LINUX 240 FULL FINAL REVIEW

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What FTP command runs a shell on the local computer? Group of answer choices # ~ * !

!

Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it? a. $ b. > c. % d. #

#

What metacharacter indicates background command execution? a. @ b. ^ c. & d. !

&

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? Group of answer choices /etc/inittab /etc/init.conf /etc/keys.conf /etc/cmd.conf

/etc/inittab

Which of the following options for the gpg command will specify the key that should be retrieved? Group of answer choices --get-key --recv-keys --request --get

--recv-keys

Which of the following options for the iptables command will delete all rules for all chains? Group of answer choices -F -D -R -C

-F

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? Group of answer choices -D -P -r -d

-P

Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system? Group of answer choices -F -u -i -U

-U

Callie wants to make sure that a filesystem is checked every 20 days. Which of the following options, when used with the tune2fs command, would set a full filesystem check to run every 14 days? a. -i 14 b. -i 14d c. -d 14 d. -i 336

-i 14d

When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file? Group of answer choices -v -a -c -s

-v

Which of the following files can you add filenames to so that the git add * command will not stage them? a. .gitignore b. .gitnopush c. .ignore d. .nopush

.gitignore

Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her Windows workstation. Which of the following file formats is Sandra likely to find available for download from Fedora's website in order to allow her to use the file as the source for booting and installing Linux as a VM? a. .zip b. .tar.gz c. .iso d. .tgz

.iso

Which of the following is not a valid compression file extension for the Linux operating system? Group of answer choices .bz2 .gz .vz .xz

.vz

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed? Group of answer choices /27 /24 /28 /23

/27

Which of the following is required as a separate partition in order to use LVM? a. /var b. /boot c. /tmp d. /home

/boot

Which of the following would be the device file for the third partition on the second SATA drive on a Linux system? a. /dev/hdb3 b. /dev/hdc2 c. /dev/sdb3 d. /dev/sdc2

/dev/sdb3

Which of the following files is where the default runlevel is set on some Linux systems? a. /etc/inittab b. /etc/init.d/init c. /etc/rc.d/init.conf d. /etc/rc.d/init.d/init.conf

/etc/inittab

Which of the following files contains the list of shared libraries? Group of answer choices /etc/ld.so.cache /lib/ld.so.conf /etc/ld.so.conf /lib/shared.conf

/etc/ld.so.cache

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? Group of answer choices /etc/warning.txt /etc/deny.login /etc/nologin.txt /etc/banner.conf

/etc/nologin.txt

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? Group of answer choices /etc/nsswitch.conf /etc/hosts /etc/resolv.conf /etc/named.conf

/etc/nsswitch.conf

Which of the following files contain the path and filename where DNS servers should be configured? Group of answer choices /etc/nsswitch.conf /etc/hosts /etc/named.conf /etc/resolv.conf

/etc/resolv.conf

In which file can you configure rules for logging on a Linux system? a. /etc/rsyslog.conf b. /etc/syslog.rules c. /etc/syslog.rules.conf d. /etc/syslogd.conf

/etc/rsyslog/conf

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

/etc/services

Which of the following files contains the encrypted passwords for users on a modern Linux system by default? Group of answer choices /etc/psh /etc/shadow /etc/pwenc /etc/passwd

/etc/shadow

In which of the following directories can you place files that will be copied to new user directories when new users are created? a. /etc/rc.d b. /etc/skel c. /usr/local/template d. /usr/local/useradd

/etc/skel

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? Group of answer choices /etc/sudoers /etc/sudo.conf /etc/rc.d/sudoers.conf /etc/su.conf

/etc/sudoers

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search. Which of the following files could Lynn modify so that the locate command no longer includes those results? a. /etc/locate.d/updatedb.conf b. /etc/locate.conf c. /etc/updatedb.conf d. /etc/locatedb.conf

/etc/updatedb.conf

Which of the following is the full path and file name where the Debian Package Manager repositories can be configured? Group of answer choices /etc/dpm/repositories.conf /etc/dpm.conf etc/apt.source.conf /etc/apt/sources.list

/etc/apt/sources.list

Jackson wants to automatically mount a secondary internal hard drive when his Linux workstation boots up. In which of the following files should he configure an entry for the partition on the drive that he wants to mount? a. /etc/ftab b. /etc/crontab c. /etc/mtab d. /etc/fstab

