<<

:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM 1. symbol will be used with to match the pattern pat the beginning of a line?

A. ^pat B. $pat C. pat$ D. pat^ E. None of the above

Ans: A

2. Which command is used to display the of the ?

A. B. C. D. grep E. None of the above

Ans: B

3. Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?

A. u+x emp[l-3] B. chmod 777 emp* C. chmod u+r ??? emp D. chmod 222 emp? E. None of the above

Ans: A

4. Which of the following keys is used to replace a single character with new text?

A. S B. s C. r D. C E. None of the above

Ans: B

5. Which command sends the word count of the file infile to the newfile.

A. infile >newfile B. wc newfile C. wc infile - newfile D. wc infile | newfile E. None of the above

Ans: A

-1- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM 6. Which of the following commands is used to display the directory attributes rather than its contents?

A. -l -d B. ls -l C. ls -x D. ls -F E. None of the above

Ans: A

7. The Octal number to be given alogn with chmod command to a file readable, writable and executable to the owner, readable and executable to group and others is:

A. 000 B. 755 C. 744 D. 555 E. None of the above

Ans: B

8. Which of the following is not a communication command.

A. B. C. D. grep E. None of the above

Ans: D

9. Which command is used to concatenate all files beginning with the string 'emp' and followed by a non-numeric characters?

A. cat emp[!0-9] B. more [emp][!0-9] C. cat emp[x-z] D. cat emp[a-z] E. None of the above

Ans: A

10. Which command is used to remove a file?

A. remove B. C. D. del E. None of the above

Ans: B

-2- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM 11. The agency that sits between the user and the UNIX system is called the

A. logic B. profile C. shell D. erxc E. None of the above

Ans: C

12. Which command is used to count just the number of characters in a file?

A. wc - 1 B. wc -c C. wc - D. wc -r E. None of the above

Ans: B

13. Which command is used to display a file contents in octal form?

A. B. C. of D. oct E. None of the above

Ans: B

14. In editor, forward search is performed using the command.

A. :pat B. ?pat C. /pat D. All of the above E. None of the above

Ans: C

15. Which option will be used with command to slow the entire command line of the process being run?

A. -4 B. -f C. -1 D. -2 E. None of the above

Ans: B

16. Which option is used with rm command to make the command prompt the user with each filename and a ?, before acting on it

-3- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM

A. -r B. -x C. -i D. -1 E. None of the above

Ans: C

17. Which of the following commands is used to obtain a list of all files by modification ?

A. ls -1 B. ls -t C. ls -i D. ls -R E. None of the above

Ans: B 18. Which command is used to display the characteristics of a process?

A. pid B. C. ps D. au E. None of the above

Ans: C 19. The field separator in command is specified with

A. -a option B. -d option C. -r option D. -x option E. None of the above

Ans: B

20. Which option will be used with command to change the access time?

A. -a B. -b C. -t D. -h E. None of the above

Ans: A

21. Which command is used to display and create files?

A. cat B. vi C. D. lyrix

-4- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM E. None of the above

Ans: A

22. Which column contains all details of the permissions of a file when you issue the ls -l command?

A. second B. fourth C. third D. first E. None of the above

Ans: D 23. While working with mail command, which command is used to save mail in a separate file?

A. s B. r C. w D. d E. None of the above

Ans: A

24. Which command is used to terminate a process?

A. B. haltsys C. cancel D. E. None of the above

Ans: D

25. The command uses:

A. standard input file B. standard output file C. both input and output file D. neither standard input nor standard output file E. None of the above

Ans: D

26. What is the main advantage of Windows OS? a. Defects have widespread effect b. Enhancements helps all users c. User friendly d. None of the above

-5- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM c.

27.What are the advantages of ? Choose all that apply. a. Stability b. Runs on Old Hardware c. Security d. Free or Open source a,b,c,d

28. Kernel Mode that performs access check in Windows is called; a. Security reference Monitor b. System reference monitor c. security reserved memory d. system reserved memory a.

29. ______is responsible for enforcing Security Policy in standalone Windows a. Local Security Authority b. Remote Security Authority c. Local system authority d. logon security appliance a.

30. What is the database that stores user accounts and local users information a. Security Account Manager b. System Access Manager c. Security Access manager d.System Account manager a.

31. Active Directory is a Directory service for server based authentication. True or False

-6- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM True

32. Local accounts for computers are hooked up to a network. true or False

False

33.Networked computers can ONLY be workgroup joined. True or false

False

34. ______grants or denies access to protected resource such as files, memory, etc. a. Discretionary access control b. system access control c. mandatory access control d. all of the above. a.

35. system ACL is used for auditing and to enforce mandatory integrity policy.

True or false. true

36. What is the low level change to Windows that isolates different objects on a trust based scale. a. Integrity control b. confidentiality control c. availability control d. reliability control ans: a.

37. Which of the following file format is supported in Win 7? a. EXT4 b. BSD c. NTFS d. EXT3

-7- C:\Users\jkrishnavs\Desktop\nptelassignment\WEEK5.txt Thursday, April 16, 2015 12:54 PM c.

38. Unix OS is an a. Multi User b. Time sharing OS c. Multi tasking OS d. All of the above d

-8-