0% found this document useful (0 votes)
24 views19 pages

Complete OS Q&A

The document provides comprehensive exam questions and answers related to managing users and groups, permissions and ownership, network configuration, and compression, system backup, and software installation in Linux. It covers essential commands, file locations, user account types, and network concepts, along with explanations of tools and utilities used in Linux. The content is structured in a Q&A format, making it a useful study resource for Linux administration.

Uploaded by

thetit4ns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views19 pages

Complete OS Q&A

The document provides comprehensive exam questions and answers related to managing users and groups, permissions and ownership, network configuration, and compression, system backup, and software installation in Linux. It covers essential commands, file locations, user account types, and network concepts, along with explanations of tools and utilities used in Linux. The content is structured in a Q&A format, making it a useful study resource for Linux administration.

Uploaded by

thetit4ns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Comprehensive Exam Questions and Answers for Managing Users and Groups in Linux

Q1: What is the purpose of groups in Ubuntu Linux?

Answer:

o Groups are used to manage users, set permissions, and monitor user activity.
o They allow managing access to special files and directories.

o Administrators and root users manage the level of access for groups.

Q2: What are the two types of user accounts in Linux?

Answer:

o Superuser (root): Has full access to the system and can perform administrative
tasks.

o Regular user: Has restricted access based on assigned permissions.

Q3: Where are user home directories located in Linux?

Answer:

o Regular users: /home/<username>.


o Root user: /root.

Q4: What does the su command do in Linux?

Answer:

o su means substitute user.

o It allows a user to switch to another user account.

o Syntax: su <username>

o Example: su john -c ls lists the contents of John's home directory.


Q5: How do you return to your regular user identity after using su?

Answer: Use the exit command.

Q6: What is the purpose of the sudo command?

Answer:

o Grants a user temporary access to root or administrative privileges.


o Requires user authentication and checks /etc/sudoers for authorization.

PREPARED BY H. COMANDO
o Example: sudo apt-get install wget installs a package as root.

Q7: What is the difference between su and sudo?

Answer:

o su: Switches to another user account and retains their permissions for the session.
o sudo: Temporarily executes a single command with elevated privileges.

Q8: How do you list all users in Linux?

Answer:

o Use cat /etc/passwd or getent passwd.

Q9: How do you list all groups in Linux?

Answer:

o Use cat /etc/group or getent group.

Q10: How do you view groups for a specific user?


Answer:

o Use groups <username> (e.g., groups john).

Q11: How do you create a new user in Linux?

Answer:

o Syntax: useradd <username> (e.g., useradd BCS13).

o To assign an existing group: useradd -G <groupname> <username>.

Q12: How do you set a password for a user?


Answer: Use passwd <username>.

Q13: How do you delete a user in Linux?

Answer:

o Syntax: userdel <username>.

o To remove the home directory: userdel -r <username>.

PREPARED BY H. COMANDO
Q14: How do you modify a user account?

Answer:

o Syntax: usermod [options] <username>.

o Example: usermod -a -G <groupname> <username> adds a user to a group.


Q15: How do you create a new group in Linux?

Answer:

o Syntax: groupadd <groupname>.

o Example: groupadd newgroup.

Q16: How do you delete a group?

Answer: Syntax: groupdel <groupname>.

Q17: How do you modify a group?

Answer: Syntax: groupmod [options] <groupname>.


Q18: What is the /etc/passwd file?

Answer:

o A database containing user account information.

o Format: username:password:uid:gid:comment:home_dir:shell.

Q19: What is the purpose of /etc/shadow?

Answer:

o Stores encrypted passwords for users.


o Only accessible by the root user.

Q20: What are the advantages of shadow passwords?

Answer:

o Improves security by keeping passwords hidden.

o Supports password aging and expiration policies.

PREPARED BY H. COMANDO
Q21: How do you configure password expiration for a user?

