Linux+ Exam Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is true concerning systemd service units? (Choose all that apply.) A. Services can be started at system boot time. B. Services can be started in parallel. C. A service can be started based upon a timer. D. A service can be started after all other services are started. E. A service can be prevented from starting at system boot time.

A, B, C, D, E. This is a tricky question, because all of these statements are true concerning systemd service units. Therefore, options A, B, C, D, and E are correct choices.

Where does the workstation BIOS attempt to find a bootloader program? (Choose all that apply.) A. An internal hard drive B. An external hard drive C. A DVD drive D. A USB memory stick E. A network server

A, B, C, D, and E. The BIOS firmware can look in multiple locations for a bootloader program. Most commonly it looks at the internal hard drive installed on the system, but if none is found, it can search other places. Most workstations allow you to boot from an external hard drive or from a DVD drive. Modern workstations now also provide the option to boot from a USB memory stick inserted into a USB port on the workstation. Finally, many workstations provide the PXE boot option, which allows the workstation to boot remotely from a network server.

Which of the following are remote desktops? (Choose all that apply.) A. Spice B. NX C. Xrdp D. VNC E. Caja

A, B, C, D. Spice (sometimes written as SPICE), NX, Xrdp, and VNC are all remote desktops. Therefore, options A, B, C, and D are correct answers. Caja is the file manager in the MATE desktop environment and not a remote desktop.

Which of the following is true about netfilter? (Choose all that apply.) A. It is used by firewalld B. It is used by UFW. C. It provides code hooks into the Linux kernel for firewall technologies to use. D. It is used by iptables. E. It provides firewall services without the need for other applications.

A, B, C, D. Used by firewalld, UFW, and iptables, netfilter provides code hooks into the Linux kernel for firewall technologies to use in order to implement fully functional firewall capabilities. Therefore, options A, B, C, and D are all correct answers.

Which of the following is a BRE pattern that could be used with the grep command? (Choose all that apply.) A. Sp?ce B. "Space, the .*frontier" C. ^Space D. (lasting | final) E. frontier$

A, B, C, E. A BRE is a basic regular expression that describes certain patterns you can use with the grep command. An ERE isan extended regular expression and it requires the use of grep -e or the egrep command. Options A, B, C, and E are all BRE patterns that can be used with the grep command, so they arecorrect choices.

Which of the following are GUI components? (Choose all that apply.) A. Favorites bar B. File manager C. Icons D. Command line E. System tray

A, B, C, E. A favorites bar, file manager, icons, and a system tray are all part of a graphical UI. Therefore, options A, B, C, and E are correct choices.

Which of the following will allow you to change an account's /etc/shadow file record data? (Choose all that apply.) A. The passwd command B. The usermod command C. The userdel command D. The getent command E. The chage command

A, B, C, E. The passwd, usermod, userdel, and chage commandscan all manipulate (or remove) an account's /etc/shadow filerecord data in some way. Therefore, options A, B, C, and E areall correct.

Peter is trying to complete his network application, Spider, but is running into a problem with accessing a remote server's files and there are no network problems occurring at this time. He thinks it has something to do with the remote server's ACLs being too restrictive. You need to investigate this issue. Which of the following might you use for troubleshooting this problem? (Choose all that apply.) A. The firewall-cmd command B. The ufw command C. The iptables command D. The getacl command E. The setacl command

A, B, C. Since the problem involves a remote server, you need to investigate the firewall access control lists (ACLs) on both the local and remote systems. Therefore, depending upon their firewall employed, you may use the firewall-cmd, ufw, or iptables command in the troubleshooting process. Thus,options A, B, and C are the correct answers.

Which of the following are fields within a /etc/shadow file record? (Choose all that apply.) A. Password expiration date B. Account expiration date C. Password D. Comment E. Default shell

A, B, C. The password expiration date, account expiration date, and password are all legitimate fields within a /etc/shadow file record. Therefore, options A, B, and C are correct answers.

You are managing a SysV init system and need to perform someemergency maintenance at runlevel 1. To do this, you need to jump runlevels. What command could you employ? (Choose allthat apply.) A. telinit S B. telinit 1 C. init one D. init s E. init 1

A, B, D, E. Runlevel 1 is also called single user mode. You can employ either the init or telinit command to jump to that runlevel and pass them one of the three following arguments: 1, s, or S. Therefore, options A, B, D, and E are correct answers.

Which of the following is used in container orchestration?(Choose all that apply.) A. Automated configuration management B. Self-healing C. DevOps D. Agentless monitoring E. Build automation

A, B, D, E. The concepts listed in options A, B, D, and E are all used in container orchestration. While DevOps benefits from container orchestration and often employs it, it is not used within container orchestration.

Which of the following are fields within a /etc/passwd file record? (Choose all that apply.) A. User account's username B. Password C. Password change date D. Special flag E. UID

A, B, E. The user account's username, password (though it typically only contains an x), and UID are all legitimate fields within a /etc/passwd file record. Therefore, options A, B, and Eare correct answers.

Which of the following commands displays information about the account issuing the command? (Choose all that apply.) A. whoami B. who am i C. cat $HOME/.bashrc D. cat $HOME/.profile E. id

A, B, E. The whoami, who am i, and id commands will all displayinformation about the current account that is issuing thecommands. Therefore, options A, B, and E are correct answers.

What two character sets use a transformation code to store characters? (Choose two.) A. UTF-8 B. UTF-16 C. ASCII D. Unicode E. locale

A, B. The UTF-8 and UTF-16 character sets use a transformation process to reduce the Unicode character set into 1-byte (UTF-8) or 2-byte (UTF-16) values, so options A and B are correct.

Which two software packages are used in Linux to maintain log files? (Choose two.) A. rsyslogd B. journald C. ntpd D. DHCPd

A, B. The rsyslogd program is used by SysV init systems to log events, and the journald program is used by Systemd systems to log events, so options A and B are the correct answers.

A file data.txt needs to be sorted numerically and its output saved to a new file newdata.txt. Which of the following commands can accomplish this task? (Choose all that apply.) A. sort -n -o newdata.txt data.txt B. sort -n data.txt > newdata.txt C. sort -n -o data.txt newdata.txt D. sort -o newdata.txt data.txt E. sort data.txt > newdata.txt

A, B. To sort the data.txt file numerically and save its output the new file, newdata.txt, you can either use the -o switch to save the file or employ standard output redirection via the >symbol. In both cases, however, you need to use the -n switchto properly enact a numerical sort. Therefore, both options Aand B are correct.

Which of the following is true of a compositor? (Choose all that apply.) A. A compositor arranges various display elements within a window to create a screen image. B. Wayland is a compositor. C. Mutter contains a compositor. D. Kwin contains a compositor. E. Weston is a compositor.

A, C, D, E. A compositor arranges various display elements within a window to create a screen image. Therefore, option A is a correct answer. Both Mutter and Kwin, even though their primary duty is as a window manager, also contain compositors. Thus, options C and D are correct answers too. Weston is a compositor for the Wayland display server, so option E is also a correct choice.

You want to edit the file SpaceOpera.txt and decide to use the vim editor to complete this task. Which of the following are vim modes you might employ? (Choose all that apply.) A. Insert B. Change C. Command D. Ex E. Edit

A, C, D, E. The three modes of the vim editor are command (also called normal mode), insert (also called edit or entry mode), and ex (sometimes called colon commands) mode. Therefore, options A, C, D, and E are correct answers.

You are managing a systemd system and need to create an automount unit file. Which of the following directives should you review to possibly include in this file's [Automount] section? (Choose all that apply.) A. Where B. Options C. DirectoryMode D. TimeOutIdleSec E. What

A, C, D. For systemd automount unit files, the only directives that can be included in the [Automount] file section are Where, DirectoryMode, and TimeOutIdleSec. Thus, options A, C, and D are correct answers.

You want to employ SSH port forwarding and use its local mode. Which ssh command switches should you employ? (Choose all that apply.) A. -N B. -X C. -f D. -R E. -L

A, C, E. You need to indicate to the openSSH server that no terminal is required because you are only establishing a tunnel.Therefore, the -N switch is needed. The -f switch will send the openSSH tunnel into the background, freeing up your command-line interface so you can type in remote desktop commands. The local mode of the ssh command requires that you use the -L switch to specify the local system as well as thelocal and remote ports to be used. Therefore, options A, C, andE are correct.

A Unicode-encoded text file, MyUCode.txt, needs to be perused. Before you decide what utility to use in order view the file's contents, you employ the wc command on it. This utility displays 2020 6786 11328 to STDOUT. What of the following is true? (Choose all that apply.) A. The file has 2,020 lines in it. B. The file has 2,020 characters in it. C. The file has 6,786 words in it. D. The file has 11,328 characters in it. E. The file has 11,328 lines in it.

A, C. The first item output by the wc utility is the number of lines within a designated text file. Therefore, option A is correct.

If your Linux server doesn't have a graphical desktop installed, what two tools could you use to configure network settings from the command line? A. nmcli B. iwconfig C. ip D. netstat E. ping

A, C. The nmcli and the ip commands both allow you to set and change network settings from the command line, so options A and C are both correct.

Which of the following are options used in the /etc/fstab file to designate a filesystem as one that uses quotas? (Choose all that apply.) A. usrquota B. quotaon C. grpquota D. quotacheck E. aquota.user

A, C. The usrquota and grpquota are /etc/fstab settings usedto enable user and group quotas for a filesystem. Therefore,options A and C are correct answers.

Which of the following are remote desktops typically used with virtual machines? (Choose all that apply.) A. Spice B. NX C. Xrdp D. VNC E. All of the above

A, D. Spice and VNC are the remote desktops, which are typically used with virtual machines. By default, VNC is used with KVM virtual machines. However, you can replace VNC with Spice. Thus, options A and D are the correct answers.

Which of the following files contain user account creation directives used by the useradd command? (Choose all that apply.) A. The /etc/default/useradd file B. The /etc/useradd file C. The /etc/adduser.conf file D. The /etc/login.defs file E. The /etc/login.def file

A, D. The /etc/default/useradd file and /etc/login.defs file are files that contain user account creation directives used by the useradd command. Therefore, options A and D are the correct answers.

