CIT 412 FInal Study Notes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following desktops is the default for many Linux distributions, such as Fedora and Ubuntu? KDE Unity MATE GNOME

GNOME

Which of the following are popular Linux desktops? (Choose FIVE). Correct Answer: KNOPPIX GNOME Cinnamon KDE Mate NX Grub Unity SPICE

Gnome Cinnimon KDE MATE Unity

Which of the following lines in the /etc/cups/cupsd.conf file will configure CUPS to listen for print jobs coming in on the server's network interface with the IP address 192.168.0.1 through the IPP port? Listen 192.168.0.1:631 Listen *:631 Listen localhost:631 Listen 192.168.0.0:631

Listen 192.168.0.1:631

Users are complaining that the clocks for their operating systems do not match the current time for the location in which they live. Which of the following server roles is BEST for correcting this issue? Correct Answer: Proxy NTP SSH DHCP

NTP

Which remote desktop technology offers access from most common platforms such as Linux, Windows, Mac, iOS, Android, and Rasberry? XRDP SPICE VNC NX

NX

Which of the following statements best describes the effects of having only the gshant user account listed in the /etc/at.allow file? Only gshant can use the at command. Only gshant and root can use the at command. Only root can use the at command. All users but gshant can use the at command.

Only gshant and root can use the at command.

You obtain your applications and updates in RPM format. Which of the following distributions is your system based on? Correct Answer: Xandros Debian Slackware Red Hat

Red Hat

You are requested to help a user who reports that he has no more local storage space. You go to his system and log in as the root user. Which of the following commands will display the available disk space on all partitions? (Select TWO). dskuse -free fdisk -free df du -h du -a df -h

df df -h

Which useradd option displays the default values specified in the /etc/default/useradd file?

-D

According to the command help, which of the following options can be added to the killall command to kill a process group instead of just a process? (Type killall -h or killall --help at the prompt to answer this question.) -g -q -v -w

-g

You are installing Linux on an old computer with an old BIOS, and you are planning the partitions for the hard disk drive. Which of the following directories SHOULD exist in the first 1024 cylinders of the hard disk drive? /var /home /bin /boot

/boot

Under the Filesystem Hierarchy Standard (FHS), what is the full path to the directory that contains the device files for a Linux system?

/dev

Which of the following partitions functions as virtual memory for a Linux system? / /var /srv swap

/swap

Which if the following directories typically hold the dynamic libraries on your system? (Select TWO). /usr/local/lib/ /lib/ld.so/ /etc/ld.so.conf/ /usr/lib/

/usr/lib/ /usr/local/lib/

During installation, you must create a root user account for the system. Which of the following user account number does this account use? 0 Correct Answer: 1 Correct Answer: 10 Correct Answer: 100

0

Which of the following is the maximum number of GUID partitions that can be created using the gdisk utility? 32 128 64 8

128

Which values are set for the following environment variables? Type echo $variable at the prompt to answer the question. The variables are case sensitive. Home Lang SHELL TERM

/root en_us.uft-8 /bin/bash linux

You have a Linux system with 8 GB of RAM installed. You plan to use this system as a server. How much space should you plan to partition for the swap file? 16 GB 12 GB 4 GB 8 GB

8 GB

You need to create a symbolic link to the /usr/share/zoneinfo/EST time zone file that permanently alters the time zone for the system. What should you enter at the command prompt to accomplish this task?

ln -s /usr/share/zoneinfo/EST /etc/localtimeIncorrect Answer: In -s /usr/share/zoneinfo/EST /etc/localtime

You want to view all currently-running processes that include getty in the process name. Which command would you use? ps -a | find getty ps -A | grep getty ps -a | grep getty ps -A | find getty

ps -A | grep getty

Which of the following commands initializes a physical volume? vgcreate pvscan lvcreate pvcreate

pvcreate

A technician executed a command that collects various OS usage statistics, provides report capability, and saves system activity information. Which of the following commands produced the following output? vmstat iostat free sar

sar

Which command should you use to change the time zone (TZ) environment variable? (Select TWO). netdate tzselect tzconfig date

tzconfig tzselect

What is the correct order for the boot phases of a Linux computer? 1st BIOS 2nd Boot loader 3rd OS Kernel 4th system or init

...

A user has requested that each time she presents credentials to log in, a particular entry be written to a log file. This action will only apply to her, and she is using the bash shell. Which of the following configuration files is the BEST to modify to enable this action? .bashrc .sh .profile /etc/profile

.profile

Type ls -a /hr at the prompt to answer the question. What is the name of the hidden directory in /hr?

