Simuladão Completo e definitivo para 1Z0-409 - Oracle Enterprise Linux Fundamentals - Parte 2 (final)




Olá,
Segue abaixo a conclusão do simulado completo e definitivo com 230 questões sobre o exame 1Z0-409 - Oracle Enterprise Linux Fundamentals. 


Na postagem http://esli-nux.com/2015/05/certificacao-oracle-enterprise-linux.html conferimos tudo sobre a certificação 1Z0-409 Oracle Enterprise Linux Fundamentals. 



Para o post não ficar muito grande, as questões nº 1 até a nº 115,
estão na parte 1 do simulado, 
neste link:




=====================================
  • Question: 116
As a normal user on a Linux system, you are trying to execute the /bin/ls command. What happens
when you execute the command at the shell prompt?

A. The shell executes the program, sets a priority value of -19, and waits for the system calls from the kernel.
B. The shell passes asynchronous interrupts to the kernel and returns to the prompt waiting to display the output.
C. The shell executes the program, breaks memory into small chunks called pages, and initializes a system call to the kernel.
D. The shell makes a system call asking the kernel to start the command as a child process and goes to sleep, waits for the command to finish.





  • Question: 117
Match the following utilities with their functionalities.

1. ghostscript a. converts text to Postscript
2. enscript b. formats output to print several document pages on one printer page
3. mpage c. Postscript renderer that can convert between Postscript and many other formats

A. 1-a, 2-c, 3-b
B. 1-a, 2-b, 3-c
C. 1-c, 2-a, 3-b
D. 1-c, 2-b, 3-a


  • Question: 118
View the Exhibit.












Which option with the mkdir command would print a message for each created directory as shown in the Exhibit?

A. The option m alone
B. The options m and p
C. The options p and v
D. The options m and v




  • Question: 119
You are writing a script and add the following line at the beginning of the script:

#!/bin/bash

What implications does this have on the shell script if the script is called directly at the c shell prompt?

A. The script will treat the line as a comment.
B. The current shell will attempt to parse and execute the script.
C. The script will be executed using bash as the shell interpreter.
D. The script will be executed using bourne as the shell interpreter.



  • Question: 120
View the Exhibit.

























The root user issued the following command on mailqueue.txt shown in the Exhibit:

cat mailqueue.txt | cut -dr -f2- | cut -f2 | cut -d "@" -f2 | sort | uniq | wc -l

What is the purpose of using this command?

A. to count the total number of e-mail addresses in the file
B. to list the e-mail addresses after removing the duplicates
C. to sort the e-mail addresses in mailqueue.txt and print it along with the total number of lines
D. to determine how many different domains are available amongst the e-mail addresses in mailqueue.txt





  • Question: 121
View the Exhibit.












The users smith, scott, and bob are working on a common project and the /projects directory is assigned to them as the common working directory to access using group privileges.
The users report a problem that they are assigned the ownership of whatever files they edit inside the /projects directory.
They also need to have the same level of access control on all files and directories inside the /projects directory owned by other members of the group.
As a Linux administrator, what would you do to resolve this error and meet the users' requirements?

A. Set SUID alone on the /projects directory.
B. Set SGID alone on the /projects directory.
C. Set Sticky bit alone on the /projects directory.
D. Set 2770 permissions on the /projects directory.
E. Set 7777 permissions on the /projects directory.
F. Set 3770 permissions on the /projects directory.




  • Question: 122
Which three statements are true about tunneling an application through ssh? (Choose three.)

A. Tunneling works by port forwarding.
B. Only one port could be forwarded at a time
C. Tunneling works only if the remote host runs an X server.
D. Tunneling works only if the remote host runs an ssh server.
E. All requests aimed at the local port are forwarded to the remote port via ssh and thus encrypted.



  • Question: 123

As root you execute the following command:echo "Good\nMorning\nSmith"
You find the two newline characters in the output and do not want them to appear in the output. Which two among the following would help you achieve this task without effecting the content of echo command? (Choose two.)

A. echo -e "Good\nMorning\nSmith"
B. echo -n "Good\nMorning\nSmith"
C. echo -E "Good\nMorning\nSmith"
D. echo -ne "Good\nMorning\nSmith"
E. echo -nE "Good\nMorning\nSmith"
F. echo -eE "Good\nMorning\nSmith"



  • Question: 124
Match the print commands with their functionalities.

1. lpq a. printer control program
2. lprm b. Send a job to the queue to be printed.
3. lpr c. Remove a job from the queue.
4. lpc d. View the contents of the queue.

A. 1-a, 2-c, 3-b, 4-d
B. 1-a, 2-b, 3-c, 4-d
C. 1-d, 2-b, 3-c, 4-a
D. 1-d, 2-c, 3-b, 4-a





  • Question: 125
Match the following rpm options with their functions:

1. -i                a. replaces any older versions of a package with the new package
2. -U               b upgrades packages, but only if an earlier version exists on your system
3. -F                c. uninstalls the specified package
4. -e                d. installs a new package

A. 1-d, 2-a, 3-b, 4-c
B. 1-d, 2-b, 3-a, 4-c
C. 1-a, 2-c, 3-b, 4-d
D. 1-a, 2-b, 3-c, 4-d




  • Question: 126
A normal user sends a print job to the default printer but later finds the print queue is big and decides to cancel the job. What would the user do to perform this task?

A. The user has no permission to view job numbers using the jobs command and hence cannot delete the job.
B. The user can know the job number but cannot remove the job as he has no permission to use the lprm command.
C. The user has to list the job using lpq and remove it using the command lprm with the job number as the argument.
D. The user has no permission to view job numbers using the lpq command and hence cannot delete the job.


  • Question: 127
The Linux file system contains a directory by default on which all users have rwx permissions. Only the root user has the permission to delete any file created by any user. Identify the directory and find out why it is so.

A. /tmp, because sticky bit is set on that
B. / (root file system), because of 1777 permissions
C. /home, because home directories will have 770 permissions
D. /usr, because all users will have rwx permissions and sticky bit set on that
E. /home, because no user will have write permission on files owned by others



  • Question: 128
You use the SUSPEND character to suspend an already running process. Which signal does it send to the process?

A. SIGINT
B. SIGHUP
C. SIGSTOP
D. SIGTERM



  • Question: 129
The free command reports slightly less memory than the actual total memory available. Why is it so?

