Where is the operating system of a Raspberry Pi stored?
Answer : C
The Raspberry Pi uses an SD card (or microSD card for newer models) as its main storage device. This means that the operating system and any other files are stored on the SD card, which can be easily inserted or removed from the Raspberry Pi. The SD card also allows the user to switch between different operating systems by using different cards or partitions. The Raspberry Pi does not have any internal storage, such as a hard disk drive or a solid state drive, nor does it use any external devices, such as an IDE bus, a firmware partition, or a GPIO module, to store the operating system.Reference:
Raspberry Pi OS -- Raspberry Pi
Choosing Storage for Raspberry Pi - Kingston Technology
Beginner's Guide: How To Install a New OS on Raspberry Pi
Which of the following Linux Distributions is derived from Red Hat Enterprise Linux?
Answer : E
CentOS is a Linux distribution that is derived from Red Hat Enterprise Linux (RHEL). CentOS stands for Community Enterprise Operating System and it aims to provide a free, enterprise-class, community-supported computing platform that is functionally compatible with RHEL. CentOS is one of the most popular Linux distributions for servers and cloud computing. Raspbian, openSUSE, Debian and Ubuntu are other Linux distributions that are not derived from RHEL, but have their own origins and development histories. Raspbian is based on Debian and optimized for the Raspberry Pi. openSUSE is a community project sponsored by SUSE Linux and other companies. Debian is one of the oldest and most influential Linux distributions, and Ubuntu is derived from Debian and sponsored by Canonical Ltd.Reference:
Linux Essentials - Linux Professional Institute (LPI)1
Linux Essentials Version 1.6 Update - Linux Professional Institute (LPI)2
Free LPI 010-160 Questions - Pass LPI 010-160 - Pass4Success3
LPI Linux Essentials Study Guide: Exam 010 v1.6, 3rd Edition4
What is the UID of the user root?
Answer : E
The UID of the user root is always 0 on Linux systems. This is because the kernel uses the UID 0 to check for the superuser privileges and grant access to all system resources. The name of the user account with UID 0 is usually root, but it can be changed or have aliases. However, some applications may expect the name root and not work properly with a different name. The UID 0 is reserved for the root user and cannot be assigned to any other user. The UID 0 is stored in the /etc/passwd file along with other user information.Reference:
Linux Essentials Topic 104: The Linux Operating System, section 104.4: Runlevels and Boot Targets.
Linux Essentials Topic 106: Security and File Permissions, section 106.1: Basic security and identifying user types.
Linux Essentials Topic 106: Security and File Permissions, section 106.2: Creating users and groups.
Which statements about the directory /etc/skel are correct? (Choose two.)
Answer : C, D
The /etc/skel directory is a skeleton directory that contains the default files and directories that are automatically copied to the home directory of a new user when the account is created by the useradd command12.The purpose of this directory is to provide a consistent and uniform environment for all new users and to save the system administrator's time and effort in configuring the user settings12.The /etc/skel directory can be customized by adding or removing files and directories as needed, depending on the desired default settings for the new users12.
The other options are incorrect because:
A . The personal user settings of root are stored in this directory.This is not true, as the personal user settings of root are stored in the /root directory, which is the home directory of the root user3.The /etc/skel directory does not affect the root user's settings, but only the settings of the new users created by the useradd command12.
B . The files from the directory are copied to the home directory of the new user when starting the system.This is not true, as the files from the directory are copied to the home directory of the new user when the account is created, not when starting the system12.The copying process only happens once, when the useradd command is executed, and not every time the system is started12.
E . The directory contains the global settings for the Linux system.This is not true, as the directory contains the default settings for the new users, not the global settings for the Linux system12.The global settings for the Linux system are usually stored in other directories under /etc, such as /etc/default, /etc/sysconfig, /etc/init.d, etc4.
Understanding the /etc/skel directory in Linux -- The Geek Diary
/etc/skel directory in Linux - techPiezo
Linux File System Hierarchy - /root directory - LinuxConfig.org
Linux configuration: Understanding *.d directories in /etc | Enable Sysadmin
Which of the following characters in a shell prompt indicates the shell is running with root privileges?
Answer : B
The shell prompt is a symbol or a string of characters that indicates the shell is ready to accept commands. The shell prompt can be customized by the user or by the system administrator. The default shell prompt for a normal user is usually a dollar sign ($), while the default shell prompt for the root user is usually a hash sign (#). The root user is the superuser or the administrator of the system, who has full access and control over all files, commands, and resources. Running commands as root can be dangerous, as it can cause irreversible damage to the system if done incorrectly. Therefore, it is advisable to use sudo or su to run commands as root only when necessary, and to switch back to a normal user as soon as possible. The shell prompt indicates the shell is running with root privileges when it ends with a hash sign (#).Reference:
Linux Essentials - Linux Professional Institute (LPI)
Running a shell command as root - Unix & Linux Stack Exchange
What information can be displayed by top?
Answer : B
The top command is a Linux command that shows the running processes on the system. It provides a dynamic real-time view of the system performance and resource usage. The top command can display various information about the processes, such as their process ID, user, priority, state, CPU and memory usage, command name, and more. The top command can also sort the processes by different criteria, such as CPU or RAM consumption, by using the interactive commands. The top command is useful for monitoring the system load and identifying the processes that are consuming the most resources.Reference:
Linux Essentials Topic 104: The Linux Operating System, section 104.3: Basic features and commands of the Linux standard shells.
Linux Essentials Topic 106: Security and File Permissions, section 106.4: Monitor and manage Linux processes.
What happens to a file residing outside the home directory when the file owner's account is deleted? (Choose two.)
Answer : C, E
When a user account is deleted, the files owned by that user are not automatically deleted from the file system, unless they are in the user's home directory. The files residing outside the home directory will remain unchanged, but they will have an invalid owner. The owner of a file is identified by a numeric user ID (UID), which is mapped to a user name by the /etc/passwd file. When a user is deleted, the corresponding entry in the /etc/passwd file is removed, but the UID of the file is not changed. Therefore, when listing the file's details, the UID of the former owner is shown instead of the user name. For example, if the user alice with UID 1001 is deleted, and she owns a file named report.txt in the /tmp directory, the output of ls -l /tmp/report.txt will look something like this:
-rw-r--r-- 1 1001 users 1024 Nov 20 14:11 /tmp/report.txt
The user root is not set as the new owner of the file, nor is the file moved to /lost+found or removed from the file system. The /lost+found directory is used to store files that are recovered from a corrupted file system after running the fsck command, not from deleted user accounts. The file system check does not affect the ownership or permissions of the files, unless there is a serious inconsistency that needs to be fixed.Reference:
Linux Essentials - Linux Professional Institute (LPI), section 5.2.1
5.2 Lesson 1 - Linux Professional Institute Certification Programs, slide 6.