.sanford

During installation, you need to make sure there is plenty of hard disk space allocated to the partition that is going to hold the entire Linux operating system. Which of the follwoing is the BEST mount point for this partition? /home /usr / /boot

/

Which of the following paths represents the root directory? / /home/root /boot /root

/

The /etc/shells file contains a list of shells that are available on the current system. Type cat /etc/shells at the prompt to answer the following question: Which of the shells listed below is not available on the system? /bin/sh /bin/bash /bin/ksh /sbin/nologin

/bin/ksh

You have GRUB2 installed on your Linux workstation. You need to make changes to the boot menu. Which files and scripts can you edit to modify the menu entries and behavior of the boot menu? (Select TWO.) /etc/grub.d/40_custom /etc/default/grub /boot/grub2/grub.cfg /boot/grub.conf /etc/lilo.conf

/etc/default/grub /boot/grub2/grub.cfg

If a systemd system is configured to use multi-user.target as the default boot target, which file has a symbolic link (symlink) to the multi-user.target file? /usr/lib/systemd/system/multi-user.target /etc/inittab /etc/systemd/system/multi-user.target /etc/systemd/system/default.target

/etc/systemd/system/default.target

What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?

/etc/timezone

What is the full path to the directory that contains user data for all standard users on the system?

/home

Which of the following directories MUST be part of the partition that holds the root (/) directory? (Select THREE). var /proc /usr /bin /home /etc

/proc /bin /etc

You are in the process of manually creating the partitions during a Linux installation. Knowing that users will often require a lot of space to store their files, which of the following directories (or mount points) SHOULD be configured on its own partition? /usr /home /var /boot

/home

For which of the following directories should you create separate partitions? (Select TWO) /home /var /bin /lib

/home /var

If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the log files are on the same partition as the operating system, this could potentially bring down a Linux computer. Which of the following directories (or mount points) SHOULD be configured on its own partition to prevent this from happening? /var /opt /etc /usr /systerm-34

/var

Most Linux distributions propose to create the root (/) and swap partitions by default. To prevent user files and system log files from filling up the / partition, which additional partitions are you MOST strongly advised to create? (Select TWO). /var /home /opt /tmp /boot /usr

/var /home

What is the full path to the directory that contains log files, including secure, messages, [application], and kern.log?

/var/log

Which of the following is the maximum number of primary partitions that can be created on a single hard disk drive? 4 8 2 Unlimited

4

Type cat /etc/passwd at the prompt to answer the following questions: What is the UID for the schawla user account? What is the UID for the schawla user account? What is the full user's name (GECOS field) for the rcronn user account? What is the primary group ID for the ftp user account? What is the path of the home directory for the root user account?

509 Robert Cronn 50 /root

You use a special user account called administrator to log on to your computer; however, you think someone has learned your password. You are logged on as Administrator. In this lab, your task is to change your password to r8ting4str. The current administrator account uses 7hevn9jan as the password.

A the prompt, type passwd and press Enter. When prompted, enter 7hevn9jan as the current password and press Enter. At the New password prompt, enter r8ting4str and press Enter. Retype r8ting4str as the new password and press Enter.

Gloria, a Linux administrator, used the gdisk utility to create eight partitions on a new hard drive. Which of the following BEST describes the partitions Gloria has created? The first three partitions are primary partitions. The fourth is an extended partition that holds five logical partitions, making eight partitions in total. All eight partitions are logical partitions. There are no primary or extended partitions. All eight partitions are the same. They are simply partitions. There are no primary, extended, or logical partitions. The first seven partitions are primary partitions. The eighth partition is an extended partition that can be used to contain logical partitions.

All eight partitions are the same. They are simply partitions. There are no primary, extended, or logical partitions.

Your company uses a proprietary graphics program called Imitator that's stored in the /root directory. Maggie Brown (mbrown) needs to create and modify images with the Imitator program. In this lab, your task is to create a symbolic link file to /root/imitator as follows: Use imitator_link as the symbolic link name. Create the file in /home/mbrown.

At the prompt, type ln -s /root/imitator /home/mbrown/imitator_link. Press Enter to create the symbolic link.

The IT manager in your organization has asked you to install the pulseaudio-equalizer.noarch package. In this lab, your task is to install the pulseaudio-equalizer.noarch package.

At the prompt, type dnf install pulseaudio-equalizer.noarch and press Enter. Press Y and then press Enter to install the package.

In this lab, your task is to: Rename the sales group western_sales_division. Create the eastern_sales_division group. Remove aespinoza as a member of the western_sales_division group. Assign aespinoza as a member of the eastern_sales_division group. When you're finished, view the /etc/group file or use the groups command to verify the changes.

At the prompt, type groupmod -n western_sales_division sales and press Enter to rename the sales group to western_sales_division. Type groupadd eastern_sales_division and press Enter to create the eastern_sales_division group. Type usermod -G eastern_sales_division aespinoza and press Enter to modify group membership. When you assign aespinoza to the eastern_sales_division group with the usermod -G option, the user account is removed from the western_sales_division group. Use cat /etc/group or groups aespinoza to verify the aespinoza's group membership.

The VP of sales promoted Salman Chawla (schawla) to regional sales director. Now Salman needs the rights and permissions assigned to the mgmt2 and hr groups. You are logged on as root. When assigning group membership, remember that: When you use the usermod -G command to assign group membership, the user account is removed from all existing secondary groups before being added to the groups specified with the usermod command. When you use the usermod -aG command to assign group membership, the new group is appended to the list of existing secondary groups the user belongs to. In this lab, your task is to: Identify all the groups that the schawla user belongs. Add mgmt2 and hr as secondary groups to the schawla user, but make sure the user is still a member of all current groups. When you're finished, view the /etc/group file to verify the changes.

