12-14 linux

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following files does a TCP wrapper check before starting a network daemon?Group of answer choices /etc/wrapper.allow and /etc/wrapper.deny /etc/tcp.allow and /etc/tcp.deny /etc/hosts.allow and /etc/hosts.deny /etc/daemon.allow and /etc/daemon.deny

/etc/hosts.allow and /etc/hosts.deny

What FTP command runs a shell on the local computer?Group of answer choices # ~ * !

!

Which of the following options for the gpg command will specify the key that should be retrieved?Group of answer choices --get-key --recv-keys --request --get

--recv-keys

Which of the following options for the iptables command will delete all rules for all chains?Group of answer choices -F -D -R -C

-F

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed? /23 /24 /27 /28

/27

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination?Group of answer choices /etc/inittab /etc/init.conf /etc/keys.conf /etc/cmd.conf

/etc/inittab

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login?Group of answer choices /etc/warning.txt /etc/deny.login /etc/nologin.txt /etc/banner.conf

/etc/nologin.txt

f someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login?Group of answer choices /etc/warning.txt /etc/deny.login /etc/nologin.txt /etc/banner.conf

/etc/nologin.txt

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? /etc/hosts /etc/nsswitch.conf /etc/resolv.conf /etc/named.conf

/etc/nsswitch.conf

Which of the following files contain the path and filename where DNS servers should be configured?Group of answer choices/etc/nsswitch.conf/etc/hosts/etc/named.conf/etc/resolv.conf

/etc/resolv.conf

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

/etc/services

Which of the following files contains the encrypted passwords for users on a modern Linux system by default?Group of answer choices /etc/psh /etc/shadow /etc/pwenc /etc/passwd

/etc/shadow

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?Group of answer choices /etc/sudoers /etc/sudo.conf/ etc/rc.d/sudoers.conf /etc/su.conf

/etc/sudoers

Which of the following files does the hostnamectl command modify to set the hostname on a machine? /etc/hostname /etc/host.conf /etc/hosts.conf /etc/hostname.conf

/etc/hostname

What zone configuration file contains a PTR record used to identify the loopback adapter?Group of answer choices /var/named/named.local /etc/named.conf /etc/named.loop /var/named/named.ca

/var/named/named.local

Where is the default document root directory for the Apache Web server?Group of answer choices /var/www/html /usr/local/html/usr/share/local/html/var/html

/var/www/html

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.)Group of answer choices 22 80 21 23

21 23

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server?Group of answer choices 23/tcp open telnet 993/tcp open imaps 22/tcp open ssh 443/tcp open https

23/tcp open telnet

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server?Group of answer choices 23/tcp open telnet 993/tcp open imaps22/tcp open ssh443 /tcp open https

23/tcp open telnet

Which of the following is not a valid Apparmor command?Group of answer choices aa-unconfined aa-trust aa-complain aa-enforce

aa-trust

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? Group of answer choice sbrstatip bridge brctl netbr

brctl

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?Group of answer choicesDocker Hubcloud-initKickstartOVF

cloud-init

Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.) A. substitute B. nameserver C. search D. lOOkUp E. method

B. nameserver C. search

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address? local files hosts etchosts

files

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

What command can be used to view and modify the date and time within the BIOS?Group of answer choices date hwclock clkmod clock

hwclock

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory?Group of answer choices Telnet Kerberos SyslogIncorrect. TFTP

Kerberos

Which of the following types of DNS records need to be configured to facilitate email delivery?Group of answer choices IMAP PTR CNAME MX

MX

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command?Group of answer choices RSA and RSA RSA (sign only) DSA (sign only) RSA and Elgamal

RSA and RSA

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services?Group of answer choices NTP TACACS+ RADIUS SSH

TACACS+

What is the most commonly used LAN protocol?UDP/IP IPX/SPX TCP/IP DLC

TCP/IP

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename?Group of answer choices upload filename get filename mput filename put filename

mput filename

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection?Group of answer choices finger ethstat transit ping

ping

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection?Group of answer choicesfingerethstattransitping

ping

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? ping -4 server1 ping server1 ping -c 4 server1 ping -n 4 server1

ping -c 4 server1

Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command?Group of answer choices sudoer visudo sudoers edsudo

visudo

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system?Group of answer choices vmctl vmpager vmstat vmmview

vmstat

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password?Group of answer choices su user sudoer switchuser

su

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?Group of answer choices sudoer sudo su doas

sudo

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance?Group of answer choices noop deadline cft testwr

testwr

Which of the following commands can be used to trace an IPv6 route? (Choose two.) trace6 traceroute6 tracert6 tracepath6

traceroute6 tracepath6

Which of the following is a valid APIPA address?127.0.0.1 169.254.38.10 110.11.12.13 192.168.1.17 169.254.38.101

169.254.38.101

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? 83 2 48 128

48

Which of the following ports would be used to resolve a domain name to an IP address?44 323 53 69

53

Does not install software on the nodes that it manages. Instead; communication is via SSH or another API that a device supports.

Agentless

Which of the following is a key difference between agent-based orchestration and agent less orchestration (Choose Two.)

Agentless orchestration does not require a proprietary software agents to be installed on the managed hosts. Agent-based requires that proprietary software is installed on each device you wish to monitor.

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do?Group of answer choices Configure /etc/fstab to mount the partition. Configure /etc/crypttab to mount the partition. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it.

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website?Group of answer choices public DMZ trusted internal

DMZ

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?Group of answer choices DHCP NTP DNS NIS

DNS

Which of the following SQL statements can be used to delete a table from a database?Group of answer choices DROP FROM database TABLE table_name; DROP TABLE table_name; ALTER DATABASE database DROP TABLE table_name; DELETE TABLE table_name;

DROP TABLE table_name;

Which of the following does the -r option for the gpg command specify?Group of answer choices Encrypt for the user id given. Revoke keys from the key server. Remote key server to query. Retrieve keys for given key ID.