/etc/fstab

Which of the following files does the hostnamectl command modify to set the hostname on a machine? Group of answer choices /etc/host.conf /etc/hostname /etc/hostname.conf /etc/hosts.conf

/etc/hostname

Which of the following files does a TCP wrapper check before starting a network daemon? Group of answer choices /etc/wrapper.allow and /etc/wrapper.deny /etc/tcp.allow and /etc/tcp.deny /etc/hosts.allow and /etc/hosts.deny /etc/daemon.allow and /etc/daemon.deny

/etc/hosts.allow and /etc/hosts.deny

Under the root directory in Linux, which directory contains system commands and utilities? a. /opt b. /var c. /boot d. /usr

/usr

Which of the following files stores information about failed logins on a Linux system? a. /var/log/btmp b. /var/log/wtmp c. /var/log/nolo d. /var/log/failed

/var/log/btmp

What zone configuration file contains a PTR record used to identify the loopback adapter? Group of answer choices /var/named/named.local /etc/named.conf /etc/named.loop /var/named/named.ca

/var/named/named.local

Where is the default document root directory for the Apache Web server? Group of answer choices /usr/share/local/html /usr/local/html /var/html /var/www/html

/var/www/html

Where is the default document root directory for the Apache Web server? Group of answer choices /var/www/html /usr/local/html /usr/share/local/html /var/html

/var/www/html

Which of the following umask settings will result in new files receiving the default permissions -rw-------? a. 0177 b. 0600 c. 0188 d. 0688

0177

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.) Group of answer choices 22 80 21 23

21 23

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server? Group of answer choices 23/tcp open telnet 993/tcp open imaps 22/tcp open ssh 443/tcp open https

23/tcp open telnet

If the physical extent of a volume group is set to 32MB, what is the maximum logical volume size? a. 256GB b. 512GB c. 1TB d. 2TB

2TB

Which of the following is not a valid Apparmor command? Group of answer choices aa-unconfined aa-trust aa-complain aa-enforce

aa-trust

Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux system? a. e2label b. blkid c. fatlabel d. showpart

blkid

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? Group of answer choices brstat ip bridge brctl netbr

brctl

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time? Group of answer choices Docker Hub cloud-init Kickstart OVF

cloud-init

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? Group of answer choices Configure /etc/fstab to mount the partition. Configure /etc/crypttab to mount the partition. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it.

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal? a. disp b. fg c. front d. jobs -f

fg

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address? Group of answer choices etchosts local files hosts

files

Which of the following commands can be used to recursively search a directory tree for files that meet a certain criterion without using a database or premade index of files? a. locate b. find c. where d. search

find

Which of the following commands can be used to only show jobs that have been paused. a. jobs -p b. jobs -s c. jobs -n d. jobs -r

jobs -s

Which of the following commands can you use to view events within the journald database? a. journald --list b. journalctl c. journal --display d. viewlogs -journald

journalctl

Which of the following log files contains information and error messages generated by the Linux kernel? a. wtmp b. dmesg c. kern.log d. secure

kern.log

Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357? a. sigkill 1357 b. killall 1357 c. kill -15 1357 d. kill -9 1357

kill -9 1357

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

Which of the following commands will list missing libraries as not found if a necessary library is not installed? Group of answer choices ldso ldd ldchk ldconfig

ldd

What command can be used to view and modify the date and time within the BIOS? Group of answer choices date hwclock clkmod clock

hwclock

Which of the following are true of the echo command? a. When used to display text, quotation marks are optional. b. It can be used to display shell variables by including a $ sign in front of the variable name. c. Including a semicolon at the end of the line will not affect the text being displayed. d. All of the other options are true.

It can be used to display shell variables by including a $ sign in front of the variable name.

