LinkedIn skill assessment answers and questions — Linux
Embark on your journey to master لينكس with our comprehensive تقييم مهارات لينكد إن يرشد. This essential resource is meticulously crafted to equip you with the knowledge and confidence to excel in the LinkedIn Linux skill assessment. Our guide features a wide array of الأسئلة و الإجابات, providing you with an in-depth understanding of Linux’s powerful capabilities.
Whether you’re a novice exploring the لينكس landscape or an experienced professional aiming to sharpen your مهارات, this guide is your ultimate companion. Dive into this enriching learning experience and let’s conquer the LinkedIn Linux skill assessment سويا!.
Q1. To mount a drive by its ID, what command would you use first to retrieve it?
- df -h
- listid
- ليرة سورية -ل
- blkid
Q2. Linux file access control lists (ACLs) are _.
- discretionary access control system permissions layered over standard Linux permissions
- mandatory access control system permissions layered over standard Linux permissions
- a type of firewall for Linux
- the same as standard Linux permissions
Q3. When using iproute2, how do you show routing information for an IPv6 network?
- route -ipv6
- route
- IP -6 route show
- ip route show
Q4. What does this command string do?
find / -size +10M -exec ls -l {} ;
- It finds all files using ls -l and hands them off to the find command to display.
- It finds all files older than 10 minutes and long lists them using the ls command.
- It finds all files larger than 10 MB and long lists them using the ls command.
- It uses the ls command to find all files in the filesystem matching the {} wildcard.
Q5. What would this locate command show?
locate --regexp '^/usr.*pixmaps.*jpg$'
- all files in a directory named pixmaps
- all files ending in “.JPG”
- all file paths that start with “/usr”, include the word “pixmaps”, and end with “.JPG”
- all file paths that include “/usr/pixmaps” and end with “.JPG”
Q6. Which command allows you to do packet analysis from the command line?
- wireshark
- ethtool
- netstat
- tcpdump
Q7. Which command will tell you how long a system has been running?
- log
- مدة التشغيل
- runtime
- التمكن من
Q8. How would you describe PCP (Performance Co-Pilot)?
- It is an application testing suite used to profile programming code.
- It is a local command used for monitoring local system resources in real time.
- It is a set of tools, خدمات, and libraries for gathering and analyzing performance measures.
- It is a tool designed to change system configuration for purposes of optimization.
Q9. You want to resolve a long list of DNS names using dig. What should you do?
- Create a text file including all names and use the -f option of dig.
- Type in each query manually.
- Write a shell script to send multiple dig queries to the DNS server.
- Save the DNS names in an SQL database and process it with dig.
Q10. What would this command output?
ps -e --format uid,pid,ppid,%cpu,cmd
- the user ID, process ID, parent process ID, CPU usage, and command name of a process
- the user ID, group ID, parent process ID, CPU usage, and command name of a process
- the UUID, process ID, parent process ID, CPU usage, and command name of a process
- كل هذه الإجابات
سوف تحتاج إلى تحقيق ما لا يقل عن. Which command in Bash executes the last line in the shell history that starts with ls?
- !
- !!
- !*
- !ليرة سورية
س 12. The ssh-copy-id command copies _ to the remote host.
- both private and public keys
- the ssh public key
- the ssh private key
- a fingerprint file
Q13. What command is used to determine the amount of disk usage for a directory?
- تجد
- fdisk
- du
- df
س 14. A backup drive was created using dd to make a bit-for-bit copy. When the drive is inserted into an iSCSI target before it is booted up, the data appears to be missing. What could have happened?
- The backup drive is corrupted and needs to be re-created.
- When the backup drive was duplicates, the label was as well. When booted, the system mounted the old duplicates drive by its identical label.
- There is a conflict between the physical location of the backup drive and the original drive.
- The backup process went wrong, and the old drive was duplicates over the original drive.
س 15. What is the key difference between a redirect (>) and piping to the tee command?
- The tee command sends output only to STDOUT and STDERR.
- A redirect sends output to STDOUT and a file, whereas a tee sends output only to STDOUT.
- لا شئ, إنهم متشابهون.
- The tee command sends output to STDOUT and a file, whereas a redirect sends output only to a file.
س 16. What does the /etc/nsswitch.conf file manage?