A. The swap space occupies a portion of the main memory that can never be freed.
B. The multiple instances of a program like shell, being run, consumes a portion of the main memory that cannot be freed.
C. The kernel remains in the main memory while the computer is in operation and the memory it occupies can never be freed.
D. The zombie processes that exist in the process table occupy a slightly less portion of the main memory that can only be freed on reboot.



  • Question: 130
As smith you have logged in to the system at the tty1 terminal and issued the following command to make the top command run in the background.

[[email protected] ~]$ top&

You exit from the terminal and log back again in to the system at the same terminal. How is the background job affected?

A. The background job will not be affected.
B. The background job gets into the foreground as soon as smith logs in to the system.
C. The background job is deleted from the job pool and does not get listed using the jobs command.
D. The background job starts running in the background again as soon as smith logs in to the system.




  • Question: 131
As the root user, you try to log in to station1 from station2 using ssh but fail with an error message as shown below:

[[email protected]]# ssh station1
[email protected]'s password :
Permission denied, please try again.
[email protected]'s password :
Permission denied, please try again.
[email protected]'s password :
Permission denied, (publickey,gssapi-with-mic, password).


What could be the possible reason for the error?

A. The sshd service is not running on station2.
B. The sshd service is not running on station1.
C. SSH on station1 is configured to deny root permission.
D. SSH on station2 is configured to deny root permission.



  • Question: 132
View the Exhibit.











 
What would be the output of the script if it is executed using the default shell interpreter?

A. Welcome 5 timesWelcome 4 timesWelcome 3 timesWelcome 2 timesWelcome 1 timesWelcome 0 times
B. Welcome 0 timesWelcome 1 timesWelcome 2 timesWelcome 3 timesWelcome 4 timesWelcome 5 times
C. Welcome 1 timesWelcome 2 timesWelcome 3 timesWelcome 4 times
D. Welcome $i times






  • Question: 133
View the Exhibit.


















You have logged in as bob at the tty1 terminal and want to bring the job with the job number 1 to the foreground. An error is reported when you execute the %man command to achieve this. What could be the possible reason for the error?

A. There is no such job with the specified job name.
B. There is more than one job with the same job name.
C. The syntax to bring a background job to the foreground is incorrect.
D. bob does not have the permissions to bring the job from the background to the foreground.




  • Question: 134
How does the file command report the type of file? (Choose all that apply.)

A. By examining the file contents
B. By examining md5 checksum
C. By examining the file extensions
D. By comparing the file extensions with a local database available on the system
E. By examining magic numbers that occur at specific offsets and matching them against known file types






Question: 135
View the Exhibit





















You have created a user account bob on a Linux machine and, when the user logs in, he has a broken shell as shown in the Exhibit. As a Linux administrator, what would you do in this situation to let user bob get rid of this error without compromising his privacy?

A. Change the permissions of /home/bob recursively to 777.
B. Change the permission of /home/bob/.bash_profile to 770.
C. Change the user bob's shell to /bin/bash by editing /etc/passwd.
D. Change the user and group ownership of /home/bob recursively to bob.



  • Question: 136
Which statement is true about the files and directories created inside the /project directory that have 2777 permissions?

A. All files and directories will have the same group as that of the /project directory.
B. All files inside the /project directory will have permissions set to 2644 and the subdirectories will have them set to 2755.
C. All files and directories will have the default group set to the primary group of the user who creates them in /project directory.
D. All executables inside the /project directory will run with the effective group ID (EGID) of the group of the /project directory.



  • Question: 137
Observe the following NFS share exported by server1.

[[email protected] ~]$ cat /etc/exports
/data .example.com(ro,root_squash)

You have logged in as root on station1 and try to access the /data NFS share on server1 as root. Which statement holds true in this context?

A. The access to NFS share will be denied.
B. The NFS share will be accessed with the privileges of nobody.
C. The NFS share will be accessed with the privileges of the root user.
D. The NFS share will be accessed with the privileges of nfsnobody.



  • Question: 138
Identify the two true statements about screen. (Choose two.)

A. Terminal manager controls each session in a screen.
B. screen windows do not adhere to vt100 standards.
C. All windows in a screen are dependent on each other.
D. Each window in a screen has its own scroll-back buffer.
E. screen allows only one program to run using one terminal.



  • Question: 139
Match the bash file with its description:

File name Description

1. .bash_history                a. a list of commands to be executed when you log in
2. .bash_logout                 b. contains a list of commands that is executed every time you open a new shell
3. .bash_profile                 c. keeps a list of the commands you have been typing
4. .bashrc                         d. a list of auto run commands to be executed when you leave the shell


A. 1-c, 2-d, 3-b, 4-a
B. 1-b, 2-c, 3-a, 4-d
C. 1-c, 2-d, 3-a, 4-b
D. 1-b, 2-c, 3-d, 4-a






Question: 140
You have received an email with a file login_remote, which is the HEX dump of a file. View the Exhibit that shows a portion of this file.
How would you revert it to the original form in the name login?





















 


A. By using the cat command with the -t option
B. By using the xxd command with the -r option
C. By using the strings command with the -t option
D. By using the strings command with the -a option



  • Question: 141
Which two statements are true about the su command? (Choose two.)

A. Switching from super user to super user requires a password.
B. Switching from super user to normal user requires a password.
C. Switching from normal user to super user requires a password.
D. Switching from super user to normal user does not require a password.
E. Switching from normal user to normal user does not require a password.



  • Question: 142
The user smith is asked to replace all occurrences of the letter "e" with the letter "y" in file1.txt and save the output to fix.txt. Which command would let the user smith do so? (Choose all that apply.)

A. sed s/e/y file1.txt > fix.txt
B. sed /y/e/g file1.txt > fix.txt
C. sed s/e/y/g file1.txt > fix.txt
D. sed /y/e/g file1.txt > ./fix.txt
E. sed s/e/y/g < file1.txt > ./fix.txt



  • Question: 143
Identify the true statement about configure script.

A. It depends on make to create the Makefiles.
B. It creates the necessary Makefiles based on the user information.
C. It creates the required directories and subdirectories on the system.
D. It does not depend on the autoconf tool for the package installation.



  • Question: 144
Which command could help a user to output the data appended to a text file at the shell prompt, as the file grows?

A. cat
B. xxd
C. head
D. tail
E. more
F. strings




  • Question: 145
The root user on server1 is trying to switch to the normal user account scott for testing certain privileges he has and receives an error as shown below:

[[email protected] ~]# su - scott

This account is currently not available

[[email protected] ~]#


What do you infer from this error?

