EDUSUM
A BASH comment starts with which character?
#
An administrator is creating a script to process audio files stored in the /mymedia directory. He should run foo1 to process .wav files and foo2 to process .mp3 files. Neither should run on any other files in the directory. How should the administrator complete the script? Drag the appropriate keywords to the script.
#!/bin/bash for afile in /mymedia/* in $afile case *.wav) foo1 afile *.mps) foo2 afile esac until
Which option to the git checkout command creates a new branch?
-b
Which option to the iostat command displays just CPU load information?
-c
Which option to the mkdir and rmdir commands handles parent directories?
-d
Which useradd option can you use to specify the user's login shell?
-s
Which option to the mkfs command is used to specify the filesystem type that you want the command to create?
-t
Which option to the lsusb command displays detailed information about USB devices?
-v
You are manually configuring a software repository on a system. Which of the following can contain a repository definition?
/etc/apt/sources.list
Your system has encountered an internal error and crashed. You want to boot the system with the minimal services and see what repairs need to be made. Which of the following runlevels is the logical choice in this case?
1
In the class B IP address 130.88.101.75, what is the network part of the address?
130
As a sysadmin, you need to set up a shared directory with multiple users. What special permission can be set to cause the inheritance of group ownership?
2
Which account denotes the nobody account?
99
Which of the following are built-in targets?(Choose all that apply.)
ACCEPT DROP
What kind of monitoring solution involves having some software piece installed on the system or component that is being monitored?
Agent monitoring solution
True or false: An OVA file can contain one or more OVF files.
False
What is another name for Universal Coordinated Time?
Greenwich Mean Time
To enforce the use of SSL/TLS on a web server means, which of the following protocols should be used?
HTTPS
What is the purpose of running the ldd program?
Incremental
What does 12591 refer to in the following output? lsmod | head -2 Module Size. Used by tcp_diag. 12591. 0
The size in bytes of the tcp_diag module
You are in the master branch and execute the git checkout test command. After the command completes, which branch are you in?
The test branch
True or false: The rpm command manages packages; the yum command handles repositories.
True
Which of the following is a valid character set?
Unicode
Which of the following commands is most likely to help you with name resolution problems?
dig
Which of the following git commands sends changes from the local repository test branch to the remote repository?
git push -u origin test
You want to find the mail servers for a particular domain but do not want to see all the address records. Which of the following commands can accomplish this?(Choose all that apply.)
host dig
How do you watch the systemd journal logs in real time?
journalctl -f
A systems administrator needs to append output of ls -lha /opt command to the contents of a test.txt file. Which of the following commands will accomplish this?
ls -lha /opt>>test.txt
How would you back up Rebecca's home directory using the best compression available?
tar -cJf rebecca.tar.bz2 ~rebecca
A systems administrator must clean up all application files in the directory /var/log/app. However, the company's security policy requires the files to be kept on the backup server for one year. The Linux server has only the tar and bzip2 packages installed. Which of the following commands will package and compress the files?
tar -cvf applicationfiles.tar.bz2 /var/log/app/*
You have an archive file that has unknown contents. What option to the tar command would you use to view a listing of the archived files and their permissions without expanding the archive file's contents?
tar -t
What subsystem manages entries under /dev?
udev
Which of the following directories holds crontabs that specify the user under which cron will run the job?
/etc/cron.d
A system is running a version of an operating system as a client of the host operating system. Which of the following best defines this circumstance?
Virtualization
When does disk encryption protect a hard disk?
When the system is not booted
Which of the following utilities creates rules in /etc/host.deny to prevent access to the SSH server during a hacking attack?
DenyHosts
Which of the following is a valid SELinux mode?(Choose all that apply.)
Disabled Enforcing Permissive
Which of the following provides access to the Linux micro kernel?
Kernel module
Your server system seems fine, it's backed up often, and its power is provided via UPS (uninterruptible power supply), but upon inspecting your logs and system uptime, you determine that it's rebooting at least once a day. Which of the following best describes what is happening?
Kernel panic
You find a file that is clearly compressed and is apparently intended to be used as a virtualization system; it contains a descriptor, virtualization disk files, and an ISO file of a CD/DVD. What kind of file is this?
OVA
An administrator needs to mount the shared NFS file system testhost:/testvolume to mount point /mnt/testvol and make the mount persistent after reboot. Which of the following BEST demonstrates the commands necessary to accomplish this task? mkdir testhost:/testvolume at /mnt/testvol mount -a
Option C
A networked has been crashing intermittently. A Linux administrator would like to write a shell script that will attempt to ping the server and email an alert if the server fails to respond. The script will later be scheduled via cron job. Which of the following scripts would BEST accomplish this task?