- priority of one DNS server over another
- per network interface DNS server configuration
- alternative DNS services
- sources for name service information
Q17. Assume the variable myNumber holds a string consisting of 10 أرقام. What will this command output?
echo $myNumber | sed -e 's/^[[:digit:]][[:digit:]][[:digit:]]/(&)/g'
- It will only match digits—and since the string has only digits, the command will output the same number without changes.
- It will output the same 10-digit number, but every digit will be inside parentheses.
- It will output the entire 10-digit number inside parentheses.
- It will output the same 10-digit number, but the first 3 digits will be inside parentheses.
ملحوظة: check the question below for a variant of this sed expression.
س 18. What would this sed command do?
sed -E 's/[a-Z]{4}/(&)/' textfile.txt
- It would substitute the letter with an ampersand (&).
- It would replace all letters in the textfile.txt file with ampersand (&).
- It would replace the first four letters with an ampersand (&).
- It would place parentheses around the first four letters of each line of textfile.txt.
ملحوظة: check the question above for a variant of this sed expression.
Side note: this sed expression may fail with “سيد: -e expression #1, char 15: Invalid range end” (for example on MINGW64 / Git Bash); if this is the case, you can try the alternative range [A-z]
.
Q19. Packages can be downloaded but not installed with yum or dnf by specifying which option?
- لا شيء من هذه الإجابات. yum does not support downloading packages without installing them.
- –downloaddir
- -د
- –downloadonly
س 20. What character class is equal to this set?
[0-9]
-
[[:alnum:]]
-
[[:digit:]]
-
[[:alpha:]]
-
[[:num:]]
س 21. When archiving files, which command will preserve all file attributes including ACLs and SELinux security context?
- zip
- قطران
- archive
- gzip
Q22. In a systemd-based OS, you can change the system hostname by editing /etc/hostname manually and then doing what?
- Restart dhcpd.
- Run /etc/hostname.
- لا شئ, the system notices automatically.
- Notify systemd to update it by restarting the systemd-hostnamed service.
Q23. What command would you use to resize an LVM volume group to include an additional physical volume?
- vgadd
- vgresize
- vgappend
- vgextend
س 24. When would this system cron job run its task?
0 1 \* \* \*
- every minute of the hour
- every hour of every day
- every day at 1:00 AM
- only on Mondays
Q25. ifconfig has been deprecated. What command is now recommended for changing IP addresses in the live config?
- netconf
- ipconfig
- ipman
- IP
س 26. You are managing an Apache web server on a system using SELinux. By default it cannot read personal webpages in users’ home directories. What SELinux boolean would you set to allow this?
- apache_enable_homedirs
- httpd_enable_userdirs
- httpd_enable_homedirs
- httpd_enable_userhome_dirs
Q27. Why doesn’t passwd -l keep a user from logging in via other methods?
- The passwd command is not used for locking passwords.
- There is no password -l option.
- It locks only the password, not the account, so users can still authenticate with keys or other methods.
- It does lock the account, keeping users from logging in even if they are using other authentication methods.
س 28. In the Bash shell, what is the difference between piping into | and piping into |&?
- Piping into | pipes both stdout and stderr. Piping into |& pipes only stderr.
- Piping into | pipes stdout. Piping into |& pipes stdout and stderr.
- Piping into | pipes both stdout and stderr. Piping into |& pipes only stdout.
- Piping into | pipes stdout. Piping into |& pipes all open file descriptors.
س 29. Why is the passwd command able to modify the /etc/passwd file?
- The kernel identifies it as one of the names of extended commands.
- It has the same name as the file it modifies.
- It has the SUID permission mode and is owned by root.
- It is a system administration command.
Q30. When a user deletes a file using the rm command, Linux will _.
- always ask for confirmation
- back up the file before it deletes the file
- ask for confirmation if configured to do so
- never ask for confirmation
س 31. What is a major advantage of using Logical Volume Management (LVM)?
- Access to a drive is faster than with standard partitions.
- Volumes can be resized smaller without unmounting them.
- Repairing filesystem errors is easier than with standard partitions.
- Volumes can be resized even if the free space is not contiguous.
Q32. What is one major difference between brace expansion and globs?
- Globs create a list; brace expansion matches pattern.
- Brace expansion requires files to exist; globs do not.
- Brace expansion creates a list; تطابق الكرة الأرضية قائمة أسماء المسارات.
- تحصل Globs على العمليات أولاً وتستعد للتوسع لاحقًا.
على ___. لإزالة كافة قوائم ACL من الدليل, استخدم setfacl مع أي الخيارات?