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? Group of answer choices Telnet Kerberos SyslogIncorrect. TFTP

Kerberos

Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet? a. SFTP b. IMAP c. SMTP d. NTP

NTP

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command? Group of answer choices RSA and RSA RSA (sign only) DSA (sign only) RSA and Elgamal

RSA and RSA

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services? Group of answer choices NTP TACACS+ RADIUS SSH

TACACS+

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? Group of answer choices netfilter ufw TCP Wrapper iptables

TCP Wrapper

What is the most commonly used LAN protocol? Group of answer choices UDP/IP IPX/SPX TCP/IP DLC

TCP/IP

Which of the following system variables can you modify to override the default system timezone within your current shell? a. TZ b. TIME c. LOCALE d. LC_TZ

TZ

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature? a. Alt b. Tab c. Ctrl d. Esc

Tab

Which of the following states describe a process that is waiting for a parent process to release its PID? a. Wait b. Suspended c. Zombie d. Dead

Zombie

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default? Group of answer choices DNF APT Zypper DPM

Zypper

Which of the following is the common escape sequence to display a horizontal tab using the echo command? a. \tab b. ?tab c. \t d. %tab

\t

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? Group of answer choices ping -n 4 server1 ping -4 server1 ping -c 4 server1 ping server1

ping -c 4 server1

Clint has run the command parted /dev/sdb and wants to display a list of the existing partitions that exist on that drive. Which of the following commands can he use to display the existing partitions? a. disp b. list c. print d. display

print

Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation? Group of answer choices rpm -ivh --nodeps package.rpm rpm -ivhn package.rpm rpm -i --ignoredeps package.rpm rpm -in package.rpm

rpm -ivh --nodeps package.rpm

Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation? rpm -iap packagename.rpm rpm -ivp packagename.rpm rpm -iah packagename.rpm rpm -ivh packagename.rpm

rpm -ivh packagename.rpm

Which of the following commands will show the current runlevel along with the previous runlevel? (Choose all that apply.) a. runlevel b. telinit -r c. init -r d. echo $RUNLEVEL

runlevel, echo $RUNLEVEL

Which of the following commands can be used to delete a user account? a. deluser b. rmuser c. userdel d. expireuser

userdel

Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled? a. usermod -f 15 jsmith b. usermod -d 15 jsmith c. usermod -x 15 jsmith d. usermod -e 15 jsmith

usermod -f 15 jsmith

Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command? Group of answer choices sudoer visudo sudoers edsudo

visudo

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system? Group of answer choices vmctl vmpager vmstat vmmview

vmstat

Which of the following commands will count the number of lines in a file named data.csv? a. lc data.csv b. wc -l data.csv c. lines data.csv d. count -l data.csv

wc -l data.csv

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password? Group of answer choices su user sudoer switchuser

su

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? Group of answer choices sudoer sudo su doas

sudo

Which of the following is a special group that provides its members with the ability to run the su and sudo commands? a. sudoers b. adm c. wheel d. sys

sudoers

Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information? a. tmpfs b. sysfs c. procfs d. varfs

sysfs

Which of the following commands will display a list of Systemd units sorted by the time they took to load? a. systemd-analyze blame b. systemd --listload c. systemctl --listload d. systemctl-analyze -blame

system-analyze blame

Which of the following commands will set the default runlevel of a Linux system? a. systemctl --set-default runlevel5.target b. systemctl set-default runlevel5.target c. systemctl --default runlevel5.target d. systemctl set-init runlevel5.target

systemctl set-default runlevel5.target

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen? Group of answer choices tar -cfza tar -nzaf tar -czvf tar -ngac

tar -czvf

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? Group of answer choices noop deadline cfq testwr

testwr

Which of the following commands can be used to update the last modified timestamp on a file, or if the file specified does not exist will create the file? a. update file.txt b. updatets file.txt c. touch file.txt d. stamp file.txt

touch file.txt

Which of the following commands can be used to trace an IPv6 route? (Choose two.) Group of answer choices tracert6 tracepath6 trace6 traceroute6

tracepath6 traceroute6

Which of the following is a valid APIPA address? Group of answer choices 10.11.12.13 127.0.0.1 169.254.38.101 192.168.1.17

169.254.38.101

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? Group of answer choices 8 32 48 128

48

Which of the following ports would be used to resolve a domain name to an IP address? Group of answer choices 23 69 53 443

53

If no level of compression is specified, the gzip command assumes what compression level? Group of answer choices 7 5 4 6

6

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output? a. \ b. & c. ; d. |

;

Which of the following will take output from a command and append it to the end of a file? a. < b. << c. > d. >>

>>

When issuing the ls -F command, what special character indicates a linked file? a. @ b. * c. & d. =