Answer:

o Syntax: chage [options] <username>.

o Example options:
▪ -d days: Number of days since January 1, 1970, the password was last
changed.

▪ -I days: Number of inactive days after password expiration before account


lock.

Q22: What is the User Accounts tool?


Answer:

o A GUI tool for viewing, modifying, adding, and deleting users.

o Access via: Applications → System Tools → System Settings.

o Root privileges are required for full access.

Q23: What is the User Manager tool?

Answer:

o A GUI tool for managing users and groups.


o Requires superuser authentication to perform administrative tasks.

PREPARED BY H. COMANDO
Comprehensive Exam Questions and Answers for Managing Permissions and Ownership in
Linux

Q1: How does ownership work in Linux?

Answer:

o When a user creates a file or directory, their user account is automatically


assigned as the owner.

o Ownership can be viewed via GUI (Properties → Permissions) or the command


line using ls -l.

Q2: How can you change the ownership of a file or directory?

Answer:

o Use the chown command:

▪ Syntax: chown user.group file


▪ Example: chown ncth1 /tmp/myfile.txt

o Add -R for recursive ownership change:

▪ Example: chown -R user /directory

Q3: What does the chgrp command do?

Answer:

o Changes the group ownership of a file or directory.

o Syntax: chgrp group file


o Example: chgrp users /tmp/newfile.txt

Q4: What permissions are needed to change ownership?

Answer:

o To change user ownership, root privileges are required.

o To change group ownership, either root privileges or ownership of the file is


required.

PREPARED BY H. COMANDO
Q5: What are permissions in Linux?

Answer:

o Permissions control how files and directories are accessed and used.

o There are three permission types:


▪ Read (r): View file contents or list directory contents.

▪ Write (w): Modify file contents or add/remove files in a directory.

▪ Execute (x): Run a file as a program or access a directory.

Q6: What are the three entities permissions apply to?

Answer:

o Owner: The user who owns the file or directory.

o Group: The group assigned to the file or directory.

o Others: All other users.


Q7: How can permissions be viewed?

Answer:

o Use the ls -l command.

o Example output: -rwxr-xr-- 1 user group 1024 Feb 1 file.txt

▪ Owner: rwx

▪ Group: r-x

▪ Others: r--
Q8: How do you change permissions using the chmod command?

Answer:

o Symbolic mode:

▪ Syntax: chmod entity=permissions filename

▪ Example: chmod u=rw,g=r,o= file.txt

o Numeric (absolute) mode:

▪ Syntax: chmod numeric_permissions filename


▪ Example: chmod 764 file.txt (Owner: rwx, Group: rw-, Others: r--).

PREPARED BY H. COMANDO
Q9: What do the numeric permissions represent?

Answer:

o 0: No permissions.

o 1: Execute.
o 2: Write.

o 3: Write + Execute.

o 4: Read.

o 5: Read + Execute.

o 6: Read + Write.

o 7: Read + Write + Execute.

Q10: How do you modify permissions incrementally?

Answer:
o Use + to add or - to remove permissions.

o Example: chmod g+w file.txt adds write permission for the group.

o Example: chmod o-r file.txt removes read permission for others.

Q11: What are default file permissions?

Answer:

o Default permissions are determined by the system's umask setting.

o For files, default permissions are 666 (rw-rw-rw-).


o For directories, default permissions are 777 (rwxrwxrwx).

Q12: What are common file permission settings?

Answer:

o 777: No restrictions (rwxrwxrwx).

o 755: Owner can read, write, and execute; others can read and execute (rwxr-xr-x).

o 700: Owner has full permissions; others have none (rwx------).

o 644: Owner can read and write; others can only read (rw-r--r--).

PREPARED BY H. COMANDO
Q13: How do you change ownership and group ownership simultaneously?

Answer:

o Syntax: chown user:group file

o Example: chown user1:group1 file.txt


Q14: How do you use chgrp?

Answer:

o Syntax: chgrp group file

o Example: chgrp developers project.doc

Q15: How do you recursively change permissions or ownership?

