LINUX F
Kate wants to compare two text files to identify what might have been changed from one version to another. Which of the following commands can she use to do this?
diff document1.txt document2.txt
The tac command _________.
displays the contents of a file in reverse order last line first and first line last.
What does the command dumpe2fs -h do?
displays the number of used and available inodes for an ext2/ext3/ext4 filesystem
Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)
domain comptia.org nameserver 10.1.1.4
Which of the following are valid permissions for a directory where the command chmod 1777 has been used to set the permissions on it?
drwxrwxrwt
Which option to the rpm command can be used to remove a package from the system?
e
Which command is used to format a partition on a hard disk drive with the ext4 filesystem? Correct!
e2mkfs -t ext4 device
What are the three standard Linux permissions?
execute, read, write
True
A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or False?
lsusb
A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?
You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?
False
How can you specify a text pattern that must be at the beginning of a line of text using a regular expression?
Precede the string with a ^.
Which of the following can be used on Linux to provide file and print services?
Samba
schedule processes to run at a single instance in the future
The at command is used to _______________.
echo $HOME echo ~
The current value for the HOME variable is displayed by which of the following commands? (Choose all that apply.)
init
The first daemon loaded on a Linux system is _____.
chroot
Which command can you use during a system rescue to switch from the root of the live OS to the root of the Linux system installed on the hard disk?
systemctl stop lala.service
Which of the following Systemd commands can be used to stop a daemon called lala?
-lt =
Which of the following can be used for comparing values within an if statement? (Choose two.)
journalctl -k
Which of the following commands can be used on a modern Linux system to view hardware information that was captured at the beginning of the boot process?
lshw
Which of the following commands can be used to display general hardware information for the entire system?
chkconfig --level 123 lala on
Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2 and 3?
lshw -class network
Which of the following commands can quickly determine whether your network hardware was detected properly following a Linux installation?
renice -12
Which of the following commands will most likely increase the chance of a process receiving more time slices?
Which command can be used at a BASH command prompt to obtain a Web page?
curl
Which of the following refers to the third primary partition on the second SAS hard disk within Linux?
sdb3
Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled?
usermod -f 15 jsmith
Linux has only one root directory per directory tree. True or False?
True
modules
What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?
jobs
Which command can be used to see processes running in the background?
/etc/inittab
Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel?
hd2,msdos2
Which of the following indicates the second MBR partition on the third hard disk drive to GRUB2?
2
Which of the following represents stderr at the command line when used for redirection?
Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?
sa19
What does the /var directory contain?
spools and log files
Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)
the createdb command. the CREATE DATABASE statement within the PostgreSQL utility.
When compiling source code into a binary program, which command performs a system check and creates the Makefile?
./configure
chroot
Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.
Which of the following must you perform to share a directory using NFS? (Choose all that apply.)
Start or restart the NFS daemons. Edit the /etc/exports file. Run the exportfs -a command.
What is the most commonly used LAN protocol?
TCP/IP
If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?
Tab
What will the command sar -W 3 50 do?
Take 50 swap statistics every 3 seconds.
True
The sed and awk commands are filter commands commonly used to format data within a pipe. True or False?
Which of the following are characteristics of Open Source Software? (Choose all that apply.)
The software is developed collaboratively. Any bugs are fixed quickly.
/proc/meminfo
To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?
A directory is a type of file. True or False?
True
The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?
True
After typing the ls -F command, you see the following line in the output:-rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1What does this mean?
User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.
It redirects both stderr and stdout to the same location.
What does &> accomplish when entered on the command line after a command?
ioports
What file in the /proc directory contains a list of memory address ranges reserved for device use?
daemon process
What is the name given to a process not associated with a terminal?
alias showauth='tail -f /var/log/auth.log'
Which command can be used to create a new command that will monitor the contents of auth.log as they get added to the file?
init 1
Which command causes the system to enter Single User Mode?
set
Which command could you use to see a list of all environment and user-defined shell variables as well as their current values?
ps
Which command entered without arguments is used to display a list of processes running in the current shell?
read
Which construct can be used in a shell script to read stdin and place it in a variable?