Option D
Which of the following accessibility features is used to verbally read text displayed on the screen?
Orca
You are trying to set up a job to run every night, but the script keeps aborting with errors that the command was not found. Which of the following in your crontab might help?
PATH=/usr/local/bin:/sbin:/usr/bin:/bin
What is the term for a remote system failing to respond to an inbound network packet?
Packet drop
Which of the following are valid reasons to receive the following error message?(Choose all that apply.) error: cannot get exclusive lock on /var/lib/rpm/Packages?
Performing multiple install commands simultaneously Attempting an rpm install command as non-root performing multiple remove commands simultaneously
Which of the following is used as the underlying storage device to create a volume group?
Physical volume
A user calls you in panic, saying he printed something to a printer called OfficePrinter, and it's sending out page after page of junk. You turn to the command line and check the queue: OfficePrinter is printing Rank Owner Job File(s) Total Size 1st john 3 randomjunk 8765309 bytes How do you stop the job?
Run lpq -P OfficePrinter --delete-all
The ARP table includes which of the following?(Choose all that apply.)
MAC addresses IP addresses
Which partition structure has extended partitions?
MBR
What kind of server is Postfix?
You are writing a shell script that calls another program, called /bin/foo. If the program does not return successfully, you should print an error to the screen. Which of the following can you use to test for an error condition?
if [$? -gt 0]
A Linux administrator wants to fetch a Git repository from a remote Git server. Which of the following is the BEST command to perform this task?
git clone
Which commands can you use to create a repository in the current directory?(Choose all that apply.)
git clone git init
Which command displays changes over time to the Git repo?
git log
An engineer is working on a production application deployment that requires changing a web application property file called server.property that is managed by the Git version control system. A cloned copy of the remote repository in which the server.property file exists is on the local desktop computer. The engineer makes appropriate changes to the files, saves it as server.property, and executes git commit -m "changed the property file" server.property. Which of the following commands did the engineer fail to perform?
git push server.propertys
Which of the following would you use to modify a GUID partition table?
parted
You require your system to check a particular filesystem every 50 times the filesystem is mounted. Which command would you use to make this change?
tune2fs
Which command lets you alter the default permissions in a shell?
umask
Which of the following commands can you use to unmount a filesystem?
umount
As the main system administrator and also security person responsible for your systems, you have noticed some instances of multiple individuals overwriting the /etc/sudoers file on several systems. Which of the following would help alleviate this issue if junior administrators were forced to use it?
visudo
A junior Linux administrator needs to access production servers using a secure SSH protocol. Which of the following files should contain the public key to gain remote access to the server?
~/.ssh/authorized_keys
When a user on host1 uses the SSH client to successfully connect to host2 for the first time, which file is updated with SSH-related information?
~/.ssh/known_hosts on host1
Consider the following transcript: $ ./report.pl $ echo $? 1 What can be said about what just happened?
An error occurred during the script
Which of the following terms applies to parameters that are used to customize the automation procedure?
Attribute
What kind of server is RADIUS?
Authentication server
A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal?
# hostnamectl set-hostname "192.168.1.100 production.company.com"
On a Linux system installed with the default BASH shell, you need to execute a shell script that contains variables, aliases, and functions by simply entering its name on the command line. What should be the first line of the script?
#!/bin/bash
Which column from the output of the iostat -c command provides the percentage of time that the CPU is not handling any requests?
%idle
Which of the following options need to be used to create a rule that will filter based on a destination port when using the iptables command?(Choose all that apply.)
--dport -m
To compare the staged version of a file to the committed version, which option should you use with the git diff command?
--staged
While sorting a file that has numbers at the beginning of the lines, you notice that sort seems to oddly order the lines, as follows: 1 11 12 20 What option to the sort command could you use to get a more human-friendly sorting of the file?
-n
You need to ensure that Git does not include a file in the repo. Which file can you modify to make this happen?
.gitignore
Which of the following represents an extended partition device file on an MBR-based disk?
/dev/sda7
You wish to compile a software package on your system. Which of the following must be run first in order to customize the makefile for your system?
.configure
Which directory is the beginning of the virtual filesystem?
/
To change the configuration of the GRUB boot loader, which of the following files would you edit?
/boot/grub2/grub2.cfg
Which of the following is a valid software RAID device?