Encrypt for the user id given.

Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used?Group of answer choices GROUP BY JOIN HAVING ORDER BY

GROUP BY

When working with Sendmail, what command can be used to test SMTP support?Group of answer choices EHLO telnet smtp HELO

HELO

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?Group of answer choices FULL OUTER JOIN INNER JOIN RIGHT JOIN LEFT JOIN

INNER JOIN

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?Group of answer choices INSERT ('George', 'Washington') INTO users (firstname, lastname); INSERT INTO users (firstname, lastname) values ('George', 'Washington'); UPDATE users SET firstname = 'George', lastname = 'Washington'; ALTER TABLE users SET firstname = 'George', lastname = 'Washington';

INSERT INTO users (firstname, lastname) values ('George', 'Washington');

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented?Group of answer choices Kerberos CUPS OTP Finger

OTP

Which of the following are examples of multifactor authentication?Group of answer choices Password and PINA USB token and a Common Access Card Thumbprint reader and facial recognition Password and fingerprint reader

Password and fingerprint reader

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of? TCP UDP ICMP IGMP

UDP

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configurationGroup of answer choices There must be at least 3 characters that are different from their previous password. Users cannot re-use their last 3 passwords. The minimum password length has to be at least 3 characters long. Users must use at least 3 characters as numbers in their passwords.

Users must use at least 3 characters as numbers in their passwords.

Which of the following can be used to graphically remotely administer a Linux machine? RDP Telnet FTP VNC

VNC

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? ADSL VPN NTP VLAN

VPN

Which type of CM software can connect to inventory members via SSH to perform configuration management activities?Group of answer choices agentless BLOB Agent-based Kickstart

agentless

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?Group of answer choices brstat ip bridge brctl netbr

brctl

Which of the following commands will change the SELinux security context of a file?Group of answer choices sechange chcon secontext scont

chcon

Which command can be used at a BASH command prompt to obtain a Web page?Group of answer choices curl apachect1 ab webpage

curl

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?Group of answer choices agent-based imperative configuration declarative configuration agentless

declarative configuration

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system?Group of answer choices dmidecode biosinfo hwls lsuefi

dmidecode

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.) domain comptia.org order hosts, bind10.1.15.60 server10 nameserver 10.1.1.4

domain comptia.org nameserver 10.1.1.4

Which of the following commands can be used to view the quota for a user?Group of answer choices quotas jsmith quotadisp jsmith edquota -u jsmith quota --view jmith

edquota -u jsmith

Which of the following commands will display detailed information for network hardware?lsnethw disp --network lshw --net ethtool

ethtool

Which of the following commands can you use to list users who have been locked out by pam_faillock.so?Group of answer choices faillock pam_faillock pam_tally2 locklist

faillock

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem?Group of answer choices blocks chkdisk fsck chkfs

fsck

Which of the following will display entries from the Name Service Switch libraries?nsslist nss getent dispdet

getent

Which of the following commands will generate a GPG public/private key pair?Group of answer choice gpg --new-key gpg-generate gpg-key --generate gpg --gen-key

gpg --gen-key

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? ifconfig server1host server1 hostnamectl set-hostname server1 set hostname="server1"

hostnamectl set-hostname server1

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this?Group of answer choices ethconfig 0 netconfig eth0 ifconfig eth0 dhcpaddr eth0

ifconfig eth0

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? netctl eth0up ifup eth0 int eth0 upinterface eth0 --status up

ifup eth0

Which of the following can you use to configure firewall rules for IPv6 on a Linux system?Group of answer choices ip6tables fw --ipv6 fw6 netfilter -6

ip6tables

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered?Group of answer choice mailqueue mail --queue mail -q mailq

mailq

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?Group of answer choices mtr tracepath tracert traceroute

mtr tracepath traceroute

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) netstat -u netstat --udp netstat -t udp netstat udp

netstat -u netstat --udp

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?Group of answer choices mail alias newaliases sendmail

newaliases

On a system running NetworkManager, which of the following commands can be used to view or modify connection information?netman nmnet ctonf nmcli

nmcli

Which of the following permissions should a standard user have on the /etc/shadow file?Group of answer choices read, write, and execute none of the above read read and write

none of the above

What PostgreSQL command-line utility backs up PostgreSQL database settings?Group of answer pg_backup pg_dumpall pg_restore pg_dump

pg_dump

Which of the following commands can be used to display socket information out to the terminal screen? opensock ss swoolsocks sstat

ss

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface?Group of answer choices tshark wshark ushark nshark

tshark

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.)Group of answer choices udevadm control -r udevadm --reload udevadm control --reload udevadm control -R

udevadm control --reload udevadm control -R


Conjuntos de estudio relacionados

Chapter 28 Head & Spine Injuries

View Set

Rolfs Master APUSH American Pageant Periods 1-5 Key Terms and Ideas Chapters 1-21, Rolfs Pageant Chapter 22, Rolfs Pageant Chapter 23, Rolfs Pageant Chapter 24, Rolfs Pageant Chapter 25, Rolfs Pageant Chapter 26, Rolfs Pageant Chapter 27, Rolfs Pagea...

View Set

Chapter 14 - Miscellaneous Commercial Lines Coverage

View Set

Life Insurance Questions I Keep Getting Wrong

View Set

All Rise for the Honorable Perry T Cook

View Set

Свідомість як фундаментальна категорія філософії та психології

View Set

Zkouška z genetiky - genealogie

View Set

Computer Maintenance - Advanced Computer Hardware

View Set