RAID 0
Which of the following RAID levels is not fault tolerant?
seq 10 -1 1
Which of the following commands will count down from 10 to 1?
wc -l data.csv
Which of the following commands will count the number of lines in a file named data.csv?
Which command blanks the terminal screen, erasing previously displayed outpu
clear
Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?
cloud-init
Which command can be used to create an image backup of a partition?
dd
Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)
ifconfig nmcli iwconfig ping
What equivalent to the man command generally provides an easier-to-read description of the queried command and contains links to other related information?
info
What command can you use to view journald log entries on a system that uses Systemd?
journalctl
Which of the following commands can you use to view events within the journald database?
journalctl
Which of the following will invalid entries in the GRUB2 configuration cause?
kernel panic and halt the system
Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?
ldconfig
On which part of the maintenance cycle do Linux administrators spend the most time?
monitoring
When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?
mtr traceroute tracepath
Jim wants to rename a directory for a project that he has been working on. Which of the following commands can he use to perform that action?
mv projectx projecty
Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)
netstat --udp
Which command can be used to temporarily alter the primary group associated with a given user?
newgrp
Which of the following commands can be used to scan the available ports on computers within your organization?
nmap
On a system running NetworkManager, which of the following commands can be used to view or modify connection information?
nmcli
To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)
nslookup hostname dig hostname host hostname
Which command can you use to synchronize ntpd with an NTP time source?
ntpq
Many types of software are available today. Which type of software does Linux represent?
open source software
Which of the following are factors that determine which Linux distribution a user will use? (Choose all that apply.)
package manager support kernel features hardware platform
Which command would you use to unlock a user account?
passwd -u username
What PostgreSQL command-line utility backs up PostgreSQL database settings?
pg_dump
The process of sending print jobs from the print queue to the printer is called _____.
printing
Which command would a user type on the command line to find out the current directory in the directory tree?
pwd
Which of the following commands can be used to list the files contained within an installed RPM package?
rpm -ql packagename
The default permissions given by the system prior to analyzing the umask are ___________for directories and __________ for files.
rwxrwxrwx and rw-rw-rw-
After you log in to a terminal, you receive a user interface called a _________.
shell
Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?
testparm
Which of the following is the first field of the /etc/passwd file?
username
The Linux kernel exists as a file named:
vmlinuz
Which file contains information regarding the users, computers, and commands used by the sudo command?
/etc/sudoers
Under the root directory in Linux, which directory contains system commands and utilities?
/usr
You have created a full backup and four incremental backups. In which order must you restore these backups?
0, 1, 2, 3, 4
Which of the following port numbers is associated with SSH?
22
If the physical extent of a volume group is set to 32MB, what is the maximum logical volume size?
2TB
Which of the following kernels are developmental kernels? (Choose all that apply.)
4.1-rc5 2.3.4
When issuing the ls -F command, what special character indicates a linked file?
@
The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?
False
There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file, and the other that it is on a directory. True or False?
False
UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?
False
When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?
False
What type of iptables chain targets traffic that is destined for the local computer?
INPUT
Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?
INSERT INTO users (firstname, lastname) values ('George', 'Washington');
segmentation fault
If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
Which of the following Linux distributions is likely to be used by a CyberSecurity worker?
Kali
Which two people are accredited with creating the UNIX operating system? (Choose two answers.)
Ken Thompson Dennis Ritchie
modinfo bluetooth
Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information?
To which license does Linux adhere?
GNU General Public License
What does the mv command do? (Choose all that apply.)
It moves a file. It moves a directory.
What must a user do to run cp or mv interactively and be asked whether to overwrite an existing file?
Just type cp or mv as they run in interactive mode by default.
Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory?
Kerberos
Which of the following environment variables can you change the value of to set the default printer on a Linux system? (Choose two.)
