

Information Technology Fundamentals
Exam Questions
Course Introduction
Information Technology Fundamentals introduces students to the foundational concepts and practices essential to understanding the field of IT. The course covers topics such as computer hardware components, software applications, operating systems, networking basics, internet technologies, cybersecurity principles, and data management. Students gain insight into how information systems support organizational objectives and societal needs. Practical exercises and real-world scenarios help develop problem-solving skills and the ability to use technology tools effectively, preparing students for further study or entry-level roles in the ever-evolving IT industry.
Recommended Textbook
Linux+ Guide to Linux Certification 3rd Edition by Jason Eckert
Available Study Resources on Quizplus
14 Chapters
630 Verified Questions
630 Flashcards
Source URL: https://quizplus.com/study-set/1375

Page 2
Chapter 1: Introduction to Linux
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27413
Sample Questions
Q1) A(n) ____________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.
Answer: router
Q2) Consider the phrase "collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly" from the chapter. This statement describes which advantage of the Linux operating system?
A) Ease of customization
B) Flexibility for different hardware platforms
C) Risk reduction
D) Stability and security
Answer: D
Q3) The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
A)True
B)False
Answer: False
Q4) Linux kernel version 2.5.9 is a(n) ____________________ kernel.
Answer: developmental

Page 3
To view all questions and flashcards with answers, click on the resource link above.
Chapter 2: Linux Installation and Usage
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27414
Sample Questions
Q1) The command shutdown -h +30 would halt your system in 30 minutes.
A)True
B)False
Answer: True
Q2) System Rescue can be used to repair a Linux system that cannot be started.
A)True B)False
Answer: True
Q3) ____ is the metacharacter for command termination. A) \ B) & C) ;
D) | Answer: C
Q4) Another name for virtual memory is ____________________ memory.
Answer: swap
Q5) In Linux, the command ____________________ displays currently logged-in users.
Answer: who