/dev/raid0
Which of the following configuration files should be modified to disable Ctrl-Alt-Del in Linux?
/etc/inittab
In which file is network bonding configured?
/etc/network/interfaces
Which files contain lists of SSH host public keys?(Choose two.)
/etc/ssh/ssh_known_hosts ~/.ssh/known_hosts
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms. Which of the following files should be edited to accomplish this?
/etc/ssh/sshd_config
A user needs to run one or more root-level commands to accomplish a task, but you are wisely reluctant to give her the root user password or make her a member of any root-level groups. Which file would you edit to give this user access to run these commands?
/etc/sudoers
Which of the following is a pseudo-filesystem that contains information about the system?
/proc
An administrator needs to see the type of CPU that a server is running. Which of the following files contains this information?
/proc/cpuinfo
On a SysVinit system, what are the path and filename of the daemon that occupies Process ID (PID) 1?
/sbin/init
Consider the following program, which is run as ./script a b c d: shift echo $0 $1 What will it print?
/script b
Which of the following should be set up as separate partitions to separate OS data from application data?(Choose all that apply.)
/usr /var
In which directory structure are kernel modules typically found?
/usr/lib
In which directory are time zone files found?
/usr/share/zoneinfo
You want to work with the text streams on your system. Which of the following properly matches the text stream names and file descriptors?
0=stdin, 1=stdout, 2=stderr
Exactly what text would you specify at the GRUB prompt to cause a default installation of a Linux distribution to boot directly to runlevel 2 after system initialization?
2
Which of the following is most likely a Debian/Ubuntu package file?
packagename.deb
You execute a command that is supposed to end the execution of a process, and it is not successful. Which signal should you use with the kill command to guarantee the termination of the process?
9
Which of the following is most likely to provide a program like a file manager?
A desktop
What is the result of the following command? $ find / -iname "*.txt" | file > sort
A file named sort in the current directory
When you run the jobs command, your output shows a + symbol next to one of the jobs in the list. What does the + symbol indicate?
A process that is the most recently acted upon.
Standard Linux/Unix file and directory permissions do not support your need for multiple group owners of a filesystem object. What feature will allow you to accomplish this?
Access control lists
A company wants to pilot test using disk quotas to control disk usage. The network administrator needs to configure quota settings for the filesystem /dev/sdb1 for user01. Which four actions should the network administrator perform in sequence?To answer, move the appropriate actions from the list of possible actions to the answer area and arrange them in the correct order.
Actions in order: 1. edit the /etc/fstab file 2. unmount and remount the file system 3. run quotacheck 4. run edquota
What is the term for the maximum amount of data that can travel through network media?
Bandwidth
What type of virtual network allows a virtual machine to be a full participant on the same network as the virtualization host system?
Bridged
From vim's Command mode you type the letter i. What does this do?
Begins editing the text at the current cursor position
Which of the following is an SELinux value that is used to change the behavior of an SELinux security policy?
Boolean
Which of the following pauses a foreground job?
CTRL+Z
Which of the following would be considered kernel modules?
Code that performs Code that enables the kernel to communication with a network device Code that enables the kernel to understand the kernel to understand an ext4 filesystem
Which of the following is similar to a virtual machine?
Container
Which of the following key combinations pauses or stops a program's execution and allows you to run job control on it?
Ctrl+Z
Which server type provides network configuration information to client systems?
DHCP
While editing a file with the nano text editor, you notice that a particular function requires you to use the Meta key. Which of the following keys are also likely to be configured to represent the Meta key?(Choose all that apply.)
Esc key Windows key Alt key
An Extensible Firmware Interface (EFI) system partition uses a filesystem of what type for compatibility?
FAT
Which of the following are file servers?(Choose all that apply.)
FTP Samba NFS
Which of the following are considered unsecure services?(Choose all that apply.)
FTP Telnet
True or false: JSON is a superset of YAML.
False
True or false: The initrd method of providing a root filesystem to support early user space exists on disk as a cpio archive and uses dracut as its main build tool.
False
True or false: The jobs command can only be used on systems that run in text mode or via the ssh command. It cannot be used in graphical terminal sessions such as gnome-terminal or xterm.
False
What is mandatory access control designed to secure?
Files and directories
Which of the following is an important reason to have an accurate system time?(Choose all that apply.)
For client/server interactions For generating transaction log timestamps For generating file timestamps For generating log entry timestamps
Which of the following programs is a valid onscreen keyboard program?
GOK
Which of the following is most likely to be the boot loader on a current distribution by default?
