250+ TOP MCQs on Administrator Specific Commands & Privileges

Unix Multiple Choice Questions on “Administrator Specific Commands and Privileges”.

1. The system administrator is also known as _____
a) master user
b) superuser
c) root user
d) master and super user

Answer: d
Clarification: The system administrator has access to huge powers. This entrusted person is also known as the root user or superuser.

2. Which of the following functionalities is carried by the root user?
a) managing disk space
b) performing backup
c) changing attributes of a file
d) managing disk space, performing backup, changing attributes of a file

Answer: d
Clarification: superuser or the root user has access to vast powers like he/she is responsible for managing the disk space, performing backups, changing attributes of files, maintaining user accounts etc.

3. What is the login name of system administrator?
a) root
b) su
c) master
d) admin

Answer: a
Clarification: UNIX provides a special login name for system administrator i.e. root. This account doesn’t need to be created separately but comes with every system. The password for the root user is set at the time of installation.

4. What is the prompt for system administrator?
a) $
b) %
c) #
d) &

Answer: c
Clarification: The prompt of the root user is # whereas the prompt for normal users or non-privileged users is % or $.

5. When we log in as root user we are placed in ____
a) /bin
b) /root
c) /system
d) /admin

Answer: b
Clarification: When we log in to the system as root user we are normally placed in the root’s home directory. Depending on the system we are using this directory can be / or /root.

6. The PATH for superuser doesn’t include current directory.
a) True
b) False

Answer: a
Clarification: Since we know that the superuser has to constantly navigate through the file system, it may happen that he/she unintentionally execute the scripts or programs written by other users. That’s why the PATH for a superuser doesn’t include the current directory.

7. Which command is used for acquiring superuser status?
a) pu
b) su
c) admn
d) super

Answer: b
Clarification: Any user can acquire the status of superuser by using the su command. The only condition that needs to be fulfilled here is, he/she must be aware of the root password. For example,

$ su
Password: *****        //root’s password
#pwd
/home/abd             //prompt changes ( super user mode)

8. Which of the following is used for creating user’s environment?
a) su
b) su –
c) -su
d) su – –

Answer: b
Clarification: The administrator can create a simulated environment using su – for any user. This command creates the user’s environment without taking the login-password route. For example,

Above command will execute abd’s .profile and creates a temporary abd’s environment.

9. User’s environment mode created using su – is terminated using ____
a) ctrl-v
b) ctrl-q
c) ctrl-d
d) ctrl-f

Answer: c
Clarification: The administrator can create a simulated environment using su – for any user. This mode runs a separate sub-shell and is terminated using ctrl-d or exit.

10. Which command is used by the system administrator to set the date of the system?
a) dt
b) su
c) date
d) chdt

Answer: c
Clarification: date command is used by users for displaying the system date. Same command is used by the system administrator to change/set the system date. The argument is an eight-character string of the form MMDDhhmm. For example,

# date 08122134
Sun Aug  12 21:34:00 IST 2018

11. ____ command allows superuser to communicate with users.
a) comm
b) cron
c) date
d) wall

Answer: d
Clarification: The wall command can be used by the administrator to address all users simultaneously. For example,

# wall
Kindly everyone shut down the system before leaving the lab.
[ctrl-d]
All the users currently logged in will receive this message on their terminal.

12. ____ command is used for setting limits on file size.
a) limit
b) flimit
c) ulimit
d) flim

Answer: c
Clarification: The ulimit command is used for imposing a restriction on the maximum size of the file that a user is permitted to create on the system. For example,

# ulimit  209788        // measured in 512-byte locks

13. The access to the use of at and batch is restricted and controlled by ___ and ____
a) at.allow, batch.allow
b) at.allow, at.deny
c) at.allow , batch.deny
d) batch. deny, batch.allow

Answer: b
Clarification: The access to the use of at and batch is restricted and controlled by the files at.allow and at.deny. If at.allow is present, only those users which are listed in this file can use at and batch. If this file is not present then the system checks at.deny for users who are blocked from using these commands.

14. If both at.allow and at.deny are not present, only the system administrator can access at and batch command.
a) True
b) False

Answer: a
Clarification: The access to the use of at and batch is restricted and controlled by the files at.allow and at.deny. If at.allow is present, only those users which are listed in this file can use at and batch. If this file is not present then the system checks at.deny for users who are blocked from using these commands. If neither file is present, only the administrator can invoke at and batch.

15. ____ command is used by the superuser for changing root’s password.
a) pd
b) password
c) pswd
d) pwd

Answer: c
Clarification: The pswd command prompts for existing password when this command is used by a non-privileged user but when the same command is used by the superuser it behaves much leniently and doesn’t ask for the old password this time. For example,

# pswd
/* diagnostic messages displayed */
New-password : ******
Re-enter password: ******
Password Changed

Leave a Reply

Your email address will not be published. Required fields are marked *