Unit 9 Linux, NOS 120 Study Guide Ch. 8, NOS 120 Study Guide Ch. 10, NOS 120 Study Guide Ch. 11, NOS 120 Study Guide Ch. 12, NOS 120 Study Guide Ch. 13, NOS 120 Study Guide Ch. 14
Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.) Select one or more: a. getent /etc/shadow b. read /etc/shadow c. show /etc/shadow d. cat /etc/shadow
cat /etc/shadow getent /etc/shadow
Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires? Select one: a. usermod --expiry jsmith b. chage -u jsmith c. lsuser jsmith d. chage -l jsmith
chage -l jsmith
Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time? Select one: a. OVF b. cloud-init c. Kickstart d. Docker Hub
cloud-init
Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files? Select one: a. bkup b. sysbackup c. cpio d. diskdup
cpio
Which of the following commands will show the current user cron jobs that have been created for the currently logged in user? cronjobs --list cron --list cron -l crontab -l
crontab -l
You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program? Select one: a. ctrl-c b. ctrl-w c. ctrl-q d. ctrl-x
ctrl-c
You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program? ctrl-c ctrl-q ctrl-w ctrl-x
ctrl-c
Which of the following commands can be used to pause a printer named Printer1? Select one: a. cupsdisable Printer1 b. cupsreject -p Printer1 c. cupsreject Printer1 d. cupsdisable -c Printer1
cupsdisable Printer1
Which command can be used at a BASH command prompt to obtain a Web page? Select one: a. ab b. webpage c. curl d. apachect1
curl
Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them? Select one: a. imperative configuration b. agent-based c. agentless d. declarative configuration
declarative configuration
Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.) Select one or more: a. groupdel b. rmgroup c. rmg d. delgroup
delgroup groupdel
Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.) Select one or more: a. usermod -d b. userdel c. usermod -r d. deluser
deluser userdel
Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system? Select one: a. lsuefi b. dmidecode c. biosinfo d. hwls
dmidecode
Which of the following is the log file where Dandified YUM writes its log entries? Select one: a. dnf.log b. dyum.log c. dnf.rpm.log d. yumd.log
dnf.rpm.log
Which of the following commands can be used to modify configuration options for DPM packages after they have been installed? Select one: a. dpkg-config b. dpkg-update c. dpkg-configure d. dpkg-reconfigure
dpkg-reconfigure
Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? Select one: a. packages.log b. dpackage.log c. dpkg.log d. dpm.log
dpkg.log
Which of the following commands will display detailed information for network hardware? Select one: a. hwdisp --network b. lshw --net c. lsnet d. ethtool
ethtool
After a background process has been started, what command below can be used to move it to the foreground? Select one: a. fgnd b. fgd c. b2f d. fg
fg
After a background process has been started, what command below can be used to move it to the foreground? fg fgnd fgd b2f
fg
You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal? Select one: a. disp b. fg c. front d. jobs -f
fg
You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal? disp fg front jobs -f
fg
Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address? Select one: a. etchosts b. hosts c. local d. files
files
If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? Select one: a. chkfs b. blocks c. chkdisk d. fsck
fsck
Which of the following will display entries from the Name Service Switch libraries? Select one: a. nsslist b. getent c. nss d. dispdet
getent
Which of the following commands can a user run to display the groups that they are a member of? Select one: a. groupmod --list b. groups --list c. groupls d. groups
groups
You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? Select one: a. hostnamectl set-hostname server1 b. set hostname="server1" c. ifconfig server1 d. host server1
hostnamectl set-hostname server1
What command can be used to view and modify the date and time within the BIOS? Select one: a. clock b. date c. clkmod d. hwclock
hwclock
Which of the following commands can be used to convert files between different character encodings? Select one: a. conv b. transform c. convert d. iconv
iconv
The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? Select one: a. int eth0 up b. interface eth0 --status up c. ifup eth0 d. netctl eth0 up
ifup eth0
Which of the following can you use to configure firewall rules for IPv6 on a Linux system? Select one: a. fw --ipv6 b. ip6tables c. netfilter -6 d. fw6
ip6tables
Which of the following commands can be used to only show jobs that have been paused. Select one: a. jobs -r b. jobs -n c. jobs -p d. jobs -s
jobs -s
Which of the following commands can be used to only show jobs that have been paused. jobs -p jobs -s jobs -n jobs -r
jobs -s
Which of the following commands can you use to view events within the journald database? Select one: a. journal --display b. journald --list c. journalctl d. viewlogs --journald
journalctl
Which of the following log files contains information and error messages generated by the Linux kernel? Select one: a. wtmp b. secure c. dmesg d. kern.log
kern.log
Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357? sigkill 1357 killall 1357 kill -15 1357 kill -9 1357
kill -9 1357
When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.