A. The user scott's account is locked.
B. The user scott has the shell set to /bin/false.
C. The user scott is assigned with a UID below 500.
D. The user scott's account has reached the expiry date.
E. The user scott has the shell set to /sbin/nologin.
F. The user scott does not have a valid UID to get authorized by the system.




  • Question: 146
Which three statements are true about Local Shell variables? (Choose three.)

A. set by the shell
B. user modifiable
C. accessible by child processes
D. value restricted to a single shell
E. passed to programs started by the shell



  • Question: 147
What happens when you execute the lpq command without passing any arguments?

A. It lists all the jobs in the default queue.
B. It lists the jobs in all the available queues.
C. It removes all the jobs available in the default queue.
D. It removes the jobs available in all the available queues.



  • Question: 148
The cut -d: -f 1,3,8 /etc/passwd command is issued on a Linux system. Which statement about the output is true?

A. It displays an error because /etc/passwd has only seven fields.
B. It displays all the users and the corresponding UIDs from the /etc/passwd file separated by a : field delimiter.
C. It displays all the users, corresponding GIDs, and login shell from the /etc/passwd file separated by a : field delimiter.
D. It displays all the users, corresponding UIDs, and login shell from the /etc/passwd file separated by a : field delimiter.




  • Question: 149
Match the directories with their contents.

1. BUILD/ a. contains pristine source tarball as well as any patches and other ancillary files
2. SOURCES/ b. contains the package.spec file that describes and controls RPM build
3. RPMS/ c. source tarball is extracted, patches applied, and compilation takes place
4. SPECS/ d. freshly built binary RPMs placed in these directories

A. 1-d, 2-b, 3-a, 4-c
B. 1-c, 2-d, 3-b, 4-a
C. 1-d, 2-c, 3-b, 4-a
D. 1-c, 2-a, 3-d, 4-b




  • Question: 150
You have the /home/ file system on server1 exported through NFS.
You have a fresh installation of Linux on a workstation and want to setup the workstation to mount and unmount the /home/ filesystem automatically.

Which default configuration files on the workstation would you edit to achieve this task?

A. Edit the /etc/fstab file.
B. Edit the /etc/inittab file.
C. Edit only the /etc/auto.home file.
D. Edit only the /etc/auto.master file.
E. Edit both the /etc/auto.home and /etc/auto.master files.




  • Question: 151
View the Exhibit.



























Which two key combinations will help you edit more than one file at a time in the same terminal
window using vim editor as shown in the Exhibit? (Choose two.)

A. Control+w+w to edit in vertical split windows
B. Control+w+v to edit in vertical split windows
C. Control+w+h to edit in horizontal split windows
D. Control+w+s to edit in horizontal split windows
E. Control+Alt+v to edit in vertical split windows
F. Control+Alt+h to edit in horizontal split windows


  • Question: 152
You have issued the following command:

echo -e welcome\nTo Oracle\nEnterprise\rLinux

What would be the impact of -e switch on the echo command?

A. It honors the escape sequence only for the carriage return.
B. It honors the escape sequence only for the first new line character.
C. It honors the escape sequence only for the two new line characters.
D. It honors the escape sequence only for the second new line character.
E. It honors the escape sequence for both the new line characters and carriage return.



  • Question: 153
Which three statements are true about the mount command? (Choose three.)

A. It supports labels for mounting.
B. It can be used only by root to mount the local file system.
C. By default it can be used by an ordinary user to mount the local file system.
D. It will list all the currently mounted file systems, if executed without any arguments.
E. It will list only the file systems listed in /etc/fstab if executed without any arguments



  • Question: 154
UNIX was known as the most stable operating system ever released. Identify two major design principles that help attain this stability. (Choose two.)

A. easily modifiable end user programs
B. all configuration data stored in binary files
C. entire policy decisions made by the kernel
D. everything in UNIX is either a file or a process



  • Question: 155
Match the following umask values with their effective file and directory permissions.

umask             Files Directories
1) 0220        a) 666 777
2) 0000        b) 640 751
3) 0026        c) 600 700
4) 0077        d) 660 770
5) 0007        e) 000 000
6) 0777        f) 446 557

A. 1-b, 2-e, 3-d, 4-f, 5-c, 6-a
B. 1-f, 2-a, 3-b, 4-c, 5-d, 6-e
C. 1-d, 2-a, 3-b, 4-f, 5-c, 6-e
D. 1-f, 2-e, 3-b, 4-c, 5-d, 6-a
E. 1-d, 2-a, 3-f, 4-b, 5-c, 6-e




  • Question: 156
View the Exhibit.












Which command would give you the output shown in the Exhibit?

A. grep root /etc/passwd
B. grep -ni root /etc/passwd
C. awk '/bash$/' /etc/passwd | grep root
D. awk -F: '/bash$/ {print $0}' /etc/passwd | grep root



  • Question: 157
Observe the script below:

echo " Enter your name : "

read name

echo " Hello $name , Good Morning. "


What does read do in this script? (Choose all that apply.)

A. It will store the input in the name variable.
B. It will accept only file name as the input.
C. It will make the script stop execution if numbers are given as input.
D. It will make the program pause till the input is given through the standard input.



  • Question: 158
View the Exhibit and examine the output of the following command:
rpm -qR ftp
What would you infer from the output?

















A. It shows the list of files in the querying package.
B. It shows all the packages installed in the system.
C. It shows all the packages dependent on the querying package.
D. It shows all the packages on which the querying package depends.



  • Question: 159
You log in as normal user bob and execute the mount command without any arguments. What would be the output of this command?

A. mount will prompt for the device to mount.
B. All the currently mounted file systems will be displayed.
C. All the file systems defined only in /etc/fstab will be displayed.
D. mount will report an error which says the mount command is not found.



  • Question: 160
Identify commands that can process text in a file. (Choose all that apply.)

A. tr
B. cut
C. awk
D. paste
E. strings
F. dos2unix


  • Question: 161
You have logged in to a newly installed Oracle Enterprise Linux machine in the graphical mode.

Which default desktop will be used after you log in?

A. Xfce
B. Xpde
C. KDE
D. TWM
E. IceWM
F. GNOME




  • Question: 162

View the script given below:

for i in $(seq 5)

do

echo $i

done

What is the output of this script?
A. 12345
B. 54321
C. 1 2 3 4 5
D. 5 4 3 2 1




  • Question: 163
The user smith on your system complained that he is not able to change his password. As an administrator, you long-listed the passwd command and the /etc/shadow file on the system. View the Exhibit that shows the output. What would you do to enable smith to change his password?










