • option-2
      [[ $myVar -lt 10 ]] || echo " Hello World"
    The OR Operator (||) is much like an ‘else’ statement in programming. The above operator allow you to execute second command only if the execution of first command fails, i.e., the exit status of first command is ‘1’.
    • option-3
      [[ $myVar -gt 10 ]] && echo " Hello World"
    The AND Operator (&&) would execute the second command only, if the execution of first command SUCCEEDS, i.e., the exit status of the first command is 0. This command is very useful in checking the execution status of last command.
    • option-4
      [[ $myVar -gt 10 ]] || echo " Hello World"

  1. What is not inherited by child process?
    • shell aliases
    • userid
    • environmental variables
    • scheduling priority

  1. What NFS option allows the root user to access NFS shares as the root user?
    • no_admin_squash
    • no_root_squash
    • allow_root_access
    • all_squash

  1. You send an email to a remote client using the following syntax. What will be in the body of the email?
    date | mail -s "This is a remote test" [email protected]

    • “This is a remote test”
    • the date, the time, and the words “This is a remote test”
    • The email subject shows “This is a remote test” but the body of the email will be empty.
    • the current date and time

  1. What is the /etc/hosts file used for?
    • resolving the local name
    • blocking sites using iptables
    • setting the hostname
    • configuring DNS name servers

  1. In an extended regular expression, you would use (pattern){3} to match three instances of the pattern. How would you match the same thing with an extended glob?
    • 3(pattern)
    • {0,3}(pattern}
    • Occurrence quantifiers are not supported in Bash’s version of extended globs, so this is not possible.
    • {3}(pattern})

  1. When configuring a Samba share, how would the engineering group be specified in the smb.conf?
    • Samba uses Linux operating system groups from the /etc/group file; just specify the group name.
    • It would be preceded by a percent sign (%), such as %engineers.
    • Use the group name by itself; Samba checks for its existence.
    • It would be preceded by an @ symbol, such as @engineering.

  1. To configure the Kerberos client, which command should you use to import the keytab file?
    • krb5-workstation
    • ktutil
    • pam_krb5
    • kdb5_util

  1. To search from the current cursor position up to the beginning of the file using VIM, type ______ and then the search criteria.
    • ?
    • </font>
    • /
    • /search

  1. What is the job of the NetworkManager daemon?
    • It is a graphical tool that manages network connections, including bonding and wireless networks.
    • It is a security service that manages user access control of local network-aware services.
    • It attempts to keep an active network connection available at all times.
    • It is a command-line tool that manages network connections.

  1. Why might would you use the usermod command ?
    • to log out a user
    • to lock a user’s account
    • to change global user account settings
    • to set a user’s password

CREDITS: (Source)

Click here to see solutions for all HackerRank SQL practice questions.
Click here to see solutions for all Machine Learning Coursera Assignments.
Click here to see more codes for Raspberry Pi 3 and similar Family.
Click here to see more codes for NodeMCU ESP8266 and similar Family.
Click here to see more codes for Arduino Mega (ATMega 2560) and similar Family.

Feel free to ask doubts in the comment section. I will try my best to answer it.
If you find this helpful by any mean like, comment and share the post.
This is the simplest way to encourage me to keep doing such work.

Thanks & Regards,
- APDaga DumpBox
Post a Comment (0)
Previous Post Next Post