TOP-10 2daygeek Knowledge Action Part-III

Hi Linux Users,we had already released our Knowledge Action Part I & II. Now, we are going to make the Third part. If you have any suggestion/doubts pls share your comment in our comment section, Pls do not post any negative comments because we’re spending lots of time for preparing these articles. If you give your valuable suggestion/feedback’s, we will take it as an opportunity to improve our blog, based on that.


Question : 1) Which Command is used to create/add new user account in Linux ?

a) useradd [Option] [User Name]
b) adduser [Option] [User Name]
c) Both
d) Only – useradd [Option] [User Name]

Answer : Both, useradd is a system command to create new users in system & adduser is a perl script which uses useradd command in back-end to create the user account. This will differ based on linux distribution.

Question : 2) How many types of files available in Linux ?

a) 3
b) 5
c) 7
d) 8

Answer : 7 ,For more information about file types.

Question : 3) How many color of linux files is available ?

a) 3
b) 5
c) 7
d) 8

Answer : 7 ,For more information about color coding.

Question : 4) How many fields available in /etc/shadow file ?

a) 3
b) 5
c) 7
d) 8

Answer : 8 ,For more information about /etc/shadow file.

Question : 5) How many fields available in /etc/passwd file ?

a) 3
b) 5
c) 7
d) 8

Answer : 7 ,For more information about /etc/passwd file.

Question : 6) What is the root UID ?

a) 0
b) 1
c) 3
d) 5

Answer : 0 is Reserved UID for root.

Question : 7) How many UID Reserved for system users ?

a) 50 (0-49)
b) 49 (1-49)
c) 99 (1-99)
d) 100 (0-99)

Answer : 99 (1-99) is Reserved UID for system users.

Question : 8) How many UID Reserved for system accounts/groups ?

a) 50 (0-49)
b) 100 (0-99)
c) 499 (500-999)
d) 900 (100-999)

Answer : 900 (100-999) is Reserved UID for system accounts/groups.

Question : 9) How many sub fields available at password field in /etc/shadow file ?

a) 0
b) 1
c) 3
d) 5

Answer : 3

Question : 10) What kind of hashs used at password field in /etc/shadow file ?

a) hash_algorithm
b) hash_salt
c) hash_data
d) above all
e) a & b
f) b & c

Answer : above all Above three algorithm is used in password field.

About Magesh Maruthamuthu

Love to play with all Linux distribution

View all posts by Magesh Maruthamuthu

Leave a Reply

Your email address will not be published. Required fields are marked *