GRUB
Which partition table allows you to have the largest number of partitions?
GUID partition table
A junior Linux administrator is optimizing a system in which an application needs to take priority 0 when running the process. The administrator runs the ps command and receives the following output: Given this scenario, which of the following steps will address this issue?
Issue the command renice -n 8481
You are looking at an old script you wrote and see this line: if [ -x /bin/ps -a -f /etc/app.conf ] In plain English, what does it say?
If /bin/ps is executable and /etc/app.conf exists
When reviewing a shell script you have found, you see this: if [[ -x /etc/zoid ]]; then. /etc/zoidelif [[ -x $HOME/.zoid ]]; then. $HOME/.zoidfi Which of the following is true?
If /etc/zoid is marked as executable, it will be executed
You perform weekly backups that effectively replicate your data set onto a disk or tape. You want to increase your backups to a daily event, and as the week progresses, each daily backup should include only the data from that day. Which of the following best describes this backup scheme?
Incremental
You want to completely back up your production system every Sunday evening, but during the week you want to back up each subsequent day's changes in a separate backup. What backup type would you use?
Incremental
Which of the following statements BEST represents what the term "agentless" means regarding orchestration?
Installation of a tool is not required on the remote system to perform orchestration tasks
Which of the following is used to force the locale for default language output even if some of the other variables are set?
LC_ALL
You're about to call a friend in Thunder Bay, but you don't know what time zone she is in. Which of the following would help you determine what time it is in Thunder Bay?
LC_TIME=America/Thunder_bay date
Which of the following is a disk encryption technology?
LUKS
Which feature could be used to share incoming web requests to multiple servers?
Load balancer
A systems administrator has finished building a new feature for the monitoring software in a separate Git branch. Which of the following is the BEST method for adding the new feature to the software's master branch?
Merge the changes from the feature branch to the master branch.
Which accessibility program allows you to move your mouse cursor by pressing keyboard keys?
Mouse keys
During the installation of a virtual machine, you remember that this host should never be contacted directly but only by traffic that goes through the host OS first. What type of networking best describes this method?
NAT
Which of the following is a network-based filesystem?
NFS
Which server type provides time and date data to a client system?
NTP server
Which server type enables you to determine a hostname by translating the hostname to an IP address?
Name server
An orchestrated instance is stored in what location?
None of these
Which of the following is a place where a real filesystem is merged onto the virtual filesystem?
None of these answers are correct
You need to execute the date command using the Hong Kong time zone. Which of the following commands will perform this task?
None of these answers are correct
Which of the following are SELinux contexts applied to?(Choose all that apply.)
Processes Files
Which of the following are common configuration management tools?(Choose all that apply.)
Puppet Chef
A company wants to implement an IEEE 802.1x port-based network access control system. What does an Administrator need to configure to support authentication?
RADIUS
A four-drive Linux NAS has been improperly configured. Each drive has a capacity of 6TB, for a total storage capacity of 24TB. To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID configuration?
RAID 10
What data does the free command display?(Choose all that apply.)
RAM Swap space
Which of the following is not a valid iptables target?
REFUSE
A package is described as being a type of cpio archive with some added meta information. Which package type best describes this sort of package?
RPM
A Linux administrator implemented a new HTTP server using the default configuration. None of the users on the network can access the server. If there is no problem on the network or with the users' workstations, which of the following steps will BEST analyze and resolve the issue?
Run netcat to ensure the port is correctly bound, and configure a static route to the web to allow access on ports 80 and 443
A Linux administrator needs to switch from text mode to GUI. Which of the following runlevels will start the GUI by default?
Runlevel 5
You wish to terminate a process but don't want to cause unnecessary data loss or other problems. Which signal would be the most appropriate?
SIGTERM
You run a whistleblower's website for those reporting fraud and abuse in a particular industry and are unable to get a central authority to issue you a certificate. Which of the following best describes your certificate authority status?
Self-signed
What does the lsdev command do?
Shows I/O ports Shows DMA channels Shows DMA channels
Which of the following takes a point-in-time copy of a logical volume and makes it available as another disk while still allowing writes to happen to the original filesystem?
Snapshot
Which of the following are valid token types?(Choose all that apply.)
Software Hardware
Consider this output: # localeLANG=en_US.UTF-8LC_TIME="es_ES.UTF-8"LC_MESSAGES="en_CA.UTF-8"LC_ALL="de_DE.UTF-8" If you were to run the date command, which locale would be used for the formatting?