known_hosts
Which of the following commands will list missing libraries as not found if a necessary library is not installed? Select one: a. ldso b. ldd c. ldchk d. ldconfig
ldd
Which of the following commands will show a number of environment variables that start with LC_? Select one: a. env b. localvar c. locale d. printenv
locale
Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer? Select one: a. lpoptions -d printer1 b. lp -d printer1 c. lpd -d printer1 d. lpq --set-default printer1
lpoptions -d printer1
Which of the following commands can you use to send a print job to printer1? (Choose all that apply.) Select one or more: a. lp -d printer1 mydocument.txt b. lp -p printer1 mydocument.txt c. lpr -d printer1 mydocument.txt d. lpr -P printer1 mydocument.txt
lpr -P printer1 mydocument.txt lp -d printer1 mydocument.txt
Which of the following commands will display the print jobs in the print queue for printer1 only? Select one: a. lpq -p printer1 b. lp -j printer1 c. lpstat -o printer1 d. lpq -d printer1
lpstat -o printer1
Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? Select one: a. psfiles b. pstatus c. lsof d. pids
lsof
Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? psfiles lsof pstatus pids
lsof
Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered? Select one: a. mail -q b. mail --queue c. mailq d. mailqueue
mailq
What command looks for a Makefile and uses the information within it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? Select one: a. make b. make install c. install d. configure
make
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem? Select one: a. make clean b. make image c. make d. make install
make install
Which of the following commands will generate a new initramfs? Select one or more: a. dracut b. mkinit c. mkinitrd d. cutram
mkinitrd, dracut
What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename? Select one: a. upload filename b. put filename c. get filename d. mput filename
mput filename
Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.) Select one or more: a. 10.1.15.60 server10 b. domain comptia.org c. nameserver 10.1.1.4 d. order hosts, bind
nameserver 10.1.1.4 domain comptia.org
Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) Select one or more: a. netstat -t udp b. netstat -u c. netstat udp d. netstat --udp
netstat -u
After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? Select one: a. newaliases b. sendmail c. mail d. alias
newaliases
On a system running NetworkManager, which of the following commands can be used to view or modify connection information? Select one: a. netctonf b. nmcli c. nm d. netman
nmcli
Which of the following can be used preceding a command to prevent a process from terminating when the parent process terminates? bg runat & nohup
nohup
Which of the following permissions should a standard user have on the /etc/shadow file? Select one: a. read b. read, write, and execute c. read and write d. none of the above
none of the above
What PostgreSQL command-line utility backs up PostgreSQL database settings? Select one: a. pg_backup b. pg_dumpall c. pg_dump d. pg_restore
pg_dump
Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? Select one: a. ethstat b. ping c. finger d. transit
ping
Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? Select one: a. ping -4 server1 b. ping -n 4 server1 c. ping server1 d. ping -c 4 server1
ping -c 4 server1
Which of the following commands can be used to terminate a process by the process name? kill pkill stop pskill
pkill
Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.) Select one or more: a. top b. jobs c. ps d. proc
ps top
Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.) ps proc top jobs
ps top
What command is used to display the lineage of a process by tracing its PPIDs until the init daemon? psbranch pstree psparent pshead
pstree
Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process? Select one: a. d b. p c. r d. n
r
Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process? n p r d
r
While the top command is running, what key can be pressed to change the nice value of a process? Select one: a. n b. v c. r d. p
r
While the top command is running, what key can be pressed to change the nice value of a process? n r p v
r
Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation? Select one: a. rpm -in package.rpm b. rpm -i --ignoredeps package.rpm c. rpm -ivh --nodeps package.rpm d. rpm -ivhn package.rpm
rpm -ivh --nodeps package.rpm
Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation? Select one: a. rpm -iap packagename.rpm b. rpm -iah packagename.rpm c. rpm -ivh packagename.rpm d. rpm -ivp packagename.rpm
rpm -ivh packagename.rpm
Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest? Select one: a. md4sum b. sha256sum c. md5sum d. sha1sum
sha256sum
Which of the following commands will shut down a Linux system? (Choose all that apply.) Select one or more: a. telinit 0 b. poweroff c. runlevel 0 d. shutdown -h now
shutdown -h now poweroff telinit 0
Which of the following commands can be used to display socket information out to the terminal screen? Select one: a. woolsocks b. opensocks c. ss d. sstat
ss
Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? Select one: a. su b. sudo c. doas d. sudoer
sudo
Which of the following commands will display a list of Systemd units sorted by the time they took to load? Select one: a. systemd --listload b. systemctl --listload c. systemd-analyze blame d. systemctl-analyze --blame
systemd-analyze blame
Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.) Select one or more: a. systemd-make b. logger c. mklog d. systemd-cat e. logentry
systemd-cat logger
Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen? Select one: a. tar -cfza b. tar -ngac c. tar -czvf d. tar -nzaf
tar -czvf
If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? Select one: a. noop b. cfq c. deadline d. testwr
testwr
When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? Select one or more: a. mtr b. tracert c. traceroute d. tracepath
tracepath traceroute mtr
Which of the following commands can be used to trace an IPv6 route? (Choose two.) Select one or more: a. traceroute6 b. trace6 c. tracepath6 d. tracert6
tracepath6 traceroute6
Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? Select one: a. wshark b. nshark c. ushark d. tshark
tshark
Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use? Select one: a. tzselect b. timezones c. zoneselect d. zones
tzselect
Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) Select one or more: a. udevadm --reload b. udevadm control --reload c. udevadm control -R d. udevadm control -r
udevadm control -R udevadm control --reload
Which of the following commands can be used to delete a user account? Select one: a. deluser b. rmuser c. expireuser d. userdel
userdel
Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled? Select one: a. usermod -f 15 jsmith b. usermod -e 15 jsmith c. usermod -x 15 jsmith d. usermod -d 15 jsmith
usermod -f 15 jsmith
Which of the following is the first field of the /etc/passwd file? Select one: a. username b. GID c. GECOS d. UID
username
Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute? run watch do while
watch
Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.) Select one or more: a. curl b. wwwretr c. wget d. GET
wget curl
Which of the following is a special group that provides its members with the ability to run the su and sudo commands? Select one: a. sys b. adm c. sudoers d. wheel
wheel
What command can be used to display the contents of a file that was compressed with the compress utility? Select one: a. cat b. acat c. ccat d. zcat
zcat
Which of the following states describe a process that is waiting for a parent process to release its PID? Select one: a. dead b. wait c. suspended d. zombie
zombie
Which of the following states describe a process that is waiting for a parent process to release its PID? wait suspended zombie dead