- -د
- -ك
- -ب
- -س
س 34. أي خيار سوف ليس أعمال التصميم الجرافيكي والمواد التسويقية “مرحبا بالعالم” في المحطة?
- ا
myVar = 5
[[ $myVar -lt 10 ]] && echo " Hello World"
- ب
myVar = 5
[[ $myVar -lt 10 ]] || echo " Hello World"
- C
myVar = 5
[[ ! $myVar -gt 10 ]] && echo " Hello World"
- د
myVar = 5
[[ $myVar -gt 10 ]] || echo " Hello World"
تتم محاذاة كل طبقة وهذه كلها في نفس الوقت. ما لا يرث عن طريق عملية الطفل?
- الأسماء المستعارة قذيفة
- معرف المستخدم
- المتغيرات البيئية
- أولوية الجدولة
Q36. ما هو خيار NFS الذي يسمح للمستخدم الجذر بالوصول إلى مشاركات NFS باعتباره المستخدم الجذر?
- no_admin_squash
- no_root_squash
- allow_root_access
- all_squash
Q37. يمكنك إرسال بريد إلكتروني إلى عميل بعيد باستخدام بناء الجملة التالي. ماذا سيكون في نص البريد الإلكتروني?
date | mail -s "This is a remote test" user1@rhhost1.localnet.com
- “هذا اختبار عن بعد”
- التاريخ, الوقت, والكلمات “هذا اختبار عن بعد”
- يظهر موضوع البريد الإلكتروني “هذا اختبار عن بعد” لكن نص البريد الإلكتروني سيكون فارغًا.
- التاريخ والوقت الحالي
Q38. ما هو الملف /etc/hosts المستخدم؟?
- حل الاسم المحلي
- حجب المواقع باستخدام iptables
- تحديد اسم المضيف
- تكوين خوادم أسماء DNS
Q39. In an extended regular expression, you would use (pattern){3} to match three instances of the pattern. How would you match the same thing with an extended glob?
- 3(pattern)
- {0,3}(pattern}
- Occurrence quantifiers are not supported in Bash’s version of extended globs, so this is not possible.
- {3}(pattern})
س 40. When configuring a Samba share, how would the engineering group be specified in the smb.conf?
- Samba uses Linux operating system groups from the /etc/group file; just specify the group name.
- It would be preceded by a percent sign (%), such as %engineers.
- Use the group name by itself; Samba checks for its existence.
- It would be preceded by an @ symbol, such as @engineering.
س 41. To configure the Kerberos client, which command should you use to import the keytab file?
- krb5-workstation
- ktutil
- pam_krb5
- kdb5_util
س 42. To search from the current cursor position up to the beginning of the file using VIM, type _ and then the search criteria.
-
?
-
\
-
/
-
/search
س 43. What is the job of the NetworkManager daemon?
- It is a graphical tool that manages network connections, including bonding and wireless networks.
- It is a security service that manages user access control of local network-aware services.
- It attempts to keep an active network connection available at all times.
- It is a command-line tool that manages network connections.
س 44. Why might would you use the usermod command?
- to log out a user
- to lock a user’s account
- to change global user account settings
- to set a user’s password
س 45. Extending an LVM volume group does what to the formatted filesystem?
- It prepares the filesystem for use by defragmenting it.
- It resizes the filesystem to match the volume group size.
- It does nothing.
- It remounts the filesystem with the new size.
س 46. Which kernel module do you need to load to use interface bonding?
- bonding.
- فريق.
- netbond.
- كفالة.
Q47. What does this command string do?
find / -size -10K -exec ls -l {} \;
- It finds all files larger than 10k and long lists them using the ls command.
- It finds all files of size 10k using ls -l and hands them off to the find command to display.
- It finds all files in the / directory of size 10k and long lists them.
- It finds all files in the file system smaller than 10k and long lists them using the ls command.
س 48. To change the priority of multiple swap partitions, which file would you edit?
- /proc/swapiness
- /etc/fstab
- /etc/mounts
- /etc/swaps
Q49. What would you type to list all systemd service unit files, whether they are enabled or not?
- systemctl list-services.
- chkconfig –list-all
- systemctl list-unit-files -at service
- systemctl list-unit-files -t service
س 50. You can set Linux group passwords using which command?
- gpasswd
- passwd
- editsam
- grouppass
س 51. With most GNU commands, if an option is a word, what will it be preceded by?