LPDEST PRINTER
A user runs the fsck command with the -f option on an ext4 filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair?
Mount the filesystem and check the lost+found directory underneath the mount point.
Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?
Restart the DHCP daemon.
Who formed the Free Software Foundation to promote open development?
Richard Stallman
If a hard link is created to a file and then the original file is deleted, which of the following is true?
The original file will be removed while the hard link remains usable to access the contents of the file.
If you boot your computer from Linux live media, you will be able to use a fully-functional Linux system prior to installing Linux on permanent storage. True or False?
True
SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?
True
graphical.target
What Systemd target corresponds to runlevel 5?
depmod
Which command should you run after installing a new kernel module to update the module dependency database?
nl /etc/passwd
Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file?
If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command. If /etc/cron.allow exists, only users listed in it can use the cron command. If /etc/at.allow exists, only users listed in it can use the at command.
Which of the following statements is true? (Choose all that apply.)
$2
Which of the following variables could access the value "/etc" within the sample shell script, if the sample shell script was executed using the bash sample /var /etc /bin command?
nodememstats
Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?
cd /home/user1 && echo "welcome home"
Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed?
grep root /etc/passwd | tee ~/root.txt
Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file?
init/systemd
Which process has a PID of 1 and a PPID of 0?
0
Which runlevel halts the system?
Which of the following commands can be used to remove the test DPM package, including any test configuration files?
apt purge test
In order to move from the /home/joe/test/data to the /home/joe directory, what command should be issued?
cd ../..
The vi editor can function in which two of the following modes? (Choose both that apply.)
command insert
Which of the following commands extracts an archive?
cpio -vicdu -I /dev/fd0
Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer?
lpoptions -d printer1
Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)
mtr
Which command searches for and displays any text contents of a binary file?
strings
After typing the command umask 731, the permissions on all subsequently created files and directories will be effected. In this case, what will be the permissions on all new files?
---r--rw-
The command chmod 317 file1 would produce which of the following lines in the ls command?
--wx--xrwx 1 user1 root 0 Apr 29 15:40 file1
Which option to the dpkg command can be used to list the files that comprise a package?
-L
Which option can be added to the ls or ps command to view the SELinux label?
-Z
When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file?
-v
Which of the following file extensions are used by the Debian Package Manager?
.deb
Files that have been compressed using the xz utility typically have the ______ extension.
.xz
Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command?/dev/sda1 / ext4 defaults 1 1none /dev/pts devpts gid=5,mode=620 1 0none /proc proc defaults 0 1none /dev/shm tmpfs defaults 1 0/dev/sdc2 swap swap defaults 0 1/dev/dvd /media/dvd iso9660 noauto,ro 0 0
/, /proc, and swap
Which of the following would be the device file for the third partition on the second SATA drive on a Linux system?
/dev/sdb3
You plug a USB flash memory drive into a system that has two SATA hard disks. How will the partition on this USB flash memory drive be identified by Linux?
/dev/sdc1
Which of the following is the full path and file name where the Debian Package Manager repositories can be configured?
/etc/apt/sources.list
In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
/etc/cron.monthly
Which of the following files does the hostnamectl command modify to set the hostname on a machine?
/etc/hostname
What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)
/etc/hosts DNS
Which of the following files contains the list of shared libraries?
/etc/ld.so.cache
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?
/etc/resolv.conf
In which of the following directories can you place files that will be copied to new user directories when new users are created?
/etc/skel
Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?
/etc/sudoers
Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?
/etc/sysconfig/network-scripts/ifcfg-enp8s0
Which of the following is an absolute pathname? (Choose all that apply.)
/home/resume
The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?
/root
What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?
/srv/ftp
Where are the files stored that contain information for all of the time zones that could be recognized by a Linux operating system?
/usr/share/zoneinfo
What directory under / contains the log files and spools for a Linux system?
/var
Most log files on the system are found in which directory?
/var/log
What zone configuration file contains a PTR record used to identify the loopback adapter?
/var/named/named.local
Which dump level indicates a full backup?