A. Set SGID on /usr/bin/passwd.
B. Set SUID on /usr/bin/passwd.
C. Set sticky bit on /usr/bin/passwd.
D. Set write and execute permissions for others on /etc/shadow.
E. Set read, write, and execute permissions for others on /etc/shadow.




  • Question: 164

As user smith you issue the mesg command on the tty1 terminal to know its status. The output of the command is shown below:

[ [email protected] ]$ mesg

is y

[ [email protected] ]$

Which three statements are true in this context? (Choose three.)

A. The talkd daemon honors the current mesg status.
B. The wall command honors the current mesg status.
C. The talk command honors the current mesg status.
D. The talkd daemon does not honor the current mesg status.
E. The talk command does not honor the current mesg status.
F. The wall command does not honor the current mesg status.






  • Question: 165
Match the following commands with their actions in the execute mode of the vi editor:

1) :e!                 a) save and exit
2) :X                 b) exit even if changes have not been saved
3) :wq               c) save and exit even if the file is read only
4) :w!               d) forget changes since last write
5) :q!                e) save the file even if it is marked read only
6) :wq!               f) encrypt the file along with a password

A. 1-d, 2-f, 3-c, 4-b, 5-e, 6-a
B. 1-f, 2-b, 3-a, 4-e, 5-d, 6-c
C. 1-c, 2-b, 3-a, 4-f, 5-d, 6-e
D. 1-d, 2-f, 3-a, 4-e, 5-b, 6-c



  • Question: 166
After logging in as root, you want to install a new kernel. How would you install the new kernel?

A. Install the new kernel by using rpm with the -i option.
B. Install the new kernel by using rpm with the --F option.
C. Install the new kernel by using rpm with the --force option.
D. Upgrade the existing kernel with the new kernel using the -U option with the rpm command.




  • Question: 167
You have to start a process in the bash shell and at the same time want to work in the shell. How would you achieve this without terminating the process?

A. Press [Ctrl] + [y] while the process is running.
B. Press [Ctrl] + [d] while the process is running.
C. Press [Ctrl] + [z] while the process is running.
D. Press [Ctrl] + [c] while the process is running.




  • Question: 168

Match the following backslash-escaped characters with their description:
1. \c                a. newline
2 . \v               b. carriage return
3 . \r               c. vertical tab
4 . \n               d. suppressing trailing newline

A. 1-d, 2-c, 3-b, 4-a
B. 1-b, 2-d, 3-c, 4-a
C. 1-c, 2-b, 3-a, 4-d
D. 1-a, 2-b, 3-d, 4-c




  • Question: 169
Observe the code given below:

a=5.56

b=4.32

c=`echo $a + $b | bc`

echo "$a + $b = $c"

echo " Final Output is $c"

What would be the final output of this code?

A. 9
B. 9.8
C. 9.9
D. 9.88



  • Question: 170
bob wants to send the contents of the /project/javaclass file to smith using mail through the command line. Which command would help him achieve the task?

A. mail [email protected] < /project/javaclass.
B. mail [email protected] > /project/javaclass.
C. mail [email protected] << /project/javaclass.
D. mail [email protected] >> /project/javaclass.




  • Question: 171
An attempt by bob to remotely access smith's shell results in an error as follows:

[[email protected] ~]$ ssh server200

The authenticity of host 'server200 (192.168.0.200)' can't be established.

RSA key fingerprint is 1c:6e:b7:8b:65:cc:04:e8:16:ca:7e:81:de:d6:5e:c4.


What would you infer from the error?

A. The hostname could not be mapped to an IP address.
B. The PubkeyAuthentication parameter is set to no in the /etc/ssh/ssd_config file.
C. The ssh verified that the system claiming to be server200 is server200 and not any other host.
D. This response is because ssh is unable to find server200 in the ~/.ssh/known_hosts file of server100.


  • Question: 172
The user smith issued the egrep "^[[:alnum:]]{4,}$" file1.txt | wc -l command. What would be the expected output from this command?

A. the total number of lines that have 4 or more characters
B. the total number of words that have 4 or more characters
C. the total number of lines that are shorter than 4 characters
D. the total number of words that are shorter than 4 characters




  • Question: 173
Which two statements about bzip2 are correct? (Choose two.)

A. It supports recovery from media errors.
B. It is portable, works in 32/64 bit platform.
C. It has lower compression ratio than gzip.
D. Its default action saves original file after creating new compressed file.
E. It first does all of the decompression in memory, and then sends out the contents of the decompressed file to STDOUT.



  • Question: 174
The user smith on station1 is trying to use sftp to transfer some files to and from stationX, and receives an error message as shown below:

[[email protected] ~]$ sftp stationx

Connecting to stationX...

[email protected]'s password:

request for subsystem 'sftp' failed on channel 0

couldn't read packet: Connection reset by peer

[[email protected] ~]$

How would you resolve the issue?

A. Restart the xinetd service on stationX with the gssftp service enabled.
B. Restart the sshd service on stationX with the IgnoreRhosts parameter set to no in /etc/ssh/sshd_config.
C. Restart the sshd service on stationX with /usr/bin/sftp enabled as the subsystem parameter in /etc/ssh/sshd_config.
D. Restart the sshd service on stationX with /usr/libexec/openssh/sftp-server enabled as a subsystem parameter in the /etc/ssh/sshd_config file.



  • Question: 175
You have logged in as user smith at tty1 terminal and issued the following incomplete command at the bash prompt:

[[email protected] ~]# if [ i > j ] then

>


The shell displays the default secondary prompt ">". What would you do to make "=>" as the default secondary prompt temporarily only for user smith and for the tty1 terminal current session?

A. Redefine PS1=?>
B. Redefine PS2=?>
C. Redefine PS3=?>
D. Redefine PS4=?>





Question: 176
View the exhibit.









You have given 1 as the input. What is the output if the script is executed using the default shell interpreter?

