Professional Documents
Culture Documents
Linux Question Bank With Answers
Linux Question Bank With Answers
13. Pick out the remote installation methods of Linux operating system
a) HTTP installation
b) NFS installation
c) FTP installation
d) All the above
22. What is the command for viewing date and time in the terminal?
a) date
b) time
c) date | time
d) none of the above
23. How many CUI terminals are present in Linux operating system?
a) 6
b) 7
c) 12
d) 5
29. To learn more about the management of an internet site the best utiltity to use would be:
a) whois
b) traceroute
c) ping
d) ping6
30. What is the command to check whether the router is working properly or not?
a) ping6
b) ping
c) wall
d) traceroute
31. Pick out the command that is used for whether ipforwarding is enabled or not?
a) cat /proc/sys/net/ipv4/ip_forward
b) ping
c) netstat
d) traceroute
33. Which file can you prevent non-root users from logging into the system? (specify the path
and the file name)
a) /etc/login
b) /etc/nologin
c) /etc/nologon
d) /etc/logon
34. What command can be used for formatted output of the wtmp file? (no arguments)
a) last
b) first
c) recent
d) alias
35. What command can be sued to switch user from one user?
a) switch
b) su
c) suser
d) none of the above
40. Which of these commands could you use to show one page of output at a time?
a) more
b) grep
c) sed
d) pause
41. Which commands will give you information about how much disk space each file in the
current directory uses?
a) ls -l
b) ls -la
c) du .
d) ls -a
42. What command would send the output of cmd1 to the input of cmd2?
a) cmd1 | cmd2
b) cmd1 || cmd2
c) cmd1 && cmd2
d) cmd1 ; cmd2
51. What are the files will be touched in the case of creating one user?
a) /etc/passwd
b) /etc/shadow
c) /etc/group
d) all the above
54. What is the command to change the home directory of the user?
a) rm /etc/home <home dir path> <username>
b) useradd -d /<home dir path> <username>
c) useradd -c /<home dir path> <username>
d) useradd -r /<home dir path> <username>
56. ------------- is the command to delete the user name and his home folder.
a) userdel -d <username>
b) userdel <username>
c) userdel -r <username>
d) userdel -c <username>
59. ---------- is the command for installing grub loader in the case of rescue mode.
a) grub-install
b) grub
c) install-grub
d) all the above
62. What command can be used for getting cpu information of a machine?
a) cat /cpuinfo
b) cat /proc/cpuinfo
c) cat /etc/cpuinfo
d) cat /boot/cpuinfo
64. What is the command used for checking the file system?
a) man
b) cat
c) fsck
d) none of the above
65. What are the features of linux?
a) Stability
b) Virus Proof
c) Strong Cryptography
d) All the above
69. Which option will not corrupt the previous installation of the operating system while
installing the new version of linux?
a) Remove all Linux partitions on this system
b) Remove all partitions on this system
c) Keep all partitions and use existing free space
d) All the above
75. -------- is the virtual file system that indicating the processes in Linux.
a) /proc
b) /etc/proc
c) /proc/cpuinfo
d) /proc/virtual
78. Which command can be used for deleting the directory & its contains?
a) rmdir
b) rm -rf
c) removedir
d) both a & b
83. ------- command is used for setting priority for the process.
a) nice
b) setprior
c) both a & b
d) none of the above
85. To update the slocate database you need to use ----------- command.
a) slocate update
b) locate update
c) update locate
d) updatedb
86. Pick the command that is used to unmount the mount point.
a) mount
b) umount
c) unmount
d) dismount
89. What is the option for the maximum number of days a password should stay valid?
a) chage -M 30 username
b) passwd - M 30 username
c) both a & b
d) none of the above
90. What command can be used to convert shadow passwords to normal passwords?
a) pwconv
b) pwunconv
c) both a & b
d) no such provision in Linux
95. -------- command is used for changing the ownership of the file or direcory
a) chown
b) chgrp
c) chmod
d) all the above
98. ------ command changes the file attributes on a Linux second extended file system.
a) attr
b) chattr
c) setattr
d) none of the above
99. Pick the commands that are related to access control list.
a) getfacl
b) setfacl
c) a & b
d) none of the above
110. Which file is using for fixing the runlevel of the Linux operating system?
a) /etc/grub.conf
b) /etc/inittab
c) /etc/passwd
d) /etc/shadow
116. Pick out the command that is used for raiding in RHEL5.
a) mdadm
b) admdm
c) both a& b
d) none of the above
117. Pick out the write command for removing the RAID partitions.
a) mdadm –stop
b) mdadm –zero-superblock /dev/hda8 /dev/hda9
c) both a&b
d) none of the above
118. What is the command used for viewing the loaded kernel modules in RHEL5?
a) lsmod
b) msmod
c) both a &b
d) none of the above
119. What command can be used for checking the network connectivity?
a) eth
b) ifup eth0
c) ethtool
d) all the above
124. Pick up the service that has to be started for running FTP server.
a) lftp
b) ftp
c) vsftpd
d) both b &c
129. The ------ files can not be played directly in the RHEL5.
a) audio cd files.