0
The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of?
48
At the vi command mode prompt, what key combination will force a quit from the vi editor without saving changes?
:q!
What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?
;
Which of the following steps is not a common troubleshooting procedure?
Delegate responsibility.
The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?
False
The bzip2 and gzip utilities use similar compression algorithms. True or False?
False
To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command. True or False?
False
Which common GUI environments are available in most Linux distributions? (Choose all that apply.)
GNOME KDE
When working with Sendmail, what command can be used to test SMTP support?
HELO
Which of the following statements are true? (Choose all that apply.)
Hard limits can never be exceeded. Soft limits allow a user to exceed them for a certain period of time. Quotas can limit both user space and the number of files a user can own.
You can use the Ctrl+z key combination and the bg command.
How can you bypass the wait function and send a user process to the background?
Begin the line with #.
How do you indicate a comment line in a shell script?
Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?
INNER JOIN
journald
In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?
libvert
In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?
/boot
In what directory is Stage2 of the GRUB2 boot loader stored?
After typing the ls -a command, you notice a file whose filename begins with a dot ( . ). What does this mean?
It is a hidden file.
After typing the ls -F command, you notice a filename that ends with an * (asterisk) character. What does this mean?
It is an executable file.
Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)
LUKS GPG
Linux was developed by __________ to resemble the _________ operating system.
Linus Torvalds, MINIX
When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a:
Linux distribution
GNU General Public License
Linux is secure and has a lower total cost of ownership than other operating systems. Linux software is unlikely to become abandoned by its developers. Linux is widely available for many platforms and supports many programming languages.
1u
Linux servers are typically installed in a rack using rackmount server hardware. Which of the following describes the minimum height of a rackmount server?
What are best practices for securing a local Linux server? (Choose all that apply.)
Lock the server in a server closet. Use encryption for files and network traffic. Ensure that SELinux or AppArmor is used to protect key services.
First: /etc/profile Second: /etc/profile.d/* Third: /etc/bashrc Fourth: ~/.bashrc
Match the file with the order in which the BASH shell environment files are read:
20 and 19
Nice values are used to affect process priorities using a range between _____________
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
Options
How can a user switch from insert mode to command mode when using the vi editor?
Press the Esc key.
Which Windows program is often used to connect to a Linux server via SSH?
Putty
The root user utilizes the chgrp command to give ownership of a file to another user. What must the root user do to regain ownership of the file?
Run chgrp again listing the root user as the new owner.
You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?
Run the newaliases command.
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory?
SIGQUIT
After logging into a terminal, a user will receive an interface known as which option?
Shell
Which of the following is not an example of virtualization software that can be used to install Linux within another operating system?
Spiceworks
all instances of a process with the same name matched by a regular expression
The pkill command terminates ________
True
To kill a process running in the background, you must place a % character before its process ID. True or False?
/test
To which directory will the test ZFS volume from the previous question be mounted by the ZFS system?
Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?
True
DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?
True
Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?
True
Most source code is typically available on the Internet in tarball format or as a git repository. True or False?
True
PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?
True
The -9 option to the gzip utility results in a higher compression ratio. True or False?
True
The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?
True
The lvextend command can be used to add unused space within a volume group to an existing logical volume. True or False?
True
The operating system software is necessary for a computer to function. True or False?
True
When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration?
Users must use at least 3 characters as numbers in their passwords.
Which of the following can be used to graphically remotely administer a Linux machine?
VNC
Which of the following can be used to provide graphical remote administration? (Choose all that apply.)
VNC ssh -X
zpool create test mirror /dev/sdb /dev/sdc
What command can be used to create a ZFS volume called test from the space on /dev/sdb and /dev/sdc that functions like RAID level 1?
mdadm
What command is used to manage a software RAID configuration after installation?
crontab
What command is used to view and modify user jobs scheduled to run with cron?
FC HBA
What component of a Linux server is used to connect to a Fibre Channel SAN?
/etc/rc2.d
What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2?
