Comp linux+ final assessment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Linux administrator is working on a script to perform an automation task to clean up specific files in a user's personal directory. What alias can the administrator use in place of the directory path for this folder for any user?

$HOME

With which command switch can a user display the system time in a 24-hour format?

%H

A Linux computer user troubleshoots a workstation by issuing the top command. What does the user look for within the command's output to identify kernel processor time?

%s

A project folder exists on a Linux server. Several users mention that access to the folder is not working properly. If the administrator uses the setfacl command to remove all ACL entries but leaves standard permissions in place, which command switch does the administrator issue?

-b

A user would like to use a package manager to set up software on a Red Hat Linux system. While doing so, the user would like detailed output along with a progress bar. Which command options does the user issue? (Select all that apply.)

-i -v -h

A user looks to view the compression state of compressed files to save disk space. What command option does the user issue when using the GNU zip utility?

-v

A developer compiles software on a Linux system. Something is not working correctly, and the developer potentially missed a step. Which command does the developer use prior to using the make command to create any binaries?

./configure

A new user to the Linux operating system looks to find where the command-line utilities are saved to reference in a script. Which standard subdirectory does the user need to find?

/bin

An administrator executes the ls -l command on the /dev directory on a Linux system to check for error messages. Which device file should the administrator examine?

/dev/null

A systems administrator troubleshoots a problem on a Linux system. The issue is that a new user does not belong to a group as intended. The administrator verifies any associated IDs by viewing which files? (Select all that apply.)

/etc/group /etc/passwd

A Linux system administrator needs to find the password expiration information for all system users. Which file does the administrator review to accomplish this?

/etc/shadow

A problematic Red Hat-derived Linux system requires investigating. The issue is a potential system breach. With which log can an administrator determine if there are any failed login attempts?

/var/log/secure

A Linux network engineer has received a service ticket to allow Network Time Protocol traffic into a secured DMZ. What port will they need to open to allow this traffic to flow through?

123

A user creates a script on a Linux system. Which operator does the user use when requiring standard output to redirect to a file?

>

An administrator configures a network with a 172.16.0.0 subnet. On which class of address does the network operate?

B

A seasoned Windows system administrator has recently joined the Linux administration team and wants to learn about the shell on the company's Linux hosts. As with most Linux distributions, what shell would the system administrator find as the default?

Bash

The systemd initialization process on a Linux system experiences difficulty with a particular process. After some investigating, a system administrator notices that the unit file requires a configuration change. Which directives does the administrator modify for the process startup to fork and load any dependencies? (Select all that apply.)

Before= Requires=

A user troubleshoots a Linux system that does not boot properly. The issue appears to be with drive sectors that do not load properly. The user investigates which part of the boot process?

Boot loader

An engineer utilizes an orchestration utility that requires an agent for the target systems. Which utility is in use?

Chef

A Linux administrator attempts to create a custom container from scratch. The administrator decides to use Docker as a solution. Which step does the administrator perform first?

Create a configuration file.

A Linux user decides to use storage input /output (I/O) scheduling on a server. Of the different behavior types, the user configures a read first in first out (FIFO) queue and a write first in first out (FIFO) queue. Which schedule does the user implement?

Deadline

An organization needs to upgrade a server farm with a new virtual machine configuration. The administrators manage the configuration centrally. The tool that the administrators utilize defines the settings from a desired configuration in which mode?

Declarative

The company has asked an Apache web developer to change the configuration of a development server so that when users access the internal site, they pull up documents from a testing folder, rather than the default location /var/www/html. What directive of the httpd.conf file will point connections to this testing folder?

DocumentRoot

An administrator evaluates using logical volume management (LVM) rather than a traditionally managed physical volume for the root file system. What benefits can the administrator expect when using the LVM? (Select all that apply.)

Dynamic volume creation without rebooting Ability to exceed the space of a physical device Ability to quickly revert to a previous state

An administrator believes that user storage quotas are set on a Linux system. Running a disk quota report produces no results. What action should the administrator take to verify user quotas are configured?

Edit the /etc/fstab file.

A user would like to configure new repositories with the advanced package tool (APT) package manager. How can the user accomplish this? (Select all that apply.)

Edit the sources.list file. Edit the sources.list.d file.

A Linux user would like to add a virtual file system to a Linux workstation. Which storage type directly supports this feature?

FUSE

A user requires that fields in a text file are sorted in a particular manner. The user issues the sort command with the -k option. How does this option impact the sort command results?

Field location values are used.

A user would like to have a file name in one directory point to a file in another. How does an administrator accomplish this?

File link

A Linux administrator hardens a server by implementing best practice settings. Which setting does the administrator adjust to achieve the principle of least privilege?

Host firewall

A security engineer recommends the use of firewalls for servers spread throughout an organization's network implementation. To fulfill the engineer's requirements, only the service that the server provides should be allowed to pass through the firewall. What approach does the engineer use when configuring the firewall?

Host-based

A user would like to review metadata on a file, such as file time stamps. What does the user utilize to obtain this information?

Index node

A Linux system experiences a sudden issue in which the root file system cannot be found. What results from this issue?