At the prompt, type groups schawla and press Enter to view a list of all groups the user belongs to. You will see that schawla currently belongs to the mgmt1 and sales group. The schawla group is the user's primary group. Type usermod -aG mgmt2,hr schawla and press Enter to add hr and mgmt2 to the secondary group memberships for the schawla user account. Type cat /etc/group or groups schawla and press Enter to verify the changes.

You are an IT manager. One of your job duties is monitoring system logs for the Linux systems on your network. The Journald service is collecting and storing system log data. In this lab, your task is to view the system logs using the journalctl command with the option that: Displays the kernel message log from the current boot. Displays the system log in reverse order with the newest entries first.

At the prompt, type journalctl -k and press Enter. Type q to quit. Type journalctl -r and press Ente

Will Adams (wadams) owns and maintains a database file in /home/wadams called contacts.db. The file holds contact information for perspective clients. Brenda Cassini (bcassini) and Vera Edwards (vedwards) want to access and add contact information to the file to share the data among the three users. In this lab, your task is to create hard link files to /home/wadams/contacts.db as follows: Use contacts_link as the hard link name. Create the file in the following directories:/home/bcassini/home/vedwards

At the prompt, type ln /home/wadams/contacts.db /home/bcassini/contacts_link and press Enter. Type ln /home/wadams/contacts.db /home/vedwards/contacts_link and press Enter.

You recently installed and formatted a new hard drive in your system. Its device file name is /dev/sdb1. Now you want to mount the volume. Remember that: Volumes are mounted to empty directories. A common place to mount volumes is to a directory inside of the /mnt directory. You can use the -t option to specify the file system. In this lab, your task is to: Create the /mnt/disk directory. Mount /dev/sdb1 to the /mnt/disk directory with the ext3 file system. When you are finished, use the mount command to verify that the volume is mounted correctly.

At the prompt, type mkdir /mnt/disk and press Enter. Type mount -t ext3 /dev/sdb1 /mnt/disk and press Enter. Type mount and press Enter to verify that the volume is mounted correctly.

Which system component verifies the hardware and passes control of the computer to the boot loader? CMOS OS kernel BIOS Init

BIOS

Actions you were required to perform: Run ping localhost & Run ls Run fg

At the prompt, type ping localhost & and press Enter to launch ping in the background.Ping continues to run in the background and its output will show on the screen. You can still interact with the console and run other commands in the foreground. Press CTRL + C. This would normally stop the ping. The command is not recognized because ping is in the background. Type cd / and press Enter. Notice that other commands entered in the foreground. Type ls and press Enter.Notice that the output of ls is interspersed with the output of ping running in the background. Type fg and press Enter to bring the ping command back to the foreground.Ping is now running in the foreground and the console will not allow other commands to be run. Press CTRL + C. The ping command is now terminated since it is in the foreground.

There is a C debugger package installed on the server that your organization is no longer using. The IT manager in your organization has asked you to uninstall the ddd-C-Debug-2.8.15-3.cd15 package. In this lab, your task is to: Uninstall the ddd-C-Debug-2.8.15-3.cd15 package. Verify that the ddd-C-Debug-2.8.15-3.cd15 package is uninstalled.

At the prompt, type rpm -e ddd-C-Debug and press Enter to uninstall the package. Type rpm -q ddd-C-Debug and press Enter to verify that the package is installed.

The power has gone out in your facility. You have a UPS (uninterruptible power source) that protects your system and provides enough power to allow you to shut down safely. In this lab, your task is to immediately shut down the system using the command line.

At the prompt, type shutdown -h now halt to immediately shut down the system. Press Enter.

You've encountered system problems that require you to reboot the system. You want to inform users that the system will shut down and reboot. In this lab, your task is to send a command to reboot the system in 5 minutes.

At the prompt, type shutdown -r +5. Press Enter to send the default message to logged-in users, give them 5 minutes to disconnect, and reboot the system.

The IT manager in your organization has asked you to install the fontconfig-3.10.87-5.fc24.rpm package. In this lab, your task is to complete the following: Switch to the root user using a password of 1worm4b8. You must have root user permissions to install packages. Use the rpm -ivh command to install the fontconfig-3.10.87-5.fc24.rpm package.The package is located in the /home/wadams/Downloads directory. Verify that the fontconfig package has been installed.

At the prompt, type su - and press Enter. Type 1worm4b8 as the password and press Enter. Type rpm -ivh /home/wadams/Downloads/fontconfig-3.10.87-5.fc24.rpm and press Enter. Type rpm -q fontconfig and press Enter to verify that the package is installed.

Salman Chawla (schawla) forgot his password and needs access to the resources on his computer. You are logged on as wadams. The password for the root account is 1worm4b8. In this lab, your task is to: Change the password for the schawla user account to G20oly04 (0 is a zero). Make sure the password is encrypted in the shadow file.

