Home > Articles > Linux Operating System

Linux Operating System

Chapter Description

In this sample chapter from CCNA Cybersecurity Operations Companion Guide and the Cisco Networking Academy, learn how to perform basic Linux operations as well as administrative and security-related tasks.

Check Your Understanding

Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. The appendix “Answers to ‘Check Your Understanding’ Questions” lists the answers.

  1. What is the outcome when a Linux administrator enters the man man command?

    1. The man man command configures the network interface with a manual address.

    2. The man man command provides documentation about the man command.

    3. The man man command provides a list of commands available at the current prompt.

    4. The man man command opens the most recent log file.

  2. What is a benefit of Linux being an open source operating system?

    1. Linux distributions are maintained by a single organization.

    2. Linux distributions must include free support without cost.

    3. Linux distribution source code can be modified and then recompiled.

    4. Linux distributions are simpler operating systems since they are not designed to be connected to a network.

  3. Which types of files are used to manage services in a Linux system?

    1. Device files

    2. System files

    3. Directory files

    4. Configuration files

  4. Which working environment is more user-friendly?

    1. A CLI

    2. A GUI

    3. The command prompt

    4. A hybrid GUI and CLI interface

  5. Which Linux component would be used to access a short list of tasks the application can perform?

    1. Launcher

    2. Quicklist

    3. Dash Search Box

    4. System and Notification Menu

  6. Which term is used to describe a running instance of a computer program?

    1. Fork

    2. Patch

    3. Process

    4. Package manager

  7. Which type of tool is used by a Linux administrator to attack a computer or network to find vulnerabilities?

    1. Firewall

    2. PenTesting

    3. Malware analysis

    4. Intrusion detection system

  8. Which method can be used to harden a computing device?

    1. Allow USB auto-detection.

    2. Force periodic password changes.

    3. Allow default services to remain enabled.

    4. Update patches on a strict annual basis irrespective of release date.

  9. Consider the result of the ls -l command in the Linux output below. What are the group file permissions assigned to the analyst.txt file?

    ls -l analyst.txt
    -rwxrw-r-- sales staff 1028 May 28 15:50 analyst.txt
    1. Read only

    2. Read, write

    3. Full access

    4. Read, write, execute

There are currently no related articles. Please check back later.