Which commands allow you to set the Linux system time to the workstation BIOS clock time? (Choose two.) A. hwclock B. date C. time D. timedatectl E. localectl

A, D. The hwclock and timedatectl commands allow you to synchronize the Linux system time to the workstation BIOS time, so options A and D are correct.

What commands allow you to set the workstation BIOS clock time to the Linux system time? (Choose two.) A. hwclock B. date C. time D. timedatectl E. localectl

A, D. The hwclock and timedatectl commands allow you to synchronize the workstation BIOS time to the Linux system time, so options A and D are correct.

Your system is running an X display server and a user's graphical user interface is not acting properly. Which of the following commands can you use first to diagnose potential problems? Choose all that apply. A. xwininfo B. Xorg -configure C. xcpyinfo D. xdpyinfo E. loginctl

A, D. The xwininfo and xdpyinfo commands provide information about the X server, including the different screen types available, the default communication parameter values, and protocol extension information as well as individual window information. These two utilities would be the best ones to start diagnosing the problem. Therefore, options A and D are correct answers.

A _______ runs in background and listens for client connection requests for a single application. A. Daemon B. Super-server C. Shell D. Graphical desktop

A. A daemon is a single application that runs in background listening for client connection requests, so option A is the correct answer.

What is the term commonly used for when the Linux system halts due to a system error? A. Kernel panic B. Kernel ring buffer C. Initrd RAM disk D. Bootloader E. Firmware

A. A kernel panic occurs when a Linux system haltsunexpectedly due to a system error, so option A is the correctterm.

What server role should you implement to increase performance on your company's website? A. A load balancer B. A web proxy C. A DHCP server D. A container

A. A load balancer sends client requests to one server within acluster of servers to balance traffic among the servers, so option A is correct.

Which of the following is a measurement of the maximum amount of data that can be transferred over a particular network segment? A. Bandwidth B. Throughput C. Saturation D. Latency E. Routing

A. Bandwidth is a measurement of the maximum data amount that can be transferred between two network points over a period of time. Therefore, option A is the correct answer.

A ___________ determines the time relative to the UTC time in a specific location. A. Time zone B. Localization C. Character set D. Locale E. Hardware clock

A. Each time zone determines the offset from UTC that applies to a specific location, so option A is correct.

You've recently become the system administrator for an older Linux server, which still uses SysV init. You determine that itsdefault runlevel is 3. What file did you find that information in? A. /etc/inittab B. /etc/rc.d C. /etc/init.d/rc D. /etc/rc.d/rc E. /etc/rc.local

A. For SysV init systems, the default runlevel is stored within the /etc/inittab file within the initdefault record. Therefore, option A is the correct answer.

Which command in GRUB2 defines the location of the /boot folder to the first partition on the first hard drive on the system? A. set root=hd(0,1) B. set root=hd(1,0) C. set root=hd(1,1) D. set root=hd(0,0) E. set root=first

A. GRUB2 identifies the hard drives starting at 0, but the partitions start at 1, so the first partition on the first hard drive would be 0,1 and option A is correct.

What drive and partition does the raw device file /dev/sdb1 reference? A. The first partition on the second SCSI storage device B. The second partition on the first SCSI storage device C. The first partition on the second PATA storage device D. The second partition on the first PATA storage device E. The second partition on the second SATA storage device

A. Option A is the correct answer because Linux uses the/dev/sdxx format for SCSI and SATA raw devices. The device is represented by a letter, starting with a, and the partition is represented by a number, starting at 1.

What folder does Red Hat-based systems use to store network configuration files? A. /etc/sysconfig/network-scripts B. /etc/network C. /etc/ifcfg-eth0 D. /etc/ifconfig E. /etc/iwconfig

A. Red Hat-based systems use separate files to store the IP address and router information. Those files are stored in the/etc/sysconfig/network-scripts folder, making option A correct.

What file does Red Hat-based systems use to define the timezone for the Linux system? A. /etc/localtime B. /etc/timezone C. /usr/share/zoneinfo D. /usr/share/timezone E. /usr/share/localtime

A. Red Hat-based systems use the /etc/localtime file to store the appropriate time zone file for the location where the system is running, so option A is correct.

Which of the following is not used by default within GNOME Shell? A. SDDM B. Files C. Mutter D. GDM E. Doc

A. SDDM (Simple Desktop Display Manager) is the default display manager for the KDE Plasma desktop environment. Therefore, option A is the correct answer.

Which of the following best describes the slow keys accessibility setting? A. A keyboard option that modifies how long a key must be pressed down to acknowledge the key B. A keyboard option that sets keyboard modifier keys, such as Ctrl and Shift, to maintain their pressed status until a subsequent key is pressed C. A keyboard option that modifies how long a key must be pressed down as well as defines a delay to acknowledge the key repeat D. A keyboard option that sets a primary key to be pressed along with a mouse click to emulate secondary mouse clicks E. A keyboard option that displays a visual keyboard on the UI that can be manipulated by a mouse or other pointing device to emulate key strokes

A. Slow keys are a keyboard option that modifies how long a key must be pressed down to acknowledge the key. Therefore, option A is the correct answer.

What package do you need to install to allow your Linux server to provide IP addresses to clients on your local network? A. DHCPd B. BIND C. ntpd D. Evolution

A. The DHCPd program provides DHCP server services on a local network, so option A is correct.

Where are the GRUB Legacy configuration files stored? A. /boot/grub B. /boot/efi C. /etc D. /var E. /proc

A. The GRUB Legacy configuration files are stored in the /boot/grub directory, so option A is correct.

Where is the Master Boot Record located? (Choose all that apply.) A. The first sector of the first hard drive on the system B. The boot partition of any hard drive on the system C. The last sector of the first hard drive on the system D. Any sector on any hard drive on the system E. The first sector of the second hard drive on the system

A. The Master Boot Record (MBR) is located in only one place, on the first sector of the first hard drive on the workstation; thus option A is the only correct answer.

You have modified an OpenSSH service's configuration file, /etc/ssh/ssh_config. The service is already running. What is the best command to use with systemctl to make this modified file take immediate effect? A. reload B. daemon-reload C. restart D. mask E. unmask

A. The best command to make the modified file take immediateeffect for the openSSH service is systemctl reload. This command will load the service configuration file of the runningdesignated service without stopping the service. Therefore, option A is the best answer.

A short text-based control file is no longer working properly with the program that reads it. You suspect the file was accidentally corrupted by a control code update you performed recently, even though the file's control codes are all correct.Which command should you use next on the file in your problem investigation? A. cat -v B. cat -z C. cat -n D. cat -s E. cat -E

A. The cat -v command will show any nonprinting characters that may have gotten embedded in the control file causing it to be corrupt, and therefore option A is the correct answer.

Which of the following commands will display the file SpaceOpera.txt to output as well as save a copy of it to the file SciFi.txt? A. cat SpaceOpera.txt | tee SciFi.txt B. cat SpaceOpera.txt > SciFi.txt C. cat SpaceOpera.txt 2> SciFi.txt D. cp SpaceOpera.txt SciFi.txt E. cat SpaceOpera.txt &> SciFi.txt

A. The command in option A will display the SpaceOpera.txtfile to output as well as save a copy of it to the SciFi.txt file.Therefore, option A is the correct answer.

You have a text file, monitor.txt, which contains information concerning the monitors used within the data center. Each record ends with the ASCII LF character and fields are delimitated by a comma (,). A text record has the monitor ID, manufacture, serial number, and location. To display each data center monitor's monitor ID, serial number, and location, usewhich cut command? A. cut -d "," -f 1,3,4 monitor.txt B. cut -z -d "," -f 1,3,4 monitor.txt C. cut -f "," -d 1,3,4 monitor.txt D. cut monitor.txt -d "," -f 1,3,4 E. cut monitor.txt -f "," -d 1,3,4

A. The cut command gathers data from the text file, listed as itslast argument, and displays it according to the options used. Todefine field delimiters as a comma and display each data center monitor's monitor ID, serial number, and location, the optionsto use are -d "," -f 1,3,4. Also, since the text file's record send with an ASCII LF character, no special options, such as the -z option, are needed to process these records. Therefore, option A is the correct choice.

Which command do you use to display the current time and date using a specific output format? A. date B. time C. timedatectl D. localectl E. hwclock

A. The date command allows you to specify a format for displaying the time and date, so option A is correct.

What network setting defines the network device that routes packets intended forhosts on remote networks? A. Default router B. Netmask C. Hostname D. IP address E. DNS server

A. The default router sends packets from the local network toremote networks, so to communicate with a remote host, you need to define the default router address, making option A correct.

Which command would you use to find the mail server for a domain? A. dig B. netstat C. ping6 D. host E. ss

A. The dig command can display individual host records for a domain, which you can use to find the MX mail host for the domain, so option A is correct.

What tool should you use to install a .deb package file? A. dpkg B. tar C. gcc D. rpm E. gzip

A. The dpkg program is used for installing and removing Debian-based packages that use the .deb file format, so option A is correct.

Which command displays the duplex settings for an Ethernet card? A. ethtool B. netstat C. iwconfig D. iwlist E. route

A. The ethtool command displays features and parameters for network cards, so option A is the correct answer.

Which ifconfig format correctly assigns an IP address and netmask to the eth0 interface? A. ifconfig eth0 up 192.168.1.50 netmask 255.255.255.0 B. ifconfig eth0 255.255.255.0 192.168.1.50 C. ifconfig up 192.168.1.50 netmask 255.255.255.0 D. ifconfig up E. ifconfig down

A. The ifconfig command must specify the network interface, the IP address, and then the netmask option before the netmask address. You can use the up or down option to place the networkcard in an active or inactive state by default, but it's not required. Option A is the only option that uses the correctvalues in the correct order.

What command displays all of the available wireless networks in your area? A. iwlist B. iwconfig C. ifconfig D. ip E. arp

A. The iwlist command displays the available wireless network access points detected by the wireless network card, so option A is correct.

