Linux + Final
You need to search through a large text file and find any record that contains either Luke or Laura at the record's beginning. Also, the phrase Father is must be located somewhere in the record's middle. Which of the following is an ERE pattern that could be used with the egrep command to find this record?
"(^Luke|^Laura).*Father is.*"
Which diff option is the best option to allow you to quickly determine if two text files are different from one another?
-q
Katie wants to display the most recent entries in the journal log on her Linux system. What journalctl option should she use?
-r
What filename extension do UEFI bootloader files use?
.efi
What file name extension does the CentOS Linux distribution use for packages?
.rpm
What folder does the udev program use to create a permanent link to a storage device based on its serial number?
/dev/disk/by-id
What raw device file would Linux create for the second SCSI drive connected to the system?
/dev/sdb
By default, STDOUT goes to what item? /dev/ttyn, where n is a number.
/dev/tty
User environment files typically come from where?
/etc/skel/
Where should you place a new configuration file to add a third-party repository to a Red Hat-based package management system?
/etc/yum.repos.d
Which folder contains template files for each time zone that Linux supports?
/usr/share/zoneinfo
What program does the workstation firmware start at boot time?
A bootloader
The grep utility can employ regular expressions in its PATTERN. Which of the following best describes a regular expression?
A pattern template you define for a utility, which uses the pattern to filter text
The cut utility often needs delimiters to process text records. Which of the following best describes a delimiter?
A single space or a colon (:) that creates a boundary between different data items in a record
Which of the following best defines a file descriptor?
A six-character name that represents standard output
What server role should you implement to block your local network clients from accessing sports websites during business hours?
A web proxy
On your server, you need Service-B to start immediately before Service-A. Within the systemd Service-A unit configuration file, what directive should you check and potentially modify?
After
Which of the following best describes a digital signature?
An original plaintext hash, which is encrypted with a private key and sent along with the cipher text
Which web server is used in the popular LAMP stack?
Apache
You are trying to decide whether to use a hard link or a symbolic link for a data file. The file is 5GB, has mission-critical data, and is accessed via the command line by three other people. What should you do?
Create three hard links and provide the links to the three other people for data protection.
What is used to automatically assign an IP address to a client?
DHCP
What package do you need to install to allow your Linux server to provide IP addresses to clients on your local network?
DHCPd
What device setting defines a host that maps a hostname to an IP address?
DNS server
A _______ runs in background and listens for client connection requests for a single application.
Daemon
You have a lengthy file named, FileA.txt. What will the head -15 FileA.txt command do?
Display the first 15 lines of the file.
Time and space to generate archives are not an issue, and your system's environment is not a high IO one. You want to create full backups for your system only once per week and need to restore data as quickly as possible. Which backup type plan should you use?
Full archive weekly; differential daily
Peter Quill, a Linux system administrator, has been testing a new firewalld configuration. The test was successful. What should Mr. Quill do next?
Issue the firewall-cmd --runtime-to-permanent command using super user privileges.
What is the term commonly used for when the Linux system halts due to a system error?
Kernel panic
Which part of the Linux mail process is responsible for sending emails to remote hosts?
MTA
Linux uses to add the file-system on a new storage device to the virtual directory.
Mount points
What protocol should you use to mount folders from remote Linux servers on your local Linux server?
NFS
Which authentication package used to be called by the name "Yellow Pages"?
NIS
Which tool do newer versions of Ubuntu use to set network address information?
Netplan
Tony is trying to troubleshoot errors produced by an application on his Linux system but has to dig through lots of entries in the journal log file to find them. What journalctl match option would help him by only displaying journal entries related to the specific application?
OBJECT_PID
The _________ package allows you to create a secure tunnel across a private network to access your local network remotely.
OpenSSH
What SELinux mode tracks policy violations but doesn't enforce them?
Permissive
How does a server know what client request is sent to which application daemon?
Ports
Barbara wants to ensure that the journal log files will be saved after the next reboot of her Linux system. What systemd-journald configuration setting should she use?