At the prompt, type su -c "passwd schawla" and press Enter. Type 1worm4b8 and press Enter for the root user password. Type G20oly04 and press Enter for the new password for the schawla user account. Type G20oly04 as the new password and press Enter.

While working on your Linux server, you want to enable anaconda.service and disable vmtoolsd.service using the systemctl command. In this lab, your task is to complete the following: Use the systemctl command to enable anaconda.service. Use the systemctl command to disable vmtoolsd.service. After each command, check the service status with the systemctl is-enabled command.

At the prompt, type systemctl enable anaconda.service and press Enter to enable anaconda.service. Type systemctl disable vmtoolsd.service and press Enter to disable vmtoolsd.service. Type systemctl is-enabled service_name and press Enter to check the service status.

You're working on your Linux server and need to change to single user mode. You can change to single user mode using the systemctl command and rescue.target. Rescue.target is a special target unit that runs a base system in single user mode and a rescue shell. In this lab, your task is to: Use the systemctl command to make rescue.target the current target. After changing to rescue.target, log back in as root using 1worm4b8 as the password.

At the prompt, type systemctl isolate rescue.target and press Enter to change the runlevel to rescue.target. Enter the password 1worm4b8 and press Enter to log in to the root account after changing the current target.

While working on your Linux server, you want to practice starting, stopping, and restarting a service using the systemctl command. In this lab, your task is to: Use the systemctl command to start bluetooth.service. Use the systemctl command to stop bluetooth.service. Use the systemctl command to restart bluetooth.service.

At the prompt, type systemctl start bluetooth.service and press Enter to start bluetooth.service. Type systemctl stop bluetooth.service and press Enter to stop bluetooth.service. Type systemctl restart bluetooth.service and press Enter to restart bluetooth.service.

Create the pdenunzio user account. Include the full name, Paul Denunzio, as a comment for the user account. Set eye8cereal as the password for the user account. When you're finished, view the /etc/passwd file to verify the creation of the account.

At the prompt, type useradd -c "Paul Denunzio" pdenunzio and press Enter to create the user and set the comment in a single command. Type passwd pdenunzio and press Enter. Type eye8cereal as the password and press Enter. Retype eye8cereal as the password and press Enter. Type cat /etc/passwd and press Enter to verify that the account was created.

Linda Blaine (lblaine) and Rhonda Conger (rconger) are temporary employees who were auditing your organization's financial documents. Their user accounts are members of the auditors group. They have completed their work and have moved on to new assignments. You need to remove their user accounts, home directories, and the auditors group from the system. In this lab, your task is to: Delete the following user accounts and their corresponding home directories: lblaine rconger Delete the auditors group. View the /etc/group file to verify the changes.

At the prompt, type userdel -r lblaine and press Enter to delete the lblaine user account and home directory. The inclusion of the -r switch removes the home directory. Type userdel -r rconger and press Enter to delete the rconger user account and home directory. Type groupdel auditors and press Enter to delete the auditors group. Type cat /etc/group and press Enter. Type ls /home and press Enter to verify the changes.

Terry Haslam (thaslam) was dismissed from the organization. His colleagues have harvested the files they need from his home and other directories. Your company security policy states that upon dismissal, users accounts should be removed in their entirety. In this lab, your task is to: Remove the thaslam user account and the home directory from the system. The -r switch removes the home directory when the user is also removed. When you're finished, view the /etc/passwd file and /home directory to verify the account's removal.

At the prompt, type userdel -r thaslam and press Enter to remove the user account and the home directory. Type cat /etc/passwd and press Enter. Type ls /home and press Enter to verify that the account was removed.

Add the hr group as a secondary group for the mbrown and cflynn user accounts. When you're finished, view the /etc/group file or use the groups command to verify the changes.

At the prompt, type usermod -G hr mbrown and press Enter to make mbrown a member of the hr group. Use usermod -G hr cflynn and press Enter to make cflynn a member of the hr group. Use groups mbrown and press Enter to verify the mbrown's group membership. Use groups cflynn and press Enter to verify the cflynn's group membership.

Every seven years, your company provides a 6-week sabbatical for every employee. Vera Edwards (vedwards), Corey Flynn (cflynn), and Bhumika Kahn (bkahn) are leaving today, while Maggie Brown (mbrown), Brenda Cassini (bcassini), and Arturo Espinoza (aespinoza) are just returning. The company security policy mandates that user accounts for employees gone for longer than two weeks be disabled. In this lab, your task is to complete the following: Lock the following user accounts: vedwards cflynn bkahn Unlock the following user accounts: mbrown bcassini aespinoza When you're finished, view the /etc/shadow file to verify the changes.

At the prompt, type usermod -L vedwards or passwd -l vedwards and press Enter to lock the user account. Type usermod -L cflynn or passwd -l cflynn and press Enter to lock the user account. Type usermod -L bkahn or passwd -l bkahn and press Enter to lock the user account. Type usermod -U mbrown or passwd -u mbrown and press Enter to unlock the user account.