You downloaded a large important file, fortytwo.db, from your company's local website to your Linux server but got interrupted by an emergency. Now you cannot remember where you stored the file. What is the best first step to fixing this problem? A. Issue the sudo updatedb command. B. Issue the locate -b fortytwo.db command. C. Issue the locate -b 'fortytwo.db' command. D. Download the file from the company's local website again. E. Issue the locate fortytwo.db command.

A. The locate utility searches the mlocate.db database, which is --typically only updated one time per day via a cron job. Therefore, for this newly created file, the first thing you shoulddo is update the mlocate.db via the updatedb command, usingsuper user privileges. Thus, option A is the correct answer.

You have just created an empty directory called MyDir. Which command most likely did you use? A. mkdir -v MyDir B. touch MyDir C. cp -R TheDir MyDir D. mv -r TheDir MyDir E. rmdir MyDir

A. The mkdir -v command creates a directory and lets youknow whether or not it was successful, so option A is the correct answer.

Which command allows you to append a partition to the virtual directory on a running Linux system? A. mount B. umount C. fsck D. dmesg E. mkinitramfs

A. The mount command allows you to specify the partition and the location in the virtual directory to append the partition files and folders. The files and folders contained in the partition then appear at that location in the virtual directory.

What popular open source web server can also perform as a load balancer? A. nginX B. Apache C. PostgreSQL D. Lighthttpd

A. The nginX web server can also perform as a load balancer and send client requests to multiple backend web servers, so option A is correct.

What command parameter would you add to the end of the GRUB2 linux command to force a Linux system to start in single-user mode? A. single B. fsck C. mkinitrd D. mkinitramfs E. dmesg

A. The single command parameter instructs the Linux system to start in single user mode after booting, so option A is correct.

User environment files typically come from where? A. /etc/skel/ B. /home/userid C. $HOME D. ~ E. /etc/

A. The skeleton directory, /etc/skel/, typically contains theuser environment files that are copied to the account's homedirectory when it is created. Therefore, option A is the correctanswer.

Which of the following describes the sound keys accessibility setting? A. Sounds are made when the Caps Lock or Num Lock key isturned on or off. B. A program that reads the GUI aloud, such as Orca. C. A cursor blink rate modification to make it easier to locate the cursor on the screen. D. Output to a refreshable braille display that is provided by the Orca screen reader. E. The screen or a screen portion is amplified to differentmagnification levels.

A. The sound keys accessibility setting provides beeps wheneverthe Caps Lock or Num Lock key is turned on or off. Therefore,option A is the correct answer.

What command do you use to display entries in the systemd-journald journal? A. journalctl B. syslogd C. klogd D. systemd-journald E. vi

A. The systemd-journald application uses its own binary file format for the journal file and requires the journalctl file to read it, so option A is correct.

What systemd command allows you to view and change the time, date, and time zone? A. timedatectl B. localectl C. date D. time E. locale

A. The timedatectl program is part of the systemd package and allows you to both view and change the current time, date, and time zone for the Linux system, so option A is correct.

What program does the workstation firmware start at boot time? A. A bootloader B. The fsck program C. The Windows OS D. The mount command E. The mkinitrd program

A. The workstation firmware looks for the bootloader program to load an operating system.

Which of the following is not a systemd target unit? A. runlevel7.target B. emergency.target C. graphical.target D. multi-user.target E. rescue.target

A. There is no runlevel7.target. The legitimate systemd targets, which provide backward SysV init compatibility, go from runlevel0.target through runlevel6.target. Therefore,option A is the correct answer.

Which of the following files and directories may be involved in setting up the environment for all system users? (Choose all that apply.) A. /etc/bash_profile/ B. /etc/profile C. /etc/profile.d/ D. /etc/bashrc E. /etc/bash.bashrc

B, C, D, E. Depending on the Linux distribution currently inuse, the files (and directory) in options B, C, D, and E may beinvolved in setting up the global environment. The directory inoption A, while similar to a user environment file name, ismade up.

Which of the following can be used as backup utilities? (Choose all that apply.) A. The gzip utility B. The zip utility C. The tar utility D. The rsync utility E. The dd utility

B, C, D, E. The zip, tar, rsync, and dd utilities all can be used to create data backups. Therefore, options B, C, D, and E are correct answers.

Which of the following is true concerning X11? (Choose all that apply.) A. XFree86 is the dominant X server. B. X.Org foundation develops an X server. C. The X server is being replaced by Wayland. D. X11 means a user can have 11 sessions. E. X is short for X Window System.

B, C, E. The X.Org foundation does develop an X server, called X11. The X server is being replaced by Wayland. X is short for X Window System, which is a display server. So options B, C, and E are correct.

The init program may be located in which of the following directories? (Choose all that apply.) A. /etc/rc.d/ B. /etc/ C. /sbin/ D. /usr/lib/systemd/ E. /bin/

B, C, E. The init program may exist in the /etc/, /sbin/, or/bin/ directory, depending upon your distribution and its version, so therefore options B, C, and E are correct.

You want to find any file named 42.tmp, which exists somewhere in your current directory's tree structure and display its contents to STDOUT. Which of the following will allow you to build a command to do this? (Choose all that apply.) A. xargs (find . -name 42.tmp) cat B. cat `find . -name 42.tmp` C. cat $(find . -name 42.tmp) D. cat {find . -name 42.tmp} E. find . -name 42.tmp | xargs cat

B, C, E. The xargs command, $() method, backticks (`), and brace expansion all allow you to build a command-line command on the fly. In this case, only options B, C, and E areusing the correct command syntax to find any file named 42.tmp, which exists somewhere in your current directory's tree structure and display its contents to STDOUT. Therefore, options B, C, and E are correct answers.

There is a large directory structure that needs to be renamed.What mv command options should you consider employing?(Choose all that apply.) A. -f B. -i C. -n D. -r E. -v

B, C, E. When renaming a directory, you only need to employ the mv command. However, it is wise to use the -i option, so if the new directory name already exists, the utility will stop and ask permission prior to proceeding. Even better is to use the -noption; that way, if the new name you select is already being used, the mv command does not allow you to overwrite it. Also, the -v option is worthwhile, so the mv command operates inverbose mode, telling you want is going on. Therefore, options B, C, and E are all correct choices.

Where are GRUB2 configuration files stored? (Choose all that apply.) A. /proc B. /etc/grub.d C. /boot/grub D. /boot/efi E. /var

B, C. The GRUB2 bootloader stores configuration files in both the /boot/grub directory and the /etc/grub.d directory, so options B and C are correct.

Which of the following commands will allow you to view the NUhura account's record data in the /etc/passwd file? (Choose all that apply.) A. getent NUhura passwd B. cat /etc/passwd C. passwd NUhura D. grep NUhura /etc/passwd E. getent passwd NUhura

B, D, E. Though not very efficient, the cat /etc/passwdcommand would allow you to view the NUhura account's recordwithin the /etc/passwd file. The grep NUhura /etc/passwd andgetent passwd NUhura commands also would allow you to seethe NUhura record. So options B, D, and E are correct choices.

For setting environment parameters within a unit configuration file, which directives should you potentially employ? Choose allthat apply. A. Type B. Environment C. EnvironmentParam D. EnvironmentFile E. PATH

B, D. Linux systems use environment variables to store information about the shell session and working environment. If you need to ensure that a particular environment variable isset properly for your service, you need to employ the Environment directive and/or the EnvironmentFile directive for setting environment parameters. Therefore, options B and D are correct answers.

Your company decides it needs an orchestration system (also called an engine). Which of the following is one you could choose? (Choose all that apply.) A. Mesos B. Kubernetes C. Splunk D. Swarm E. AWS

B, D. Only Kubernetes and Swarm are orchestration systems.Therefore, options B and D are correct answers.

Which directories contain dynamic files that display kernel and system information? (Choose two.) A. /dev B. /proc C. /etc D. /sys E. /dev/mapper

B, D. The Linux kernel uses the /proc and /sys directories to produce dynamic files that contain information about the kernel and system, so options B and D are correct.

Which of the following could be used to view the members of the NCC-1701 group? (Choose all that apply.) A. groups NCC-1701 B. getent group NCC-1701 C. getent groups NCC-1701 D. grep NCC-1701 /etc/group E. grep NCC-1701 /etc/groups

B, D. The getent group NCC-1701 and grep NCC-1701/etc/group commands would both allow you to see the variousNCC-1701 group members. Therefore, options B and D arecorrect answers.

What command-line commands allow you to send process signals to running applications? (Choose two.) A. renice B. pkill C. nice D. kill E. pgrep

B, D. The pkill and kill commands allow you to send Linux process signals to running applications, so options B and D are correct.

Which of the following are true concerning Wayland? (Choose all that apply.) A. Currently X11 is more secure than Wayland. B. Wayland uses the $WAYLAND_DISPLAY environment variable. C. Wayland's only compositor is Weston. D. XWayland supports legacy X11 programs. E. Set WaylandDisable to true to disable Wayland in GNOME Shell.

B, D. Wayland does use the $WAYLAND_DISPLAY environment variable, so option B is a correct answer.

Which Linux commands allow you to retrieve the time from the physical workstation or server? (Choose two.) A. date B. hwclock C. time D. locale E. timedatectl

B, E. Both the hwclock and timedatectl commands retrieve the time and date from the physical workstation or server, so options B and E are correct.

A system administrator has created a backup archive and transferred the file to another system across the network. Which utilities can be used to check the archive files integrity?(Choose all that apply.) A. The rsync utility B. The md5sum utility C. The sftp utility D. The scp utility E. The sha512sum utility

B, E. Both the md5sum and sha512sum utilities produce hashes on files, which can be compared to determine if file corruption occurred, such as when transferring a file over the network. Therefore, options B and E are the correct answers.

Which of the following best defines a file descriptor? A. A letter that represents the file's type B. A number that represents a process's open files C. Another term for the file's name D. A six-character name that represents standard output E. A symbol that indicates the file's classification

B. A file descriptor is a number that represents a process's openfiles. Therefore, option B is the correct answer.

You are trying to peruse a rather large text file. A coworker suggests you use a pager. Which of the following best describes what your coworker is recommending? A. Use a utility that allows you to view the first few lines of the file. B. Use a utility that allows you to view one text page at time. C. Use a utility that allows you to search through the file. D. Use a utility that allows you to filter out text in the file. E. Use a utility that allows you to view the last few lines of the file.