Storage=persistent
Which environment variable can programmers use to temporarily change the time zone setting for just their environment?
TZ
A user has logged into the tty3 terminal. Which of the following user environment files is executed first if found in the user's home directory?
The .bash_profile file
You use the useradd -D command to view account creation configuration directives. What file does this command pull its displayed information from?
The /etc/default/useradd file
The last command, by default, pulls its data from what file?
The /var/log/wtmp file
You create an account using the appropriate utility, except for some reason the account's home directory was not created. Which of the following most likely caused this to occur?
The CREATE_HOME directive is not set.
Where does the firmware first look for a Linux bootloader program?
The Master Boot Record (MBR)
Sam needs to allow standard users to run an application with root privileges. What special permissions bit should she apply to the application file?
The SUID bit
You have completed a full archive and sent it to a remote system using the sftp utility. You employ the md5sum program on both the local archive and its remote copy. The numbers don't match. What most likely is the cause of this?
The archive was corrupted when it was transferred.
You need to quickly create a special archive. This archive will be a single compressed file, which contains any .snar files across the virtual directory structure. Which archive utility should use?
The cpio utility
The system admin took an archive file and applied a compression utility to it. The resulting file extension is .gz. Which compression utility was used?
The gzip utility
What memory area does Linux use to store boot messages?
The kernel ring buffer
You are transferring files for a local backup using the sftp utility to a remote system and the process gets interrupted. What sftp utility command should you use next?
The reput command
The cat -E MyFile.txt command is entered, and at the end of every line displayed is a $. What does this indicate?
The text file records end in the ASCII character LF.
Which of the following commands will display CPU load data along with information concerning users who are currently logged into the system?
The w command
A ___________ determines the time relative to the UTC time in a specific location.
Time zone
The_____firmware method has replaced BIOS on most modern IBM-compatible computers.
UEFI
Which character set has replaced ASCII as the default character set used in U.S. Linux installations?
UTF-8
Which character set uses a 3-byte code and can represent characters from most languages used in the world?
Unicode
You are trying to peruse a rather large text file. A coworker suggests you use a pager. Which of the following best describes what your coworker is recommending?
Use a utility that allows you to view one text page at time.
Which field contains the same data for both a /etc/passwd and /etc/shadow file record?
User account's username
Which bonding mode would you use to combine two network interfaces to create a single network interface with double the amount of bandwidth to your Linux server?
aggregation, mode 4
Which of the following is NOT a PAM control flag?
allowed
Which program should you use to download tarballs from an application's website?
cURL
A short text-based control file is no longer working properly with the program that reads it. You suspect the file was accidentally corrupted by a control code update you performed recently, even though the file's control codes are all correct. Which command should you use next on the file in your problem investigation?
cat -v
Nancy wants to write a rsyslogd rule that separates event messages coming from the system job scheduler to a separate log file. Which syslog facility keyword should she use?
cron
You have a text file, monitor.txt, which contains information concerning the monitors used within the data center. Each record ends with the ASCII LF character and fields are delimitated by a comma (,). A text record has the monitor ID, manufacture, serial number, and location. To display each data center monitor's monitor ID, serial number, and location, use which cut command?
cut -d "," -f 1,3,4 monitor.txt
Which command do you use to display the current time and date using a specific output format?
date
You need to create a low-level backup of all the data on the /dev/sdc drive and want to use the /dev/sde drive to store it on. Which dd command should you use?
dd of=/dev/sde if=/dev/sdc
You need to edit quota grace periods. Which of the following commands should you use?
edquota -t
Your system uses systemd and has a service currently set to not start at system boot. You want to change this behavior and have it start. What systemctl command should you employ for this service?
enable
What option sets the wireless access point name in the iwconfig command?
essid
What filesystem is the latest version of the original Linux filesystem?
ext4
The program is a handy tool for repairing corrupt filesystems.
fsck
What is the most common compiler used for open-source Linux applications?
gcc
Sally needs to view the ACL permissions assigned to a file on her Linux server. What command should she use?
getfacl
Which partitioning tool provides a graphical interface?