zombie
The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use? Select one: a. zypper b. apt c. dnf d. rpm
zypper
If incompatible X Windows settings are configured, where will the errors that are generated be written to? Select one: a. /var/log/xwindows.error b. ~/.xerror c. ~/.xwin-error d. ~/.xsession-errors
~/.xsession-errors
Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system? Select one: a. -U b. -F c. -i d. -u
-U
Which of the following options can be used with the usermod command to change the description of the user account that is stored in the GECOS field? Select one: a. -g b. -c c. -s d. -d
-c
What option can be used with the ps command to display an entire list of processes across all Terminals, including daemons? -a -f -e -l
-e
What option can be used with thepscommand to display an entire list of processes across all Terminals, including daemons? Select one: a. -e b. -f c. -a d. -l
-e
When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file? Select one: a. -a b. -v c. -s d. -c
-v
Which of the following file extensions are used by the Debian Package Manager? Select one: a. .dpkg b. .d c. .dpm d. .deb
.deb
Which of the following is not a valid compression file extension for the Linux operating system? Select one: a. .bz2 b. .vz c. .xz d. .gz
.vz
Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed? Select one: a. /24 b. /28 c. /27 d. /23
/27
The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket? Select one: a. /etc/rsyslog.socket b. /var/log.sock c. /tmp/log d. /dev/log
/dev/log
Which of the following is the full path and file name where the Debian Package Manager repositories can be configured? Select one: a. /etc/dpm/repositories.conf b. /etc/apt.source.conf c. /etc/apt/sources.list d. /etc/dpm.conf
/etc/apt/sources.list
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? /etc/cron.deny /etc/cron.d/cron.deny /etc/cron.allow /etc/cron.d/cron.allow
/etc/cron.deny
A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? Select one: a. /etc/cron.allow b. /etc/cron.deny c. /etc/cron.d/cron.deny d. /etc/cron.d/cron.allow
/etc/cron.deny
In which directory would a system administrator store scripts that should be run monthly by the cron daemon? /var/cron/monthly /etc/crontab/monthly /var/crontab/monthly /etc/cron.monthly
/etc/cron.monthly
In which directory would a system administrator store scripts that should be run monthly by the cron daemon? Select one: a. /etc/crontab/monthly b. /var/cron/monthly c. /var/crontab/monthly d. /etc/cron.monthly
/etc/cron.monthly
Which of the following files does the hostnamectl command modify to set the hostname on a machine? Select one: a. /etc/hostname.conf b. /etc/host.conf c. /etc/hosts.conf d. /etc/hostname
/etc/hostname
On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? Select one: a. /etc/cmd.conf b. /etc/init.conf c. /etc/keys.conf d. /etc/inittab
/etc/inittab
Which of the following files contains the list of shared libraries? Select one: a. /etc/ld.so.cache b. /lib/shared.conf c. /etc/ld.so.conf d. /lib/ld.so.conf
/etc/ld.so.cache
If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? Select one: a. /etc/banner.conf b. /etc/nologin.txt c. /etc/deny.login d. /etc/warning.txt
/etc/nologin.txt
You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? Select one: a. /etc/resolv.conf b. /etc/nsswitch.conf c. /etc/named.conf d. /etc/hosts
/etc/nsswitch.conf
Which of the following files contain the path and filename where DNS servers should be configured? Select one: a. /etc/hosts b. /etc/resolv.conf c. /etc/named.conf d. /etc/nsswitch.conf
/etc/resolv.conf
In which file can you configure rules for logging on a Linux system? Select one: a. /etc/syslog.rules b. /etc/syslog.rules.conf c. /etc/syslogd.conf d. /etc/rsyslog.conf
/etc/rsyslog.conf
What is the complete path and filename of the file where ports and their associated protocols are defined?
