Linux + Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

You need to search through a large text file and find any record that contains either Luke or Laura at the record's beginning. Also, the phrase Father is must be located somewhere in the record's middle. Which of the following is an ERE pattern that could be used with the egrep command to find this record?

"(^Luke|^Laura).*Father is.*"

Which diff option is the best option to allow you to quickly determine if two text files are different from one another?

-q

Katie wants to display the most recent entries in the journal log on her Linux system. What journalctl option should she use?

-r

What filename extension do UEFI bootloader files use?

.efi

What file name extension does the CentOS Linux distribution use for packages?

.rpm

What folder does the udev program use to create a permanent link to a storage device based on its serial number?

/dev/disk/by-id

What raw device file would Linux create for the second SCSI drive connected to the system?

/dev/sdb

By default, STDOUT goes to what item? /dev/ttyn, where n is a number.

/dev/tty

User environment files typically come from where?

/etc/skel/

Where should you place a new configuration file to add a third-party repository to a Red Hat-based package management system?

/etc/yum.repos.d

Which folder contains template files for each time zone that Linux supports?

/usr/share/zoneinfo

What program does the workstation firmware start at boot time?

A bootloader

The grep utility can employ regular expressions in its PATTERN. Which of the following best describes a regular expression?

A pattern template you define for a utility, which uses the pattern to filter text

The cut utility often needs delimiters to process text records. Which of the following best describes a delimiter?

A single space or a colon (:) that creates a boundary between different data items in a record

Which of the following best defines a file descriptor?

A six-character name that represents standard output

What server role should you implement to block your local network clients from accessing sports websites during business hours?

A web proxy

On your server, you need Service-B to start immediately before Service-A. Within the systemd Service-A unit configuration file, what directive should you check and potentially modify?

After

Which of the following best describes a digital signature?

An original plaintext hash, which is encrypted with a private key and sent along with the cipher text

Which web server is used in the popular LAMP stack?

Apache

You are trying to decide whether to use a hard link or a symbolic link for a data file. The file is 5GB, has mission-critical data, and is accessed via the command line by three other people. What should you do?

Create three hard links and provide the links to the three other people for data protection.

What is used to automatically assign an IP address to a client?

DHCP

What package do you need to install to allow your Linux server to provide IP addresses to clients on your local network?

DHCPd

What device setting defines a host that maps a hostname to an IP address?

DNS server

A _______ runs in background and listens for client connection requests for a single application.

Daemon

You have a lengthy file named, FileA.txt. What will the head -15 FileA.txt command do?

Display the first 15 lines of the file.

Time and space to generate archives are not an issue, and your system's environment is not a high IO one. You want to create full backups for your system only once per week and need to restore data as quickly as possible. Which backup type plan should you use?

Full archive weekly; differential daily

Peter Quill, a Linux system administrator, has been testing a new firewalld configuration. The test was successful. What should Mr. Quill do next?

Issue the firewall-cmd --runtime-to-permanent command using super user privileges.

What is the term commonly used for when the Linux system halts due to a system error?

Kernel panic

Which part of the Linux mail process is responsible for sending emails to remote hosts?

MTA

Linux uses to add the file-system on a new storage device to the virtual directory.

Mount points

What protocol should you use to mount folders from remote Linux servers on your local Linux server?

NFS

Which authentication package used to be called by the name "Yellow Pages"?

NIS

Which tool do newer versions of Ubuntu use to set network address information?

Netplan

Tony is trying to troubleshoot errors produced by an application on his Linux system but has to dig through lots of entries in the journal log file to find them. What journalctl match option would help him by only displaying journal entries related to the specific application?

OBJECT_PID

The _________ package allows you to create a secure tunnel across a private network to access your local network remotely.

OpenSSH

What SELinux mode tracks policy violations but doesn't enforce them?

Permissive

How does a server know what client request is sent to which application daemon?

Ports

Barbara wants to ensure that the journal log files will be saved after the next reboot of her Linux system. What systemd-journald configuration setting should she use?

Storage=persistent

Which environment variable can programmers use to temporarily change the time zone setting for just their environment?

TZ

A user has logged into the tty3 terminal. Which of the following user environment files is executed first if found in the user's home directory?