A. 12345
B. 1234
C. 1 2 3 4
D. 1 2 3 4 5




  • Question: 177
Identify the option that has the correct match for an Enterprise Linux standard/feature with its description:
1) POSIX          a) helps software to predict the location of installed files and directories
2) FHS              b) helps provide compatibility among distributions
3) LSB               c) GNU project's replacement for the UNIX kernel to work in Linux
4) HURD           d) assures code portability between systems

A. 1-b, 2-d, 3-a, 4-c
B. 1-d, 2-a, 3-b, 4-c
C. 1-c, 2-a, 3-d, 4-b
D. 1-b, 2-c, 3-d, 4-a




  • Question: 178
Match the process status with its definition.
1. Running             a. Waiting for some event (for example, user input)
2. Stopped              b. Child not properly reaped by parent
3. Sleeping             c. Still loaded in memory, but not running
4. Zombie               d. Currently being allocated CPU slices

A. 1-b, 2-c, 3-b, 4-a
B. 1-a, 2-b, 3-d, 4-c
C. 1-d, 2-c, 3-a, 4-b
D. 1-c, 2-b, 3-a, 4-d




  • Question: 179
Which two statements are true about the init process? (Choose two.)

A. Process ID (PID) of init is always 1.
B. Process ID (PID) of init is always 0.
C. The first process spawned by the kernel is init.
D. init uses the exec() method to spawn a new process.
E. By default, normal users can use init to change the run level.



  • Question: 180

Note the following command executed by the user smith on server1.

[[email protected] ~]$ groups

apps smith sysgroup admins scott

[[email protected] ~]$ touch file1 newfile

[[email protected] ~]$ mkdir dir1 dir2

[[email protected] ~]$ ls

dir1 dir2 file1 newfile

What would be the default group of the files and directories created by user smith on server1?

A. scott
B. apps
C. smith
D. admins
E. sysgroup




  • Question: 181
Which file compression standards are recognized and could be decompressed by gunzip? (Choose all that apply.)

A. zip
B. gzip
C. bzip2
D. compress



  • Question: 182
Identify the true statements about sendmail. (Choose all that apply.)

A. Sendmail is a mail server.
B. Sendmail acts as an e-mail client.
C. Sendmail supports only IMAP protocol.
D. Sendmail can be used to send a file with the -t option at the command line.



  • Question: 183
A user issued the following command on a Linux system:

find / -name passwd | cpio -o | bzip2 > passwd.cpio.bz2

What could be the purpose of issuing this command?

A. to find all files called passwd in the root file system ( / )
B. to find the /etc/passwd file and compress it using bzip2
C. to create a compressed cpio archive of all files with the name passwd.
D. to create a compressed cpio archive of the list of all files with the name passwd



  • Question: 184
You want to secure the server1 server by denying root access through ssh. Which file would you edit on server1 to achieve this task?

A. ~/.ssh/rc
B. ~/.ssh/config
C. /etc/ssh/sshrc
D. /etc/ssh/sshd_config



  • Question: 185
Match the query commands with their functions.

1. rpm -qa               a. lists packages on which the package depends
2. rpm -qi                b. lists all packages installed on the system
3. rpm -qR               c. list of all the files in the package
4. rpm -ql                d. information about the package

A. 1-d, 2-c, 3-d, 4a.
B. 1-d, 2-c, 3-b, 4-d.
C. 1-b, 2-d, 3-a, 4-c.
D. 1-b, 2-c, 3-d, 4-a.



  • Question: 186
As an administrator you want to make sure that accidentally you do not delete files using rm command. You also want to make sure that even the use of rm command without any valid switches prompts for confirmation before file deletion. Which option would help you achieve this task?

A. alias rm="rm -i".
B. alias rm="rm -f".
C. alias rm="rm -r".
D. alias rm="rm -v".





  • Question: 187
View the Exhibit.
















What does the case statement do in the script? (Choose two.)

A. exits the script if 0 is supplied as the input
B. executes like a series of if-then-else statements
C. prints all output of all commands on standard output
D. executes the last echo statement if 0 is supplied as the input





  • Question: 188
As user smith you have executed the following command at station1:

[[email protected] ~]$ ssh [email protected] /etc/init.d/sendmail restart

Which statement is true about the execution of this command?

A. The command fails with an error command not found.
B. The command is executed by station1 without logging in to server1.
C. The command is executed by the server1 server without sending back the output to station1.
D. The command is executed by server1 after the correct password is entered by the user and the output is sent back to station1.






  • Question: 189
View the Exhibit.


















You have logged in as the user bob and now you want to send a message to smith and check if he is logged on to the system by using the w command. You find smith logged in to two terminals, so you send the message using the write command without specifying smith's terminal. To which terminal is the message sent?

A. the terminal with the least idle time
B. the terminal with the maximum idle time
C. to smith's last login terminal irrespective of the idle time
D. to smith's first login terminal irrespective of the idle time




  • Question: 190
As a root user you want to modify the default shell prompt to include the hostname as part of the prompt. Also you want the change in the hostname to reflect on the prompt immediately. Which option would help you achieve this task?

A. PS2='[`hostname`]'
B. PS1='[`hostname`]'
C. PS2=''[`hostname`]''
D. PS1=''[`hostname`]''




  • Question: 191
Match the positional parameter with its functionality.

1.$0                  a. lists the number of arguments passed
2. $#                b. name of the shell script
3. $@                c. lists the arguments passed

A. 1-a, 2-c, 3-b.
B. 1-b, 2-a, 3-c.
C. 1-a. 2-b, 3-c.
D. 1-c, 2-b, 3-a.



  • Question: 192
View the Exhibit.















A /project directory is created on a Linux file system with 1776 permissions. Which statement is true?

A. Only the root user has complete control over the /project directory.
B. The user smith can create files in /project but he will not be able to delete them.
C. The user scott can do anything in the /project directory including deleting all files, even those created by the root user.
D. All members of the apps group can create, delete, and modify all files that belong to the apps group in the /project directory.




  • Question: 193
As a root user you have issued the following commands at the bash prompt:

[[email protected] ~]#set a b c d e f g h i j k l m n o p q r s t u v w x y z

[[email protected] ~]#shift 9

[[email protected] ~]#echo ${10}

What would be the output of the echo command?

A. It will print the letter j.
B. It will print the letter s.
C. It will print $1 followed by the literal 0.
D. It will print ${10} onto the standard output.



  • Question: 194
Which two commands would you use to kill all the processes owned by the user smith? (Choose two.)

A. pkill -9 -u smith
B. skill -9 -u smith
C. pkill -1 -u smith
D. skill -1 -u smith
E. pkill -19 -u smith




  • Question: 195
Identify the true statements about the nice value. (Choose two.)

A. It only accepts priority values less than 19.
B. By default it reduces the priority of a process by 10.
C. A higher nice value makes a process run at a lower priority.
D. By default a normal user can make a process run at a higher priority.