/etc/services
Which of the following files contains the encrypted passwords for users on a modern Linux system by default? Select one: a. /etc/passwd b. /etc/shadow c. /etc/psh d. /etc/pwenc
/etc/shadow
In which of the following directories can you place files that will be copied to new user directories when new users are created? Select one: a. /usr/local/useradd b. /etc/skel c. /usr/local/template d. /etc/rc.d
/etc/skel
Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? Select one: a. /etc/sudoers b. /etc/rc.d/sudoers.conf c. /etc/sudo.conf d. /etc/su.conf
/etc/sudoers
What is the path to where the journald.conf file is located? Select one: a. /etc/systemd/journald.conf b. /etc/journald/journald.conf c. /etc/rsyslog/journald.conf d. /etc/rsyslogd/journald.conf
/etc/systemd/journald.conf
Which of the following files stores information about failed logins on a Linux system? Select one: a. /var/log/nolo b. /var/log/failed c. /var/log/wtmp d. /var/log/btmp
/var/log/btmp
What zone configuration file contains a PTR record used to identify the loopback adapter? Select one: a. /var/named/named.local b. /etc/named.loop c. /etc/named.conf d. /var/named/named.ca
/var/named/named.local
Where are scheduled commands stored on Ubuntu Linux systems? /var/spool/cron/atjobs /etc/at/ /tmp/at /var/spool/at
/var/spool/cron/atjobs
Where is the default document root directory for the Apache Web server? Select one: a. /usr/share/local/html b. /var/html c. /var/www/html d. /usr/local/html
/var/www/html
Which of the following is a valid APIPA address? Select one: a. 169.254.38.101 b. 192.168.1.17 c. 127.0.0.1 d. 10.11.12.13
169.254.38.101
Which of the following is the highest value that can be set for the nice value which would result in a greater chance of a lower priority? 20 19 10 0
19
Which of the following is the highest value that can be set for the nice value which would result in a greater chance of a lower priority? Select one: a. 20 b. 10 c. 0 d. 19
19
The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? Select one: a. 128 b. 32 c. 8 d. 48
48
Which of the following ports would be used to resolve a domain name to an IP address? Select one: a. 23 b. 443 c. 53 d. 69
53
If no level of compression is specified, thegzipcommand assumes what compression level? Select one: a. 7 b. 6 c. 5 d. 4
6
Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? Select one: a. Configure /etc/fstab to mount the partition. b. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it. c. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. d. Configure /etc/crypttab to mount the partition.
Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.
If a process state is currently showing as uninterruptible sleep, which letter will show in the output of the ps command? S U N D
D
In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? Select one: a. public b. DMZ c. trusted d. internal
DMZ
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? Select one: a. NTP b. DHCP c. DNS d. NIS
DNS
Which of the following SQL statements can be used to delete a table from a database? Select one: a. DROP FROM database TABLE table_name; b. ALTER DATABASE database DROP TABLE table_name; c. DROP TABLE table_name; d. DELETE TABLE table_name;
DROP TABLE table_name;
Which of the following does the -r option for the gpg command specify? Select one: a. Encrypt for the user id given. b. Remote key server to query. c. Retrieve keys for given key ID. d. Revoke keys from the key server.
Encrypt for the user id given.
Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used? Select one: a. JOIN b. GROUP BY c. HAVING d. ORDER BY
GROUP BY
When working with Sendmail, what command can be used to test SMTP support? Select one: a. HELO b. EHLO c. smtp d. telnet
HELO
Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables? Select one: a. RIGHT JOIN b. INNER JOIN c. LEFT JOIN d. FULL OUTER JOIN
INNER JOIN
Which of the following is a valid SQL statement for adding a new row of data to a SQL database table? Select one: a. UPDATE users SET firstname = 'George', lastname = 'Washington'; b. INSERT ('George', 'Washington') INTO users (firstname, lastname); c. ALTER TABLE users SET firstname = 'George', lastname = 'Washington'; d. INSERT INTO users (firstname, lastname) values ('George', 'Washington');
INSERT INTO users (firstname, lastname) values ('George', 'Washington');
Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? Select one: a. Syslog b. Kerberos c. TFTP d. Telnet
Kerberos
What DNS resource record type is used to provide the IP address for the e-mail server for a zone? Select one: a. NS b. MX c. CNAME d. SOA
MX
Which of the following types of DNS records need to be configured to facilitate email delivery? Select one: a. PTR b. CNAME c. IMAP d. MX
MX
When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented? Select one: a. CUPS b. Kerberos c. OTP d. Finger
OTP
Which of the following environment variables can you change the value of to set the default printer on a Linux system? (Choose two.) Select one or more: a. LPDEST b. PRINT c. PRINTER d. LPDEFAULT
PRINTER LPDEST
Which of the following are examples of multifactor authentication? Select one: a. Password and PIN b. Password and fingerprint reader c. Thumbprint reader and facial recognition d. A USB token and a Common Access Card
Password and fingerprint reader
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? SIGINT SIGKILL SIGQUIT SIGTERM
SIGQUIT
Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? Select one: a. SIGQUIT b. SIGINT c. SIGKILL d. SIGTERM
SIGQUIT
Which of the following does Click Assist do? Select one: a. Simulates a left click by holding down the left shift key or a right click by holding down the right shift key. b. Simulates a right click by holding down the left mouse button. c. Simulates a right click by holding down the Ctrl key on the keyboard. d. Reads the text for buttons on the screen so the user knows what they may be clicking on.
