Skip to main content

Information Technology Fundamentals Exam Questions - 630 Verified Questions

Page 1


Information Technology Fundamentals

Exam Questions

Course Introduction

Information Technology Fundamentals introduces students to the foundational concepts and practices essential to understanding the field of IT. The course covers topics such as computer hardware components, software applications, operating systems, networking basics, internet technologies, cybersecurity principles, and data management. Students gain insight into how information systems support organizational objectives and societal needs. Practical exercises and real-world scenarios help develop problem-solving skills and the ability to use technology tools effectively, preparing students for further study or entry-level roles in the ever-evolving IT industry.

Recommended Textbook

Linux+ Guide to Linux Certification 3rd Edition by Jason Eckert

Available Study Resources on Quizplus

14 Chapters

630 Verified Questions

630 Flashcards

Source URL: https://quizplus.com/study-set/1375

Page 2

Chapter 1: Introduction to Linux

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27413

Sample Questions

Q1) A(n) ____________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.

Answer: router

Q2) Consider the phrase "collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly" from the chapter. This statement describes which advantage of the Linux operating system?

A) Ease of customization

B) Flexibility for different hardware platforms

C) Risk reduction

D) Stability and security

Answer: D

Q3) The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.

A)True

B)False

Answer: False

Q4) Linux kernel version 2.5.9 is a(n) ____________________ kernel.

Answer: developmental

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Linux Installation and Usage

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27414

Sample Questions

Q1) The command shutdown -h +30 would halt your system in 30 minutes.

A)True

B)False

Answer: True

Q2) System Rescue can be used to repair a Linux system that cannot be started.

A)True B)False

Answer: True

Q3) ____ is the metacharacter for command termination. A) \ B) & C) ;

D) | Answer: C

Q4) Another name for virtual memory is ____________________ memory.

Answer: swap

Q5) In Linux, the command ____________________ displays currently logged-in users.

Answer: who

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Exploring Linux Filesystems

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27415

Sample Questions

Q1) To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.

A) cd ..

B) cd ../..

C) /home/joe

D) cd ./..

Answer: B

Q2) Displays a file in reverse order.

A)log file

B)tac command

C)directory

D)named pipe

E)egrep command

F)socket file

G)head command

H)special device file

I)linked files

Answer: B

Q3) The file .file.dat is an example of a(n) ____________________ file. Answer: hidden

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Linux Filesystem Management

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27416

Sample Questions

Q1) Command used to test network connectivity.

A)chgrp

B)groups

C)alias

D)touch

E)chmod

F)chown

G)ping

H)whoami

I)umask

Q2) To copy a directory full of files in Linux, you must tell the cp command that the copy will be ____________________ (involve files and subdirectories too) by using the -R option

Q3) To create a subdirectory, you would use the makedir command.

A)True

B)False

Q4) How does the execute permission apply to a directory?

Q5) Describe the SUID. Give an example of a command that typically has this permission set.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Linux Filesystem Administration

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27417

Sample Questions

Q1) The more filesystems that are used on a system, the less likely a corrupted filesystem will interfere with normal system operations.

A)True

B)False

Q2) Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

A) breaks

B) corruption

C) degradation

D) failures

Q3) When a device is mounted, it is attached to a certain directory on the directory tree called a(n) mount point. _________________________

A)True

B)False

Q4) What are the three different types of hard drives? Briefly describe each, and list the possible configurations and device files for each type.

Q5) Creating a filesystem on a device is commonly referred to as

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Advanced Installation

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27418

Sample Questions

Q1) The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.

A) meminfo

B) ioports

C) iomem

D) misc

Q2) To view the hardware detected during boot time, you can use the ____________________ command after system startup.

Q3) You can use a small bootable Linux kernel to fix problems related to the following: the boot loader; filesystems and partitions; the configuration file; and drivers.

A)True

B)False

Q4) A Fedora 13 CD installation requires ____ CDs.

A) two

B) four

C) six

D) ten

Q5) What is iSCSI? What is it typically used for and how is it configured?

Q6) What is System Rescue? Explain how you would activate this tool.

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Working With the Bash Shell

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27419

Sample Questions

Q1) The file descriptor stderr is represented by the number ____.

