SG: Ch 20: Working with MAC OS and Linux Flashcards Preview

CompTIA A+ 220-1002 > SG: Ch 20: Working with MAC OS and Linux > Flashcards

Flashcards in SG: Ch 20: Working with MAC OS and Linux Deck (20)
Loading flashcards...
1
Q

What is the name of the area at the bottom of a macOS screen where, by default, a bar of crucial icons appears?

A. Footer

B. Mission Control

C. Taskbar

D. Dock

A

D. Dock

The Dock is the area at the bottom of the macOS screen that is used to launch applications. The footer is not a valid answer. Mission Control is a macOS feature that allows you to see all the applications running. The Taskbar is a Windows Desktop element that is used to track running applications and quickly launch them.

2
Q

Which of the following is a macOS feature for password management?

A. Spotlight

B. Keychain

C. Dock

D. Gestures

A

B. Keychain

Keychain is a tool that saves credentials so that the user does not need to be prompted. Spotlight is a utility in macOS that allows a search of the operating system and Internet for search terms. The Dock is the macOS application menu that is located on the bottom of the screen. Gestures allow you to use more than one finger on the trackpad to perform different functions.

3
Q

Which of the following Linux commands/utilities can be used to edit a wireless connection’s configuration settings?

A. dd

B. apt-get

C. iwconfig

D. pwd

A

C. iwconfig

The iwconfig command can be used to edit a wireless connection’s configuration settings. The dd command is used to duplicate disks. The apt-get command is used with the APT package management system for downloading packages. The pwd command will show the current working directory.

4
Q

Which of the following Linux commands will show you a list of running processes?

A. ls

B. cat

C. ps

D. su

A

C. ps

The ps command will display a snapshot of the current running processes on a Linux operating system. The ls command will display a listing of files from the working directory. The cat command will display the contents of a file. The su command allows you to change user logins at the command line.

5
Q

Your iPad has an application that will not stop running. What feature/tool can you use to stop it?

A. kill

B. Force Quit

C. Task Manager

D. Close Quit

A

B. Force Quit

By pressing the home button twice on an iPad, you can Force Quit and application that will not stop running. The kill utility can be used only at the command line of Linux/macOS. The Task Manager is a Windows utility. Close Quit is not a feature and therefore a wrong answer.

6
Q

Within a Linux terminal, you want to see all the files on your system in long format (using the –l option), including any hidden files (which requires the –a option). Which command should you use?

A. ls –a | ls -l

B. ls –s; ls -l

C. ls -la

D. ls –a\ls -l

A

C. ls -la

The command ls -la will list all of the files in long format. The command ls -a | ls-l will not work. The ls -s; ls -a will show two listings: one with the size and the other with all of the files. The ls -a\ls -l command will show two listings—one with all files and the other in a long format—but will not show all files in a long format.

7
Q

If the permissions for a file are rwxrw-r–, what permissions apply for a user who is a member of the group to which the owner belongs?

A. Read, write, and execute

B. Read and write

C. Read only

D. No access

A

B. Read and write

The effective permissions are read and write. From left to right, the permissions are rwx for the user, rw- for the group, and r– for everyone else. Since the user is only a member of the group applied to the file, they will have read and write permissions.

8
Q

As part of your training program, you’re trying to convince users to make backups on a regular basis. Which Apple app can be used to make backups of various types on a regular basis?

A. Time Machine

B. Finder

C. VSS

D. Keychain

A

A. Time Machine

Time Machine is the Apple application that can be used to create backups on a regular basis. Finder is the macOS equivalent to Windows File Explorer. VSS is a Windows technology that is used to create snapshots of a volume. Keychain is a tool that saves credentials so that the user does not need to be prompted.

9
Q

What type of backups is kept on site at the computer center for immediate recovery purposes?

A. Man-in-the-middle

B. Cloud copies

C. Journal copies

D. Working copies

A

D. Working copies

Working copies are backups that are kept on site at the computer center for immediate recovery purposes. Man-in-the-middle is an attack where an eavesdropper listens between two people or devices. Cloud copies are backups that are sent to cloud storage and cannot be immediately recovered. Journal copies is a wrong answer.