B. A pager utility allows you to view one text page at a time andmove through the text at your own pace. Therefore, option B is the correct answer.

How does a server know what client request is sent to which application daemon? A. IP addresses B. Ports C. Ethernet addresses D. Services

B. Linux services listen on well-known ports for requests from clients, so option B is correct.

___________ is the ability to adapt a Linux system to a specific language. A. locale B. Localization C. Character set D. Unicode E. ASCII

B. Localization is the process of adapting a Linux system's character set to use a local language, so option B is correct.

You are a system administrator on a CentOS Linux server. You need to view records in the /var/log/messages file that start with the date May 30 and end with the IPv4 address 192.168.10.42. Which of the following is the best grep command to use? A. grep "May 30?192.168.10.42" /var/log/messages B. grep "May 30.*192.168.10.42" /var/log/messages C. grep -i "May 30.*192.168.10.42" /var/log/messages D. grep -i "May 30?192.168.10.42" /var/log/messages E. grep -v "May 30.*192.168.10.42" /var/log/messages

B. Option B is the best command because this grep command employs the correct syntax. It uses the quotation marks around the pattern to avoid unexpected results and uses the .* regular expression characters to indicate that anything can be between May 30 and the IPv4 address. No additional switches arenecessary.

You are trying to decide whether to use a hard link or a symbolic link for a data file. The file is 5GB, has mission-critical data, and is accessed via the command line by three other people. What should you do? A. Create a hard link so the file can reside on a different filesystem for data protection. B. Create three hard links and provide the links to the three other people for data protection. C. Create three symbolic links and protect the links from the three other people for data protection. D. Create a symbolic link so the file can reside on a different filesystem. E. Create a symbolic link so the links can share an inode number.

B. Option B is the correct answer because the hard links will prevent the three other command-line interface users from accidently deleting the data. If they delete their link's name,they will not delete the data.

Which configuration line sets a dynamic IP address for a Debian system? A. iface eth0 inet static B. iface eth0 inet dhcp C. auto eth0 D. iface eth0 inet6 auto E. BOOTPROTO=dynamic

B. Option B is the correct format to set a dynamic IP addressfor the interface.

Which tool do newer versions of Ubuntu use to set network address information? A. netstat B. Netplan C. iwconfig D. route E. ifconfig

B. Starting with version 17.04, Ubuntu has switched to using the Netplan tool to set network address information, so option B is the correct answer.

Which environment variable allows you to retrieve the numeric user ID value for the user account running a shell script? A. $USER B. $UID C. $BASH D. $HOME E. $1

B. The $UID environment variable contains the numeric user ID value of the user account running the shell script, so option B is correct.

To copy a directory with the cp command, which option do you need to use? A. -i B. -R C. -v D. -u E. -f

B. The -R option used with the cp command allows you to copy a directory's contents. You can also employ the -r or --recursive options to achieve the same results. Therefore, option B is the correct answer.

You are using the ls command to look at a directory file's metadata but keep seeing metadata for the files within it instead. What command option will rectify this situation? A. -a B. -d C. -F D. -l E. -R

B. The -d switch on the ls command will allow you to view adirectory file's metadata instead of seeing metadata for the files managed by that directory. Therefore, option B is the correct choice.

Which diff option is the best option to allow you to quickly determine if two text files are different from one another? A. -e B. -q C. -s D. -W E. -y

B. The -q (or --brief) option used with the diff command willallow you to quickly determine if two text files are differentfrom one another. Thus, option B is the correct answer.

The lsmod utility provides the same information as what other utility or file(s)? A. The modinfo utility B. The /proc/modules file C. The /etc/modules.conf file D. The insmod utility E. The /run/modprobe.d/*.conf files

B. The /proc/modules file has the same information that is displayed by the lsmod utility (though the lsmod utility formats it much nicer). Therefore, option B is the correct answer.

Which folder contains template files for each time zone that Linux supports? A. /etc/localtime B. /usr/share/zoneinfo C. /etc/timezone D. $HOME E. /usr/share/timezone

B. The /usr/share/zoneinfo folder contains template files for each of the time zones supported in Linux, so option B is correct.

Which web server is used in the popular LAMP stack? A. nginX B. Apache C. Lighthttpd D. PostgreSQL

B. The Apache web server has gained popularity as being combined with the Linux OS, the MySQL database server, and the PHP programming server, making the LAMP stack.

The Cinnamon desktop environment uses which windows manager? A. Mutter B. Muffin C. Nemo D. Dolphin E. LightDM

B. The Cinnamon desktop environment uses the Muffin windows manager. Therefore, option B is the correct answer.

Which file contains a list of DNS servers the Linux system can use to resolve hostnames? A. /etc/dhcpd.conf B. /etc/resolv.conf C. /etc/nsswitch.conf D. /etc/network/interfaces E. /etc/sysctl.conf

B. The DNS servers are listed in the /etc/resolv.conf configuration file using the nameserver setting, so option B is correct.

What is used to automatically assign an IP address to a client? A. Default router B. DHCP C. ARP table D. Netmask E. ifconfig

B. The Dynamic Host Configuration Protocol (DHCP) is used to assign dynamic IP addresses to client workstations on anetwork, so option B is correct.

Which LC_ environment variable determines how Linux displays dollar and cents values? A. LC_NUMERIC B. LC_MONETARY C. LC_CTYPE D. LC_TIME E. LC_COLLATE

B. The LC_MONETARY environment variable determines the character set used for displaying monetary values, so option Bis correct.

Which was the first bootloader program used in Linux? A. GRUB Legacy B. LILO C. GRUB2 D. SYSLINUX E. ISOLINUX

B. The Linux Loader (LILO) bootloader program was the first bootloader used in Linux, so option B is correct.

Which part of the Linux mail process is responsible for sending emails to remote hosts? A. MUA B. MTA C. MDA D. Evolution

B. The MTA package is responsible for connecting with remote mail hosts to deliver email messages, so option B is correct.

The _________ software package allows your Windows workstations to mount a folder stored on a Linux server. A. ntpd B. Samba C. DHCPd D. Evolution

B. The Samba software package allows a Linux server to communicate with Windows servers and clients using the SMB protocol, so option B is correct.

The_____firmware method has replaced BIOS on most modern IBM-compatible computers. A. FTP B. UEFI C. PXE D. NFS E. HTTPS

B. The UEFI firmware method has replaced the BIOS in most IBM-compatible computers, so option B is correct.

Which bonding mode would you use to combine two network interfaces to create a single network interface with double the amount of bandwidth to your Linux server? A. balance-rr, mode 0 B. aggregation, mode 4 C. active/backup, mode 1 D. balance-tlb, mode 5 E. balance-arb, mode 6

B. The aggregation, or mode 4, method of bonding combines the network interfaces to create a single, larger network pipe, so option B is correct.

A customer has complained that a service on your SysV init system is not working. Which of the following commands is the best command to use to check the service? A. service start B. service status C. service --status-all D. service stop E. service reload

B. The best command to use is the service status command, passing the service name to it as an argument. This will display the service's current status and allow you to start the troubleshooting process quickly. Therefore, option B is thecorrect answer.

What command can you use to change the owner assigned to a file? A. chmod B. chown C. chage D. ulimit E. chgrp

B. The chown command allows you to set both the owner and group assigned to a file, so option B is correct.

When will the cron table entry 0 0 1 * * myscript run the specified command? A. At 1 a.m. every day B. At midnight on the first day of every month C. At midnight on the first day of every week D. At 1 p.m. every day E. At midnight every day

B. The cron table format specifies the times to run the script by minute, hour, day of month, month, and day of week. Thus the format 0 0 1 * * will run the command at 00:00 (midnight)on the first day of the month for every month.

Which Linux command changes the value of a localization environment variable? A. time B. export C. locale D. date E. hwclock

B. The export command sets the value associated with an environment variable, so option B is correct.

The_____command generates the GRUB2 configuration used for booting. A. mkinitrd B. grub-mkconfig C. grub-install D. mkinitramfs E. dmesg

B. The grub-mkconfig command processes GRUB2 directives stored in the /etc/grub.d folder to generate the GRUB2 configuration, which you can redirect to the /etc/grub2.cfgfile, so option B is correct.

The init program is started on a Linux system and has a process ID number. What typically is that process's ID number? A. 0 B. 1 C. 2 D. 10 E. Unknown

B. The init program is typically started immediately after the Linux system has traversed the boot process, and it has a process ID (PID) number of 1.

The last command, by default, pulls its data from what file? A. The /var/run/utmp file B. The /var/log/wtmp file C. The /var/log/wtmp.1 file D. The /etc/shadow file E. The /etc/passwd file

B. The last command by default pulls its data from the/var/log/wtmp file. Therefore, option B is the correct answer.

Which command lists all of the localizations installed on your Linux system? A. timedatectl B. localectl C. locale D. LANG E. LC_ALL

B. The localectl command uses the list-locales option to display all of the localizations installed on the Linux system, so option B is correct.

What type of address is used so local applications can use network protocols to communicate with each other? A. Dynamic address B. Loopback address C. Static address D. Hostname E. MAC address

B. The loopback address is a special address that is assigned tothe loopback interface and allows local applications to communicate with each other, making option B the correctanswer.

If you see the named program running in background on your Linux server, what service does it provide? A. Network time B. Hostname resolution C. Dynamic IP address allocation D. Printing

B. The named program is part of the BIND application, which provides hostname resolution services, so option B is correct.

Which of the following commands will allow you to switch temporarily from your account's default group to another group with whom you have membership? A. The usermod command B. The newgrp command C. The groups command D. The groupadd command E. The groupmod command

B. The newgrp command will let you switch temporarily fromyour account's default group to another group with whom youhave membership. Therefore, option B is the correct answer.

Which of the following can override the settings in the ~/.ssh/config file? A. The settings in the /etc/ssh/ssh_config file. B. The ssh utility's command-line options. C. You cannot override the settings in this file. D. The settings in the /etc/ssh/sshd_config file. E. The settings in the sshd daemon's configuration file.