Page 4
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Exploring Linux Filesystems
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27415
Sample Questions
Q1) To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.
A) cd ..
B) cd ../..
C) /home/joe
D) cd ./..
Answer: B
Q2) Displays a file in reverse order.
A)log file
B)tac command
C)directory
D)named pipe
E)egrep command
F)socket file
G)head command
H)special device file
I)linked files
Answer: B
Q3) The file .file.dat is an example of a(n) ____________________ file. Answer: hidden
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Linux Filesystem Management
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27416
Sample Questions
Q1) Command used to test network connectivity.
A)chgrp
B)groups
C)alias
D)touch
E)chmod
F)chown
G)ping
H)whoami
I)umask
Q2) To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -R option
Q3) To create a subdirectory, you would use the makedir command.
A)True
B)False
Q4) How does the execute permission apply to a directory?
Q5) Describe the SUID. Give an example of a command that typically has this permission set.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Linux Filesystem Administration
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27417
Sample Questions
Q1) The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.
A)True
B)False
Q2) Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.
A) breaks
B) corruption
C) degradation
D) failures
Q3) When a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point. _________________________
A)True
B)False
Q4) What are the three different types of hard drives? Briefly describe each, and list the possible configurations and device files for each type.
Q5) Creating a filesystem on a device is commonly referred to as
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Advanced Installation
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27418
Sample Questions
Q1) The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.
A) meminfo
B) ioports
C) iomem
D) misc
Q2) To view the hardware detected during boot time, you can use the ____________________ command after system startup.
Q3) You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.
A)True
B)False
Q4) A Fedora 13 CD installation requires ____ CDs.
A) two
B) four
C) six
D) ten
Q5) What is iSCSI? What is it typically used for and how is it configured?
Q6) What is System Rescue? Explain how you would activate this tool.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Working With the Bash Shell
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27419
Sample Questions
Q1) The file descriptor stderr is represented by the number ____.
A) 0
B) 1
C) 2
D) 3
Q2) You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
A)True
B)False
Q3) The ____ escape sequence represents a form feed.
A) \n
B) \f
C) /f
D) /n
Q4) Any command that can be executed on the command line can also be placed inside any environment file.
A)True
B)False
Q5) What are shell variables? What are environment and user-defined variables?
Page 9
Q6) What are shell scripts? Why and how are they executed?
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: System Initialization and X Windows
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27420
Sample Questions
Q1) The Linux kernel is stored in the ____ directory.
A) /
B) /boot
C) /root
D) /krnl
Q2) A system process that performs useful tasks, such as printing, scheduling, and operating system maintenance.
A)active partition
B)Display Settings
C)X client
D)ELILO
E)window manager
F)initstates
G)daemon
H)virtualization software
I)Grand Unified Bootloader
Q3) Administrators most commonly use a(n) graphical user interface.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Managing Linux Processes
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27421
Sample Questions
Q1) To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.
A) -f
B) -l
C) -a
D) -e
Q2) The ____ field in a cron table contains the absolute pathname to the command to be executed.
A) first
B) second
C) fifth
D) sixth
Q3) If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.
A)True
B)False
Q4) Why would you want to schedule commands? What methods are available for scheduling commands?
Q5) The ____________________ can be used to affect the process priority indirectly.
11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Common Administrative Tasks
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27422
Sample Questions
Q1) To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.
A) passwdconv
B) pwconv
C) passwd
D) pwdcv
Q2) Accepting print jobs into a print queue.
A)facility
B)LPD
C)rsyslogd
D)primary group
E)logrotate
F)GID
G)spooling
H)CUPS
I)UID
Q3) _______________________________________________________ represents a text description of the user and is typically left blank.
Q4) Describe the process of sending information to a printer using the CUPS daemon.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Compression, System Backup, and Software Installation
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27423
Sample Questions
Q1) It is good form to read the Makefile after you run the configure script.
A)True
B)False
Q2) The rate of compression.
A)full backup
B)make install
C)checksum
D)tarball
E)compression ratio
F)Brasero Disc Burner
G)compression algorithm
H)sum
I)archive
Q3) You can perform up to ____ different incremental backups using the dump/restore utility.
A) seven
B) eight
C) nine
D) ten
Q4) ____________________ is used to reduce the size of a file or set of files.
To view all questions and flashcards with answers, click on the resource link above. Page 13
Chapter 12: Network Configuration
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27424
Sample Questions
Q1) Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Q2) Class D addresses are used for multicasting.
A)True
B)False
Q3) A route table is a list of TCP/IP networks that is stored in system memory.
A)True
B)False
Q4) The /etc/resolv.conf file can contain up to ____ DNS servers.
A) two
B) three
C) four D) five
Q5) A network ____________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
Q6) What is VNC? How does it transfer graphics across the network?
Q7) SLIP is a newer technology than PPP.
A)True
B)False

14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Configuring Network Services
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27425
Sample Questions
Q1) During the DNS lookup process, if the ISP DNS server has recently resolved the FQDN and placed the result in its local DNS cache, you receive the response immediately (called a(n) recursive query). _________________________
A)True
B)False
Q2) A line within the httpd.conf configuration file.
A)DNS cache file
B)SQL
C)Network File System (NFS)
D)forward lookup
E)document root
F)zone
G)directive
H)recursive query
I)reverse lookup
Q3) The Very Secure FTP daemon is a stand-alone daemon.
A)True
B)False
Q4) The first DNS server in a zone is called the ____________________ DNS server.
Q5) What is NFS? How do you access files using a configured NFS Server?
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Troubleshooting, Performance, and Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/27426
Sample Questions
Q1) Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.
Q2) A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet. _________________________
A)True
B)False
Q3) The free command can be used to display the total amounts of physical and swap memory in Kilobytes and their utilizations. _________________________
A)True
B)False
Q4) If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
A)True
B)False
Q5) The ____________________ command is used to view the current SELinux status.
Q6) How can netfilter/iptables be used to create a firewall service?
Page 16
To view all questions and flashcards with answers, click on the resource link above.