- two dashes
- a backslash
- one dash
- ولا شيء
Q52. What would happen if you have a script file named script that takes a long time to complete, and you type nohup ./script &
in the command line?
- The script will remain running in the background even if you reboot the system.
- The script will run in your terminal and you will not be able to do anything until it completes.
- The script will run in the background until you end the session.
- The script will run in the background and will continue running even if you end the session.
nohup is a POSIX command which means “no hang up”. Its purpose is to execute a command such that it ignores the HUP (hangup) signal and therefore does not stop when the user logs out.
Q53. To elevate privileges using the sudo
يأمر, a user must _.
- enter the root user’s password
- enter their own password
- enter the sudo user’s password
- change to the root group
س 54. When would this system cron job run its task?
0 22 * * 1-5
- on the 22nd of every month from June to May
- في 10:00 PM Monday to Friday
- كل 22 minutes every day except weekends
- من عند 1:00 AM to 5:00 AM on the 22nd of every month
Q55. How does TCP Wrappers differ from a firewall?
- Firewalls are only service specific, whereas TCP Wrappers can block all traffic.
- TCP Wrappers works at the network layer, so it blocks traffic before the firewall even sees it.
- Firewalls easily spawn commands to operate on connection data, whereas TCP Wrappers cannot.
- TCP Wrappers works at the application layer, so it can make access decisions on encrypted data.
ملحوظة: TCP Wrapper works on Application Layer but answer is not too much confirmed.
س 56. As root, you set execute permissions for user, مجموعة, and other on a directory. Now users can do what?
- They can execute files in it.
- They can traverse it.
- They can read files in it.
- They can delete files in it.
ملحوظة: This is correct because of the keyword “directory”. More info هنا.
Q57. What will this command print?
echo "Thu Jun 4 15:45:45 PDT 2020" | cut -f3 -d" "
- It will print nothing.
- Thu Jun 4 15:45:45 PDT 2020
- 0.6567708333333333
- 4
س 58. How can you improve this code snippet?
if ls /etc/passwd &> /dev/null
then
echo "exists"
fi
- The code snippet cannot be improved, this is a valid way of checking for the existence of a file.
- Use Bash’s built-in
[[ ]]
test conditions instead of the ls command. - The redirect to
/dev/null
will silence the return code invalidating the conditional. Removing the redirect will solve this. - The ls command will output the name of the file to the screen. Running ls in quiet mode will improve the code snippet.
س 59. Using a systemd-based distribution, you want to restrict the cron service from running either automatically or manually. Which command would you run?
- systemctl disable crond
- systemctl disallow crond
- systemctl mask crond
- systemctl stop crond
ملحوظة: This is the correct answer because “قناع” prohibits all kinds of activation of the unit, including manual activation.
مرجع: search “قناع”.
س 60. What issue might a user have when they mount a filesystem by partition path such as /dev/sdal in the /etc/fstab file?
- The device order may change on boot, resulting in a system that will not boot properly.
- The user may run out of device letters.
- There are no issues with referring to partitions by their partition path.
- It is more difficult identifying mounted devices by partition path.
س 61. Which option would you choose to force grep to use a basic regular expression (BRE)?
- grep -E
- grep -B
- grep -e
- grep -G
تتم محاذاة كل طبقة وهذه كلها في نفس الوقت: Man page of grep command.
س 62. An rsyslogd filter determines which items in a log file to act on. What is it made up of?
- a facility and an action
- a filter and an action
- a facility and a priority
- a filter and a priority
س 63. Which choice is a Network Manager tool used to configure network connections from the GUI?
- nmcli
- IP
- Onmtui
- nm-connection-editor
س 64. What will not happen if you run the make command without parameters?
- It will clean up all previously generated binaries and perform a new build.
- It will run rules of compilation and building.
- It will look for a file called makefile in your current directory.
- It will build only programs that need to be rebuilt.
س 65. Most commands that support SELinux use which option to display SELinux security context?
- -S
- –selinux
- –ماك
- -مع
س 66. What is the difference between the whoami and logname commands?
- whoami and logname provide the same information.
- whoami tells who are you currently, and logname tells who you were when you logged in initially.
- logname specifies the name of the login log file, and whoami prints the logged in username.
- whoami shows you who logged in as initially, and logname shows who are you currently.
Q67. What is the command to create an associative array in Bash?
- declare -a
- aarray
- array -a
- declare -A
Q68. What tool should you use to replace a physical volum in LVM?