B. The settings within the ~/.ssh/config file can be overridden by various ssh utility options provided at the command line. Therefore, option B is the correct answer.

What command would you use to find out what application was using a specific TCP port on the system? A. ip B. ss C. host D. dig E. ifconfig

B. The ss command can display both open ports and the applications that own them, so option B is correct.

Which command displays the current date, system time, hardware time, and time zone? A. date B. timedatectl C. time D. hwclock E. localectl

B. The timedatectl command from the Systemd package displays the current date, the Linux system time, the hardware clock time, and the time zone, so option B is correct.

Where does the firmware first look for a Linux boot loaderprogram? A. The /boot/grub folder B. The Master Boot Record (MBR) C. The /var/log folder D. A boot partition E. The /etc folder

B. The workstation firmware looks at the first sector of the first hard drive to load the bootloader program. This is called the Master Boot Record, so option B is correct.

You need to change the system's default target. What systemctl command should you use to accomplish this task? A. get-default B. set-default C. isolate D. is-enabled E. is-active

B. To change the system's default target, you need to employ the systemctl set-default command, passing the target name as an argument and using super user privileges. Therefore, option B is the correct answer.

A problem has occurred concerning group quotas on three filesystems. You need to quickly remove all filesystems' quota limits to temporarily resolve this issue. What is the best command to employ? A. vi /etc/fstab B. quotaoff -a C. quotacheck -cg D. quotacheck -cu E. umount

B. To quickly remove quota limits on all filesystems, you woulduse the quotaoff -a command. Therefore, option B is the correct answer.

You (username Samantha) are logged into a laptop (IP address192.168.0.42) running a Linux GNOME Classic desktop environment at your company desk in Building A. A problem has occurred on a rack-mounted Linux system (IP address192.168.0.7) in Building C. You need to securely access a GUI application on the remote system that uses X11. What command should you use? A. ssh -Y [email protected] B. ssh -X [email protected] C. ssh -Y [email protected] D. ssh -X [email protected] E. ssh -L [email protected]

B. You need to employ X11 forwarding. To properly and securely access the remote Linux system and run an X11-based application, the command in option B is the best choice. Thus, option B is the right answer.

Which of the following are stream editors? (Choose all that apply.) A. vim B. sed C. awk D. gawk E. nano

BCD. The sed, awk, and gawk utilities are all stream editors.

Which of the following is true concerning the MATE desktop environment? (Choose all that apply.) A. MATE is a GNOME Shell fork. B. MATE uses Metacity as its window manager. C. MATE's display manager is LightDM. D. MATE's file manager is Caja. E. MATE is no longer being developed.

C, D. MATE's display manager is LightDM, and its file manager is Caja. Therefore, options C and D are correct answers.

Which of the following utilities change text within a file?(Choose all that apply.) A. cut B. sort C. vim D. nano E. sed

C, D. Recall that many utilities that process text do not change the text within a file unless redirection is employed to do so. The only utilities in this list that will allow you to modify text include the text editors vim and nano. Therefore, options C and D are the correct answers.

Which two commands set the IP address, subnet mask, and default router information on an interface using the command line? A. netstat B. ping C. nmtui D. ip E. route

C, D. The nmtui command provides an interactive text menu for selecting a network interface and setting the network parameters, and the ip command provides a command-line tool for setting network parameters, so both options C and D are correct.

Your older Debian-based Linux distribution system uses SysVinit. It soon is going to be upgraded to a Debian-based distro that uses systemd. To start some analysis, you enter the runlevel command. Which of the following are results you may see? (Choose all that apply.) A. N 5 B. 3 5 C. N 2 D. 2 3 E. 1 2

C, E. Debian-based Linux distributions that use SysV init only use runlevels from 0 through 2. The runlevel command shows the previous runlevel or N for newly booted. Therefore, the only options that this runlevel command would show on an older Debian-based Linux distribution system, which uses SysV init,are options C and E.

What two environment variables control all of the localization settings? A. LC_MONETARY B. LC_NUMERIC C. LANG D. LC_CTYPE E. LC_ALL

C, E. The LANG and LC_ALL environment variables control all ofthe localization environment variable settings, so options C andE are correct.

Which of the following commands can display the data.txt and datatoo.txt files' content one after the other to STDOUT? (Choose all that apply.) A. ls data.txt datatoo.txt B. sort -n data.txt > datatoo.txt C. cat -n data.txt datatoo.txt D. ls -l data.txt datatoo.txt E. sort data.txt datatoo.txt

C, E. The commands in both options C and E will display the data.txt and datatoo.txt files' content one after the other to STDOUT. The cat -n command will also append line numbers to it, but it will still concatenate the files' content to standardoutput. Therefore, options C and E are correct.

A allows your developers to easily deploy applications between development, test, and production. A. A web proxy B. A DHCP server C. A container D. A cluster

C. A container allows developers to develop applications in acontrolled environment that can easily be deployed to otherservers, so option C is correct.

Which of the following best describes a desktop environment? A. A set of programs that allow a user to interact with the system via icons, windows, and various other visual elements B. A screen where you choose a username and enter a password to gain system access C. A series of components that work together to provide the graphical setting for the user interface D. A program that allows you to perform file maintenance activities graphically E. A set of programs that determine how the windows are presented on the desktop

C. A desktop environment is a series of components that work together to provide the graphical setting for the user interface. Therefore, option C is the correct answer.

"A networking method for controlling and managing network communications via software that consists of a controller program as well as two APIs" describes which of the following? A. Thick provisioning B. Thin provisioning C. SDN D. NAT E. VLAN

C. A software-defined network (SDN) is a networking method for controlling and managing network communications via software that consists of a controller program as well as two APIs. Thus, option C is the correct answer.

The cat -E MyFile.txt command is entered, and at the end of every line displayed is a $. What does this indicate? A. The text file has been corrupted somehow. B. The text file records end in the ASCII character NUL. C. The text file records end in the ASCII character LF. D. The text file records end in the ASCII character $. E. The text file records contain a $ at their end

C. A text file record is considered to be a single file line thatends in a newline line feed that is the ASCII character LF. You can see if your text file uses this end-of-line character via thecat -E command. Therefore, option C is the correct answer.

What server role should you implement to block your local network clients from accessing sports websites during business hours? A. A DHCP server B. A web server C. A web proxy D. A container

C. A web proxy server allows you to intercept client webrequests and block any requests based on rules you define, sooption C is correct.

You need to modify a systemd service unit configuration. Where should the modified file be located? A. /etc/system/systemd/ B. /usr/lib/system/systemd/ C. /etc/systemd/system/ D. /usr/lib/systemd/system/ E. /run/system/systemd/

C. Any modified systemd service unit configuration file should be stored in the /etc/systemd/system/ directory. This will prevent any package upgrades from overwriting it and keep the directory precedence from using the unmodified service unit copy, which may reside in the /usr/lib/systemd/system/directory. Therefore, option C is the correct answer.

What folder contains the time zone template files in Linux? A. /etc/timezone B. /etc/localtime C. /usr/share/zoneinfo D. /usr/share/timezone E. /usr/share/localtime

C. Both Debian-based and Red Hat-based Linux distributions store the time zone template files in the /usr/share/zoneinfo folder, so option C is correct.

If you do not tack on the -m option with an argument to the gitcommit command, what will happen? A. The command will throw an error message and fail. B. The commit will take place, but no tracking will occur. C. You are placed in an editor for the COMMIT_EDITMSG file. D. Your commit will fail, and the file is removed from the index. E. Nothing. This is an optional switch.

C. If the -m option with an argument is not tacked onto the gitcommit command, you are placed into the vim editor to edit the COMMIT_EDITMSG file.

You create an account using the appropriate utility, except for some reason the account's home directory was not created. Which of the following most likely caused this to occur? A. The HOME directive is set to no. B. You did not employ super user privileges. C. The CREATE_HOME directive is not set. D. The INACTIVE directive is set to -1. E. The EXPIRE date is set and it is before today

C. If the CREATE_HOME directive is not set or it is set to no, thenwhen a user account is created, no home directory will becreated by default. Most likely this caused the problem, sooption C is the correct answer.

What folder do most Linux distributions use to store boot logs? A. /etc B. /var/messages C. /var/log D. /boot E. /proc

C. Most Linux distributions store boot log files in the /var/log folder.

You are working on a Linux server at the command line, and you try to issue a diff command and receive a response stating that the command was not found. What is the next best step to take in order to start the troubleshooting process? A. Hit your up arrow key and press Enter. B. Log out, log back in, and retry the command. C. Enter the which diff command. D. Enter the where is diff command. E. Reboot the server and retry the command.

C. Option C is the correct answer because the which command will allow you to quickly see the location of the program you provide as an argument. If you see no response, you can go on to the next troubleshooting step of determining if the program is not installed.

You are looking at a directory that you have not viewed in along time and need to determine which files are actually directories. Which command is the best one to use? A. mkdir -v B. ls C. ls -F D. ls -i E. ll

C. Option C will append an indicator code of / to every directoryname, so therefore it is the best choice.

What command can you use to display new entries in a log file in real time as they occur? A. head B. tail C. tail -f D. head -f E. vi

C. The -f option of the tail command displays new additions to a file in real time, so option C is correct.

What directory contains configuration information for the X Windows System in Linux? A. /dev B. /proc C. /etc/X11 D. /sys E. /proc/interrupts

C. The /etc/X11 directory contains configuration files used by both the X.org and XFree86 applications for controlling the XWindows graphical environment on the Linux system, so option C is correct.

What file should you place console and terminal file names into to prevent users from logging into the Linux system as the root user account from those locations? A. /etc/cron.deny B. /etc/hosts.deny C. /etc/securetty D. /etc/login.warn E. /etc/motd

C. The /etc/securetty file provides a list of locations from which users can't log in using the root user account, so option C is correct.