The IT manager in your organization has asked you to change the GRUB_TIMEOUT parameter from 5 seconds to 10 seconds to give users more time to make a menu selection from the GRUB menu before the default operating system is booted. In this lab, your task is to: Change the GRUB_TIMEOUT parameter from 5 seconds to 10 seconds. Reboot the operating system to verify the changes made to the wait time from the GRUB menu. Log in with the username root and the password 1worm4b8.

At the prompt, type vi /etc/default/grub and press Enter to open the GRUB2 configuration file for editing. Press i to change to vi insert mode. Change the first line of the file to GRUB_TIMEOUT=10. Press the Esc key to leave insert mode. Type :wq and press Enter to save the changes. Type grub2-mkconfig -o /boot/grub2/grub.cfg and press Enter to write the boot loader changes to the grub.cfg file. Type reboot and press Enter to see the changes made to the wait time from the GRUB menu. Type root for the user. Type 1worm4b8 as the root password and press Enter.

The IT manager has asked you to set up dual boot capabilities on a Linux system so the system boots to Windows 10 by default, but can also boot to Linux. There is an external hard drive connected to this system with Windows 10 installed on it. In this lab, you will configure GRUB 2 to add a Windows 10 menu option and make it the default boot option. In this lab, your task is to: Change the default menu option for the GRUB2 boot loader to Windows 10. Use the grub2-mkconfig command to make the 30_os-prober script find the Windows 10 operating system on the external hard drive and add it as an entry in the boot menu. Reboot the machine and select the Windows 10 option from the boot menu. Only the Windows 10 splash screen will display.

At the prompt, type vi /etc/default/grub and press Enter to open the GRUB2 configuration file. Press i to change to vi insert mode. Change the third line of the file to GRUB_DEFAULT=Windows 10. Press the Esc key to leave insert mode. Type :wq and press Enter to save the changes. Type grub2-mkconfig -o /boot/grub2/grub.cfg and press Enter to write the boot loader changes to the grub.cfg file. Type reboot and press Enter to see the changes made to the GRUB menu. Select Windows 10 from the boot menu.

You need to create a script file in vim editor to change and export the SHELL environmental variable as the C-shell. In this lab, your task is to: Open the vim editor with a new file named /etc/pref_shell. Add the following lines to the file:SHELL=/bin/cshexport SHELL Save and close the file.

At the prompt, type vi /etc/pref_shell and press Enter to open vim and create the file. Press the a key to enter insert mode. Type the following text:SHELL=/bin/cshexport SHELL Press the Esc key to exit insert mode. Type : to enter command line mode. Type wq and press Enter to save the file and exit.

Tim, a system administrator, wants to simplify the provisioning and disabling of user accounts. Which of the following server roles should Tim install and configure? Correct Answer: Load balancer Containers Proxy Authentication server

Authentication server

You have a user who has difficulty typing. She is constantly pressing keys multiple times by accident. Which keyboard accessibility option should you enable? Mouse keys Repeat keys Sticky keys Bounce keys

Bounce keys

Which of the following is the standard shell for MOST Linux computers? tcsh C-shell Korn Bourne shell Bourne-again shell (bash)

Bourne-again shell (bash)

Drag the server role to its proper description.

Capturing a timeline of events that have taken place on the computer in the form of a file. *Loggin* A network that uses encryption to allow IP traffic to travel securely over the TCP/IP A *VPN* Increases response time to back-end servers by distributing the workload across the available servers *Load Balancer* A computer that provides indirect internet access to the computers in your network. *proxy*

Your company recently setup a VPN and wants to use a digital certificate for authentication instead of a pre-shared key. Which of the following server roles would allow the company to provide this functionality internally instead of using an external provider? Name server SSH Certificate Authority SNMP

Certificate Authority

Which of the following desktops was derived from GNOME 3, follows traditional desktop metaphor conventions, and is the primary desktop environment for the Mint distribution? MATE KDE Cinnamon Unity

Cinnamon

Your company is running a critical business application. The executive team wants to ensure the server is available at all times, even in the event of a server failure. Which of the following server roles would be used to provide a failover server in the event of a system failure? Clustering Proxy SNMP Load balancer

Clustering

Your company develops applications to run on Linux systems. You currently have four teams working on a different aspect of the same application. Which of the following server roles would give you the BEST method for testing all team members' code without effecting your part of the project or your operating system and personal files?: Monitoring Database Clustering Load balancer Containers

Containers

Users are complaining that they are unable to connect to any servers or the internet. Based on the symptoms they describe, you suspect that the users are not being assigned the correct IP addresses. Which of the following server roles would be the BEST role to work with to correct this issue? DHCP Proxy VPN SNMP

DHCP

Alex, a webmaster, is implementing an order processing system on the company's website. Which of the following server roles should Alex implement with the order processing application? Database Clustering Monitoring VPN

Database

Which of the following are true about the ASCII character set? (Choose TWO.) Correct Answer: Uses a variable-length encoding standard. orrect Answer:Support international characters. Does not include international symbols. Uses a seven-bit encoding technique. Is not compatible with UTF-8.

Does not include international symbols. Uses a seven-bit encoding technique.