gparted
You need to figure out what configuration file(s) hold a host name directive. Which of the following commands is the best one to use?
grep
You are a system administrator on a CentOS Linux server. You need to view records in the /var/log/messages file that start with the date May 30 and end with the IPv4 address 192.168.10.42. Which of the following is the best grep command to use?
grep "May 30.*192.168.10.42" /var/log/messages
What command must you run to save changes to a GRUB Legacy boot menu?
grub-install
You need to insert the abc module into the Linux kernel. This module does not have any dependencies. What is the best utility to use?
insmod
If your Linux server doesn't have a graphical desktop installed, what tool could you use to configure network settings from the command line
ip
James needs to log all kernel messages that have a severity level of warning or higher to a separate log file. What facility and priority setting should he use?
kern.warn
For an application to use PAM, it needs to be compiled with which PAM library?
libpam
What Linux command displays all of the localization environment variables and their values?
locale
What Systemd utility allows you to change the localization on your Linux system?
localectl
Which of the following commands will help you determine whether your display server is Wayland or X11?
loginctl
What tool do you use to manually add a filesystem to the virtual directory?
mount
Which command allows you to append a partition to the virtual directory on a running Linux system?
mount
What popular open source web server can also perform as a load balancer?
nginX
What syslog severity level represents normal but significant condition messages?
notice
A text file, StarGateAttacks.txt, needs to be specially formatted for review. Which of the following commands is the best command to accomplish this task quickly?
pr
You have two short text files that have maximum record lengths of 15 characters. You want to review these files side by side. Which of the following commands would be the best to use?
pr -mtl 20
A problem has occurred concerning group quotas on three filesystems. You need to quickly remove all filesystems' quota limits to temporarily resolve this issue. What is the best command to employ?
quotaoff -a
You have modified an OpenSSH service's configuration file, /etc/ssh/ssh_config. The service is already running. What is the best command to use with systemctl to make this modified file take immediate effect?
reload
A long-time server administrator has left the company, and now you are in charge of her system. Her old user account directory tree, /home/Zoe/, has been backed up. Which command is the best one to use to quickly remove her files?
rm -rI /home/Zoe
You have a file that is over 10GB in size, and it needs to be backed up to a locally attached drive. What is the best utility to use in this situation?
rsync
What configuration file does the rsyslogd application use by default?
rsyslog.conf
What are the equivalent symbolic mode permissions for the octal mode value of 644?
rw-r--r--
What command parameter would you add to the end of the GRUB2 linux command to force a Linux system to start in single-user mode?
single
Which of the following commands will put any generated error messages into the black hole?
sort SpaceOpera.txt 2> /dev/null
Which command displays which ports the processes use on Linux systems?
ss
You (username Samantha) are logged into a laptop (IP address 192.168.0.42) running a Linux GNOME Classic desktop environment at your company desk in Building A. A problem has occurred on a rack-mounted Linux system (IP address 192.168.0.7) in Building C. You need to securely access a GUI application on the remote system that uses X11. What command should you use?
ssh -X [email protected]
Which of the following is an example of UFW simple syntax for blocking all incoming and outgoing OpenSSH connections without providing a blocking message?
sudo ufw deny 22/tcp
What protocol became a de facto standard in Linux for tracking system event messages?
syslog
Harry has finished writing his application source code but needs to package it for distribution. What tool should he use so that it can be extracted in any Linux distribution?
tar
Which command displays the current date, system time, hardware time, and time zone?
timedatectl
Your boss has asked you to remove KSingh's account and all his home directory files from the system immediately. Which command should you use?
userdel -r KSingh
Which of the following commands is the best one to add JKirk as a member to a new group called the NCC-1701 group and not remove any of the account's previous group memberships?
usermod -aG NCC-1701 JKirk
What user groups are commonly used to assign privileges for group members to run applications as the administrator?
wheel
Which of the following files may be involved in authenticating with SSH keys?
~/.ssh/id_rsa
The OpenSSH application keeps track of any previously connected hosts and their public keys in what file?
~/.ssh/known_hosts