Spanish
You are viewing the contents of the /etc/init.d directory or the /etc/rc.d/init.d directory on a system and see what looks like a number of service names. What boot and service management style is the system apparently using?
SysVinit
Which protocol offers reliable data package transfer?
TCP
Which one of the following is not used for peripherals to communicate with the CPU and other peripherals?
TCP/IP ports
Your organization wants to boot some systems from a remote server and mount the root of the system from those remote servers. Which protocol is used to server the initial PXE image to the local workstation?
TFTP
What type of access does the execute permission for directories provide?
The ability to change into a directory
You are installing a virtual machine that supposedly requires a great deal of storage, but you won't be implementing that storage until after the next budget cycle. What kind of provisioning should you for the disk?
Thick
Distributed version control systems represent which generation of version control systems?
Third
Which of the following describes a use of DNAT?
To redirect network packets to another host
The development team has automated their software build process so each time a change is submitted to the source code repository, a new software build is compiled. They are requesting that the Linux operations team look into automating the deployment of the software build into the test environment. Which of the following is the benefit to the development team for implementing deployment automation?
To streamline the deployment process for deploying builds into test environments
Which of the following should a password be applied to in order to better secure the boot process?(Choose all that apply.)
UEFI/BIOS The boot loader
You have grouped together a set of services and want the system to use those services as a predefined set when it's in normal operations. What would you call this set of services as on a systemd system?
Unit
A junior Linux administrator is setting up system-wide configuration settings. The goal is to ensure the PATH environment variable includes the following locations for all users who log into a Linux system. The administrator issues the following commands at the terminal: Respectively, the output of these commands is as follows: Given this output, which of the following would be the BEST action for the administrator to perform to address this issue? Choose one:
Update the /etc/profile file using a text editor, navigate to the PATH element, add the missing locations and run the ./etc/profile command to update the changes
What type of service creates a private network on top of a public network?
VPN
Which of the following filesystems do not support journaling?(Choose all that apply.)
VFAT ext2
Which of the following is the predominant closed source virtualization vendor?
VMware
You have configured logrotate to rotate your custom application's log file, but the logs do not seem to be written to the new file; they are still going to the timestamped file. What could be going on?
You need to restart your logrotate daemon
You are using vi or another text editor to write a technical article for your organization's website, and after altering a couple of lines of content, you want to save and exit the file. Which of the following keystrokes will accomplish saving and exiting the file?(Choose two.)
ZZ :wq
Which of following is the correct way to specify a section called sshd in a fail2ban configuration file?
[sshd]
Which of the following syslog severities are more severe than notice?(Choose two.)
alert warning
Having two users with the same UID is ___.
an unwise practice from a security standpoint
Which command would you use to upgrade the iceweasel package to the latest version?
apt-get install iceweasel
How does at differ from cron?
at is for ad hoc jobs that are manually created
You have configured a job to run with the batch command, but apparently system utilization never drops as low as the default value. Which of the following commands can be used to set a custom value for the batch command?
atrun
A systems administrator needs to retrieve specific fields from a csv file. Which of the following tools would accomplish this task?
awk
Consider the following cron entry and choose the correct statement. 0 10 12 * * /usr/local/bin/backup.sh
backup.sh will run at 10am on the 12th day of every month
If you want to run a job when the system load is low, what would be the best command to use?
batch
Which compression utility offers the highest level of compression?
bzip2
A lengthy configuration file contains an important parameter at the end of the file that you need to view. Which of the following commands would, by default, display at least the last 10 lines of the configuration file, with no additional keystrokes?
cat tail
You are on a very limited system and find that the installer has not included any text editors. To create a simple text configuration file named servicea.conf, which of the following commands could you use?
cat > servicea.conf
A systems administrator is configuring options on a newly installed Linux VM that will be deployed to the Pacific time zone. Which of the following sets of commands should the administrator execute to accurately configure the correct time settings?
cd /etc ln -s /usr/share/zoneinfo/US/Pacific localtime
You are currently in the directory /home/user1/subdir1 and need to navigate to the directory /home/user3. Which of the following commands will accomplish this?(Choose two.)
cd ~/user3 cd ../../home/user3
Which command enables you to change password aging for a user account?
chage
A Linux administrator installed a new network adapter and temporarily disabled the network service from starting on boot. The partial output of chkconfig is as follows: Which of the following commands BEST describes how the administrator should re-enable the network service?
chkconfig --level 345 network on
Which of the following commands set the SUID permission?
chmod u+s file
Which of the following is the equivalent to the command chmod 644 file.txt?
