CompTIA Linux+ (XKO-004) Post-Assessment Quiz
Which of the following options can be used with the dpkg command to remove a specified package from a system, including any configuration files used by the package?
-P
Which of the following file extensions might be used as part of a shell script filename?
.sh
When using AppArmor, the restrictions for each program are stored within text files named for the program under the directory _____________.
/etc/apparmor.d
Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify?
/etc/bashrc
Bradley wants to quickly map a hostname to an IP address of an internal server that he wants to access by name but that has no DNS entries. Which of the following files could he modify to enable accessing the server by name from his workstation?
/etc/hosts
Carter is worried about limited disk space on the drive where /var exists. He wants to ensure that every week a new log file is created and that any log files older than 4 weeks are deleted. Where would Carter configure these options?
/etc/logrotate.conf
You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is _________________.
/etc/motd
What is the path and filename where Linux stores the configured network services and their associated ports for a system?
/etc/services
Sawyer needs to ensure that a configuration file for a new application shows up in new user directories as new users are added to the system. He has already copied it into existing user directories. Where should Sawyer place a copy of this file to ensure that it also shows up in the new user directories as well?
/etc/skel
Hanna needs to find any error messages that have been generated by the kernel. Where would she look for that information?
/var/log/kern.log
What is the default nice value of new processes?
0
Which of the following would be a valid entry for the cron daemon to execute a script named myscript in the root user's directory at 5 am on the first day of every month?
0 5 1 * * /root/myscript
Which of the following settings for umask would ensure that the user and group permissions are not affected while the other does not have read, write, or execute?
0007
Fred wants to ensure that only system administrators can create scheduled tasks on the Linux server. Which of the following is the most efficient way for Fred to ensure that this is enforced?
Add all system administrators to /etc/cron.allow and /etc/at.allow
Match the following description of a service to the service acronym:
FTP - This service provides a repository where users can upload or download files. NTP - This protocol provides the ability to synchronize time between network devices and a world cloak. DHCP - This service is used to automatically assign IP addresses to hosts when they join a network. DNS - This service runs on a server to allow clients to resolve names to IP addresses.
Kenneth wants to use Fibre Channel to connect to his Fibre Channel SAN. Which of the following types of controllers would he need to have installed in the Linux Server?
HBA
Henry manages the DevOps team at his company. He hears a lot of terms used to describe the day-to-day job functions of his team. Some of those functions include things like build automation and infrastructure automation. These could be considered part of which terminology?
IaC
Tabitha has been asked to provide a configuration file to her company's cloud service provider that will allow a custom configuration from an ISO installation image for new virtual machines. Which of the following configuration files was she most likely asked to provide?
Kickstart
Which of the following locale environment variables overrides all of the others when it is set?
LC_ALL
Leonard wants to network book a new Linux workstation from an image contained on a TFTP server. Which of the following should Leonard configure in the workstation's BIOS as first in the boot order?
PXE
Kane has just made changes to the /etc/default/grub file on a Linux server running GRUB2. What is the next step that Kane needs to perform?
Run grub2-mkconfig
Jerry manages a number of Linux servers that reside in different branch offices for his company. He needs a secure way to perform maintenance, check on the status of backups, and start and stop services without traveling to those offices. Which of the following is Jerry most likely to use?
SSH
Using the output below, determine which of the following is true: drwxr-xr-x 4 jsmith finance 128 Feb 21 2018 ProjectX
The permissions could have been set using the command - chmod 755 ProjectX.
Which of the following technologies is a platform independent protocol that can be used to graphically connect to a Linux computer?
VNC
Which of the following are valid servers for the graphical component of the Linux operating system? (Choose two.)
X11 Wayland
Which of the following might you expect to see as the first line of a bash shell script?
a. #!/bin/bash
Jan is a DevOps Engineer that is in charge of setting up a new Configuration Management software. The software they've been using required a piece of software to be installed on the virtual machines and containers in their environment, whereas the new Configuration Management software he's in charge of deploying does not. What kind of CM is Jan deploying?
agentless
Which of the following commands can be used to show the list of jobs scheduled with the at daemon?
atq
Which of the following commands will list all users except for the root account?
cat /etc/passwd | grep -v root grep -v root /etc/passwd
Karen wants to see which partitions are currently mounted on a Linux workstation. Which of the following commands could she use to see this information?