The .bash_profile file

You use the useradd -D command to view account creation configuration directives. What file does this command pull its displayed information from?

The /etc/default/useradd file

The last command, by default, pulls its data from what file?

The /var/log/wtmp file

You create an account using the appropriate utility, except for some reason the account's home directory was not created. Which of the following most likely caused this to occur?

The CREATE_HOME directive is not set.

Where does the firmware first look for a Linux bootloader program?

The Master Boot Record (MBR)

Sam needs to allow standard users to run an application with root privileges. What special permissions bit should she apply to the application file?

The SUID bit

You have completed a full archive and sent it to a remote system using the sftp utility. You employ the md5sum program on both the local archive and its remote copy. The numbers don't match. What most likely is the cause of this?

The archive was corrupted when it was transferred.

You need to quickly create a special archive. This archive will be a single compressed file, which contains any .snar files across the virtual directory structure. Which archive utility should use?

The cpio utility

The system admin took an archive file and applied a compression utility to it. The resulting file extension is .gz. Which compression utility was used?

The gzip utility

What memory area does Linux use to store boot messages?

The kernel ring buffer

You are transferring files for a local backup using the sftp utility to a remote system and the process gets interrupted. What sftp utility command should you use next?

The reput command

The cat -E MyFile.txt command is entered, and at the end of every line displayed is a $. What does this indicate?

The text file records end in the ASCII character LF.

Which of the following commands will display CPU load data along with information concerning users who are currently logged into the system?

The w command

A ___________ determines the time relative to the UTC time in a specific location.

Time zone

The_____firmware method has replaced BIOS on most modern IBM-compatible computers.

UEFI

Which character set has replaced ASCII as the default character set used in U.S. Linux installations?

UTF-8

Which character set uses a 3-byte code and can represent characters from most languages used in the world?

Unicode

You are trying to peruse a rather large text file. A coworker suggests you use a pager. Which of the following best describes what your coworker is recommending?

Use a utility that allows you to view one text page at time.

Which field contains the same data for both a /etc/passwd and /etc/shadow file record?

User account's username

Which bonding mode would you use to combine two network interfaces to create a single network interface with double the amount of bandwidth to your Linux server?

aggregation, mode 4

Which of the following is NOT a PAM control flag?

allowed

Which program should you use to download tarballs from an application's website?

cURL

A short text-based control file is no longer working properly with the program that reads it. You suspect the file was accidentally corrupted by a control code update you performed recently, even though the file's control codes are all correct. Which command should you use next on the file in your problem investigation?

cat -v

Nancy wants to write a rsyslogd rule that separates event messages coming from the system job scheduler to a separate log file. Which syslog facility keyword should she use?

cron

You have a text file, monitor.txt, which contains information concerning the monitors used within the data center. Each record ends with the ASCII LF character and fields are delimitated by a comma (,). A text record has the monitor ID, manufacture, serial number, and location. To display each data center monitor's monitor ID, serial number, and location, use which cut command?

cut -d "," -f 1,3,4 monitor.txt

Which command do you use to display the current time and date using a specific output format?

date

You need to create a low-level backup of all the data on the /dev/sdc drive and want to use the /dev/sde drive to store it on. Which dd command should you use?

dd of=/dev/sde if=/dev/sdc

You need to edit quota grace periods. Which of the following commands should you use?

edquota -t

Your system uses systemd and has a service currently set to not start at system boot. You want to change this behavior and have it start. What systemctl command should you employ for this service?

enable

What option sets the wireless access point name in the iwconfig command?

essid

What filesystem is the latest version of the original Linux filesystem?

ext4

The program is a handy tool for repairing corrupt filesystems.

fsck

What is the most common compiler used for open-source Linux applications?

gcc

Sally needs to view the ACL permissions assigned to a file on her Linux server. What command should she use?

getfacl

Which partitioning tool provides a graphical interface?

gparted

You need to figure out what configuration file(s) hold a host name directive. Which of the following commands is the best one to use?

grep

You are a system administrator on a CentOS Linux server. You need to view records in the /var/log/messages file that start with the date May 30 and end with the IPv4 address 192.168.10.42. Which of the following is the best grep command to use?