  • Question: 196
You have downloaded a file called firefox.tar.gz. Which of the following commands could help you to extract the files from this tar file? (Choose all that apply.)

A. tar xjf firefox.tar.gz
B. tar xzf firefox.tar.gz
C. tar -xvjf firefox.tar.gz
D. tar --gzip -xf firefox.tar.gz




  • Question: 197
As a user smith you executed the following command to change the default priority of the date command:

[[email protected] ~]$ nice --10 date

nice : cannot set priority : Permission denied

[[email protected] ~]$

What could be the reason for the error message?

A. smith does not have the SUID bit set on nice.
B. smith does not have the execute permission on nice.
C. smith does not have the permission to change the nice value from the default to a lower value.
D. smith does not have the permission to change the nice value from the default to a higher value.



  • Question: 198
You receive a file that has the extension .tar and you are unable to open it. How would you find what type of file it is?

A. By issuing the md5 command
B. By issuing the file command
C. By issuing the strings command
D. By issuing -t switch with the tar command



  • Question: 199
Match the following Regular Expressions (RE) with their resultant actions:

1) ^RE                a) anchor RE at end of line
2) RE$                 b) anchor RE at start of word
3) \
4) RE\>               d) anchor RE at start of line

A. 1-d, 2-a, 3-b, 4-c
B. 1-a, 2-d, 3-c, 4-b
C. 1-c, 2-b, 3-d, 4-a
D. 1-b, 2-c, 3-a, 4-d





  • Question: 200

You execute the following command:

find /home/ -name ?.jpg? -type f -user john

What is the expected output of this command?

A. A list of all regular files and directories with the pattern jpg in file names and owned by the user john, under the /home directory
B. A list of all the regular files with the extension .jpg and owned by the user john, under the /home directory and subdirectories
C. A list of all the regular files with the extension .jpg and owned by the user john, under the /home directory, not in subdirectories
D. A list of all the regular files with the extension .jpg and owned by the users john and root, under the /home directory and subdirectories



  • Question: 201
When bash is invoked as an interactive login shell, what is the order in which the bash configuration files are read with the assumption that all the files exist and are readable?

A. ~/.bash_profile,~/.bash_login,/etc/profile,~/.profile
B. /etc/profile,~/.bash_profile,~/.bash_login,~/.profile
C. ~/.profile,~/.bash_login,/etc/profile,~/.bash_profile
D. ~/.bash_login,/etc/profile,~/.profile,~/.bash_profile




  • Question: 202
As per the Linux Documentation Project (LDP), which directory in the File System Hierarchy (FSH) holds the online distribution documentation that includes FAQs, How-to's, Web sites, and so on?

A. /usr/include
B. /usr/share/doc
C. /usr/local/share
D. /usr/share/man/doc




  • Question: 203
The GNU project was started by Free Software Foundation (FSF) with a goal to create a free UNIX Clone. What do you understand by the term free as per the terms of FSF?

A. The source code will be provided free of cost with the software.
B. The software is fully free and is charged only to fix breakdowns.
C. The software is distributed free in runnable (installable) form with no cost.
D. The software is distributed free but does not offer the freedom to redistribute it.




  • Question: 204
You have logged in as a normal user bob and use write and wall to chat with other users. How are you able to chat with other user terminals?

A. because the SGID bit is set on both the write and wall commands, and the group ownership is set to root
B. because the SUID bit is set on both the write and wall commands, and the group ownership is set to tty
C. because the SUID bit is set on both the write and wall commands, and the group ownership is set to root
D. because the SGID bit is set on both the write and wall commands, and group ownership is set to tty



  • Question: 205
You have set HISTCONTROL=ignoreboth. What are the implications of this setting on history?

A. It saves both duplicates and commands prefixed with a space.
B. It ignores commands prefixed with a space but saves duplicates.
C. It ignores duplicates but saves the commands prefixed with space.
D. It ignores both the duplicate commands and commands prefixed with a space.





  • Question: 206
View the Exhibit.


















The user scott tries to long-list the contents of the /tmp/newdir directory and receives an error.
What could be the possible solution to let scott list the files in /tmp/newdir?

A. chmod 750 newdir
B. chmod 700 newdir
C. chmod u=rwx newdir
D. chmod 740 /tmp/newdir



  • Question: 207
Identify the XDMCP query type in which a client machine connects to the first available machine to get a list of all machines to which it can connect.

A. Direct
B. Indirect
C. Parallel
D. Broadcast


  • Question: 208
Identify two correct statements about the cp command in association with the inode table. (Choose two.)

A. Deletes the old directory entry with the old file name
B. Allocates a free inode number placing a new entry in the inode table
C. Has no impact on the inode table (except for time stamp or location of data on disk)
D. Creates a new directory entry that associates with a new name and inode number



  • Question: 209
Identify the correct statements about the tr command? (Choose all that apply.)

A. It works from STDOUT.
B. It helps in Regex pattern matching.
C. It can be used to delete a set of characters.
D. It can be used to merge multiple blank lines into one.
E. It can be used to translate one set of characters into another.




  • Question: 210
A group of users on a Linux system have a common working directory /documents with 1770 permissions. You have a scenario where you have to let all users of the group delete any file or directory in /documents. What would you do in this situation to let them delete any file or directory in /documents?

A. Remove sticky bit on the directory.
B. Set 3770 permissions on /documents
C. Set rwx permissions for others on /documents.
D. Set 777 permissions on all files and directories in /documents.




  • Question: 211
As the user smith you issue the following command:


[[email protected] ~]$ scp file1 [email protected]:~bob

Enter passphrase for key '/home/smith/.ssh/id_dsa': file1 100% 0 0.0KB/s 00:00

[[email protected] ~]$


What is the authentication method used in the node?

A. Password authentication
B. Public Key Authentication
C. Host-based authentication
D. KeyBoard-Interactive Authentication
E. Challenge Response Authentication




  • Question: 212
Identify the true statement about AutoFS.

A. AutoFS mounting can be triggered only by a root user.
B. Both on demand mounting and unmounting of file systems is taken care of by AutoFS.
C. AutoFS automatically mounts the file systems on demand but requires manual unmounting.
D. AutoFS requires manual mounting of file systems but unmounts them without user intervention.




  • Question: 213
Which two statements are true about lp? (Choose two.)

A. It submits files for printing.
B. It cannot alter a pending job.
C. By default it sets a priority of 100 to any print job.
D. It uses "localhost" or the value of the CUPS_SERVER environment variable as the default hostname.