cat /proc/mounts
Kaylee is managing a system that uses SysV system initialization. She wants to make sure that iptables starts when the system is booted. Which of the following should Kaylee run?
chkconfig --add iptables
Git creates a snapshot of each version of your files. What are these snapshots referred to?
commit
Which of the following commands will create a new file containing a list of users along with their login shell?
cut -d: -f1,7 /etc/passwd > usershells
Which of the following commands can be used to make a block by block copy of one drive to another without regard for filenames?
dd
Which of the following commands can be used to view the hardware detected by the Linux kernel during bootup?
dmesg
If a USB device is physically present but the lsusb command cannot locate the device, which command can be used to display the information from SMBIOS so that you can attempt to locate a driver for it?
dmidecode
Mary has been locked out of her account after failing to correctly enter her password three times. As the system administrator, you need to unlock her account. Which of the following commands would unlock Mary's account assuming that you are using pam_faillock.so module?
faillock --reset --user mary
Which of the following commands can be used to modify the date and time within the system BIOS?
hwclock
Which of the following attributes can be given to a file using the chattr command in order to prevent the file from being modified in any way (even by the root user)?
immutable
Patrice has just set up a new Linux server. She has already configured a full backup to run every Sunday morning. She wants to create an additional backup every day to ensure that less data would be lost in the event of a mid-week failure. She wants to use the least amount of disk space possible for these additional backups. Which of the following should she configure?
incremental
Which of the following commands can be used to reboot a Linux system? (Choose all that apply.)
init 6 telinit 6 reboot
Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run?
iptables -F
Catherine wants to connect her laptop running Linux to a wireless network. Which of the following utilities can she use to make that connection?
iwconfig
Sheila needs to see a list of pending print jobs on a system. Which of the following commands can she use to display those jobs?
lpq
Jack needs to be able to determine which modules are currently loaded on a Linux server. Which of the following commands could he use to gather this information?
lsmod
Which of the following commands can be used to format a disk partition as ext4? (Choose all that apply.)
mke2fs mkfs
Which of the following commands could be used to access data on a CD?
mount -r -t iso9660 /dev/cdrom /media/cdrom
Which of the following tools can you use to query DNS servers to verify the records for an FQDN? (Choose two.)
nslookup dig
Which of the following commands could be used to turn off quotas?
quotaoff
Zachary is analyzing running processes using the top utility. Without exiting the top utility, he wants to change the nice priority level of a process. What key can Zachary use to change the nice level?
r
John needs to remove the subdirectory named temp2 as well as all of the files that it contains. Which of the following commands could John use to accomplish this task in one step?
rm -r temp2
Jake needs to find out which RPM package a file belongs to. Which of the following commands could he use to find his answer?
rpm -qf bluefish
A junior system administrator comes to ask for your assistance. He was given instructions to activate the third partition on the second hard drive to use as virtual memory. It has already been formatted and initialized as swap. Which command could you suggest that the junior system administrator use?
swapon /dev/sdb3
You are investigating a DHCP issue on your company's network and decide to analyze the packets that are being sent and received on a Linux workstation. Which of the following could you use to see the contents of the packets arriving at the workstation? (Choose two.)
tcpdump wireshark
Natalie wants to use an existing server to deploy a new virtual machine. The new virtual machine will initially only need 20 GB of disk space, but is expected to grow at a rate of 5 GB per month. She wants to set the size for the virtual hard drive to 512 GB. However, the server that she intends to use has a 2 TB hard drive with only 100 GB of free disk space. What can Natalie use to accomplish this task?
thin provisioning
Keri is getting frustrated that her workstation wants to do a filesystem check upon boot on a fairly frequent basis. Which of the following could she use to change how frequently the system forces a filesystem check to be run?
tune2fs
Ciara has created a shell script that works just fine in the shell where she developed it. However, when she tries to execute it in a subshell some of the environment variables don't seem to be correct. How can she resolve this issue?
use the export command to make them available to subshells
Carlos manages a Linux system that users are able to SSH into in order to perform certain tasks. However, he has just installed a critical patch and wants to reboot the server to ensure that it has fully taken effect. Which of the following commands should he use to ensure that a reboot will not interrupt any logged in users?
w
Which of the following commands can be used to find out when a domain name expires?
whose
Craig has just run the ssh-keygen command on his workstation. What is the default path and filename for the new private key that was generated?
~/.ssh/id_rsa