@

When using the vi text editor, which of the following keys, when in command mode, will change to insert mode and place the cursor at the end of the current line? a. i b. a c. I d. A

A

Which of the following types of encryption uses a pair of keys known as a public and private? a. symmetric b. asymmetric c. SHA1 hashing d. message digest

Asymmetric

Which of the following is the default desktop environment used by Linux Mint? a. GNOME b. KDE c. Unity d. Cinnamon

Cinnamon

The United States Air Force was able to install Linux on a popular gaming console and then connect over 1,700 of these systems together to work as one big supercomputer. Which of the following types of technologies did they implement? a. herding b. cloud computing c. group computing d. clustering

Clustering

f a process state is currently showing as uninterruptible sleep, which letter will show in the output of the ps command? a. S b. U c. N d. D

D

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? Group of answer choices public DMZ trusted internal

DMZ

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? Group of answer choices DHCP NTP DNS NIS

DNS

Which of the following SQL statements can be used to delete a table from a database? Group of answer choices DROP FROM database TABLE table_name; DROP TABLE table_name; ALTER DATABASE database DROP TABLE table_name; DELETE TABLE table_name;

DROP TABLE table_name;

Which of the following does the -r option for the gpg command specify? Group of answer choices Encrypt for the user id given. Revoke keys from the key server. Remote key server to query. Retrieve keys for given key ID.

Encrypt for the user id given.

Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do not charge for the software but also do not distribute the source code along with it? a. shareware b. freeware c. malware d. tryware

Freeware

When using the vi text editor, which of the following keys, when in command mode, will move to the last line in the document? a. G b. L c. P d. W

G

Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used? Group of answer choices GROUP BY JOIN HAVING ORDER BY

GROUP BY

When working with Sendmail, what command can be used to test SMTP support? Group of answer choices EHLO telnet smtp HELO

HELO

Which of the following is the greatest expense for companies using Linux? a. Additional software b. Operating system cost c. Hiring people to maintain the Linux system d. Software upgrades

Hiring people to maintain the Linux system

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables? Group of answer choices FULL OUTER JOIN INNER JOIN RIGHT JOIN LEFT JOIN

INNER JOIN

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table? Group of answer choices INSERT ('George', 'Washington') INTO users (firstname, lastname); INSERT INTO users (firstname, lastname) values ('George', 'Washington'); UPDATE users SET firstname = 'George', lastname = 'Washington'; ALTER TABLE users SET firstname = 'George', lastname = 'Washington';

INSERT INTO users (firstname, lastname) values ('George', 'Washington');

Which of the following will the split command do on a file when no other options are specified? a. It will split a file into new files that are 1 kilobyte each. b. It will split a file into new files that are 1 megabyte each. c. It will split a file into new equally sized files that are 1/10th of the original file size. d. It will split a file into new files that are 1,000 lines each.

It will split a file into new files that are 1,000 lines each.

Which of the following would be a term applicable to an e-mail program on a workstation that is used to view email? a. MTA b. MDA c. MUA d. MBR

MUA

What DNS resource record type is used to provide the IP address for the e-mail server for a zone? Group of answer choices NS CNAME MX SOA

MX

Which of the following types of DNS records need to be configured to facilitate email delivery? Group of answer choices IMAP PTR CNAME MX

MX

Which of the following will invalid entries in the GRUB2 configuration cause? a. kernel warning automatically skipping invalid entries b. kernel panic and halt the system c. kernel error with confirmation to skip invalid entries d. no error, automatically skipping invalid entries until a valid entry is found

No error, automatically skipping invalid entries until a valid entry is found

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented? Group of answer choices Kerberos CUPS OTP Finger

OTP

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be: a. Arguments b. Options c. Keywords d. Metacharacters

Options

Which of the following are examples of multifactor authentication? Group of answer choices Password and PIN A USB token and a Common Access Card Thumbprint reader and facial recognition Password and fingerprint reader

Password and fingerprint reader

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization? a. file server b. DNS server c. proxy server d. DHCP server

Proxy server

Which of the following types of cloud platforms would a webmail service offered to the general public be considered? a. SaaS b. PaaS c. IaaS d. MaaS

SaaS

Which of the following does a Linux kernel use to store the value of epoch time? a. The number of days since January 1, 1900 b. The number of minutes since January 1, 1900 c. The number of seconds since January 1, 1970 d. The number of milliseconds since January 1, 1980

The number of seconds since January 1, 1970

What would be the result of running the command chown :root file1.txt a. This would set the owner of file1.txt to root. b. This would set the group ownership of file1 to root. c. This would set the owner and group ownership of file1 to root. d. This would keep the current ownership of the file, and add root as a second owner of the file.