You have just installed a new Linux system, which is using the Wayland system. Which of the following is a VALID statement regarding this system? Events captured from the keyboard are sent to the Wayland compositor, which renders the changes required and then sends them to the screen. Events captured from the keyboard are sent to the Wayland compositor and then the Wayland client, where the rendering takes place. Events captured from the keyboard are sent to the Wayland compositor and then sent to the window manager for rendering. Events captured from the keyboard are sent to Wayland compositor and then the Wayland client. After rendering, the client sends the information to the screen.

Events captured from the keyboard are sent to the Wayland compositor and then the Wayland client, where the rendering takes place.

Your company uses both Linux desktops and Windows desktops. Which of the following server roles should be used to provide a central location for users of both operating systems to share files? Database Proxy File servers Authentication server

File servers

You need the DNF utility to check specific URLs for RPM repositories. Which of the following locations should you add the URLs to? In .repo files within the /etc/yum.conf file. In .repo files within the /var/lib/rpm directory. In .repo files within the /var/usr/yum.log file. In .repo files within the /etc/yum.repos.d/ directory.

In .repo files within the /etc/yum.repos.d/ directory.

In this lab, your task is to use the dnf command to uninstall the RunSnakeRun.noarch package. Complete this lab as follows: At the prompt, type dnf erase RunSnakeRun.noarch and press Enter. Press Y and press Enter to install the package.

In this lab, your task is to use the dnf command to uninstall the RunSnakeRun.noarch package. Complete this lab as follows: At the prompt, type dnf erase RunSnakeRun.noarch and press Enter. Press Y and press Enter to install the package.

Which of the following situations is most likely to cause a dependency problem? Installing two different packages that both include /usr/lib/graphlib. Upgrading the library /usr/lib/biglib from version 1.4 to version 1.6. Several applications using the /usr/lib/biglib library. Upgrading the kernel from 2.4.6 to 2.4.12.

Installing two different packages that both include /usr/lib/graphlib.

Which of the following desktops emulates a Windows desktop, especially in the location of the menu options and bottom panel bar? KDE MATE Unity GNOME

KDE

During the process of troubleshooting a resource issue on a server, the technician entered the following command and received the output showing zombie processes. [user@centos7]#ps aux |grep Z USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMANDljenkins 2346 0.0 0.0 0 0 ? Z 08:44 0:02 [kdmflush] ljenkins 3365 0.0 0.0 0 0 ? Z 08:64 0:14 [bioset]ljenkins 3812 0.0 0.0 0 0 ? Z 09:31 0:05 [bioset] ljenkins 4957 0.1 0.0 0 0 ? Z 10:16 0:35 [email-client] ljenkins 5276 0.1 0.0 0 0 ? Z 12:04 0:45 [email-client] What should the technician do NEXT to resolve the issue with zombie processes? Correct Answer: Kill each of the PIDs listed in the command output. Correct Answer: Nothing. The systemctl process will clean up the processes automatically each week. Correct Answer: Kill any child processes. Correct Answer: Kill the parent process.

Kill the parent process.

Linux can be implemented in many different ways. Drag the implementation type to the definition that matches it BEST. Running Linux and Windows on the same physical computer. Infrastructure as a Service (IaaS). Used by Google on many of the physical products it sells. Manages intelligent devices, such as automation and control equipment.

Linux virtualization Linux and Cloud Computing Linux on mobile devices Embedded Linux

You are trying to pipe data from the cat command to another program, but the data output does not make sense. You believe that the system's locale is corrupting the output. To test your hypothesis, you decide to change a locale environment variable. Which of the following changed variable would MOST likely produce correct data? LANG=C LC_NUMERIC=C LC_COLLATE=C LC_NAME=C

LANG=C

Your company has been expanding the number of servers in the company's data center, and there is an increased need to gather metrics, watch process states, work with logs, watch services states and file system usage. Which of the following sever roles should be installed to provide this functionality? Monitoring Database Containers Logging

Monitoring

Which of the following is a free, open-source scriptable screen reader that works with the GNOME desktop? GOK Emacspeak Orca Gedit

Orca

Which of the following functions does the -d option perform when using the apt-get command to install a package? All installed packages are upgraded to the latest versions in with the information in /etc/apt/sources.list. The package database is checked for consistency and errors. Package installation is simulated without an actual installation. Packages are downloaded to the system, but not installed.

Packages are downloaded to the system, but not installed.

Which of the following server roles would you implement to provide services offered by CUPS and IPP? Print server Proxy Monitoring SSH

Print server

A protocol used to communicate with and monitor network devices and servers. A protocol used to securely log on to remote systems using encryption. Resolves (or maps) the fully qualified domain names (FQDNs) to IP Addresses. A program responsible for accepting HTTP (Hypertext Transfer Protocol) requests from clients.

SNMP SSH SSH Web server

Which of the following provides a complete open-source solution for remote access to virtual machines? SPICE xrdp VNC NX

SPICE

You have a systemd Linux system that is configured to boot into the graphical.target by default. The system seems to be running much slower than normal. You need to reboot the system, but you want it to boot into a single-user target unit with no network access so you can perform troubleshooting tasks and get the system running normally again. What should you do before you reboot? Set the default boot target torescue.target. Provide the kernel boot option systemctl=rescue.target. Change the CMOS boot order. Configure the /etc/inittab file.

Set the default boot target torescue.target.

Which of the following is the primary role of a mail transfer agent (MTA)? Provide redundant online storage for the mail sever. Store messages so they can be downloaded or send email to a destination MTA. Control the bandwidth used by mail user agent (MUA). Transfer mail to a print server queue.

Store messages so they can be downloaded or send email to a destination MTA.

Which of the following BEST describes the role of the Linux desktop? The Linux desktop manages input devices such as the mouse and keyboard and controls output to monitors and printers. The Linux desktop controls the placement and appearance of windows on a Linux computer. The Linux desktop takes the information from the display server and renders it so that it can be displayed on the screen. The Linux desktop adds a series of tools and utilities to make the GUI useful.

The Linux desktop adds a series of tools and utilities to make the GUI useful.

Which of the following character sets is a variable length encoding standard of Unicode that uses one to four 8-bit bytes to support many languages and most commonly used on Linux? ASCII UTF-8 LANG LC_ALL

UTF-8

Which of the following is the maximum number logical partitions allowed on an extended partition? 4 1 2 Unlimited

Unlimited

You have connected a new printer to a systemd-based Linux server. You cannot print to the new printer from a user workstation on the network. What tasks should you complete on the server first? (Select TWO.) Use rpm -qi cups or dnf list cups to make sure the CUPS daemon is installed. Use the command service printer restart to restart the print service. Use service cupsstatus to make sure the CUPS printing service is running. Use rpm -qi printd or dnf list printd to make sure the print daemon is installed. Use systemctl status cups to make sure the CUPS printing service is running.

Use rpm -qi cups or dnf list cups to make sure the CUPS daemon is installed. Use systemctl status cups to make sure the CUPS printing service is running.

As a part of your daily maintenance, you scan for and kill any zombie processes on the system. In this lab, your task is to: Use the ps aux command to find zombie processes. Zombie processes have a Z in the STAT column of the ps aux output. Use kill -9 PID to terminate the zombie processes.

Use the ps aux command to find zombie processes as follows: At the prompt, type ps aux | less to view the list of processes. Use the up/down arrows to find the processes with status z. Type q to exit the process list and return to the command prompt. Terminate the processes as follows: Type kill -9 1301 and press Enter. Type kill -9 1570 and press Enter. Type kill -9 1980 and press Enter.

Which of the following users MOST benefit from the sticky keys accessibility option? Users who press single keys multiple times by accident. Users who have difficulty pressing multiple keys at the same time. Users who need a tactile representation of the keys. Users who press and hold down keys by accident.

Users who have difficulty pressing multiple keys at the same time

Which of the following statement describes file globbing? Determining the category of the file or command. Displaying which commands use specific files. Using wildcards to match specific files. Indexing files for the locate command.

Using wildcards to match specific files.

Mary, a technician, is troubleshooting memory and performance issues on a system. Mary executed a command to show information about processes, memory, paging, block IO, traps, disks, and CPU activity. Which of the following commands did Mary use to produce the output below? iostat free top vmstat

VMstat

Linux provides technology that allows the user to remotely view a graphical user interface and control mouse and keyboard events.Which of the following technologies establishes a connection with a remote computer using a viewer on one end and a server on the remote end? SPICE VNC XRDP

VNC

Which component of the X11 Window System controls the placement and appearance of windows on a Linux computer?

Windows Manager

Which X11 Window System element is the MAIN system component? X11 server Desktop environment X11 system Window manager

X11 server

Your company has implemented both Linux and Window servers. The system administrators use Windows desktops, so they have access to Windows administration tools. They routinely access the Windows servers using Windows Remote Desktop. Which of the following implementations would allow the system administrators to connect to the Linux systems using Windows Remote Desktop? SPICE VNC XRDP NX

XRDP

Which of the following commands creates a shortcut that can be used to run the tail -f /var/log/messages command? export sysmesg="tail -f /var/log/messages" export alias="tail -f /var/log/messages" alias sysmesg="tail -f /var/log/messages" env alias="tail -f /var/log/messages"

alias sysmesg="tail -f /var/log/messages"

You are working on a Debian distribution of Linux. You want to retrieve information about the Debian package database on the system. Without using any command options, what command will provide the information you need?

apt-cache

You are working on a Debian distribution of Linux. You need to install a package, but you do not want to manually install all the dependencies for the package. Without using any command options, what command should you use?

apt-get

working correctly. Which of the following commands is the MOST correct method to get the package to work? apt-get update mathpac apt-get upgrade mathpac rpm -U mathpac apt-get dist-upgrade mathpac

apt-get upgrade mathpac

Which of the following commands removes a job from the at queue? (Select TWO. Each answer is an independent solution.) atq at -l at -f atrm at -d

atrm at -d

Which of the following commands sorts the combined contents of the wordlist1 and wordlist2 files and sends the results to both the screen and a file named sortedwordlist? cat /usr/wordlist1 /usr/wordlist2 | sort | tee sortedwordlist cat /usr/wordlist1 /usr/wordlist2 | sort sortedwordlist cat /usr/wordlist1 >> /usr/wordlist2 | sort sortedwordlist cat /usr/wordlist1 /usr/wordlist2 | tee sortedwordlist

cat /usr/wordlist1 /usr/wordlist2 | sort | tee sortedwordlist

You must change ownership of a script called myscript so that only the user owner has read/write access to it and only the user owner and group owner have execute permissions. Which of the following commands will accomplish this task? chmod 771 myscript chmod 611 myscript chmod 755 myscript chmod 750 myscript

chmod 750 myscript

You have installed a package called mathpac with DNF. After a system upgrade, the package is not working correctly. Which of the following commands should you try first to get the package to function? dnf remove mathpac and then dnf install mathpac rpm -U mathpac dnf upgrade mathpac : dnf update mathpac

dnf update mathpac

The system requirements for a new Linux computer show that the system will primarily be used to store documents of small size. Which of the following file systems would be the MOST efficient at storing these documents on a Linux system? ext2 ext4 HPFS ext3

ext4

Which of the following Linux file systems support journaling? ext4 swap VFAT ext2

ext4

Which of the following is the MOST common Linux file system? XFS ReiserFS JFS ext4

ext4

You are experiencing a problem with a SysV init network server. You want to bring the system down and try reseating the cards within it before restarting it. Which command completely shuts down the system in an orderly manner? init 0 init 1 init 5 init 6

init 0

Linux systems that use SysVinit (init) use the syslogd daemon to manage logging. Which of the following daemons is used on newer system-based distributions to provide a local system log file? journald syslog systemctl rsyslog

journald

You have been asked to temporarily fill in for an administrator who has just been fired. This administrator was known to have lax security standards, and you suspect that passwords are still kept in the /etc/passwd file. Which of the following entry within the passwd file would indicate that the passwords are stored there? kolton:34uyx:431:0:Back Door:/root:/bin/bash adam:x:341:52:Adam Fox:/users/adam:/bin/bash clifford:x:687:301:non secure user:/root: eddie:x:100:100:://users/eddie:

kolton:34uyx:431:0:Back Door:/root:/bin/bash

Which of the following commands shows failed login attempts on the system? lastlog lastb tail sar

lastb

Your Linux system was installed for you while you were living in the United States of America. You have since been transferred to a satellite office located in Wood Walton, England, and have taken your computer with you. Since England uses the larger A4 paper size, you would like to change the LC_PAPER locale environment variable. Which of the following is the BEST shell command to use for this purpose? echo export localectl iconv locale

localectl

Which of the following commands manages, compresses, renames, and deletes log files based on a specific criteria such as size or date? logrotate dmesg lastlog logger

logrotate

You are working on a Linux distribution that uses systemd. Which file in the /usr/lib/systemd/system/ directory is text-based and used to start the services that support multiple users and support networking? multi-user.target rc-sysinit.conf init.d graphical.target default.target

multi-user.target

Which of the following commands merges two files on a line-by-line basis and separate each line with a tab? join od paste pr

paste

A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. To ensure that the CPU gives preference to other processes, you need to lower the daemon's priority. The PID number is 2345. Which command would you use to decrease the daemon's priority? renice -n 0 2345 renice -n 10 2345 nice -n 0 2345 renice -n -10 2345

renice -n 10 2345

What command will upgrade an RPM package only if an earlier version is already installed on the system?

rpm -F

What is the core process for a systemd-based Linux system?

systemd

You need to determine the priority of several processes. Which command should you enter to identify the process ID and nice value for each process? renice jobs top nice

top

Which of the following apt-cache options will show the missing dependencies in the package cache? Correct Answer: pkgnames stats unmet depends showpkg

unmet

Which of the following commands produced this output? 06:14:11 up 139 days, 24 min, 5 users, load average: 0.12, 0.33, 0.48 w ps uptime top

uptime

Which of the following utilities would you typically use to lock a user account? (Select TWO. Each answer represents an independent solution.) useradd usermod userdel passwd

usermod passwd

You have an XFS file system in your Linux system represented by /dev/sdb1. You need to copy all the filenames on the drive to the /reviewxfs file. You must be able to read the filenames in the /reviewxfs file. Which of the following commands should you use? xfs_metadump -e /dev/sdb1 /reviewxfs xfs_metadump -o /dev/sdb1 /reviewxfs xfs_info /dev/sdb1 /reviewxfs xfs_growfs -n /dev/sdb1 /reviewxfs

xfs_metadump -o /dev/sdb1 /reviewxfs

A technician has been given a work order to install the Apache webserver on a system configured with a YUM repository. Which of the following commands will install the webserver? yum install apache2 rpm -ivh apache2 dnf install httpd yum install httpd

yum install httpd


Ensembles d'études connexes

Chapter 15 Section 5 Study Guide Part I

View Set