chmod u=rw,go=r file.txt
Your printer, named JonathansDesk, had an error printing a document, and now CUPS has stopped the printer. How do you get jobs printing again?
cupsenable JonathonsDesk
Which command builds the kernel module dependency file?
depmod
LMV device files are managed by the _____.
device mapper
A user reports that one of his fellow users is hogging all the disk space on their shared server. Which command would you use to show that system's disk statistics for its mounted filesystems?
df
You create a new file named test.sh in a Git directory but have not yet committed the changes to the local repository. Which command should you execute?
git add test.sh
A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?
echo "modprobe bluetooth" > /etc/modprobe.d/modprbe-bluetooth
When writing a BASH script, you find yourself needing to exit early because of an error condition. Which of the following commands should be used?
exit 1
Which command can be used with the following to place the top command in the foreground?(Choose two.) jobs [1]- Stopped vim [2]+ Stopped top
fg %2 fg
You know that you downloaded a file called backup.tar.gz this morning, but you can't remember where you put it. Which is the most appropriate command for finding the file?
find / -name backup.tar.gz
One of the systems you manage is acting funny, and suspect that some files might have special bits set that allow standard users to run important utilities as root. Which of the following search commands shows you all files that have any combination of special bits set?
find / -perm +7000
If you had an operation you wanted to perform on every process currently running, what would be the most appropriate loop construct?
for
Given a directory full of files, how could you rename everything to have a .bak extension?
for i in *; do mv $i.bak; done
Which of the following commands display memory usage?(Choose all that apply.)
free vmstat
A junior administrator of a physical server receives log messages indicating the out-ofmemory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file. Which of the following should the administrator use to reduce the output of memory messages?
free : swapoff / swapfile ;swapon -a
A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?
free, fack, partprobe
Your server will not complete booting because one of the filesystems is experiencing errors that prevent it from mounting. Which command will help you the most?
fsck
You are using a series of command line tools to display output that is useful, but what you would rather see as output is exactly the opposite of what is being shown. Which of the following would you use to see the reverse or inverse of the normal output?
grep -v
What is the proper URL to access the CUPS administrative interface running on the same machine as the web browser?
http://localhost:6361
You discover that the system clock has drifted and is no longer accurate. You do some research and find that the RTC is accurate. What command could you execute to set the system clock to the RTC?
hwclock --hctosys
Which of the following commands can be used to perform simple disk latency tests?
ioping
Which of the following commands would display CPU statistics every 2 seconds for a total of 4 times?
iostat -c 2 4
Which of the following commands can be used to display the IP address of a local interface?(Choose all that apply.)
ip ifconfig
To display the parameters of a wireless network interface, what command do you use?
iwconfig
Which of the following is considered a logging process?
journald
Instead of using the up and down arrow keys, you can use
k for up and j for down
If ps -ef | grep nginx | awk '{print $2}' returns a list of process IDs for nginx, what would you use to kill them all in one line?
kill $(ps -ef | grep nginx | awk
If ps -ef | grep nginx | awk '{print $2}' returns a list of process IDs for nginx, what would you use to kill them all in one line?
kill $(ps -ef | grep nginx | awk '{print$2}'"
An administrator has modified the configuration file for a service. The service is still running but is not using the new configured values. Which of the following will BEST remediate this issue?
kill -HUP
Which term describes the use of software tools to perform orchestration processes?
laC
A Linux administrator is investigating an unscheduled restart of an application server and wants to check for successful logins prior to the restart. Which of the following commands would display this information?
last
A command you compiled from source isn't executing properly. Which of the following could you use to see what libraries it depends on?
ldd
You're vacationing in Hawaii. Ignoring why you chose to bring your work computer on vacation, how will you change the time zone for everything on your system?
ln -sf /usr/share/zoneinfo/US/Hawaii /etc/timezone
What feature allows a system to display information in different ways?
locale
Which command logs a message to syslog from the command line?
logger This is a message
Which of the following commands prints a file called resume.pdf to a printer called Main?
lp -d Main resume.pdf
When you boot your Linux system, all that appears is a grub> prompt. What command would show you the available drives detected by the system?
ls
Which command displays modules that are currently loaded into memory?
lsmod
An administrator receives a warning about a file system filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the file system. Which of the following commands would BEST assists the administrator in identifying the problem?
lsof | grep largelogfile
Which command gives an overview of all the hardware and drivers in the system, including the ports used to talk to the CPU?