grep "May 30.*192.168.10.42" /var/log/messages

What command must you run to save changes to a GRUB Legacy boot menu?

grub-install

You need to insert the abc module into the Linux kernel. This module does not have any dependencies. What is the best utility to use?

insmod

If your Linux server doesn't have a graphical desktop installed, what tool could you use to configure network settings from the command line

ip

James needs to log all kernel messages that have a severity level of warning or higher to a separate log file. What facility and priority setting should he use?

kern.warn

For an application to use PAM, it needs to be compiled with which PAM library?

libpam

What Linux command displays all of the localization environment variables and their values?

locale

What Systemd utility allows you to change the localization on your Linux system?

localectl

Which of the following commands will help you determine whether your display server is Wayland or X11?

loginctl

What tool do you use to manually add a filesystem to the virtual directory?

mount

Which command allows you to append a partition to the virtual directory on a running Linux system?

mount

What popular open source web server can also perform as a load balancer?

nginX

What syslog severity level represents normal but significant condition messages?

notice

A text file, StarGateAttacks.txt, needs to be specially formatted for review. Which of the following commands is the best command to accomplish this task quickly?

pr

You have two short text files that have maximum record lengths of 15 characters. You want to review these files side by side. Which of the following commands would be the best to use?

pr -mtl 20

A problem has occurred concerning group quotas on three filesystems. You need to quickly remove all filesystems' quota limits to temporarily resolve this issue. What is the best command to employ?

quotaoff -a

You have modified an OpenSSH service's configuration file, /etc/ssh/ssh_config. The service is already running. What is the best command to use with systemctl to make this modified file take immediate effect?

reload

A long-time server administrator has left the company, and now you are in charge of her system. Her old user account directory tree, /home/Zoe/, has been backed up. Which command is the best one to use to quickly remove her files?

rm -rI /home/Zoe

You have a file that is over 10GB in size, and it needs to be backed up to a locally attached drive. What is the best utility to use in this situation?

rsync

What configuration file does the rsyslogd application use by default?

rsyslog.conf

What are the equivalent symbolic mode permissions for the octal mode value of 644?

rw-r--r--

What command parameter would you add to the end of the GRUB2 linux command to force a Linux system to start in single-user mode?

single

Which of the following commands will put any generated error messages into the black hole?

sort SpaceOpera.txt 2> /dev/null

Which command displays which ports the processes use on Linux systems?

ss

You (username Samantha) are logged into a laptop (IP address 192.168.0.42) running a Linux GNOME Classic desktop environment at your company desk in Building A. A problem has occurred on a rack-mounted Linux system (IP address 192.168.0.7) in Building C. You need to securely access a GUI application on the remote system that uses X11. What command should you use?

ssh -X [email protected]

Which of the following is an example of UFW simple syntax for blocking all incoming and outgoing OpenSSH connections without providing a blocking message?

sudo ufw deny 22/tcp

What protocol became a de facto standard in Linux for tracking system event messages?

syslog

Harry has finished writing his application source code but needs to package it for distribution. What tool should he use so that it can be extracted in any Linux distribution?

tar

Which command displays the current date, system time, hardware time, and time zone?

timedatectl

Your boss has asked you to remove KSingh's account and all his home directory files from the system immediately. Which command should you use?

userdel -r KSingh

Which of the following commands is the best one to add JKirk as a member to a new group called the NCC-1701 group and not remove any of the account's previous group memberships?

usermod -aG NCC-1701 JKirk

What user groups are commonly used to assign privileges for group members to run applications as the administrator?

wheel

Which of the following files may be involved in authenticating with SSH keys?

~/.ssh/id_rsa

The OpenSSH application keeps track of any previously connected hosts and their public keys in what file?

~/.ssh/known_hosts


Conjuntos de estudio relacionados

PrepU - Ch 32 - Skin Integrity and Wound Care

View Set

A&P II - Ch.18: Circulatory System - Blood (Smartbook Questions)

View Set

Unit 2 Anatomy Lab Test 2 (Exercises 11-14)

View Set

Period 4: AP US History Chapter 10

View Set