b) mp3
c) both a &b
d) none of the above
137. Which person was the team leader of the Linux OS project?
a) Karl Pearson
b) Sam Jackson
c) Linus Torvalds
d) All the above
138. What is the command for viewing all the process in the particular machine?
a) top
b) bottom
c) left
d) right
140. Which command can be used for detecting the hardware and boot information
a) dmesg
b) kernel
c) grub
d) none of the above
143. -------- command is used for creating a dummy file with no contents.
a) hang
b) touch
c) halt
d) spot
148. Which file is touched for changing the welcome message in the terminal?
a) /etc/passwd
b) /etc/message
c) /etc/motd
d) none of the above
149. which file is touched for changing the display message in the top of login?
a) /etc/motd
b) /etc/issue
c) /etc/message
d) /etc/shadow
150. Which command is used for viewing hidden files and inode numbers?
a) ls -l
b) ls -a
c) ls -lai
d) pwd.
Answers:
1. a) man
2. c) knowing the ipaddress of the specified machine
3. d) both a & b
4. c) sending the messages to all terminals
5. d) Redhat Package Manager
6. b) core operating system
7. d) All the above
8. d) a & b
9. c) a & b
10. a) lilo
11. b) linux loader
12. a) GRand Unified Boot loader
13. d) All the above
14. a) the important installation files (rpm files)
15. c) Both 1 & 2 are true.
16. a) is a program that is used for giving inputs to the machine.
17. d) All the above
18. a) is a snippet that is used to perform a specified task.
19. b) Fedora
20. a) Debian
21. c) both a & b
22. a) date
23. a) 6
24. b) statement 2 is true
25. d) all the above
26. b) ext2
27. a) mkswap
28. b) ICMP
29. a) whois
30. d) traceroute
31. a) cat /proc/sys/net/ipv4/ip_forward
32. c) /etc/services
33. b) /etc/nologin
34. a) last
35. b) su
36. b) Common Unix Print Service
37. c) Printer services
38. b) 53
39. c) both a & b
40. a) more
41. c) du .
42. c) cmd1 && cmd2
43. a) to display information about the syntax for a command
44. b) startx
45. a) pwd
46. a) for copying files
47. b) mv <src location> <dst location>
48. b) ls -a
49. c) both a & b
50. a) kill <process id>
51. d) all the above
52. b) /etc/shadow
53. c) both are true
54. b) useradd -d /<home dir path> <username>
55. b) userdel <username>
56. c) userdel -r <username>
57. d) All are true.
58. a) / and swap
59. a) grub-install
60. d) both a & c
61. a) it is taking the number of character of the soft link name.
62. b) cat /proc/cpuinfo
63. d) All the above
64. c) fsck
65. d) All the above
66. b) 1994
67. a) Bourne Again Shell
68. b) K Desktop Environment
69. c) Keep all partitions and use existing free space
70. a) Disk Druid
71. a) passwd
72. a) /etc
73. c) empty directory for mounting
74. a) /
75. a) /proc
76. c) both a &b
77. a) mkdir
78. b) rm -rf
79. d) all the above
80. b) it will display the first and last 10 lines of a file
81. a) aspell
82. c) both a & b
83. a) nice
84. a) disk usage
85. d) updatedb
86. b) umount
87. d) all the above
88. d) passwd <username>
89. a) chage -M 30 username
90. b) pwunconv
91. a) to convert normal passwords to shadow passwords.
92. d) all the above
93. a) co-administrators
94. c) visudo
95. d) all the above
96. read – 4, write – 2, execute – 1
97. a) Set Group ID
98. b) chattr
99. c) a & b
100. b) both are false
101. b) repquota
102. a) edquota
103. c) both a & b
104. d) All the above
105. b) 631
106. c) both a & b
107. a) initial RAM disk
108. a) to enter the permanent mount points and file systems
109. a) 6
110. b) /etc/inittab
111. d) All the above
112. b) Logical Volume Manager
113. a) it used to view the physical volume links.
114. d) both b & c
115. b) level 1
116. a) mdadm
117. c) both a&b
118. a) lsmod
119. c) ethtool
120. d) all the above
121. a) it is used to copy one file from remote location in a secure manner.
122. c) it is the answer file for installing a new version of OS
123. a) to provide ip addresses automatically to all clients.
124. c) vsftpd
125. c) it is installation method with network
126. d) All the above
127. d) it can be seen in /etc/services
128. d) all the above
129. b) mp3
130. a-iii, b-iv, c-ii, d-i
131. b) not same
132. d) all the above
133. a) webmin
134. c) mail exchange record
135. c) both a & b
136. a) C
137. c) Linus Torvalds
138. a) top
139. d) all the above
140. a) dmesg
141. b) It is working under DORA process
142. b) touch
143. b) touch
144. a) It is the command used for saving up a particular configuration
145. b) yes
146. a) /var/ftp/pub
147. a) no
148. c) /etc/motd
149. b) /etc/issue
150. c) ls -lai