lspci
f your syslog.conf file contained a line such as *.notice;mail.none /var/log/foo which of the following messages would you find in /var/log/foo?(Choose two.)
mail/err cron.err
You download a single package from a repository and notice something odd about the package when you are about to install it. What tool can you use to confirm that the package you have is identical to the package from the official vendor repository?
md5sum
Which command is used to create RAID devices?
mdadm
You are trying to create a new series of nested directories: /a/b/c/d/. What is the fastest way to create this nested directory set?
mkdir -p /a/b/c/d
Which of the following is a valid command to create an ext4 filesystem?(Choose all that apply.)
mkfs mkfs.ext4
Your Linux server installs correctly, but when you try to boot it, you cannot see the specialized disk subsystem that it installed to. Which of the following commands will be helpful in fixing this situation?(Choose two.)
mkinitrd dracut
Which command do you use to display the parameters or options of a module?
modinfo
Which command loads a module and its dependencies?
modprobe
You want your systemd-based server to boot to a non-graphical interface to conserve valuable system RAM. Which of the following targets would you use as the default?
multi-user.target
You are currently in the /bbb directory and want to move the contents from the /ccc directory to the /bbb directory. What is the shortest command that will accomplish this?
mv /ccc/* .
Which of the following can be used to listen to a network connection?
nc
A Linux server has multiple IPs. A Linux administrator needs to verify if the HTTP server port is bound to the correct IP. Which of the following commands would BEST accomplish this task?
netstat
Which of the following is a valid entry for resolution methods on the hosts: line in the /etc/nsswitch.conf file?(Choose all that apply.)
nis files dns
Which of the following is a valid NetworkManager tool?(Choose all that apply.)
nmcli nmtui
Which command can be used to change both the locale and keyboard layout?
none of these are correct
Which of the following commands displays information about the system's Ethernet device?
none of these are correct
If both cron.allow and cron.deny exist, what occurs?
only allow users in cron.allow to use crontab
Which fdisk command displays the partition table of the current device?
p
Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry: joe:x:505:505::/home/joe:/bin/false Which of the following commands should the administrator execute to resolve the problem?
passwd -u joe
Which command is used to display security context on processes?
ps
Which of the following commands can show you a treelike hierarchy of processes and information about them?(Choose all that apply.)
pstree ps
A Linux administrator retrieved a repository of files from a Git server using git clone. The administrator wants to see if a configuration file was added to the repository. Which of the following Git arguments should be used to see the recent modifications?
pull
A systems administrator is enabling quotas on the /home directory of a Linux server. The administrator makes the appropriate edits to the /etc/fstab file and attempts to issue the commands to enable quotas on the desired directory. However, the administrator receives an error message stating the filesystem does not support quotas. Which of the following commands should the administrator perform to proceed?
quotaon /home
Consider the following ls -l output: -rwxr-xr-- 2 fred users 0 Jan 26 13:08 22 sample.mp3 What are the permissions for the user fred on sample.mp3?
read, write, & execute
You have started a process normally but find through process management tools that it's consuming an inordinate amount of the CPU resources. What command would you use to change this process's priority to a more acceptable priority?
renice
Which command removes a module from memory only if it has no dependencies?
rmmod
Which command displays the default gateway?
route
You are the root user on your managed systems. You need to send the file /root/file6 from host1 to host3 in the same location, but you are on host2. Which of the following commands can help you to accomplish the task?
scp
A systems administrator is unable to reach other devices on the network and the Internet. The server is configured with the IP address 192.169.1.50/24 on eth0. The server's router is 192.168.1.1. The administrator reviews the output of route -n: Which of the following commands should the administrator run to correct the issue? Choose one:
route add -net 192.168.10.0 netmask 255.255.255.0 gw 192.168.2.1 eth0
You are the system administrator of two firewalls and want to apply updates from a set of packages in the current directory, but you don't want to install any new packages on the systems. Which command will do this?
rpm -F * .rpm
You are the system administrator of two firewalls and want to apply updates from a set of packages in the current directory, but you don't want to install any new packages on the systems. Which command will do this?
rpm -F *.rpm
How could you install a package called foo-1.2.3.rpm?(Choose two.)
rpm -i foo-1.2.3.deb yum install foo-1.2.3.rpm
A Linux administrator issues the following command with root or sudo privileges: rpm -i installpackage.rpm Once the command is issued, the console outputs the following error message: failed dependency. The administrator confirmed in a previous step that all dependencies have already been installed. Which of the following commands should the administrator issue to bypass this error message?