ZFS volume
What is the term for a ZFS managed filesystem that is created from ZFS pools?
single
What kernel option can be specified within a boot loader to force the system to boot to Single User Mode?
9
What kill level signal cannot be trapped?
RAID 1
What type of redundant storage configuration is most common for hosting the operating system and applications on a server?
When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead.
What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet?
thin provisioning
When configuring a virtual hard disk file, which term refers to the feature that allows the virtual hard disk file to expand dynamically as space is requested by the guest operating system?
Linux is running as a guest operating system.
When viewing the output of the lsmod command, you notice several modules that start with vmw. What does this indicate?
fi
When writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? ___________
There is a question mark in the TTY column.
When you run the ps command, how are daemon processes recognized?
/var/spool/cron/username
Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?
in RAM
Where is the /proc filesystem stored?
High Contrast
Which assistive technology will make a desktop environment more accessible toa person with low vision?
localectl
Which command can be used to modify the default locale on the system?
top
Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes listed at the beginning of the list?
/etc/init.d
Which directory stores most UNIX SysV rc scripts?
dmesg
Which of the following commands will display messages that were displayed during the boot sequence by the kernel?
cat /proc/cpuinfo
Which of the following commands will display the current CPU(s) detected by a Linux system?
if
Which of the following constructs can be used in a shell script to determine whether two values are equal and if so run another set of commands?
all of the above
Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation?
iSCSI initiator
Which of the following describes a computer that is used to access an iSCSI hard disk across the network?
/etc/profile
Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell?
Hypervisor
Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?
`command` $(command)
Which of the following lines can be used to perform command substitution within a shell script? (Choose all that apply.)
After modifying /etc/default/grub, you must run the grub2-mkconfig command before the changes are made to GRUB2.
Which of the following statements is true?
UTF-8 is commonly used to provide Unicode character set support.
Which of the following statements is true?
Wayland X.org
Which two implementations of X Windows are commonly used in Linux? (Choose two answers.)
software RAID
Which type of RAID can be entirely configured during the Linux installation process?
Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments?
XFCE
You did not append the stderr to the Error file, and, as a result, it was overwritten when the command was run a second time.
You have redirected stderr to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why?
Modify the daemon configuration file within the /etc/init directory
You want to configure the runlevels that a particular upstart daemon is started in. What should you do?
/var/log
You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files?
False
ZFS volumes are mounted at boot time from entries within /etc/fstab by default. True or False?
Using wildcard metacharacters, how can you indicate a character that is not ana or b or c or d?
[!a-d]
Which type of CM software can connect to inventory members via SSH to perform configuration management activities?
agentless
Which of the following are common methods for gaining support for Linux?
all the above
What command is equivalent to the man -k keyword command?
apropos keyword
Which of the following commands can you use to search available repository information? (Choose two.)
apt apt-cache
Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system?
apt-get upgrade
A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home?
at
Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.)
at -l atq at -q
What is the term used to describe a user providing a user name and password to log in to a system?
authentication
Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux system?
blkid
You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?
cancel Printer1-17 Printer1-21
You want to see the filesystems that are in use on the system. What command could you use? (Choose all that apply.) ls /sys/block
cat /etc/mtab df -T
Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.)
cat /etc/shadow getent /etc/shadow
When applied to a directory, the SGID special permission____________________.
causes all new files created in the directory to have the same group membership as the directory and not the entity that created them
A user typed in the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the /home/jim directory?
cd ../..