- lvcopy
- قطران
- pvmove
- cp
Q69. What is the difference the ==
و =~
comparison operators when used in BASH double square bracket if
conditionals?
- ال
==
operator performs a string comparison;=~
performs a regex comparison. - ال
==
operator performs a string comparison;=~
performs a glob pattern comparison. - ال
=~
operator performs a string comparison;==
performs a regex comparison. - لا يوجد
=~
operator in BASHif
conditionals.
س 70. What is the difference between these two lines of code?
echo "data" | tee -a file.txt
echo "data" >> file.txt
- The first line will append the word
data
to file.txt and output it on the screen. The second line will append the worddata
only to file.txt. - They are the same.
- The first line will append the word
data
to file.txt and there will be no output on the screen. The second line will output the worddata
on the screen and append it tofile.txt
- Both lines will overwrite file.txt with the word data.
س 71. Using backreferences in a POSIX regular expression, which word would this pattern match?
(ss).*\1
- addressee
- possess
- barrenness
- بنجاح
التحكم في مخاطر سلامة العمليات. To run CGI scripts with Apache, you need to _.
- compile the script with a CGI compiler
- make the script executable
- make the script executable and set the
httpd_enable_cgi
SELinux boolean - change the ownership of the script to Apache
Q73. To permanently add NAT to the default zone using firewalld, you would use which command string?
-
firewall-cmd --permanent --add-nat
-
firewall-cmd --permanent --add-masquerade
-
firewall-cmd --zone=default --add-nat
-
firewall-cmd --zone=default --add-masquerade
التحكم في مخاطر سلامة العمليات. What is the difference between using =
و ==
in a BASH double square bracket if
conditional?
if [[ $FILE == $GLOB ]] ;then
- The single equal sign (
=
) is an assignment operator; the double equal sign (==
) checks equality. - ليس هناك فرق.
- The single equal sign (
=
) checks equality; the double equal sign (==
) checks string equality. - The double equal sign (
==
) is an assignment operator; the single equal sign (=
) checks equality.
Q75. journald
differs from traditional logging services such as rsyslogd
و syslogd
because its logs are _ by default.
- stored remotely
- نص
- persistent
- not persistent
س 76. What is the purpose of a Mail Transport Agent (MTA)?
- It transports the mail from user’s computer to the mail server.
- It accepts mail and adds it to the mail queue for further processing.
- It stores the mail in a mail queue waiting for the MUA to download it.
- It transports mail from one mail server to another.
Q77. What do you need to do before you can perform SSH passwordless logins?
- Generate RSA or DSA key pairs using ssh-keygen.
- Change the remote user’s password.
- Create a local SSL certificate.
- Change the remote SSH configure to allow it.
Q78. When installing a downloaded package on the RedHat-based distribution manual using RPM, what may you have to do first?
- Compile the package source code.
- Download all dependencies and install them before installing the desired package.
- Agree to an end-user license agreement.
- provide the –resolve option so RPM resolves all packages dependency.
تتم محاذاة كل طبقة وهذه كلها في نفس الوقت: Rpm is not meant to resolve dependencies. It checks whether required software (Adobe Illustrator) are installed and fails when software is missing and when the wrong version of software is installed.
Q79. باستخدام أدوات GNU مثل GNU grep, محرج, والسيد, ما هو الفرق بين التعبيرات العادية الأساسية (بري) والتعبيرات العادية الموسعة (نكون)?
- يمكن لـ EREs مطابقة المجموعات.
- تدعم EREs مشغلي الأحداث.
- تناوب دعم ERE.
- يختلف بناء الجملة فقط.
س 80. ما هو الفرق بين قراءة قائمة أقسام القرص من /proc/partitions
والحصول عليه باستخدام fdisk -l
?
-
/proc/partitions
يمثل جدول تقسيم القرص بشكل أكثر دقة منfdisk -l
-
/proc/partitions
يظهر فقط محركات الأقراص المثبتة.fdisk -l
يظهر كافة برامج التشغيل. - لا يوجد فرق بين الاثنين, وتحتوي كلا القائمتين على نفس البيانات.
-
/proc/partitions
هي قائمة أقسام النواة الموجودة في ذاكرة الوصول العشوائي.fdisk -l
يقرأ جدول الأقسام من محرك الأقراص نفسه.
س 81. ماذا سيكون في out.txt?
cat < in.txt > out.txt
- محتوى in.txt.