This would set the group ownership of file1 to root.

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of? Group of answer choices IGMP UDP TCP ICMP

UDP

Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running? a. Kickstart b. Upstart c. GRUB d. POST

Upstart

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration Group of answer choices There must be at least 3 characters that are different from their previous password. Users cannot re-use their last 3 passwords. The minimum password length has to be at least 3 characters long. Users must use at least 3 characters as numbers in their passwords.

Users must use at least 3 characters as numbers in their passwords.

Which of the following can be used to graphically remotely administer a Linux machine? Group of answer choices FTP VNC RDP Telnet

VNC

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? Group of answer choices ADSL NTP VLAN VPN

VPN

Which of the following server roles does Apache perform? a. web server b. mail server c. name server d. certificate authority

Web server

Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system? Group of answer choices wget tar APT YUM

YUM

Which type of CM software can connect to inventory members via SSH to perform configuration management activities? Group of answer choices agentless BLOB Agent-based Kickstart

agentless

Which of the following commands can you use to search available repository information? (Choose two.) Group of answer choices apt query apt apt-cachea pt-query

apt apt-cache

Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list? Group of answer choices apt upgrade all apt upgrade apt update apt-upgrade

apt upgrade

Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system? Group of answer choices apt-get update apt-get update-all apt-get upgrade apt-get upgrade all

apt-get upgrade

A calendar for the current month can be shown on the command line by issuing which command? a. date b. cal c. w d. id

cal

Which of the following commands will display the current CPU(s) detected by a Linux system? a. cat /sys/cpuinfo b. cat /proc/cpuinfo c. cat /etc/cpu.conf d. cat /var/log/boothw.log

cat /proc/cpuinfo

In order to move from the /home/joe/test/data to the /home/joe directory, what command should be issued? a. cd .. b. cd ../.. c. /home/joe d. cd ./..

cd ../..

Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires? a. usermod --expiry jsmith b. chage -u jsmith c. chage -l jsmith d. lsuser jsmith

chage -l jsmith

Which of the following commands will change the SELinux security context of a file? Group of answer choices sechange chcon secontext scont

chcon

Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files? Group of answer choices diskdup sysbackup cpio bkup

cpio

Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute? a. run b. cron c. do d. while

cron

Which of the following commands will show the current user cron jobs that have been created for the currently logged in user? a. cronjobs --list b. cron --list c. cron -l d. crontab -l

crontab -l

You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program? a. ctrl-c b. ctrl-q c. ctrl-w d. ctrl-x

ctrl-c

Which command can be used at a BASH command prompt to obtain a Web page? Group of answer choices curl apachect1 ab webpage

curl

Which of the following file extensions are used by the Debian Package Manager? Group of answer choices .dpm .d .deb .dpkg

deb

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them? Group of answer choices agent-based imperative configuration declarative configuration agentless

declarative configuration

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them? Group of answer choices declarative configuration agentless agent-based imperative configuration

declarative configuration

Which command should you run after installing a new kernel module to update the module dependency database? a. insmod b. modprobe c. lsmod d. depmod

depmod

Kate wants to compare two text files to identify what might have been changed from one version to another. Which of the following commands can she use to do this? a. match document1.txt document2.txt b. version --compare document1.txt document2.txt c. compare document1.txt document2.txt d. diff document1.txt document2.txt

diff document1.txt document2.txt

Which of the following commands will display messages that were displayed during the boot sequence by the kernel? a. kdis b. kernlog c. messages d. dmesg

dmesg

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system? Group of answer choices dmidecode biosinfo hwls lsuefi

dmidecode

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.) Group of answer choices nameserver 10.1.1.4 10.1.15.60 server10 domain comptia.org order hosts, bind

domain comptia.org nameserver 10.1.1.4

Which of the following commands can be used to modify configuration options for DPM packages after they have been installed? Group of answer choices dpkg-config dpkg-update dpkg-configure dpkg-reconfigure

dpkg-reconfigure

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? a. dpm.log b. dpkg.log c. dpackage.log d. packages.log

dpkg.log

Which of the following are valid permissions for a directory where the command chmod 1777 has been used to set the permissions on it? a. drwxrwxrwt b. Srwxrwxrwx c. trwxrwxrwx d. drwxrwxrw-

drwxrwxrwt

Which of the following commands will display the exit status of the last command used in the BASH shell? a. echo $status b. echo $exit c. echo $? d. echo $!

echo $?