Simulates a right click by holding down the left mouse button.
Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence? Select one: a. Slow Keys b. Repeat Keys c. Sticky Keys d. Bounce Keys
Sticky Keys
Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? Select one: a. ufw b. netfilter c. iptables d. TCP Wrapper
TCP Wrapper
What is the most commonly used LAN protocol? Select one: a. IPX/SPX b. DLC c. UDP/IP d. TCP/IP
TCP/IP
You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of? Select one: a. TCP b. ICMP c. IGMP d. UDP
UDP
When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration? Select one: a. There must be at least 3 characters that are different from their previous password. b. Users cannot re-use their last 3 passwords. c. The minimum password length has to be at least 3 characters long. d. Users must use at least 3 characters as numbers in their passwords.
Users must use at least 3 characters as numbers in their passwords.
Which of the following can be used to graphically remotely administer a Linux machine? Select one: a. VNC b. Telnet c. RDP d. FTP
VNC
Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? Select one: a. VLAN b. VPN c. NTP d. ADSL
VPN
What is contained in the DISPLAY variable on a Linux system running the X window system? Select one: a. Which X server the client is supposed to connect to by default. b. How many monitors are connected to a Linux system. c. The display manager that should be used. d. The resolution of the monitor connected to the Linux system.
Which X server the client is supposed to connect to by default.
Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system? Select one: a. YUM b. APT c. wget d. tar
YUM
Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default? Select one: a. DPM b. APT c. Zypper d. DNF
Zypper
Which type of CM software can connect to inventory members via SSH to perform configuration management activities? Select one: a. Agent-based b. Kickstart c. BLOB d. agentless
agentless
Which of the following commands can you use to search available repository information? (Choose two.) Select one or more: a. apt-query b. apt-cache c. apt query d. apt
apt apt-cache
Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list? Select one: a. apt update b. apt upgrade c. apt upgrade all d. apt-upgrade
apt upgrade
Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system? Select one: a. apt-get upgrade b. apt-get update c. apt-get upgrade all d. apt-get update-all
apt-get upgrade
A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home? exec run at atq
at
Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.) at -l atq at -q at -d
at -l atq at -q
Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.) Select one or more: a. at -q b. atq c. at -d d. at -l
at -l atq at -q
Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.) at --remove atrm at -r at -d
atrm at -r at -d
Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10? Select one: a. rsyslog tty10 b. *.* /dev/tty10 c. /var/log/* tty10 d. all /dev/tty10
b. *.* /dev/tty10
If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? Select one: a. brstat b. ip bridge c. netbr d. brctl
brctl
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? Select one: a. -r b. -D c. -P d. -d
-P
What FTP command runs a shell on the local computer? Select one: a. ! b. * c. ~ d. #
!
Which of the following options for the gpg command will specify the key that should be retrieved? Select one: a. --request b. --recv-keys c. --get-key d. --get
--recv-keys
Which of the following options for the iptables command will delete all rules for all chains? Select one: a. -R b. -D c. -F d. -C
-F