rpm -i installpackage.rpm --nodeps
Which command and options allow you to view the list of required capabilities that an installed package needs to function properly?
rpm -qa
Which of the following commands shows the revision history for a software application from the package file on disk?
rpm -qp tree-1.7.0-16.fc29.x86_64.rpm --changelog
You are the system operator for a set of servers and want to transfer a large set of data between systems on the same LAN at regular intervals. What command will help you do this in the most efficient manner possible?
rsync
One of your printers, CentralArea, has a broken paper feeding mechanism and won't be fixed for a few days. Rather than queue jobs until it's fixed, how can you make it so that people trying to print to it get an immediate error, without needing to delete the printer?
run cupsreject -P CentralArea
Which of the following commands is used to display the state of runlevels on a SysVinit system?
runlevel
Which command displays CPU statistics like the iostat command but displays historical values, not present values.
sar
Which of the following commands can display disk utilization data?(Choose all that apply.)
sar iostat
A Linux systems administrator needs to copy the contents of a directory named "working" on the local working system to a folder /var/www/html on a server named " corporate-web". Which of the following commands will allow the administrator to copy all the contents to the web server?
scp -r working/* webuser@corporate-web:/var/www/html
You are the root user on your managed systems. You need to send the /root/file6 file from host1 to host3 in the same location, but you're on host2. Which of the following commands accomplishes the task?
scp root@host1:/root/file6 root@host3:~
You have just executed the screen command and are at a BASH prompt. After creating three new screen sessions, you want to see a list of the available sessions. Which keystroke set would you use to show the list?
screen -list
You want to replace the words "Linux Tarballs" with "Linus Torvalds" in a given text file. Which of the following commands would you most likely use to execute a search and replace on these words?
sed
Which of the following are part of multifactor authentication?(Choose all that apply.)
something the user knows something the user is something the user has
You are used to using the service command on your SysVinit system but have recently upgraded to a systemd-based system. Which of the following commands is the most direct replacement for the service command?
systemctl
Which SSH command is designed to replace the telnet command?
ssh
You need to be able to attach, via a shell session, to other hosts over a secure and encrypted connection and to log on to the remote system without entering a password every time. Which of the following is a program or utility that directly makes this possible?
ssh-agent
You need to display both locale and keyboard layout. Which option to the localectl command will display these values?
status
You are signed in to a normal user account and need to execute a root-specific command that is not in the normal user's path. Which of the following would you first use to accomplish this?
su -
A configuration management tool running every minute is enforcing the service HTTPd to be started. To perform maintenance, which of the following series of commands can be used to prevent the service from being started?
systemctl stop httpd && systemctl mask httpd
On a systemd system, which of the following is not a valid boot target?
systemd.target
Which of the following situations would prevent you from creating a hard link?
the link spans filesystems
Which two of the following are true of Amazon Machine Images?(Choose two.)
they are priced in simple fashion they are quick to boot and begin serving
Which of the following commands can be used to set the system date?(Choose all that apply.)
timedatectl date
You just used touch to create a new empty file—at least you thought you did—but you find a file that has apparently just been created but contains older data. What has happened?
touch has updated the older file's date and time
Which of the following commands display all of the routers that a packet travels through to get to the destination?(Choose all that apply.)
tracepath traceroute mtr
Which of the following is modified to reconfigure the boot environment?
update-grub
A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task?
use ssh-copy-id to copy each user's public key file to the respective system
A user, jsmith, needs access to database files located on a server. Which of the following will add jsmith to the "dba" group and preserve existing group memberships?
usermod -a -G dba jsmith useradd -g dba jsmith
You wish to retrieve an RPM package file from a remote package repository, and you have the full URL of the required file. Which command do you use?(Choose two.)
wget curl
Ann, a junior administrator, needs to copy software from her local machine to assist in developing a software application on a remote machine with the IP address 192.168.3.22. The file needs to be placed on the /tmp directory. After downloading the RPM to the local machine, which of the following commands would be BEST to use to copy the software?
wget [email protected]:/tmp -f ~/software.rpm
You execute the foobar command and get a very unexpected result. Rather than going to each directory in your path and looking for the executable, you want a command to tell you all instances of the foobar command in your path. Which command will do this?
which foobar
Which command fixes filesystem problems on an XFS filesystem?
xfs_repair
A junior systems administrator is upgrading a package that was installed on a Red Hat-based system. The administrator is tasked with the following: Update and install the new package. Verify the new package version is installed. Which of the following should be done to BEST accomplish these task?(Choose two.)
yum install <package name> rpm -qa