Which of the following commands can be used to view the quota for a user? Group of answer choices quotas jsmith quotadisp jsmith edquota -u jsmith quota --view jmith

edquota -u jsmith

Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out to the terminal. Which of the following commands could Garrett use to perform this search? a. grep -E "(John|Bob)" salesemployees.csv b. grep (John|Bob) salesemployees.csv c. grep -E (John|Bob) salesemployees.csv d. egrep (John|Bob) salesemployees.csv

egrep (John|Bob) salesemployees.csv

Which of the following commands will display detailed information for network hardware? Group of answer choices ethtool lshw --net lsnet hwdisp --network

ethtool

After a shell is no longer needed, what command can be given to exit the shell? a. exit b. stop c. reset d. quit

exit

If the mkfs command is executed to create a filesystem and only the block device name is specified, which of the following filesystems will be created? a. exFAT b. ext2 c. ext3 d. ext4

ext2

Which of the following commands can you use to list users who have been locked out by pam_faillock.so? Group of answer choices faillock pam_faillock pam_tally2 locklist

faillock

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? Group of answer choices blocks chkdisk fsck chkfs

fsck

Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all existing MBR partitions on a disk? a. gdisk b. cfdisk c. gfdisk d. iconv

gdisk

Which of the following will display entries from the Name Service Switch libraries? Group of answer choices dispdet nss nsslist getent

getent

Which of the following commands should you use to specify that you want to use Git for version tracking on them? a. git version b. git track c. git add d. git new

git add

Which command can be used to download an updated copy of the master branch from the original Git repository? a. git pull origin master b. git pull original master c. git pull master original d. git pull master origin

git pull origin master

Which of the following commands will generate a GPG public/private key pair? Group of answer choices gpg --new-key gpg-generate gpg-key --generate gpg --gen-key

gpg --gen-key

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? Group of answer choices set hostname="server1" hostnamectl set-hostname server1 host server1 ifconfig server1

hostnamectl set-hostname server1

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this? Group of answer choices ethconfig 0 netconfig eth0 ifconfig eth0 dhcpaddr eth0

ifconfig eth0

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? Group of answer choices interface eth0 --status up ifup eth0 netctl eth0 up int eth0 up

ifup eth0

Which of the following can you use to configure firewall rules for IPv6 on a Linux system? Group of answer choices ip6tables fw --ipv6 fw6 netfilter -6

ip6tables

In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed? a. libvm b. virsh c. vmlib d. libvert

libvert

Which of the following commands will show a number of environment variables that start with LC_? a. localvar b. locale c. env d. printenv

locale

Which of the following permissions would show for a symbolic link when displayed with the ls -l command? a. -rw-r--r-- b. srwxrwxrwx c. lrwxrwxrwx d. srw-r--r--

lrwxrwxrwx

Select the command that can be used to provide a long listing for each file in a directory: a. ls -T b. ls -L c. ls -F d. ls -I

ls -I

Which of the following commands can be used to display general hardware information for the entire system? a. lshw b. lscpu c. hwdisp d. hware

lshw

Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? a. psfiles b. lsof c. pstatus d. pids

lsof

A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device? a. usbdetect b. modusb c. lspci d. lsusb

lsusb

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered? Group of answer choices mailqueue mail --queue mail -q mailq

mailq

What command looks for a Makefile and uses the information within it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? Group of answer choices install make make install configure

make

After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem? Group of answer choices make make install make image make clean

make install

Dustin runs a command at the command line trying to find out what kernel version the system is running. However, it doesn't give him the information he needs. He knows there is an option that can be used to display the kernel version. How can he find out which option to use? a. ver --help b. help version c. man uname d. lsproc -?