The /etc/services file may be used by firewalls for what purpose? A. To designate what remote services to block B. To store their ACL rules C. To map a service name to a port and protocol D. To determine if the port can be accessed E. To designate what local services can send out packets

C. The /etc/services file may be used by a firewall, such as UFW, to map a particular service name to its port and protocol.Thus, option C is the correct answer.

Which character set uses 7 bits to store characters? A. UTF-8 B. UTF-16 C. ASCII D. Unicode E. UTF-32

C. The ASCII character set uses a 7-bit code to store English language characters, so option C is correct.

Which of the following is the KDE Plasma files manager? A. Nautilus B. Plasmoid C. Dolphin D. Kwin E. Nemo

C. The KDE Plasma's file manager is named Dolphin. Therefore, option C is the correct answer.

Which part of the Linux mail process allows you to create filters to automatically redirect incoming mail messages? A. MUA B. MTA C. MDA D. Evolution

C. The MDA allows you to create filters to match email messages to redirect to other folders, so option C is correct.

What format does MongoDB use to store data elements in the database? A. Relational B. YaML C. JSON D. Encrypted

C. The MongoDB database server uses the JSON format for storing data records.

Which authentication package used to be called by the name "Yellow Pages"? A. Samba B. Kerberos C. NIS D. BIND

C. The NIS package was formerly called Yellow Pages (YP), but the name had to be changed due to trademark issues, so optionC is correct.

The _________ package allows you to create a secure tunnel across a private network to access your local network remotely. A. BIND B. ntpd C. OpenSSH D. OpenSSL

C. The OpenSSH package allows you to use certificates to establish a secure connection between two devices on the network, so option C is correct.

What type of hypervisor is the Oracle VirtualBox application? A. PaaS B. SaaS C. Type II D. Type I E. Private

C. The Oracle VirtualBox hypervisor installs on top of a host operating system, making it a Type II hypervisor, so option C is correct.

What software package allows a Linux server to share folders and printers with Windows and Mac clients? A. Postfix B. Apache C. Samba D. Kerberos E. Docker

C. The Samba software package allows Linux servers and clients to communicate with Windows and Mac clients or servers using the Microsoft SMB protocol, so option C is correct.

Which character set has replaced ASCII as the default character set used in U.S. Linux installations? A. Unicode B. UTF-16 C. UTF-8 D. UTF-32 E. locale

C. The UTF-8 character set duplicates the ASCII character set and is the default used in most US Linux installations, so option C is correct.

What does placing an ampersand sign (&) after a command on the command-line do? A. Disconnects the command from the console session B. Schedules the command to run later C. Runs the command in background mode D. Redirects the output to another command E. Redirects the output to a file

C. The ampersand sign (&) tells the shell to run the specified command in background mode in the console session, so option C is correct.

What Linux program logs user file and directory access? A. chroot B. LUKS C. auditd D. klist E. kinit

C. The auditd program monitors system activity, including user file and directory access, and logs events based on rules you create. Thus, option C is correct.

Which directory on an old SysV init system stores the service startup scripts? A. /usr/lib/systemd/system/ B. /etc/rc.d/rcn.d/ C. /etc/init.d/ D. /etc/systemd/system/ E. /run/systemd/system/

C. The directory that stores the service startup scripts for an old (and a new) SysV init system is the /etc/init.d/ directory. Therefore, option C is the correct answer.

You need to edit quota grace periods. Which of the following commands should you use? A. edquota -u B. edquota -g C. edquota -t D. edquota -G E. edquota --grace

C. The edquota -t command will edit quota grace periods.Therefore, option C is the right answer.

Which Bash shell script command allows you to iterate through a series of data until the data is complete? A. if B. case C. for D. exit E. $()

C. The for command allows you to iterate through a series of data one by one until the data set is exhausted, so option C is correct.

If you see read or write errors appear in the system log, what tool should you use to correct any bad sections of the hard drive? A. mount B. unmount C. fsck D. dmesg E. mkinitrd

C. The fsck program can perform a filesystem check and repair multiple types of filesystems on partitions, so option C is correct.

What program allows you to fix corrupt hard drive partitions? A. mount B. umount C. fsck D. dmesg E. mkinitrd

C. The fsck program can perform a filesystem check and repair multiple types of filesystems on partitions.

You need to figure out what configuration file(s) hold a hostname directive. Which of the following commands is the bestone to use? A. which B. whereis C. grep D. locate E. find

C. The grep utility will allow you to search file contents quickly and effectively. Therefore, option C is the correct answer.

You must run the_____command to generate the GRUB2 grub.cfg configuration file. A. mkinitrd B. mkinitramfs C. grub-mkconfig D. grub-install E. fsck

C. The grub-mkconfig command combines the configurations defined in the /etc/default/grub file and all files in the /etc/grub.d folder into a single grub.cfg configuration file.

You have a lengthy file named, FileA.txt. What will the head-15 FileA.txt command do? A. Display all but the last 15 lines of the file. B. Display all but the first 15 lines of the file. C. Display the first 15 lines of the file. D. Display the last 15 lines of the file. E. Generate an error message

C. The head command can use either the -n 15 switch or the -15 switch to display a file's first 15 lines. Therefore, option C is the correct answer.

Which of the following commands will help you determine whether your display server is Wayland or X11? A. $WAYLAND_DISPLAY B. echo $AccessX C. loginctl D. echo $X11 E. runlevel

C. The loginctl command will help you determine your current GUI session number. You can then employ again the loginctl command along with your session number to determine if your GUI session is Wayland or X11. Thus, option C is the correctanswer.

What tool creates a logical volume from multiple physical partitions? A. mkfs B. pvcreate C. lvcreate D. fdisk E. vgcreate

C. The lvcreate program creates a logical volume from multiple partitions that you can use as a single logical device to build a file system and mount it to the virtual directory, so option C is correct.

Which of the following would be the appropriate base name for a mount unit file that mounts a file system at the /var/log/mount point? A. /var/log.mount B. /var/log.unit C. var-log.mount D. var-log.unit E. var/log.mount

C. The mount unit file names are created by having the absolute directory reference's preceding forward slash (/) removed, subsequent forward slashes are converted to dashes (-), and trailing forward slashes are removed. Mount unit filenames also have a .mount extension. Therefore, the mount unit file for the /var/log/ mount point would be var-log.mount. Thus, option C is the correct answer.

Which software program should you load on your Linux server to synchronize its time with a standard time server? A. DHCPd B. BIND C. ntpd D. Samba

C. The ntpd service uses NTP to synchronize the server time with a remote system, so option C is correct.

What tool allows you to send ICMP messages to a remote host to test network connectivity? A. netstat B. ifconfig C. ping D. iwconfig E. ss

C. The ping command sends ICMP packets to a specified remote host and waits for a response, making option C the correct answer.

A text file, StarGateAttacks.txt, needs to be specially formatted for review. Which of the following commands is the best command to accomplish this task quickly? A. printf B. wc C. pr D. paste E. nano

C. The pr command's primary purpose in life is to specially format a text file for printing, and it can accomplish the required task fairly quickly. Therefore, option C is the best choice.

Annika puts the file line PS1="My Prompt: " into her account's $HOME/.bash_profile file. This setting changes her prompt the next time she logs into the system. However, when she starts a subshell, it is not working properly. What does Annika need to do to fix this issue? A. Add the file line to the $HOME/.profile file instead. B. Nothing. A user's prompt cannot be changed in a subshell. C. Add export prior to PS1 on the same line in the file. D. Change her default shell to /bin/dash for this to work. E. Change the last field in her password record to /sbin/false.

C. The problem is directly related to a missing export command prior to the PS1="My Prompt: " in Annika's environment file.When this environment variable is exported and when it is set,it will be set in any started subshells. Thus, option C is the correct answer.

What command-line command allows you to view the applications currently running on the Linux system? A. lsof B. kill C. ps D. w E. nice

C. The ps command with the proper options displays the activeapplications running on the Linux system, so option C is correct.

What special bit should you set to prevent users from deleting shared files created by someone else? A. SUID B. GUID C. Sticky bit D. Read E. Write

C. The sticky bit assigned to a directory restricts all of the files in that directory so that only the file owner can delete the file,even if a user account is in the group that has write permissions, so option C is correct.

Which of the following commands is the best one to add JKirkas a member to a new group called the NCC-1701 group and not remove any of the account's previous group memberships? A. usermod -g NCC-1701 JKirk B. usermod -G NCC-1701 JKirk C. usermod -aG NCC-1701 JKirk D. groupadd NCC-1701 E. groupmod NCC-1701 JKirk

C. The usermod -aG NCC-1701 JKirk command would add JKirkto the NCC-1701 group as a member and not remove any of theaccount's previous group memberships. Therefore, option C isthe correct answer.

Which of the following commands will determine how many records in the file Problems.txt contain the word error? A. grep error Problems.txt | wc -b B. grep error Problems.txt | wc -w C. grep error Problems.txt | wc -l D. grep Problems.txt error | wc -w E. grep Problems.txt error | wc -l

C. To find records within the Problems.txt file that contain the word error at least one time, the grep command is employed. The correct syntax is grep error Problems.txt. To count the records, the grep command's STDOUT is piped as STDIN intothe wc utility. The correct syntax to count the records is wc -l. Therefore, option C is the correct answer.

Which open-source database provided fast performance andbecame a popular choice for web applications? A. MongoDB B. PostgreSQL C. MySQL D. NoSQL

C. When first released, the MySQL database server focused ons peed, making it a popular choice for high-volume Internet web applications, so option C is correct.

You use the command gnome-shell --replace at the command line and receive an error message from the utility. What does this indicate? A. The X11 display server is hung. You need to reboot the server. B. The --replace option should be swapped for the -R option. C. Your display server is Wayland. D. XWayland is currently being used. E. Wayland has been disabled for this session.

C. When your display server is Wayland, some commands, such as gnome-shell --replace, do not work in your GUI session. Therefore, option C is the correct answer.

By default, STDOUT goes to what item? A. /dev/ttyn, where n is a number. B. /dev/null C. > D. /dev/tty E. pwd

D. By default, STDOUT goes to your current terminal, which is represented by the /dev/tty file. Therefore, option D is thecorrect answer.