A) 0

B) 1

C) 2

D) 3

Q2) You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.

A)True

B)False

Q3) The ____ escape sequence represents a form feed.

A) \n

B) \f

C) /f

D) /n

Q4) Any command that can be executed on the command line can also be placed inside any environment file.

A)True

B)False

Q5) What are shell variables? What are environment and user-defined variables?

Page 9

Q6) What are shell scripts? Why and how are they executed?

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: System Initialization and X Windows

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27420

Sample Questions

Q1) The Linux kernel is stored in the ____ directory.

A) /

B) /boot

C) /root

D) /krnl

Q2) A system process that performs useful tasks, such as printing, scheduling, and operating system maintenance.

A)active partition

B)Display Settings

C)X client

D)ELILO

E)window manager

F)initstates

G)daemon

H)virtualization software

I)Grand Unified Bootloader

Q3) Administrators most commonly use a(n) graphical user interface.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Managing Linux Processes

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27421

Sample Questions

Q1) To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

A) -f

B) -l

C) -a

D) -e

Q2) The ____ field in a cron table contains the absolute pathname to the command to be executed.

A) first

B) second

C) fifth

D) sixth

Q3) If the /etc/at.allow and /etc/at.deny files do not exist, only the root user is allowed to schedule tasks using the at daemon.

A)True

B)False

Q4) Why would you want to schedule commands? What methods are available for scheduling commands?

Q5) The ____________________ can be used to affect the process priority indirectly.

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Common Administrative Tasks

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27422

Sample Questions

Q1) To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

A) passwdconv

B) pwconv

C) passwd

D) pwdcv

Q2) Accepting print jobs into a print queue.

A)facility

B)LPD

C)rsyslogd

D)primary group

E)logrotate

F)GID

G)spooling

H)CUPS

I)UID

Q3) _______________________________________________________ represents a text description of the user and is typically left blank.

Q4) Describe the process of sending information to a printer using the CUPS daemon.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Compression, System Backup, and Software Installation

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27423

Sample Questions

Q1) It is good form to read the Makefile after you run the configure script.

A)True

B)False

Q2) The rate of compression.

A)full backup

B)make install

C)checksum

D)tarball

E)compression ratio

F)Brasero Disc Burner

G)compression algorithm

H)sum

I)archive

Q3) You can perform up to ____ different incremental backups using the dump/restore utility.

A) seven

B) eight

C) nine

D) ten

Q4) ____________________ is used to reduce the size of a file or set of files.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Network Configuration

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27424

Sample Questions

Q1) Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?

Q2) Class D addresses are used for multicasting.

A)True

B)False

Q3) A route table is a list of TCP/IP networks that is stored in system memory.

A)True

B)False

Q4) The /etc/resolv.conf file can contain up to ____ DNS servers.

A) two

B) three

C) four D) five

Q5) A network ____________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.

Q6) What is VNC? How does it transfer graphics across the network?

Q7) SLIP is a newer technology than PPP.

A)True

B)False

14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Configuring Network Services

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27425

Sample Questions

Q1) During the DNS lookup process, if the ISP DNS server has recently resolved the FQDN and placed the result in its local DNS cache, you receive the response immediately (called a(n) recursive query). _________________________

A)True

B)False

Q2) A line within the httpd.conf configuration file.

A)DNS cache file

B)SQL

C)Network File System (NFS)

D)forward lookup

E)document root

F)zone

G)directive

H)recursive query

I)reverse lookup

Q3) The Very Secure FTP daemon is a stand-alone daemon.

A)True

B)False

Q4) The first DNS server in a zone is called the ____________________ DNS server.

Q5) What is NFS? How do you access files using a configured NFS Server?

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Troubleshooting, Performance, and Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/27426

Sample Questions

Q1) Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.

Q2) A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet. _________________________

A)True

B)False

Q3) The free command can be used to display the total amounts of physical and swap memory in Kilobytes and their utilizations. _________________________

A)True

B)False

Q4) If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

A)True

B)False

Q5) The ____________________ command is used to view the current SELinux status.

Q6) How can netfilter/iptables be used to create a firewall service?

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook