Linux Week 5 - Qiuz 20-24

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The network engineer Keenser believes the choices of name servers in the system's /etc/resolv.conf file, which is inefficient. Which of the following utilities can he employ to test new server choices? dnsmasq whois nmap nslookup

nslookup

Which of the following are true concerning a network socket? Choose all that apply - A single endpoint of a network connection's two endpoints - Uses a combination of an IP address and a port number - An endpoint between processes on a local system - Provides better inter-process communication then the localhost

- A single endpoint of a network connection's two endpoints - Uses a combination of an IP address and a port number

Tarissa needs to run a shell script, which has the permissions of rwxr--r--, is owned by root and belongs to the wheel group. Tarissa's user account is T2T1000, and she is a member of the admin group. What can be down to allow her to run this script? Choose all that apply - Add Tarissa to the wheel group - Add w to the script file's group permissions - Add x to the script file's group permissions - Nothing. Tarissa can run the script now

- Add Tarissa to the wheel group - Add x to the script file's group permissions

Sarah a system administrator attempts to create a file and receives an error message indicating the file cannot be created. Which of the following might be the problem? Choose all that apply - The filesystem on which she is attempting to create the file has quotas set, and she is past her quota and grace period - The filesystem on which she is attempting to create the file has run out of space - The file that she is attempting to create has an immutable bit set and therefore cannot be created - The action is triggering either an SELinux or an AppArmor policy violation - The filesystem is experiencing inode exhaustion and therefore cannot accommodate any new files

- The filesystem on which she is attempting to create the file has quotas set, and she is past her quota and grace period - The filesystem on which she is attempting to create the file has run out of space - The action is triggering either an SELinux or an AppArmor policy violation - The filesystem is experiencing inode exhaustion and therefore cannot accommodate any new files

A clock-in/out application which uses an NTP server on the local network is throwing an error concerning reaching the server. There are currently no network problems. Which of the following are steps in the troubleshooting process for this issue? Choose all that apply -Check the firewall ACLs on the NTP server -Check the firewall ACLs on the application server -Use the firewall-cmd--get-default-zone command -Check the /etc/services file for NTP ports and transport protocols -View firewall log entries

-Check the firewall ACLs on the NTP server -Check the firewall ACLs on the application server -Check the /etc/services file for NTP ports and transport protocols -View firewall log entries

The system administrator Norman runs a Python program and receives an IO Error: [Error 13] Permission denied message. What information should he gather (or know) to start troubleshooting this issue? Choose all that apply -The disk type where the program resides -His user account name -The program action that raised the error -File name and directory location of the programs I/O files -The program's name

-His user account name -The program action that raised the error -File name and directory location of the programs I/O files

Harry's newly installed USB printer is not working. The system employs CUPS. Which of the following are steps that may be included in the troubleshoot process? Choose all that apply -Issue the less /etc/printcap file -Use the lpinfo -m command to view available USB port -Put a watch on the appropriate log file and plug in the USB cable -Use the dmesg and grep utilities to find printer information

-Put a watch on the appropriate log file and plug in the USB cable -Use the dmesg and grep utilities to find printer information

Where does Linux create files to send and receive data directly with devices? /sys /proc /etc /dev /dev/mapper

/dev

Katie Jane created a new LVM (Logical Volume Manager) volume on her Linux system. Where in the virtual directory should she look to find the virtual file related to the new volume? /sys /proc /etc /dev /dev/mapper

/dev/mapper

What file does the Linux system use to track ports used to communicate with PCI boards? /proc/ioports /proc/interrupts /sys /dev /proc/dma

/proc/ioports

Anton is struggling to determine why a particular user cannot log into a CentOS system, where SELinux is disabled and auditd is not used. Which of the following are the log files to peruse? Choose all that apply /var/log/audit/audit.log /var/log/auth /var/log/secure /var/log/lastlog

/var/log/secure /var/log/lastlog

Using the uptime command you will see CPU load averages in what increments? Choose all that apply 1 minute 5 minutes 10 Minutes 15 Minutes 20 Minutes

1 minute 5 minutes 15 Minutes

Peter writes a new C++ application to use for managing his older Linux server. The new app contains no programming or logic errors. However when he tries to compile it it does not work which of the following is most likely the issue? -An incorrect application permission -An incorrect file permission -A missing or outdated GCC -A missing or outdated device -A repository problem

A missing or outdated GCC

Vincent is attempting to remotely log into the system using OpenSSH without Success. He asks you what he can do to troubleshoot this problem. What should you recommend first? -Check the /etc/ss/sshd_config configuration file - Add the -vvv option on to Vincent's ssh command - Add the -X option on to Vincent's ssh command - Confirm Vincent's public key is stored in the ~/.ssh/authorized_keys file -Check the ~/,ssh/config configuration file

Add the -vvv option on to Vincent's ssh command

By default if you specify no command-line options what does the ps command display? - All processes running on the terminal - All active processes - All sleeping processes - All Processes run by the current shell - All processes run by the current user

All Processes run by the current shell

By default if you specify no command-line options what does the ps command display? - All processes running on the terminals - All active processes - All sleeping processes - All processes run by the current shell - All processes run by the current user