You attempt to jump to a systemd target using the systemctl isolate command, but it will not work. You decide to look at the target unit file. What might you see there that is causingthis problem? A. static B. AllowIsolate=yes C. Type=oneshot D. AllowIsolate=no E. disabled

D. If a target unit file has the AllowIsolate=no setting, the target cannot be used with the systemctl isolate command. Therefore, option D is the correct answer.

The grep utility can employ regular expressions in its PATTERN. Which of the following best describes a regular expression? A. A series of characters you define for a utility, which uses the characters to match the same characters in text files B. ASCII characters, such as LF and NUL, that a utility uses to filter text C. Wildcard characters, such as * and ?, that a utility uses to filter text D. A pattern template you define for a utility, which uses the pattern to filter text E. Quotation marks (single or double) used around characters to prevent unexpected results

D. Option D is the best answer because a regular expression is apattern template you define for a utility, such as grep, which uses the pattern to filter text.

You have two short text files that have maximum record lengths of 15 characters. You want to review these files side by side. Which of the following commands would be the best to use? A. pr -m B. pr -tl 20 C. cat D. pr -mtl 20 E. pr -ml 20

D. Option D is the correct answer because the best command touse is the pr -mtl 20 command. This will display the files side by side, remove any file headers or trailers, and set the page length to 20 lines so the files do not scroll off your screen. Of course, you may need to adjust the line length depending uponyour screen's resolution.

Which of the following commands will put any generated error messages into the black hole? A. sort SpaceOpera.txt 2> BlackHole B. sort SpaceOpera.txt &> BlackHole C. sort SpaceOpera.txt > BlackHole D. sort SpaceOpera.txt 2> /dev/null E. sort SpaceOpera.txt > /dev/null

D. The /dev/null file is also called the black hole, because anything you put into it cannot be retrieved. If you do not wish to see any error messages while issuing a command, you canredirect STDERR into it. Thus, option D is the correct answer.

The ______ directory contains the various PAM configuration files. A. The /etc/pam/ directory B. The /etc/pam_modules/ directory C. The /etc/modules/ directory D. The /etc/pam.d/ directory E. The /etc/pam_modules.d/ directory

D. The /etc/pam.d/ directory contains the various PAM configuration files.

What software package allows a Linux server to print to a network printer? A. DHCPd B. BIND C. ntpd D. CUPS

D. The CUPS application provides printer drivers and services that allow Linux systems to connect with local and remote printers, so option D is correct.

The EFI System Partition (ESP) is stored in the_____directory on Linux systems. A. /boot B. /etc C. /var D. /boot/efi E. /boot/grub

D. The ESP is stored in the /boot/efi directory on Linux systems. The UEFI firmware always looks for the /boot/efi directory for bootloader programs, so option D is correct.

What protocol should you use to mount folders from remote Linux servers on your local Linux server? A. SNMP B. NTP C. DHCP D. NFS

D. The NFS protocol is used to share folder areas on the network with clients, so option D is correct.

What option sets the wireless access point name in the iwconfig command? A. key B. netmask C. address D. essid E. channel

D. The SSID value defines the access point name and is set using the essid option in the iwconfig command, making option D the correct answer.

What type of cloud service provides the full application environment so that everyone on the Internet can run it? A. PaaS B. Private C. Public D. SaaS E. Hybrid

D. The Software as a Service (SaaS) cloud service type provides full applications, allowing anyone to connect to your application, so option D is correct.

Your systemd system is taking a long time to boot and you need to reduce the boot time. Which systemd-analyze command isthe best to start narrowing down which units need to be investigated first? A. time B. dump C. failure D. blame E. verify

D. The blame command displays the amount of time eachrunning unit took to initialize, and the units and their times arelisted starting from the slowest to the fastest. That way, you canstart investigating the units at the list's top. Therefore, option Dis the correct answer.

A blind coworker who is programming on the Linux server is suddenly having odd problems with his braille display device. You determine that you need to restart the braille service. Assuming the appropriate systemd unit file is available, whichcommand would you use? A. systemctl restart braille B. systemctl reload braille C. systemctl restart brailled D. systemctl restart brltty E. systemctl reload brltty

D. The braille display device would be using the brltty service. The proper systemctl command to restart the services is inoption D.

The cat -n File.txt command is entered at the command line.What will be the result? A. The text file File.txt will be displayed. B. The text file File.txt will be displayed along with any special hidden characters in the file. C. The text file File.txt will be displayed along with any special symbols representing end-of-line characters. D. The text file File.txt will be displayed along with line numbers. E. The text file File.txt will be displayed in reverse order.

D. The cat -n File.txt command will display the File.txt text file along with line numbers.

You've moved your present working directory to a new location in the Linux virtual directory structure and need to go back to the previous directory, where you were just located. Which command should you employ? A. cd B. exit C. cd ~ D. cd - E. return

D. The cd - command will return your process to its previous directory in the virtual directory system, so option D is the correct answer.

The______command allows us to examine the most recent boot messages? A. fsck B. init C. mount D. dmesg E. mkinitrd

D. The kernel ring buffer, which you can view by typing dmesg, contains messages from the boot messages from the kernel; thus option D is correct.

What Systemd utility allows you to change the localization on your Linux system? A. timedatectl B. time C. date D. localectl E. locale

D. The localectl command is part of the Systemd package and allows you to display and change the localization settings for your Linux system, so option D is correct.

What tool do you use to install a .rpm package file? A. dpkg B. tar C. gcc D. rpm E. gzip

D. The rpm program is used for installing and removing RedHat-based packages that use the .rpm file format, so option D is correct.

Which of the following commands will display CPU load dataalong with information concerning users who are currentlylogged into the system? A. The who command B. The id command C. The whoami command D. The w command E. The last command

D. The w command displays CPU load information for the last 1,5, and 15 minutes as well as data about users who are currentlyaccessing the system. Therefore, option D is the correct answer.

How would you fix a "mount point does not exist" problem? A. Employ the fsck utility to fix the bad disk sector. B. Employ the bad blocks utility to fix the bad disk sector. C. Use super user privileges, if needed, and create the directory via the vgchange command. D. Use super user privileges, if needed, and create the directory via the mkdir command. E. Use super user privileges, if needed, and create the directory via the mountpoint command.

D. This problem concerns a missing directory. Therefore, to fix it, use super user privileges, if needed, and create the directory via the mkdir command. Thus, option D is the correct answer.

You need to enable the DHCP service on your Red Hat-based SysV init system for runlevels 3 and 5. Which of the followingcommands should you use? A. service enable dhcp 3,5 B. chkconfig --levels 3,5 dhcp on C. chkconfig --levels 35 on dhcp D. chkconfig --levels 35 dhcp on E. service enable dhcp 35

D. To enable the DHCP service on your Red Hat-based SysV init system for runlevels 3 and 5, the correct command to use is the chkconfig --levels 35 dhcp on command. Therefore, option D is the correct answer.

Your boss has asked you to remove KSingh's account and all his home directory files from the system immediately. Which command should you use? A. usermod -r KSingh B. rm -r /home/KSingh C. userdel Ksingh D. userdel -r KSingh E. usermod -d KSingh

D. To immediately remove the KSingh account and all his homedirectory files, using super user privileges, you would use theuserdel -r KSingh command. Therefore, option D is thecorrect answer.

You want to search for a particular file, main.conf, using the find utility. This file most likely is located somewhere in the/etc/ directory tree. Which of the following commands is the best one to use in this situation? A. find -r /etc -name main.conf B. find / -name main.conf C. find /etc -maxdepth -name main.conf D. find /etc -name main.conf E. find main.conf /etc

D. When using the locate command, the path argument islisted first, which is a starting point directory. The find utilitywill search through that directory and all its subdirectories(recursively) for the file or files you seek. Also, the -name switchallows you to search for a file by name, so option D is the correct answer.

You are trying to find a file on your Linux server whose name is conf. Employing the locate conf command for your search shows many directories that contain the letters conf. What is the best description for why this is happening? A. The locate utility searches for only for directory names. B. You did not employ the -d skip switch. C. It is most likely because the locate database is corrupted. D. You did not employ the appropriate regular expression. E. It is due to file globbing on the pattern name.

E. By default, the locate command uses file globbing, whichadds wildcards to the pattern you enter. Thus, conf is turnedinto *conf*. Therefore, option E best explains the results and isthe correct answer.

On your server, you need Service-B to start immediately before Service-A. Within the systemd Service-A unit configuration file, what directive should you check and potentially modify? A. Conflicts B. Wants C. Requires D. Before E. After

E. For starting Service-B immediately before starting Service-A, the Service-A unit configuration file will need to employ the After directive, set it similar to something like: After=Service-B.unit. Therefore, option E is the correct answer.

A user, who is not the owner or a group member of a particular directory, attempts to use the ls command on the directory and gets a permission error. What does this mean? A. The directory does not have display (d) set for other permissions. B. The directory does not have execute (x) set for other permissions. C. The directory does not have write (w) set for other permissions. D. The directory does not have list (l) set for other permissions. E. The directory does not have read (r) set for other permissions.

E. In order for a user to list files in a directory, the directory needs to have read (r) set for other permissions if the user is not the directory's owner or does not belong to the directory's set group. Therefore, option E is the correct answer.

You have issued the command grep Hal on a text file you generated using information from a failed login attempts file. It returns nothing, but you just performed a test case, by purposely failing to log into the Hal account, prior to generating the text file. Which of the following is the best choice as your next step? A. Employ the tail command to peruse the text file. B. Employ the cat command to view the text file. C. Delete the text file and regenerated it using information from the failed login attempts file. D. Issue the grep -d skip Hal command on the text file. E. Issue the grep -i Hal command on the text file.

E. It is possible that the account name Hal is listed in the generated text file as hal. Therefore, your best next step is toemploy the -i option on the grep command. This will quickly search the text file for the word Hal, while ignoring case. Option E is the correct answer.

A user has logged into the tty3 terminal. Which of the followinguser environment files is executed first if found in the user'shome directory? A. The .bash_login file B. The .bashrc file C. The .profile file D. The .bash.bashrc file E. The .bash_profile file

E. The .bash_profile user environment file is run first if it isfound in the user account's home directory. Therefore, option Eis the right answer.