Answer:

o Use the -R flag:

▪ Example for permissions: chmod -R 755 directory/


▪ Example for ownership: chown -R user:group directory/

PREPARED BY H. COMANDO
Comprehensive Exam Questions and Answers for Network Configuration in Linux

Q1: What is a network?

Answer: A network is two or more computers connected with media that can exchange
information.

Q2: What is the difference between LAN and WAN?

Answer:

o LAN (Local Area Network): Connects computers within close proximity.


o WAN (Wide Area Network): Connects computers separated by large distances.

Q3: What are routers used for in a network?


Answer: Routers transfer information from one network to another.

Q4: What is Ethernet?

Answer: Ethernet is the most common media access method used in networks.

Q5: What are protocols in networking?

Answer: Protocols are a set of rules of communication used between computers on a network.
Q6: List some LAN protocols used in Linux.

Answer:

o TCP/IP (Transfer Control Protocol/Internet Protocol)

o UDP/IP (User Datagram Protocol/Internet Protocol)

o IPX/SPX (Internetwork Packet Exchange/Sequence Packet Exchange)

o Appletalk

o DLC (Data Link Control)


o DECnet (Digital Equipment Corporation network)

Q7:What information is required to configure a host in a network?

Answer:

o Host name for the system.

o Domain name for the system.


o IP address for the system.

PREPARED BY H. COMANDO
o Subnet mask for the network.

o Default router (gateway).

o Name of the service used on the network.

o Name or address of the machine providing name service.


Q8: What is an IP address?

Answer: An IP address is a series of four 8-bit numbers that represent a computer on a network
and identify it to other computers.
Q9: What is a subnet mask?

Answer: A subnet mask is a series of four 8-bit numbers that determine the network and host
portions of an IP address.

Q9: What is a default gateway?

Answer: A default gateway is the IP address on a router that sends packets to remote networks.

Q10: How do you configure and verify an IP address in Linux?

Answer:

o Configure: ifconfig <interface> <IP address>

o Verify: Use the ifconfig command to check active interfaces or ping


<destination> to test connectivity.

Q11: What is the purpose of the /etc/hosts file?

Answer:
o It is a registry of IP addresses and associated host names.

o It must contain the loopback address (127.0.0.1) and the IP address for the host.

Q12: What is the purpose of the /etc/services file?

Answer:

o It contains a list of network ports and their corresponding services.

o Example: Port 25 is for SMTP, and port 80 is for HTTP.

Q13: What is the /etc/networks file used for?


Answer: It associates symbolic network names with Internet Protocol addresses.

PREPARED BY H. COMANDO
Q14: What is the ifconfig command used for?

Answer:

o Configures a network interface.

o Displays the status of all network interfaces.


o Example: ifconfig eth0 up activates the network interface eth0.

Q15: How do you assign an IP address and netmask to an interface?

Answer:

o Syntax: ifconfig <interface> <IP address> netmask <netmask>

o Example: ifconfig eth0 192.168.1.1 netmask 255.255.255.0

Q16: What is the ping command used for?

Answer: It checks network connectivity by sending ICMP echo request messages to a


destination and waiting for a response.

Q17: What is a port in networking?


Answer: A port is a number that uniquely identifies a network service.

Q18: What are well-known ports?

Answer: Ports ranging from 0 to 1024 used by common networking services.

Q19: What is the traceroute command used for?

Answer: It tracks the sequence of routers a packet takes to reach a destination.

o Syntax: traceroute <destination>

Q20: What is the netstat command used for?


Answer: It checks the status of ports, routing table information, and active connections.

Q21: What does the route command do?

Answer:

o Displays or modifies the routing table.

o Syntax: route -n

PREPARED BY H. COMANDO
Q22: What is the purpose of the arp command?

Answer: It displays and modifies the ARP cache, which maps IP addresses to MAC addresses.

Q23: What is the dig command used for?