If a user's current directory is /home/mary/project1, which command could she use to move to the etc directory directly under the root?
cd /etc
Which of these commands will set the following permissions on file1.txt? User = Read, Write, Execute Group = Read, Execute Others = Read
chmod 754 file1.txt
In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename?
chmod 7777 filename
A file has the following permissions r----x-w-. The command chmod 143 would have the same effect as the command _________. (Choose all that apply.)
chmod u=x,g=r,o=wx file1
Which of the following commands will change the user ownership and group ownership of file1 to user1 and root, respectively?
chown user1:root file1
You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program?
ctrl-c
Before a computer can use a router, what configuration information must it be provided?
default gateway
Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.)
delgroup groupdel
Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.)
deluser userdel
Which command is used to display the amount of free space that exists on a filesystem?
df
A device file _______________________. (Choose all that apply.)
displays a major and minor number in place of a file size has no data section
What does the du -s /var command do?
displays the total size of the /var directory
Which command can be used to list containers that are currently running on the operating system only?
docker ps
Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed?
dpkg.log
When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.
facility, priority
You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal?
fg
What will the following wildcard regular expression return: file[a-c]?
filea, fileb, filec
Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?
files
Which of the following commands can be used to recursively search a directory tree for files that meet a certain criterion without using a database or premade index of files?
find
Which of the following commands can be used to recursively search through the directory tree in search of a file that meets a set of given criteria instead of using an indexed database?
find
Which of the following commands will display all files and directories within the /var/log directory or its subdirectories which are owned by the root user?
find /var/log -user root
Which of the following is not a piece of information that the Fedora installation program prompts you for?
firewall settings
Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?
firewall-cmd --add-service ssh --permanent
Which of the following commands can be used to display memory statistics? (Choose all that apply.)
free sar vmstat
Which of the following commands can only be used to create partitions on a GPT hard disk?
gdisk
Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all existing MBR partitions on a disk?
gdisk
Which of the following commands will generate a GPG public/private key pair?
gpg --gen-key
Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out to the terminal. Which of the following commands could Garrett use to perform this search?
grep -E "(John|Bob)" salesemployees.csv
What command can you use to safely shut down the Linux system immediately?
halt
Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?
hwclock -c
Which of the following commands can be used to convert files between different character encodings?
iconv
Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)
ip route
Which of the following commands can be used to only show jobs that have been paused.
jobs -s
Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357?
kill -9 1357
Which command within the command-line FTP utility can be used to change the current directory on the local computer?
lcd
Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)
lp -d Printer1 file lp file
Select the command that can be used to provide a long listing for each file in a directory:
ls -I
Wayne is using the command line and is in his home directory. Which of the following will display a list of all files and their sizes from his home directory? (Choose two.)
ls -al ~ ls -al /home/wayne
Which of the following can be used to show the block devices on a Linux system? (Choose two.)
ls /sys/block lsblk
When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?
make
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem?
make install
You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do remember it will flush a variable from your system. Which command typed at a command prompt displays a list of commands that would likely contain the command you desire?
man -k flush
Which command mounts all existing filesystems in /etc/fstab?
mount -a
Linux is a ___________ and ___________ operating system.
multiuser, multitasking
Which of the following is the default window manager used by the GNOME version 3 desktop environment?
mutter
Which command do you use to rename files and directories?
mv
Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?
ping -c 4 server1
The daemons associated with network services listen for network traffic associated with a particular _____.
port
What will typing q! at the : prompt in command mode do when using the vi editor?
quit without saving any changes
Which of the following commands can be used to scan a filesystem for disk usage, create, check, and repair quota files?
quotacheck
Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process?
r
A special device file is used to ___________.
represent hardware devices such as hard disk drives and ports
If "resume" is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume?
resume
The which command _________________.
searches for a file only in directories that are in the PATH variable
Which command can be used to connect to a remote Windows share called data on the server called fileserver?
smbclient //fileserver/data
Every computer consists of physical components and non-physical components. The non-physical components of a computer that understand how to work with the physical components are referred to as:
software
Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password?
su
Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?
sudo
Which two partitions do you typically create at minimum during a Fedora Linux installation? (Choose two answers.)
swap /
Which of the following commands will set the default runlevel of a Linux system?
systemctl set-default runlevel5.target
To display a text file in reverse order, what command should be used?
tac
What command can be used to display the last five lines of a text file?
tail -5
Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen?
tar -czvf
Which of the following commands creates an archive?