  • Question: 214
As the root user on station1, you are trying to administer a printer, configured on the server1 server using CUPS, through a browser. Which two statements holds true in this context. (Choose two.)

A. CUPS uses port 630.
B. Public access provides only read access.
C. By default, CUPS accepts connections only from localhost.
D. Administering CUPS from a remote system does not require any authentication.



  • Question: 215
Which command could user smith use to change the time stamps of the file1 and dir1 given below, to the current system time?

[[email protected] ~]$ ls -l

-rw-rw-r-- 1 smith smith 6 Jan 20 10:01 file1

drwxrwxr-x 2 smith smith 4096 Jan 20 10:54 dir1


A. cat
B. stat
C. time
D. file
E. touch




  • Question: 216

Match the following symbolic notations of file permissions with their numeric values.

1) - - - s - - - - - -                     a) 5000
2) - - - - - - s - - -                     b) 4100
3) - - - - - - - - - t                      c) 7101
4) - - - S - - - - - T                    d) 1001
5) - - - s - - S - - t                    e) 7040
6) s - -S r - S - -T                    f) 2010

A. 1-d, 2-f, 3-b, 4-e, 5-c, 6-a
B. 1-b, 2-f, 3-d, 4-a, 5-c, 6-e
C. 1-f, 2-a, 3-c, 4-b, 5-e, 6-d
D. 1-b, 2-d, 3-f, 4-a, 5-e, 6-c



  • Question: 217
As normal user scott you have generated version 2 dsa key pair using the ssh-keygen program. What are the default user permissions available for the private key?

A. Only read
B. Both read and write
C. Both read and execute
D. Both write and execute
E. All read, write, and execute




  • Question: 218
You execute the command given below:

find / -perm +7000 -ls

What is the expected output from this command? (Choose all that apply.)

A. List (ls) all files and directories on the system with full permissions set.
B. List (ls) all files and directories on the system with all special permissions set.
C. List (ls) all files and directories on the system with any of the special permissions set.
D. Long-list (ls -l) all files and directories on the system with all the special permissions set.
E. Long-list (ls -l) all files and directories on the system with any of the special permissions set.





  • Question: 219
View the Exhibit.
















Which command would change the root user's current working directory to /usr/local?

A. cd -
B. cd ../..
C. cd usr/local
D. cd ~/usr/local




  • Question: 220
As a root user, you have configured a file system using AutoFS with the default settings. You changed to one of the directories under AutoFS control at the tty1 terminal and started working at the tty2 terminal. What is the status of the file system mounted in the tty1 terminal after the idle time as mentioned in the /etc/auto.master file?

A. The file system remains mounted until you logout from tty1 terminal.
B. The file system remains mounted as long as the system is up and running.
C. The file system is unmounted the moment you start working at the tty2 terminal.
D. The file system gets unmounted automatically after left idle for 5 minutes irrespective of the AutoFS configuration file time settings.






  • Question: 221
View the Exhibit.








 








/tmp/backups is a directory with SUID and SGID set as shown in the Exhibit. The user smith is trying to access this directory. Which three statements are true? (Choose three.)

A. The user smith can only navigate to the /tmp/backups directory using the others permissions on the directory.

B. The user smith cannot even list the files in the /tmp/backups directory because SUID is meant for executables only.

C. The user smith has full permissions on the /tmp/backups directory because SUID enables him to work with the security context of the root user.

D. The user smith has full permissions on the /tmp/backups directory because SGID enables him to work with the security context of the root group.

E. The user smith cannot even list the files in the /tmp/backups directory because not only SGID, but also the group membership an permissions for the group are required on the directory.




  • Question: 222
You have logged in as normal user bob with the default login shell. An attempt by bob to change the default shell to /bin/sh fails with an error. What could be the possible reason?

A. The SUID bit is not set on chsh by default.
B. The /bin/sh entry is not listed in /etc/shells file.
C. bob does not have the permissions to change the shell by default.
D. bob does not have read permissions on the/etc/shells file by default.



  • Question: 223
The root user tries to create the hard link link1 to /root/textfile in /boot and receives the error:

[[email protected] ~]# ln textfile /boot/link1

ln: creating hardlink `/boot/link' to `textfile': Invalid cross-device link


Which two statements are true? (Choose two.)

A. Hard links cannot span file systems.
B. /boot file system does not exist or it is not mounted.
C. /boot can occupy files that are required at boot time only.
D. Hard links cannot be created to the nonexistent file /root/textfile.
E. Hard link is supposed to be another physical presence of a file on the same file system.




  • Question: 224
The user smith wants to navigate to the /usr/share/doc directory. His current working directory is /home/smith. Which of these commands would help smith to navigate to the /usr/share/doc directory? (Choose all that apply.)

A. cd /usr/share/doc
B. cd ../usr/share/doc
C. cd / ; usr/share/doc
D. cd ../../usr/share/doc
E. cd / ; cd usr/share/doc




  • Question: 225
As a system administrator, you have created the /public directory. The permission to the directory is shown below:


[[email protected] ~]# ll -d /public/

drwxr-xr-x 3 root root 4096 Dec 17 04:35 /public/

You have a requirement that all the normal users in the system should be able to create files in the /public directory, but they should not be able to delete one another's files. Which command will achieve this task?

A. chmod 777 /public
B. chmod 1777 /public
C. chmod 2777 /public
D. chmod 4777 /public



  • Question: 226
Which statement is true about symbolic link?

A. It cannot span file systems.
B. It cannot reference directories.
C. It can reference nonexistent files.
D. It does not occupy storage space (that is, blocks).



  • Question: 227
Which statement is true about the command shown below?

[[email protected] ~]$ head -15 /etc/passwd | tail –5

A. It will display the first 15 lines of the /etc/passwd file.
B. It will display the last five lines of the /etc/passwd file.
C. It will display the lines 11 through 15 in the /etc/passwd file.
D. It will display the lines between 5 and 15 in the /etc/passwd file.



  • Question: 228
You have opened file1 in the vi editor. The contents of file1 is shown below:

[[email protected] ~]# vi file1
green
red
pink
blue green pink
white green blue green
blue green pink green

At the vi editor command mode, you execute the following command to edit the contents of file 1:

:1,$s/green/yellow/

What will be the result of this command?

A. It will search only the first line for all occurrences of the regex green and replace it with the word yellow.
B. It will search the entire file for the first occurrence of the regex green and replace it with the word yellow.
C. It will search only the first line for the first occurrence of the regex green and replace it with the word yellow.
D. It will search the entire file for all occurrences of the regular expression (regex) green and replace it with the word yellow.




  • Question: 229
Match the items in the two columns below. Choose the option that matches them correctly





A. 1-c, 2-a, 3-b, 4-d
B. 1-d, 2-a, 3-c, 4-b
C. 1-b, 2-d, 3-a, 4-c
D. 1-b, 2-a, 3-d, 4-c




  • Question: 230
Which statement is true about the command shown below?

[[email protected] ~]# mount -a -O no_netdev

A. It mounts all file systems that have the option _netdev specified in the Options field in the /etc/fstab file.

B. It mounts only ext3 file systems that have the option _netdev specified in the Options field in the /etc/fstab file.

C. It mounts only msdos file systems that have the option _netdev specified in the Options field in the /etc/fstab file.

D. It mounts all file systems except those with the option _netdev specified in the Options field in the /etc/fstab file.











Gabarito do simulado


Questões    Resposta(s)
Questão 1        A,B
Questão 2        A
Questão 3        E
Questão 4        D,E
Questão 5        D
Questão 6        C
Questão 7        B,D
Questão 8        B
Questão 9        A,B,C,D
Questão 10      A
Questão 11      C
Questão 12      B
Questão 13      C
Questão 14      C,F
Questão 15      D
Questão 16      A,D
Questão 17      B
Questão 18      B
Questão 19      A
Questão 20      B
Questão 21      D
Questão 22      A,D
Questão 23      B
Questão 24      B,F
Questão 25      E
Questão 26      C
Questão 27      C
Questão 28      B
Questão 29      A,B,E
Questão 30      A,D,E
Questão 31      A
Questão 32      C
Questão 33      C
Questão 34      A,C,F
Questão 35      C
Questão 36      B
Questão 37      C
Questão 38      C
Questão 39      D,C
Questão 40      A,B,C,D
Questão 41      A
Questão 42      B
Questão 43      A,D
Questão 44      A
Questão 45      B,C
Questão 46      A,C
Questão 47      A,F
Questão 48      A
Questão 49      D
Questão 50      A
Questão 51      B
Questão 52      C
Questão 53      A,B,E
Questão 54      C
Questão 55      A,D
Questão 56      A
Questão 57      A
Questão 58      D
Questão 59      B
Questão 60      A
Questão 61      C
Questão 62      D
Questão 63      B
Questão 64      B
Questão 65      D
Questão 66      C,D
Questão 67      C
Questão 68      A
Questão 69      A
Questão 70      D,E,F
Questão 71      A
Questão 72      D
Questão 73      A,C,F
Questão 74      D
Questão 75      D
Questão 76      C
Questão 77      B
Questão 78      B
Questão 79      A,C
Questão 80      B
Questão 81      B
Questão 82      A
Questão 83      D
Questão 84      A
Questão 85      C
Questão 86      A
Questão 87      E
Questão 88      C
Questão 89      D
Questão 90      B,C
Questão 91      B
Questão 92      D
Questão 93      A
Questão 94      B
Questão 95      B,E
Questão 96      A
Questão 97      D
Questão 98      C,E
Questão 99      B,C
Questão 100    D
Questão 101    C
Questão 102    B,E
Questão 103    A
Questão 104    C
Questão 105    C,D
Questão 106    B,D
Questão 107    A,B,D
Questão 108    A,C,E
Questão 109    A
Questão 110    D
Questão 111    D
Questão 112    B,D
Questão 113    C
Questão 114    A,B
Questão 115    A
Questão 116    D
Questão 117    C
Questão 118    C
Questão 119    C
Questão 120    D
Questão 121    F
Questão 122    A,D,E
Questão 123    A,D
Questão 124    D
Questão 125    A
Questão 126    C
Questão 127    A
Questão 128    C
Questão 129    C
Questão 130    C
Questão 131    C
Questão 132    B
Questão 133    B
Questão 134    A,E
Questão 135    D
Questão 136    A
Questão 137    D
Questão 138    A,D
Questão 139    C
Questão 140    B
Questão 141    C,D
Questão 142    C,E
Questão 143    B
Questão 144    D
Questão 145    E
Questão 146    A,B,D
Questão 147    A
Questão 148    B
Questão 149    D
Questão 150    E
Questão 151    B,D
Questão 152    E
Questão 153    A,B,D
Questão 154    A,D
Questão 155    B
Questão 156    B
Questão 157    A,D
Questão 158    D
Questão 159    B
Questão 160    A,B,C,D
Questão 161    F
Questão 162    A
Questão 163    B
Questão 164    A,B,C
Questão 165    D
Questão 166    A
Questão 167    C
Questão 168    A
Questão 169    D
Questão 170    A
Questão 171    D
Questão 172    A
Questão 173    A,B
Questão 174    D
Questão 175    B
Questão 176    A
Questão 177    B
Questão 178    C
Questão 179    A,C
Questão 180    B
Questão 181    A,B,D
Questão 182    A,D
Questão 183    C
Questão 184    D
Questão 185    C
Questão 186    A
Questão 187    B,D
Questão 188    D
Questão 189    A
Questão 190    B
Questão 191    B
Questão 192    C
Questão 193    B
Questão 194    A,B
Questão 195    B,C
Questão 196    B,D
Questão 197    C
Questão 198    B
Questão 199    A
Questão 200    B
Questão 201    B
Questão 202    B
Questão 203    A
Questão 204    D
Questão 205    D
Questão 206    A
Questão 207    B
Questão 208    B,D
Questão 209    C,D,E
Questão 210    A
Questão 211    B
Questão 212    B
Questão 213    A,D
Questão 214    B,C
Questão 215    E
Questão 216    B
Questão 217    A
Questão 218    C,E
Questão 219    A
Questão 220    A
Questão 221    A,B,E
Questão 222    B
Questão 223    A,E
Questão 224    A,D,E
Questão 225    B
Questão 226    C
Questão 227    C
Questão 228    B
Questão 229    D
Questão 230    D



Mais vistos no mês:

As melhores distribuições Linux para 2017

TuxMath - Tux, do Comando da Matemática. Ensino e diversão a crianças.

Teste de Performance de Rede com Iperf

DHCP - Guia Completo

OPNsense - Firewall Open Source

Aula #14 - Os sistemas de arquivos ext2/ext3/ext4

Ophcrack: Descubra todas as senhas do Windows

SSD no linux

Oracle Linux 7.0 Server com Xfce - Instalação e configurações iniciais