Linux II Final
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package?
-P
The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket?
/dev/log
Which of the following files does the hostnamectl command modify to set the hostname on a machine?
/etc/hostname
Which of the following files contain the path and filename where DNS servers should be configured?
/etc/resolv.conf
Where is the default document root directory for the Apache Web server?
/var/www/html
Which of the following ports would be used to resolve a domain name to an IP address?
53
If no level of compression is specified, the gzip command assumes what compression level?
6
Which of the following does the -r option for the gpg command specify?
Encrypt for the user id given.
When working with Sendmail, what command can be used to test SMTP support?
HELO
What DNS resource record type is used to provide the IP address for the e-mail server for a zone?
MX
When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration?
Users must use at least 3 characters as numbers in their passwords.
If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?
brctl
Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system?
dmidecode
Which of the following is the log file where Dandified YUM writes its log entries?
dnf.rpm.log
Which of the following SQL statements can be used to delete a table from a database?
drop table
Which of the following commands can be used to view the quota for a user?
edquota -u jsmith
Which of the following commands will display detailed information for network hardware?
ethtool
Which of the following commands can you use to list users who have been locked out by pam_faillock.so?
faillock
If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem?
fsck
Which of the following will display entries from the Name Service Switch libraries?
getent
Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used?
group by
Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.)
groupdel, delgroup
You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead?
hostnamectl set-hostname server1
Which of the following log files contains information and error messages generated by the Linux kernel?
kern.log
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem?
make install
When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?
mtr, tracepath, traceroute
Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection?
ping
Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation?
rpm -ivh
Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation?
rpm -ivh --nodeps package.rpm
Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest?
sha256sum
Which of the following commands can be used to trace an IPv6 route? (Choose two.)
traceroute6, tracepath6
Which of the following is a special group that provides its members with the ability to run the su and sudo commands?
wheel
Which of the following options for the gpg command will specify the key that should be retrieved?
--recv-keys
Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10?
. /dev/tty10
If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login?
/etc/nologin.txt
The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of?
48
Which type of CM software can connect to inventory members via SSH to perform configuration management activities?
agentless
Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list?
apt upgrade
Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system?
apt-get upgrade
Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.)
cat, getent
Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires?
chage -l jsmith
Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?
declarative configuration
Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?
files
Which of the following commands will list missing libraries as not found if a necessary library is not installed?
ldd
Which of the following commands can be used to display socket information out to the terminal screen?
ss
Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen?
tar -czvf
You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible?
/etc/nsswitch.conf
Which of the following files contains the encrypted passwords for users on a modern Linux system by default?
/etc/shadow
Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?
/etc/sudoers
Which of the following files stores information about failed logins on a Linux system?
/var/log/btmp
What zone configuration file contains a PTR record used to identify the loopback adapter?
/var/named/named.local
Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do?
Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.
When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented?
OTP
Which of the following environment variables can you change the value of to set the default printer on a Linux system? (Choose two.)
PRINTER, LPDEST
Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN?
VPN
Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system?
YUM
Which of the following commands will change the SELinux security context of a file?
chcon
Which of the following commands can be used to pause a printer named Printer1?
cupsdisable Printer1
Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered?
mailq
Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?
sudo
Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.)
systemd-cat, logger
Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface?
tshark
Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.)
udevadm control --reload, udevadm control -R
Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled?
usermod -f 15 jsmith
Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command?
visudo