10
Q

You are currently in a Linux terminal session and in the /home/testuser/documents/mail directory. Which command will take you to /home/testuser/documents?

A. cd.

B. cd ..

C. cd …

D. cd ∼

A

B. cd ..

The command cd .. will take you one level back from the current working directory. The command cd. will do nothing, because the period signifies the current working directory. The command cd … is not a valid command. The command cd ∼ will change directories to the home directory of the user.

11
Q

Which of the following Linux commands/utilities can be used to edit a file?

A. ps

B. vi

C. rm

D. ls

A

B. vi

The vi command is used to edit files. The ps command lists processes running. The rm command removes files or directories. The lscommand lists files and folders in the filesystem.

12
Q

Which Linux utility can be used to check and repair disks?

A. fsck

B. chkdsk

C. du

D. dumgr

A

A. fsck

The fsck Linux utility is used to check and repair disks. The chkdsk utility is a Windows utility used to check and repair disks. The du utility is used to show the current disk usage. dumgr is not a utility and is a wrong answer.

13
Q

The interpreter in Linux between the operating system and the user is known as the ____________.

A. Shell

B. Translator

C. Login

D. GUI

A

A. Shell

The shell is the interpreter in Linux between the operating system and the user. The translator is a wrong answer. Login is something you perform to access the shell. The graphical user interface (GUI) does not interpret commands and therefore not considered an interpreter.

14
Q

What does the –p option with mkdir do?

A. Prompts the user before creating files

B. Prompts the user before creating subfolders

C. Creates subfolders as well as folders

D. None of the above

A

C. Creates subfolders as well as folders

The -p option on the mkdir command allows subfolders to be created as well as the target folder. All other answers are incorrect.

15
Q

Which key combination can you use to bring up Spotlight from within an app?

A. Control+Shift

B. Option+Tab

C. Command+spacebar

D. Alt+Home

A

C. Command+spacebar

The Command+spacebar key combination will bring up the Spotlight utility. Control+Shift, Option+Tab, and Alt+Home are wrong answers.

16
Q

Which Linux command can be used to let you run a single command as another user?

A. sudo

B. su

C. passwd

D. ifconfig

A

A. sudo

The sudo command can be used to run a single command as another user. The su command allows you to change user logins at the command line. The passwd command changes the user’s password. The ifconfig command allows you to view and modify the wired network interface.

17
Q

Which of the following utilities can be used in Linux to download patches for installation on a workstation?

A. update

B. Shell/terminal

C. apt-get

D. patch

A

C. apt-get

The apt-get utility can be used to download and apply patches to a Linux installation. The update command is not a utility. Shell/terminal is an interface for interacting with the operating system with the command line. The patch command is not a utility.

18
Q

Which of the following is the most common shell used with Linux?

A. Tcl/Tk

B. Terminal

C. Bash

D. SSH

A

C. Bash

Bash is the most common command-line shell used with Linux. Tcl/Tk is a shell used with Linux, but it is very uncommon. Terminal is a utility used to access the command-line shell. SSH, or Secure Shell, is a secure protocol used to access the shell over a network.

19
Q

Which of the following commands can be used to change the owner of a file to a new owner in Linux?

A. cd

B. chmod

C. chown

D. pwd

A

C. chown

The chown command is used to change ownership of a file. The cd command changes the working directory. The chmod command changes permissions on files. The pwd command displays the current working directory.

20
Q

Which of the following allows you to install Windows on a Mac machine and choose between operating systems upon boot up?

A. Keychain

B. Mission Control

C. Finder

D. Boot Camp

A

D. Boot Camp

Boot Camp allows you to install Windows on a Mac. Keychain is a tool that saves credentials so that the user does not need to be prompted. Mission Control is a quick way on macOS to view what is currently running. Finder is the macOS equivalent to Windows File Explorer.