- الإخراج من سطر الأوامر.
- لا شئ, لأنه لا يمكنك إعادة التوجيه من ملف (in.txt) إلى ملف آخر (out.txt). You can redirect only from a command to a file.
- لا شئ, The redirect will create a new empty file, but there will not be any output from the cat command to redirect.
س 82. Using alternation in a POSIX-extended regular expression, which numbers would this pattern match?
^(([0-9][0-9]?)|(2[0-9][0-9]))$
- 0-99 و 200-299
- 0-99
- 200-299
- 0-299
س 83. Typing systemctl enable crond
does what to the crond service?
- Starts the crond service now.
- Allows user to start the crond service.
- Unmasks the crond service.
- Ensures that the crond service starts automatically on bootup.
س 84. Which of these features is missing from the Bash Language?
- associative arrays.
- extended regular expressions.
- debug traps.
- object orientation.
Q85. What is the first step to integrate extended globs into your command-line workflow?
- لا شئ, extended globs are already integrated into the shell and turned on automatically.
- Make extended globs persistent by adding
shopt -s extglob
to a shell startup file. - نوع
shopt -s extglob
into a shell one time to set the option on permanently. - Make extended globs persistent by adding
shopt +s extglob
to a shell startup file.
س 86. Which statement about default ACLs is true?
- They provide inheritance for user and group permissions.
- They work only on files.
- They provide inheritance for group ownership.
- They grant access to the directory on which they are set.
Q87. The object that systemd
uses to manage services is called a _ file.
- وحدة
- الخدمات
- المدير العام الحالي هو د
- عملية
Q89. What is the difference between the apt remove and apt autoremove commands?
- The apt remove command is a link to apt autoremove, so there are no differences.
- Both uninstall software. The apt autoremove command also uninstalls the dependencies.
- Both uninstall software. The apt remove command also uninstalls the dependencies.
- The apt autoremove command is a system service that routinely removes unused software packages.
س 90. You want to extract the contents from an rpm package. Which command do you use?
- rpm –AZ-400 Microsoft Azure DevOps Solutions
- rpm -ivh –فرض
- rpm –reinstall
- rpm2cpio
س 91. Which variable contains last background job process id?
-
$!
-
$$
-
$?
-
$*
Q92. Which feature does LVM2 included in most distributions not support?
- volume mirroring
- volume striping
- increasing LV size while mounted
- reducing LV size while mounted
Q93. Which improvements do access control lists (ACLs) have over standard Linux permissions?
- ACLs allow permissions to be set for more than one user or group on a file or directory.
- ACLs provide mandatory access control (ماك) functionality through SELinux for files and directories.
- ACLs allow a file to be owned by more than one user and group.
- ACLs provide additional flags such as append-only and immutable.
Q94. What is a maximum length for a filename under Linux?
- 256 بايت
- 1084 بايت
- 255 بايت
- 1023 بايت
س 95. Which command do you use to rename a file in Linux?
- فيديو موسيقي
- rn
- إعادة تسمية
- ren
Q96. Which file is backup file of /etc/passwd ?
- /إلخ/passwd-
- /إلخ/passwd
- /etc/paaswd.
- We can not recover
Q97. Which Vim command writes your changes to the currently open file and quits the Vim editor?
- :ف!
- :wq
- :مربع
- :ث
Q98. Just like IP addresses identify hosts on a network, _ identify the services on a host.
- DHCPs
- subnet masks
- الموانئ
- broadcast addresses
Q99. Which command shows the free disk space on one or more Linux filesystems?
- ليرة سورية
- قرص مضغوط
- du
- df
س100. In Linux, the Epoch is the number of seconds that have elapsed since January 1st, _.
- 1950
- 1965
- 1960
- 1970
س101. In which Linux shell script positional parameter is the script itself stored?
- $2
- $1
- $0
- $9
س102. VirtualBox provides _, which are installed on guests and allow the guest operating system to access shared folders on the host system, share the clipboard, and some other similar actions.
- يجب أن يجد فريقك توازنًا بين هذه المرونة والحاجة إلى التعاون ومشاركة التعليمات البرمجية بطريقة متسقة
- guest configurations
- SSHs
- guest additions
Q103. Given an IP address of 199.83.131.0 and a subnet mask of 255.255.255.0, what is the broadcast address?
- 199.83.131.1
- 10 داونينج ستريت
- 199.83.131.0
- 199.83.131.255
س104. يعرض أمر Linux قائمة العمليات المرتبطة بالمستخدم الحالي والمحطة الحالية?