tar -zcvf /dev/st0 *
When a printer is rejecting requests,____________.
the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable
Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image?
timeout
Which of the following commands can be used to update the last modified timestamp on a file, or if the file specified does not exist will create the file?
touch file.txt
Given the following output from the ls command, how many files are linked with file1?drwxr-xr-x 3 root root 4096 Apr 8 07:12 Desktop-rw-r--r-- 3 root root 282 Apr 29 22:06 file1-rw-r--r-- 1 root root 282 Apr 29 22:06 file2-rw-r--r-- 4 root root 282 Apr 29 22:06 file3-rw-r--r-- 2 root root 282 Apr 29 22:06 file4-rw-r--r-- 1 root root 282 Apr 29 22:06 file5-rw-r--r-- 1 user1 sys 282 Apr 29 22:06 file6
two
Which of the following UFW commands can be used to view configured firewall rules?
ufw status
Which command can increase the number of filehandles that programs can open in a shell?
ulimit
Elijah is done working with an external USB hard drive and wants to properly disconnect it. Which of the following commands should he use before unplugging the USB cable?
umount
John has been using the cdrom on his computer that is running the Linux operating system. He pushes the eject button on the front of the drive, but it doesn't eject the disk. Which of the following commands should he run? (Choose all that apply.)
umount /media/cdrom eject /media/cdrom
Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command?
visudo
Which of the following utilities will allow you to view information about virtual memory usage on a Linux system?
vmstat
Users enter commands directly to the kernel of the Linux operating system. True or False?
False
How can you protect a metacharacter (such as the $ character) from shell interpretation?
Precede it with a \.
startx
Which command can be used to start X Windows, the window manager, and the default desktop environment?
Which of the following commands can be used to display the current locale of a system? (Choose two.)
localectl locale
What is the name of the utility used to rotate log files?
logrotate
The IP address of 127.0.0.1 is also referred to as the _____.
loopback address
Which command is used to delete a user account?
userdel username
Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?
/etc/login.defs
Which file stores the Apache configuration in Fedora 28?
/etc/httpd/conf/httpd.conf
Which prompt does the root user receive when logged in to the system?
#
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?
You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate?
Additional entries exist within the ACL of the file that can be viewed using the getfacl command.
Which of the following are true of the echo command?
All of the other options are true.
What is the most common open source Web server available for Linux?
Apache
True
As daemon processes are not associated with terminals, you must use an option such as -e alongside the ps command to view them. True or False?
What is the default shell in Linux called?
BASH
False
BTRFS filesystems do not need to be checked for errors as they are resilient to data corruption. True or False?
When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?
Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
False
Because stderr and stdout represent the results of a command and stdin represents the input required for a command, only stderr and stdout can be redirected to/from a file. True or False?
exported
Before a user-defined variable can be used by processes that run in subshells, that variable must be __________.
True
Both aliases and functions can be used to store commands that can be executed, but functions can also accept positional parameters. True or False?
The answer is not red nor blue.
Consider the following shell script:echo -e "What is your favorite color?--> \c"read REPLYif [ "$REPLY" = "red" -o "$REPLY" = "blue" ]thenecho "The answer is red or blue."elseecho "The answer is not red nor blue."fiWhat would be displayed if a user executes this shell script and answers Blue when prompted?
What must you do to transform your computer into a DNS server? (Choose all that apply.)
Create NIS maps. Create zone files. Run the name daemon (named).
Jim has just installed two new SAS SSDs in his system. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do? (Choose all that apply.)
Create one or more partitions on each of the SSDs. Format any partitions created on the SSDs with a valid filesystem recognized by Linux Mount any partitions created on the two SSDs such that they are accessible by the operating system.
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?
Crl+g
When sitting at a computer running Linux, what key combination do you press to open the graphical terminal?
Ctrl+Alt+F1
False
DM-MPIO can be configured to provide multiple, redundant connections to data stored on a SAN. True or False?
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?
DNS
Which of the following are stand-alone daemons? (Choose all that apply.)