All processes run by the current shell

Which of the following are the types of option styles available for the ps command? Choose all that apply BSD Unix GNU Numeric

BSD Unix GNU

Which of the following are the types of option styles available for the ps command? Choose all that apply BSD Unix GNU Numeric

BSD Unix GNU

Sophia needs to connect her Linux system to a new network printer on the office network. What software package does she need to ensure is installed so she can configure the new network printer? X.org CUPS XFree86 X11 udev

CUPS

Irene normally logs into the system locally via the tty4 terminal but cannot today. However she tries her authentication at the tty3 terminal and logs in successfully. What should she check first? - Determine if getty services are running via the systemctl command - See if the account is locked via the passwd -S command - Use the last command to see when she last logged in - Check if the tty4 device file is corrupt via the ls -l command

Check if the tty4 device file is corrupt via the ls -l command

Lamar, a contractor, claims he cannot log into his account locally. He was able to do so yesterday. No one else seems to be having problems accessing the system. What should you check first? - Check if GUI services are running via the systemctl command - Determine if his account is expired via the chage command - See if the account is locked via the faillock utility - Check for policy violations in the SELinux log files

Determine if his account is expired via the chage command

Mary confirms via the sealert utility that her application cannot access the file flash.txt. What command should she use next? Is -l flash.txt Is -Z flash.txt Is -I flash.txt-directory setroubleshoot restorecon

Is -Z flash.txt

Mary adds the first SCSI disk to a Linux system that currently has only IDE drives. The system is not recognizing the new disk. Which of the following commands should she employ to troubleshoot the problem? Choose all that apply Is /sys/bus/scsi/drivers pvscan /dev/vg00/IvoI0 Ismod |grep module-name hdparm -B 127 device-filename smartctl -a

Is /sys/bus/scsi/drivers Ismod |grep module-name

Joel installed a new PCI card in his Linux system but is now getting a conflict with another device on the system. What command can he use to display the interrupts, I/O ports, and DMA channels in use by all of the existing devices? Isdev Isblk Ispci Isusb dmesg

Isdev

Frankie used the ps command to find the process ID of an application that he needs to stop. What command-line tool should he use to stop the application based on its process ID? renice pkill nice kill pgrep

Kill Reason: That allows him to stop an application that's already running by specifying its process ID

What type of hardware interface uses interrupts, I/O ports, DMA channels to communicate with the PC motherboard? USB GPIO PCI Monitor Printer

PCI

Harry has modified an application to create a file in a directory and then write data to it. The program creates the file with no problems but cannot write data to it and receives a permission error. Which of the following is most likely the issue? Directory ownership File ownership File group membership Permission inheritance Executable privileges

Permission inheritance

Melissa wants to set her default editor to the vim editor and wants this to stay set when she enters a subshell. What should she do? -Put EDITOR='vim' in the /etc/profile file -Put export EDITOR='vim' in the /etc/profile file -Put EDITOR='vim' in her ~/.profile file -Put export EDITOR='vim' in her ~/.profile file -Put export EDITOR='vim' in her ~/.bash.bashrc file

Put export EDITOR='vim' in her ~/.profile file

Shelly thinks that one of the applications on her Linux system is taking up too much physical memory and may have a problem. What column of data from the top output display should she focus on? VIRT RES SHR S %MEM

RES

What top command display cumulative CPU time instead of relative CPU time? I F r y S

S

What top command displays cumulative CPU time instead of relative CPU time? l F r y S

S

Peter's system has a memory-intensive application running on it continually. To help improve performance, he has replaced the old hard drives with solid-state drives instead of increasing RAM. Which of the following is most likely true about this situation? -The SSD for application data will enter into a degraded mode - The SSD for swap will become degraded storage - The SSD will need a namespace in its device file name - The SSD will end up the missing volume - The SSD will experience resource exhaustion

The SSD for swap will become degraded storage

Miles needs to change his present working directory to the /home/miles directory. He does not own the directory nor is he a member of its group. Assuming needed parent directory permissions are set what needs to take place for this to successfully occur? - The execute (x) permission needs to be added - The write (w) permission needs to be added - The read (r) permission needs to be added - The dash (-) permission needs to be added

The execute (x) permission needs to be added

Elliot is administering a Linux system that has multiple swap spaces. One is on a logical volume but it needs more space to accommodate additional RAM that is to be installed in the near future. What is the best way for Elliot to swap space? - Add a partition and format it with the mkswap command - Add a file and format it with the mkswap command - Add a partition via the swapon utility - Add a file via the swapon - Use LVM tools to increase the logical volume

Use LVM tools to increase the logical volume

How do you identify that legacy Unix style options for the ps command? - Use a double dash in front of the option - Use a single dash in front of the option - Do not place a dash in front of the option - Unix-style options use hexadecimal numbers

Use a single dash in front of the option

How do you identify the legacy Unix style options for the ps command? - Use a double dash in front of the option - Use a single dash in front of the option - Do not place a dash in front of the option - Unix-style options use hexadecimal numbers