Answer: It queries DNS-related information like A records, CNAME, and MX records.

Q24: What does the nslookup command do?

Answer: It is used for DNS-related queries, such as finding the IP address of a domain.

Q25: What is the tracepath command?

Answer: It performs a similar function to traceroute but does not require root privileges and has
fewer options.

Q26: What are standalone daemons?

Answer: Daemons started at boot-up that configure themselves without assistance from the
Internet Super Daemon.

PREPARED BY H. COMANDO
Comprehensive Exam Questions and Answers for Compression, System Backup, and
Software Installation in Linux

Q1: What is compression in Linux?

Answer: Compression is the process of reducing file size by stripping out unnecessary
characters.

Q2: What is a compression algorithm?

Answer: A standard set of instructions used to compress a file.

Q3: What is a compression ratio?

Answer: The percentage by which the file size is reduced during compression.
Q4: Name common compression utilities in Linux.

Answer:

o compress

o gzip

o bzip2

Q5: What is the compress utility used for?

Answer:
o Compresses files using the Adaptive Lempel Ziv coding (LZW) algorithm.

o Provides an average compression ratio of 40-50%.

Q6: How do you compress and decompress files using the compress utility?

Answer:
o Compress: compress [OPTION]... [FILE]...

o Decompress: uncompress [FILE]...

Q7: What is gzip?

Answer:
o GNU zip (gzip) compresses files using the Lempel-Ziv compression algorithm
(LZ77).
o Provides a compression ratio of 60-70%.
o Adds a .gz extension by default.

PREPARED BY H. COMANDO
Q8: How can you control the level of compression with gzip?

Answer: Use numeric options (e.g., gzip -9 for maximum compression).

Q9: How do you decompress files compressed by gzip?

Answer: Use the gunzip command.


Q10: What is the bzip2 utility used for?

Answer: Compresses files using the Burrows-Wheeler Block Sorting Huffman Coding
algorithm.
Q11: What is the average compression ratio for bzip2?

Answer: 50% to 75%.


Q12: How do you decompress files compressed by bzip2?

Answer: Use the bunzip2 command.

Q13: What limitation does bzip2 have compared to other utilities?

Answer: It cannot compress directories directly.

Q14: What is a system backup?


Answer: The process of copying files to an archive for safekeeping.

Q15: What should a system backup include?

Answer:

o User files from home directories.

o Important system configuration files.

o Files used by system services.

Q16: Name some common backup utilities.


Answer:

o tar

o cpio

o dump/restore

PREPARED BY H. COMANDO
Q17: What is the purpose of the tar utility?

Answer: Creates archives in a file on the filesystem or directly on a device.

Q18: What is the syntax for using the tar command?

Answer: tar [options] [archive-file] [file or directory to be archived]


Q19: Does the tar utility compress files inside the archive?

Answer: No, but it can compress archives using options during creation.

Q20: What is the cpio utility used for?

Answer:

o Copies files to/from archives.

o Supports long filenames and device files.

Q21: How does cpio differ from tar?

Answer: It uses absolute pathnames by default and can handle device files.
Q22: What does the dump utility do?

Answer: Backups files and directories to a device or file on the filesystem.

Q23: What filesystems does dump support?

Answer: Ext2 and Ext3.

Q24: What are the types of backups supported by dump?

Answer:

o Full backup: Archives all data on the filesystem.


o Incremental backup: Archives only data that has changed since the last backup.

Q25: What is the purpose of burning software?

Answer: Writes files to CD or DVD media.

Q26: Name a common burning software included in Fedora.

Answer: Brasero Disc Burner.

Q27: What are the main package managers in Linux?

Answer:
o APT (Advanced Packaging Tool): Used in Ubuntu, Debian, and Mint.

PREPARED BY H. COMANDO
o YUM (Yellowdog Updater Modified): Used in RedHat, CentOS, and Fedora.

Q28: How do you install a package using APT?