DNS (named) Apache (httpd)
Which of the following are examples of multifactor authentication?
Password and fingerprint reader
target ID
Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?
Which of the following actions should you first take to secure your Linux computer against network attacks?
Ensure that only necessary services are running.
To install Linux within a virtual machine, you can specify the path to an ISO image that contains the Linux installation media within virtualization software without having to first write the ISO image to a DVD or USB flash drive. True or False?
True
To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?
True
You can clear a log file simply by redirecting nothing into it. True or False?
True
You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?
True
You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?
UDP
A user mounts a device to a mount point directory and realizes afterward she needs files previously found within the mount point directory. What should this user do?
Unmount the device from the directory.
What must you do to successfully run the fsck command on a filesystem?
Unmount the filesystem.
Which of the following statements regarding LVM structure is correct?
VGs are comprised of one or more PVs
sysfs
Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?
serial RAID
Which of the following is not a type of RAID?
You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)
ssh-keygen ssh-copy-id
Standalone daemons are started on demand using xinetd. True or False?
False
The less command offers less functionality than the more command. True or False?
False
Which command can you use to lock a user account?
usermod -L username
Which prompt do regular users receive when logged in to the system?
$
What metacharacter indicates background command execution?
&
Which of the following can be used to mount a filesystem? (Choose all that apply.)
- A filesystem label - A device path such as /dev/sdb2 - A filesystem UUID
What is the name of the file that contains a listing of all users on the system and their home directories?
/etc/passwd
Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her Windows workstation. Which of the following file formats is Sandra likely to find available for download from Fedora's website in order to allow her to use the file as the source for booting and installing Linux as a VM?
.iso
Which filename extension indicates a tarball?
.tar.xz
Which of the following is not a valid compression file extension for the Linux operating system?
.vz
Which file should be configured so that quotas are enabled at boot time?
/etc/fstab
forking
A process spawning or initiating another process is referred to as _____.
is a rogue process
A runaway process that is faulty and consuming mass amounts of system resources ________.
Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing?
CD
Which DNS resource record is an alias to other records?
CNAME
fi
Every if construct begins with if and must be terminated with?
parent process ID
Every process has a process ID and a_______.
What was created to define a standard directory structure and common file location for Linux?
FHS
A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command. True or False?
False
After a partition on a hard disk is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False?
False
Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?
False
Character devices typically transfer data more quickly than block devices. True or False?
False
Linux commands entered via the command line are not case sensitive. True or False?
False
Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?
False
Only the root user can modify a file that has the immutable attribute set. True or False?
False
Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?
False
The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or False?
False
!
Which of the following operators reverses the meaning of a test statement?
Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system?
YUM
The user performing the commit has not set their Git user information. No files were added to the Git index beforehand. The user performing the commit is not running the command from within the Git repo directory. The user performing the commit is not running the command from within the Git repo directory.
You attempt to perform the git commit -m "Added listdir function" but the command fails. What are possible reasons for the failure? (Choose all that apply.)
hwclock -w
You have recently modified the system time using the date command. What command can you run to ensure that the same time is updated within the system BIOS?
Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?
declarative configuration
When you change the data in a file that is hard-linked to three others, __________.
the data in the file you modified as well as the data in all hard-linked files are modified because they share the same data and all have the same inode and file size
A user types the command head /poems/mary. What will be displayed on the terminal screen?
the first 10 lines of the file mary
Which culture embraced the term "GNU" (GNU's Not UNIX) and laid the free software groundwork for Linux?
the hacker culture
When a printer is disabled, ________.
the print queue accepts jobs into the print queue and holds them there until the printer is enabled again
The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.)
when you need support in Linux for new hardware when you need to increase the stability of Linux
Which command displays the users who are currently logged in to the Linux system?
who
Which command can be used to repair an XFS filesystem?
xfs_repair /dev/sdb1
Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?
yum search oobla
If incompatible X Windows settings are configured, where will the errors that are generated be written to?
~/.xsession-errors