Use a single dash in front of the option

Which software packages implement the X Windows graphical system in Linux? Choose all the apply X.org CUPS XFree86 X11 udev

X.org XFree86

From analysis Arthur believes the system's I/O throughput will improve by changing the I/O scheduler. On His system is a real-time application, which uses a database located on a solid-state drive. Which I/O scheduler should Arthur choose? deadline queue cfg noop

deadline

Which Linux command displays the contents of the kernel ring buffer? Isdev Isblk Ispci Isusb dmesg

dmesg Reason: event messages contained in the kernel ring buffer

Your System Administration team memberd Norman tells you the device located at the communications port is not working. What command should you issue to start the troubleshooting process? dmesg | grep -i COM dmesg | grep -i ttys sudo setserial -a /dev/COM1 sudo setserial -a /dev/ttyS0 cat /proc/interrupts

dmesg | grep -i ttys

Mark Watney a system administrator has his account MW2015 modified by a new system admin intern. When Mark logs into the system and tries to group a lost of commands it no longer works. No one else is having this problem. He suspects his account's default shell has been changed from /bin/bash to /bin/tcsh. Which of the following will determine if his suspicion is correct? Choose all that apply cat /etc/profile echo $SHELL sudo grep tcsh$ /etc/passwd sudo getent shadow MW2015

echo $SHELL sudo grep tcsh$ /etc/passwd

Mera a Linux system admin believes a new application on her system is producing too much I/O for a particular partition causing the system's processor to appear sluggish. Which tool should she use to test her problem cause theory? iostat ioping du df iotop

iostat

The system administrator, Preston has noticed that the IPv4 network seems sluggish. He decides to run some tests to check for high latency. Which of the following utilities should he use? iperf ping ip neigh dig traceroute

iperf ping traceroute

Frankie used the ps command to find the process ID of an application that he needs to stop. What command-line tool should he use to stop the application based on its process ID? renice pkill nice kill pgrep

kill

A user cannot delete one of her files but is able to delete other files in her directory. John a system admin is attempting to troubleshoot this issue. What command should he use first on the file? chown chattr chmod umask lsattr

lsattr Reason: It will display whether or not the immutable bit is set

Mr.Scott has formulated a problem cause theory that routers are saturated with traffic and dropping TCP packets from their queues. Which of the following commands should he employ to test this theory? Choose all the apply mtr ifconfig ethtool -s tracepath traceroute

mtr tracepath traceroute

Jessica has an application that crunches lots of numbers and uses a lot of system resources. She wants to run the application with a lower priority so it doesn't interfere with other applications on the system. What tool should she use to start the application program? renice pkill nice kill pgrep

nice

Jessica has an application that crunches lots of numbers and uses a lot of system resources. She wants to run the application with a lower priority so it doesn't interfere with other applications on the system. What tool should she use to start the application program? renice pkill nice kill pgrep

nice

You need to stop an application from running on your Linux system. You know the name of the application file but not the process ID assigned to it. What tool can you use to stop the application? renice pkill nice kill pgrep

pkill

You need to stop an application from running on your Linux system. You know the name of the application file, but not the process ID assigned to it. What tool can you use to stop the application? renice pkill nice kill pgrep

pkill reason: Command allows you to send a HUP signal to a running process based on a search term for the process name

Jimmy noticed his Linux system was running slow. He ran the top command and found out that a data-intensive application was consuming most of the CPU time. He doesn't want to kill the application but wants to give it a lower priority so it doesn't take up too much CPU time. What tool should he use to change the priority of the running application? renice pkill nice kill pgrep

renice

Jimmy noticed his Linux system was running slow. He ran the top command and found out that a data-intensive application was consuming most of the CPU time. He doesn't want to kill the application but wants to give it a lower priority so it doesn't take up too much CPU time. What tool should he use to change the priority of the running application? renice pkill nice kill pgrep

renice

Mary wants to view her system's processor performance over time. Which is the best utility for her to employ? uptime sysstat sar cat /proc/cpuinfo sysctl

sar

Ben updates his Ubuntu system's packages using the sudo apt-get upgrade command, and now the Apache Web service is not working properly. What command should he run? sudo apt-get clean sudo zypper clean -a sudo Idd /usr/sbin/apache2 sudo rpm -aV sudo apt-get check

sudo apt-get check

Gertie needs to determine a swap space element's type, name, and priority. Which command should she use? vmstat free fstab swapoff swapon -s

swapon -s

Charles noticed that his Linux system is running slow and needs to find out what application is causing the problem. What tool should he use to show the current CPU utilization of all the processes running on his system? top ps lsof pkill kill

top

Which program runs in the background monitoring the kernel ring buffer messages for new devices? X.org CUPS XFree86 X11 udev

udev

Which program allows you to reload the defined rules for detecting and installing new devices? udevadm udev Isusb Ispci Isdev

udevadm Reason: Allows you to send control message to the udev application running in the background


Kaugnay na mga set ng pag-aaral

Composition👉作文开头、结尾、好词好句

View Set

Chapter 9: Regulation of Transcription

View Set

Chapter 4- The market forces of supply and demand

View Set