man uname

Which of the following commands can be used to create and manage a software RAID configuration after installation? a. mdadm b. raidadm c. dmadm d. madam

mdadm

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist? a. mkdir -r ~/2019projects/project/projectplans b. mkdir -p ~/2019projects/project/projectplans c. mkdir --all ~/2019projects/project/projectplans d. mkdir -v ~/2019projects/project/projectplans

mkdir -p ~/2019projects/project/projectplans

Which of the following commands cannot be used to create an exFAT filesystem on a USB thumb drive that is recognized as /dev/sdb? a. mkfs.exfat /dev/sdb1 b. mkfs exfat /dev/sdb1 c. mkexfatfs /dev/sdb1 d. mke2fs.exfat /dev/sdb1

mkfs exfat /dev/sdb1

Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information? a. modstatus bluetooth b. lsmod bluetooth c. modinfo bluetooth d. modstat Bluetooth

modinfo bluetooth

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename? Group of answer choices upload filename get filename mput filename put filename

mput filename

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? Group of answer choices mtr tracepath tracert traceroute

mtr tracepath traceroute

Jim wants to rename a directory for a project that he has been working on. Which of the following commands can he use to perform that action? a. mv projectx projecty b. rename projectx projecty c. ren projectx projecty d. move projectx project

mv projectx projecty

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) Group of answer choices netstat -t udp netstat --udp netstat -u netstat udp

netstat --udp netstat -u

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? Group of answer choices mail alias newaliases sendmail

newaliases

Which of the following commands will display the output of a file while also displaying a line number at the left side of each line for the /etc/passwd file? a. numbers /etc/passwd b. wc -l /etc/passwd c. nl /etc/passwd d. ln /etc/passwd

nl /etc/passwd

Which of the following utilities can be used by a system administrator to determine which services are responding to network requests? Group of answer choices netscan portscan pmap nmap

nmap

On a system running NetworkManager, which of the following commands can be used to view or modify connection information? Group of answer choices nmcli netctonf nm netman

nmcli

Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node? a. nodesh b. nodemem c. nodememstats d. showmem

nodememstats

Which of the following can be used preceding a command to prevent a process from terminating when the parent process terminates? a. bg b. runat c. & d. nohup

nohup

Which of the following permissions should a standard user have on the /etc/shadow file? Group of answer choices read, write, and execute none of the above read read and write

none of the above

What PostgreSQL command-line utility backs up PostgreSQL database settings? Group of answer choices pg_backup pg_dumpall pg_restore pg_dump

pg_dump

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? Group of answer choices finger ethstat transit ping

ping

Mike has changed directory into one subdirectory after the next and has lost track of where he's at in the directory tree. Which of the following commands can he use to tell him the full path to the current subdirectory he is in? a. cd - b. pwd c. cwd d. ls -dir

pwd

What command can be issued to confirm which directory you are in at a command line prompt? a. dir b. pwd c. whereami d. ld

pwd

Which of the following commands will delete a directory and all of the files contained within it? (Choose all that apply.) a. rm olddir b. rmdir olddir c. rm -rf olddir d. rmdir -rf olddir

rm -rf olddir

Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest? Group of answer choices md5sum sha256sum md4sum sha1sum

sha256sum

Which of the following commands can be used to display socket information out to the terminal screen? Group of answer choices ss woolsocks opensocks sstat

ss

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? Group of answer choices tshark wshark ushark nshark

tshark

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) Group of answer choices udevadm control -r udevadm --reload udevadm control --reload udevadm control -R

udevadm control --reload udevadm control -R

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.) Group of answer choices wwwretr wget GET curl

wget curl

Which Linux command can be utilized to display your current login name? a. who b. whoami c. id d. w

whoami

What command can be used to display the contents of a file that was compressed with the compress utility? Group of answer choices zcat ccat acat cat

zcat

The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use? Group of answer choices apt dnf rpm zypper

zypper


Kaugnay na mga set ng pag-aaral

chapter 13 nervous system brain and cranial nerves

View Set

Insurance Professionals In Focus

View Set

Macroeconomic 2105 Final Exam UGA, UGA Macro CH 9 Problems and Applications (Book), Econ 2105 Chs 9-12, Macroeconomic 2105 Final Study Guide

View Set

Retirement & Estate Planning Final exam

View Set