Test Bank For Information Security And IT Risk Management 1st Edition by Manish Agrawal

Original price was: $75.00.Current price is: $25.00.

Digital item No Waiting Time Instant Download

  • ISBN-10 ‏ : ‎ 1118335899
  • ISBN-13 ‏ : ‎ 978-1118335895
SKU: 00078600070 Category:

Description

Test Bank For Information Security And IT Risk Management 1st Edition by Manish Agrawal

  1. 1. Chapter 3 – System Administration 2
      1. In the context of system administration, the operating system is
        1. Software that manages computer hardware and provides common services to user applications
        2. Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
        3. A text based program that allows users to interact with the shell
        4. The graphical interface for users to interact with applications

    Answer: (a)

      1. In the context of system administration, the kernel is
        1. Software that manages computer hardware and provides common services to user applications
        2. Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
        3. A text based program that allows users to interact with the shell
        4. The graphical interface for users to interact with applications

    Answer: (b)

      1. In the context of system administration, the shell is
        1. Software that manages computer hardware and provides common services to user applications
        2. Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
        3. A text based program that allows users to interact with the shell
        4. The graphical interface for users to interact with applications

    Answer: (c)

      1. Common shell programs include
        1. Bourne shell, C shell, D shell
        2. Born shell, C shell, Born again shell
        3. Korn shell, Born shell, C shell
        4. Bourne shell, C shell, Bourne-again shell

    Answer: (d)

      1. The filesystem root is represented in Linux by
        1. /
        2. .
        3. ..
        4. $

    Answer: (a)

      1. The current folder is represented in Linux by
        1. /
        2. .
        3. ..
        4. $

    Answer: (b)

      1. The parent folder of the current folder is represented in Linux by
        1. /
        2. .
        3. ..
        4. $

    Answer: (c)

      1. The default shell prompt for a regular user in the bash shell is
        1. /
        2. .
        3. ..
        4. $

    Answer: (d)

      1. The default shell prompt for the root user in the bash shell is
        1. #
        2. .
        3. ..
        4. $

    Answer: (a)

      1. An example of an absolute path is
        1. ./temp.txt
        2. /temp.txt
        3. temp.txt
        4. ../temp.txt

    Answer: (b)

      1. An example of a relative path is
        1. /temp.txt
        2. /usr/temp.txt
        3. ~/temp.txt
        4. /home/joe/temp.txt

    Answer: (c)

      1. To navigate to a specific folder, we can use the command
        1. grep
        2. ls
        3. pwd
        4. cd

    Answer: (d)

      1. To view the contents of a folder, we can use the command
        1. ls
        2. head
        3. pwd
        4. cd

    Answer: (a)

      1. When using a shell program, command arguments are
        1. Debates between users on which command to use
        2. Data provided to a command to use as input
        3. Single letters of full words that modify the behavior of the command in a pre-determined way
        4. Debates among system administrators on which commands to use

    Answer: (b)

      1. When using a shell program, command options (also called flags or switches) are
        1. Debates between users on which command to use
        2. Data provided to a command to use as input
        3. Single letters of full words that modify the behavior of the command in a pre-determined way
        4. Debates among system administrators on which commands to use

    Answer: (c)

      1. To view the contents of a file, we can use the command
        1. less
        2. more
        3. cat
        4. all of the above

    Answer: (d)

      1. The command used to copy files in Unix/ Linus is
        1. cp
        2. copy
        3. pwd
        4. rm

    Answer: (a)

      1. The command used to delete files and folders in Unix/ Linux is
        1. del
        2. rm
        3. grep
        4. cd

    Answer: (b)

      1. To find the location of a file named temp.txt somewhere within the /usr folder, we can use the command
        1. find temp.txt
        2. grep temp.txt
        3. find /usr –name temp.txt
        4. find /usr temp.txt

    Answer: (c)

      1. Permissions -rwxr-xr—on a file indicate that
        1. Anybody can read the file
        2. The root user is the owner of the file
        3. The owner can read/ write/ execute, the group and world can read the file
        4. The owner can read/ write/ execute, the group can read or execute and the world can read the file

    Answer: (d)

      1. ls –l output of “-rw-r–r– 1 jon johny 3969 May 29 10:20 README” indicates that the owner of the file is
        1. jon
        2. johny
        3. README
        4. 3969

    Answer: (a)

      1. Vi is a 
        1. Graphical editor
        2. Text editor
        3. Game on Linux systems
        4. Substitute for MS Word

    Answer: (b)

Be the first to review “Test Bank For Information Security And IT Risk Management 1st Edition by Manish Agrawal”