Answer: Use the command: sudo apt install [package name].

Q29: How do you remove a package using YUM?


Answer: Use the command: sudo yum remove [package name].

Q30: What are the benefits of using package managers?

Answer:

o Resolves dependencies automatically.

o Ensures compatibility with the system.

o Simplifies updates and installation.

Q31: How do you extract files from a .zip archive?

Answer: Use the unzip command.


Q32: How do you extract files from a .tar.gz archive?

Answer: Use the tar command with options:

o -x (extract data)

o -z (decompress gzip)

o -f (specify file)

o Example: tar -xzvf file.tar.gz

Q33: What is the wget command used for?


Answer: Downloads files from the internet via the command line.

Q34: What is the purpose of the ldd command?

Answer: Checks for library dependencies of an executable.

PREPARED BY H. COMANDO
Comprehensive Exam Questions and Answers for Operating System II

Q1: What is the purpose of storage management in Linux?

Answer:

o Linux has advanced capabilities for handling storage devices, including physical
storage, network storage, and virtual storage devices.

Q2: What is mounting in Linux?

Answer:
o Mounting is the process of attaching a storage device to the file system tree,
allowing the device to interact with the operating system.
Q3: What is the role of the /etc/fstab file?

Answer:

o The /etc/fstab file (file system table) lists the devices (such as hard disk partitions)
that are to be mounted automatically at boot time.

Q4: How can you view a list of mounted file systems?

Answer:

o Use the mount command without arguments. It displays the mounted file systems,
their mount points, file system types, and options.

Example Output:

/dev/sda2 on / type ext4 (rw)

/dev/sda1 on /boot type ext4 (rw)

/dev/sdd1 on /media/disk type vfat (rw,nosuid,nodev,noatime)


Q5: How do you unmount a device?

Answer:

o Use the umount command. For example, to unmount /dev/sdd1, use:

o sudo umount /dev/sdd1

Q6: How can you identify a device name for a removable storage device?

Answer:
o Use tail -f /var/log/messages or dmesg to monitor the system log for the device
name when the storage device is attached.
PREPARED BY H. COMANDO
Q7: What is the purpose of the mkfs command?

Answer:

o The mkfs command is used to create a new file system on a device. For example:

o mkfs.ext4 /dev/sdb1
Q8: What is the fsck command used for?

Answer:

o The fsck command (file system check) checks the integrity of file systems and
repairs them if necessary.

Example:
sudo fsck /dev/sdb1

Q9: What is process management in Linux?

Answer:

o Process management refers to the kernel’s ability to manage multiple processes by


rapidly switching between them, creating the illusion of multitasking.

Q10: What command is used to view processes in Linux?

Answer:
o Use the ps command. For example:

o ps -f

o To view all processes, use:

o ps -aux
Q11: What is the difference between foreground and background processes?

Answer:

o Foreground Process: Requires user input and is actively running on the terminal.

o Background Process: Runs continuously without requiring user interaction.


Q12: How can you move a process to the background?

Answer:

o Append & to the command. For example:


o wget http://example.com/file.iso &
PREPARED BY H. COMANDO
Q13: How do you move a background process to the foreground?

Answer:

o Use the fg command. For example:

o fg %1
Q14: What are the different types of processes in Linux?

Answer:

o Running: Currently being executed.

o Waiting: Waiting for system resources.

o Stopped: Not running.

o Zombie: Parent process has ended, but the child process remains in the process
table.

Q15: How do you end a process in Linux?

Answer:

o Locate the process ID (PID) using ps or top.


o Use the kill command:

o kill [PID]

o If the process doesn’t terminate, use:

o kill -9 [PID]

Q16: What is the killall command?

Answer:

o The killall command terminates all processes by name.


Syntax:

killall [process name]

Q17: What is the pkill command?

o The pkill command is used to terminate all processes owned by a specific user.

Syntax:
pkill -u [username]

PREPARED BY H. COMANDO

You might also like