Your X11 session has become hung. What keystrokes do you use to restart the session? A. Ctrl+C B. Ctrl+Z C. Ctrl+Q D. Ctrl+Alt+Delete E. Ctrl+Alt+Backspace

E. The Ctrl+Alt+Backspace will kill your X11 session and then restart it, putting you at the login screen (display manager.) Therefore, option E is the correct answer.

What device setting defines a host that maps a hostname to an IP address? A. Default router B. Netmask C. Hostname D. IP address E. DNS server

E. The DNS server maps the hostname to an IP address, so you must have a DNS server defined in your network configuration to be able to use hostnames in your applications. Thus, option E is correct.

Which software package allows developers to deploy applications using the exact same environment in which they were developed? A. Postfix B. Apache C. Samba D. Kerberos E. Docker

E. The Docker package provides a method for developers to capture the entire development environment for an application and deploy it into a production environment as a container, so option E is correct.

At a virtualization conference, you overhear someone talking about using blobs on their cloud-based virtualization service. Which virtualization service are they using? A. Amazon Web Services B. KVM C. Digital Ocean D. GitHub E. Microsoft Azure

E. The Microsoft Azure cloud-based virtualization service provides blobs, which are large unstructured data storage that offered over the Internet and can be manipulated with .NET code. Therefore, option E is the correct answer.

Which environment variable can programmers use to temporarily change the time zone setting for just theirenvironment? A. LANG B. LC_MONETARY C. LC_NUMERIC D. LC_ALL E. TZ

E. The TZ environment variable overrides the default system time zone for session applications, so option E is correct.

What filename extension do UEFI bootloader files use? A. .cfg B. .uefi C. .lst D. .conf E. .efi

E. The UEFI specification doesn't require a specific extension for UEFI bootloader files. However, it has become common in Linux to use the .efi filename extension to identify them; thus option E is correct.

Which character set uses a 3-byte code and can represent characters from most languages used in the world? A. ASCII B. LC_ALL C. UTF-8 D. UTF-16 E. Unicode

E. The Unicode character set uses 3 bytes to store characters, which provides enough space to represent all of the characters in the known world languages, so option E is correct.

Which of the following protocols does Xrdp employ? A. Remote Frame Buffer protocol B. Wayland protocol C. NX technology protocol D. Simple protocol for ICEs E. Remote Desktop Protocol

E. The Xrdp remote desktop software uses the Remote Desktop Protocol (RDP). Thus, option E is the correct answer.

Which of the following communicates with the Linux operating system to transmit the UI wants and needs? A. Window manager B. Display manager C. Desktop environment D. Windows server E. Display server

E. The display server uses a communication protocol to transmit the desires of the UI to the operating system, and vice versa. Therefore, option E is the correct answer.

Yesterday a coworker, Michael, was fired for nefarious behavior. His account and home directory were immediately deleted. You need to audit the server to see if he left any files out in the virtual directory system. Which of the following commands is the best one to use in this situation? A. find / -name Michael B. find / -user Michael C. find / -mmin 1440 D. find ∼ -user Michael E. find / -nouser

E. The find / -nouser command will search through the entirevirtual directory structure looking for any files that do not have a username associated with them. Since Michael's account andhome directory were deleted, any files he owned out in thevirtual directory structure will not have a username associated with them, only a user ID (UID). Thus, option E is the best answer.

What command can you use to both display and set the IP address, netmask, and default router values? A. ifconfig B. iwconfig C. route D. ifup E. ip

E. The ip command allows you to both display and set the IP address, netmask, and default router values for a network interface, so option E is correct.

What memory area does Linux use to store boot messages? A. BIOS B. The GRUB bootloader C. The MBR D. The initrd RAM disk E. The kernel ring buffer

E. The kernel ring buffer is an area in memory reserved for storing output messages as the Linux system boots, so option E is correct.

What Linux command displays all of the localization environment variables and their values? A. date B. time C. hwclock D. LANG E. locale

E. The locale command displays all of the LC_ environment variables and their values, so option E is correct.

Which utility should be used to remove a module along with any dependent modules? A. The rmmod utility B. The modinfo utility C. The cut utility D. The depmod utility E. The modprobe utility

E. The modprobe utility along with its -r switch is the utility to employ for removing (unloading) a kernel module along with any of its dependencies. Therefore, option E is the correct answer.

You need to format the string 42.777 into the correct two-digit floating number. Which of the following printf command FORMAT settings is the correct one to use? A. "%s\n" B. "%.2s\n" C. "%d\n" D. "%.2c\n" E. "%.2f\n"

E. The printf FORMAT "%.2f\n" will produce the desired result of 42.78, and therefore option E is the correct answer.

You need to display the various quotas on all your filesystems employing quota limits. Which of the following commands should you use? A. edquota -t B. quotaon -a C. quotacheck -cu D. quotacheck -cg E. repquota -a

E. The repquota -a command will display the various quotas on all your filesystems employing quota limits. Therefore, option E is the correct answer.

A long-time server administrator has left the company, and now you are in charge of her system. Her old user account directory tree, /home/Zoe/, has been backed up. Which command is the best one to use to quickly remove her files? A. cp -R /home/Zoe/ /dev/null/ B. mv -R /home/zoe/ /dev/null/ C. rm -Rf /home/Zoe/ D. rm -ri /home/Zoe/ E. rm -rI /home/Zoe

E. The rm -rI command will recursively delete the files in the /home/Zoe directory tree, and it will ask before it starts, so youknow you are deleting the correct tree.

You have a file that is over 10GB in size, and it needs to bebacked up to a locally attached drive. What is the best utility touse in this situation? A. readlink -f B. mv C. cp D. scp E. rsync

E. The rsync utility allows you to perform fast local copies, sofor a big file it is the best utility to use in this case. Therefore, option E is the correct answer.

Which command displays which ports the processes use on Linux systems? A. iwconfig B. ip C. ping D. nmtui E. ss

E. The ss command displays a list of the open ports on a Linux system, along with the processes associated with each port, sooption E is correct.

You need to determine the default target of a systemd system. Which of the following commands should you use? A. grep initdefault /etc/inittab B. runlevel C. systemctl is-enabled D. systemd get-target E. systemctl get-default

E. The systemctl get-default command will display a systemd system's default target.

Which field contains the same data for both a /etc/passwd and /etc/shadow file record? A. Password B. Account expiration date C. UID D. GID E. User account's username

E. The user account's username is the only field within a/etc/passwd and /etc/shadow record that contains the samedata. Therefore, option E is the correct answer.

You use the useradd -D command to view account creation configuration directives. What file does this command pull its displayed information from? A. The /etc/passwd file B. The /etc/shadow file C. The /etc/group file D. The /etc/login.defs file E. The /etc/default/useradd file

E. The useradd -D command allows you to view the accountcreation configuration directives within the/etc/default/useradd file. Therefore, option E is the correctanswer.

Which tool will allow you to view disk I/O specific to swapping? A. ipcs -m B. cat /proc/meminfo C. free D. swapon -s E. vmstat

E. The vmstat utility provides a lot of memory statistics, including disk I/O specific to swapping. Therefore, option E is the correct answer.

Which of the following packages will provide you with the utilities to set up Git VCS on a system? A. git-vcs B. GitHub C. gitlab D. Bitbucket E. git

E. This git package provides utilities to set up Git VCS on a system, so option E is the correct answer.

You need to enable the DHCP service on your Debian-based SysV init system for the default runlevels. Which of thefollowing commands should you use? A. update-rc.d dhcp default B. chkconfig --default dhcp on C. update-rc.d default dhcp D. update-rc.d defaults dhcp E. update-rc.d dhcp defaults

E. To enable the DHCP service on your Debian-based SysV initsystem for default runlevels, the correct command to use is the update-rc.d dhcp defaults command. Therefore, option E is the correct answer.

You need to search through a large text file and find any record that contains either Luke or Laura at the record's beginning.Also, the phrase Father is must be located somewhere in the record's middle. Which of the following is an ERE pattern that could be used with the egrep command to find this record? A. "Luke$|Laura$.*Father is" B. "^Luke|^Laura.Father is" C. "(^Luke|^Laura).Father is" D. "(Luke$|Laura$).* Father is$" E. "(^Luke|^Laura).*Father is.*"

E. To meet the search requirements, option E is the ERE to use with the egrep command. Therefore, option E is the correctanswer.

The cut utility often needs delimiters to process text records.Which of the following best describes a delimiter?A. One or more characters that designate the beginning of a line in a record B. One or more characters that designate the end of a line in are cord C. One or more characters that designate the end of a text file to a command-line text processing utility D. A single space or a colon (:) that creates a boundary between different data items in a record E. One or more characters that create a boundary between different data items in a record

E. To properly use some of the cut command options, fieldsmust exist within each text file record. These fields are data that is separated by a delimiter, which is one or more charactersthat create a boundary between different data items within arecord. Therefore, option E best describes a delimiter and is thecorrect answer.

Your system uses systemd and has a service currently set to not start at system boot. You want to change this behavior and have it start. What systemctl command should you employ for this service? A. restart B. start C. isolate D. disable E. enable

E. To set a particular service unit to start at boot time, you need to use the systemctl enable command followed by the service unit name. Therefore, option E is the correct answer.

Which of the following does not describe the less utility? A. It does not read the entire file prior to displaying the file's first page. B. You can use the up and down arrow keys to move through the file. C. You press the spacebar to move forward a page. D. You can use the Esc+V key combination to move backward a page. E. You can press the X key to exit from the utility.

E. You need to use the q key to exit from the less pager utility; therefore, only option E does not describe less and is thecorrect answer.

What command must you run to save changes to a GRUB Legacy boot menu? A. mkinitrd B. mkinitramfs C. grub-mkconfig D. grub-install E. fsck

The grub-install command installs any configuration changes into the GRUB MBR, so option D is correct.


Conjuntos de estudio relacionados

Anatomy- Hip bones- Bone markings.

View Set

Medical Terminology Final Part 1

View Set

ch 4: taxes, retirement, and other insurance concepts

View Set