- ملاحظة
- ليرة سورية
- com.pidof
- ملاحظة -e
س105. في البرنامج النصي شل, لإنشاء حلقة لا نهائية, جعل الشرط دائمًا يعود صحيحًا باستخدام _ أمر لحالة الحلقة while.
- يعود
- يكمل
- صحيح
- دائما
س106. In Linux, الخيار الذي يتم استخدامه مع الأمر uname لطباعة اسم بنية المعالج?
- -ص
- -قوس
- -ملاحظة
- -pname
Q107. أي مما يلي لا يشكل جزءًا افتراضيًا من نظام البريد الإلكتروني لـ Red Hat Linux?
- MTA
- صنوبر
- بروميل
- شراء
س 108. في تحليل BASH, أي التوسع يحدث أولا?
- توسيع هدفين
- التوسع المتغير
- توسيع اسم الملف (الكرة)
- تقسيم الكلمة
س 109. عند مطابقة النمط باستخدام تعبير عالمي أو عادي, كم عدد الأحرف التي تتطابق مع مجموعة الأحرف?
- واحد
- أي عدد من الشخصيات
- صفر أو واحد
- واحد أو أكثر
س 110. لماذا لا تستخدم mdadm --assemble
أمر فرعي عند إنشاء مصفوفة RAID5 جديدة?
-
assemble
ينشئ فقط صفائف من محركات الأقراص التي لا تحتوي على بيانات تعريف RAID عليها. -
assemble
يتم استخدامه لبناء صفائف RAID الموجودة. -
assemble
هو مرادف لcreate
. -
assemble
يتم استخدامه لبناء صفائف RAID جديدة.
س111. أي من الأنواع التالية لا يعد نوعًا افتراضيًا للإدخال/الإخراج في Linux?
- خطأ تقليدي
- المدخلات القياسية
- الإخراج القياسي
- الملف القياسي
س112. في البرنامج النصي شل, _ يعني أو.
- ||
- &
- |
- &&
يتم تحديد حدود العملية من خلال تعيين المستويات العليا والسفلى لمجموعة من المعلمات. على نظام Linux أو Unix باستخدام X Window, جيفيم * تسجيل _.
- يحتوي على نص تم تمييزه أو تحديده بالماوس
- هو نفس الشيء كما + تسجيل
- غير مستخدم
- يحتوي على جميع يانك, يمسح, يتغير, ووضع العمليات
س114. ما هو وضع النظام الذي يعمل على مستوى Linux 0 يشير?
- توقف النظام
- مستخدم متعدد
- وضع مستخدم واحد
- إعادة تشغيل النظام
س115. أي من الاختيارات التالية لا يعد وضعًا في Vi?
- إدراج
- خط
- تعديل
- يأمر
س116. الأمر الذي يستخدم لحذف مستخدم?
- userdel
- اسم المستخدم rm -rf
- فيديو موسيقي
- يمسح
س117. ما هي نواة نظام التشغيل لينكس?
- جوهر نظام التشغيل الذي يدير موارد الأجهزة والبرامج.
- واجهة مستخدم رسومية (واجهة المستخدم الرسومية) الذي يسمح للمستخدمين بالتفاعل مع نظام التشغيل.
- مجموعة من التطبيقات البرمجية التي يمكن استخدامها لأداء مهام مختلفة, مثل تصفح الويب, معالجة الكلمة, والبرمجة.
- كل ما ورداعلاه
مؤلف
-
مرحبا, I'm Helena, كاتب مدونة شغوف بنشر محتويات ثاقبة في مجال التعليم. أعتقد أن التعليم هو مفتاح التنمية الشخصية والاجتماعية, وأريد أن أشارك معرفتي وخبرتي مع المتعلمين من جميع الأعمار والخلفيات. على مدونتي, ستجد مقالات حول موضوعات مثل استراتيجيات التعلم, التعليم عبر الإنترنت, إرشاد مهني, و اكثر. وأرحب أيضًا بتعليقات واقتراحات القراء, لذلك لا تتردد في ترك تعليق أو الاتصال بي في أي وقت. أتمنى أن تستمتع بقراءة مدونتي وتجدها مفيدة وملهمة.
مشاهدة جميع المشاركات
إضافة تعليق
يجب عليك تسجيل الدخول او التسجيل لتستطيع اضافه تعليق .