Kernel panic

An administrator determines that the systemd program is not loading properly when a system boots. What likely results when the program does not load?

Kernel panic

A Linux administrator reviews the output from a recently issued ls -l /dev command. Which hardware devices does the administrator identify as a character device type? (Select all that apply.)

Mouse keyboard

A Linux administrator would like to identify all nodes on a network with a tool that uses a Transmission Control Protocol (TCP)-connect scan and provides detailed reporting. The identification of all nodes will occur on a monthly basis via an automated script. After evaluating the options, which tool does the administrator use?

Nmap

For what reasons is it much more common for Linux users to compile software than it is for Windows users? (Select all that apply.)

Optimization Special features Experimental features

A Linux administrator manages several containers for developer access. The containers vary in their configuration. For network access, some utilize network address translation. Which network drivers would require this type of implementation? (Select all that apply.)

Overlay Bridge

A Linux server is low on physical memory. An administrator attempts to reduce the low memory problem by configuring swap space for large applications. Which swap space type does the administrator utilize when storage partitions already exist?

Pseudo

A Linux administrator manages several containers on a Linux server. When managing the images, the administrator uses the pull and push commands in which context?

Registries

A systems administrator configures a Linux system for remote access via Secure Shell (SSH) by using key-based credentials. The administrator properly configures the /etc/ssh/sshd_config file, but the connection does not work as intended. What step does the administrator need to take?

Restart the sshd process.

A new mobile application development company is working on a new project that requires extremely fast storage speeds and large capacity. Which storage interface should the company be looking at implementing?

SAS

A user creates a Bash script, but has no luck running it. Reviewing the code finds no errors. What does the user determine to be the issue? (Select all that apply.)

Script permissions Folder permissions

A security engineer recommends the use of a physical firewall in an organization's network implementation. To fulfill the organization's requirements, multiple subnets should not be allowed to communicate with each other. What approach does the engineer use when configuring the firewall?

Segment-based

A systems administrator configures the use of certificates on a server. The certificate uses a direct trust and protects a web-based application. Which certificate does the administrator utilize?

Self-signed

An organization implements a new authentication scheme for all users. The scheme requires a one-time password (OTP) via a software solution on a mobile phone. What solution describes this technology the organization uses?

Software token

A system administrator enables a recently disabled service on a Linux server. When the system administrator tries to use a related feature on the server, an error message appears. What action does the administrator take with the service to remedy the problem?

Start

A user issues the getfacl command to view a list of access control list (ACL) entries on a directory. What metadata can the user expect to see as a result? (Select all that apply.)

Sticky bits Object owner Group membership

Which script component would a user use when requiring that a declared variable has a single fixed value?

String literal

An administrator would like to review the configuration for any network functionality that is part of a Linux system's startup. Which systemd unit file does the administrator determine holds the configuration?

Target

The root administrator on a Linux system adds a user to a group using the usermod command. As a result, the user belongs to the new group but is no longer a member of other groups of which they had been a member. What does the administrator determine the problem to be?

The administrator did not use the -a command switch.

A user reviews a text file. The user issues the sort command with the -r option. How does this option impact the sort command results?

The content is in descending order.

A server administrator modifies the GNU GRand Unified Bootloader (GRUB2) on a Linux server by creating a new grub.cfg file. The server contains only one operating system on a UEFI system. Now the system does not boot properly. What does the administrator conclude the issue could be? (Select all that apply.)

The file was created with a text editor. The file was saved in the wrong folder.

An experienced Windows systems administrator is new to managing Linux servers. The administrator needs to change some host firewall rules. How can the administrator quickly change the rules without the worry of a learning curve?

Use UFW.

A newly installed Linux system at an organization cannot be seen by other systems on the network by name. The administrator discovers that the new system has a naming conflict. What approach does the administrator use to remedy this issue?

Use the hostnamectl command.

A user utilizes a script to search for certain values in a file. The user would like to use results as content for a second file. How can the user accomplish this while using grep?

Use the pipe character with the command.

A Linux user tends to use multiple text editors across different distributions. Moments ago, the user saved and exited from editing a text file by using the ZZ keystrokes. Which editor did the user utilize?

Vim

A Linux root user would like to address all processes with open sockets on a system that does not have an AppArmor profile loaded. Which command does the user issue to start?

aa-unconfined

A system has stale Internet Protocol (IP) address to media access control (MAC) address information. What command does a user issue to resolve this problem?

arp

An administrator on a Linux system needs to set special permissions for a user. The permissions for the user should allow the user to have similar permissions to a file as the group owner has. Which command will the administrator utilize to accomplish this?

chmod

A network administrator needs to set permissions on a server folder for users. A user should have read and write permissions, a developers group should have read permissions, and others should have no permissions. How might the administrator address the permissions using absolute mode?

chmod 640

A Linux user would like to test software in an isolated environment. A prerequisite is that any secure boundaries should be managed by the file system. Which method does the user decide to use?

chroot

A user would like to add the week of the year information within a script file that parses information for new files added to a specific folder on the system. Which command does the user consider for use in the script?

date +%V

An administrator considers hardware component upgrades for a sluggish Linux server. Which command does the administrator utilize to immediately identify upgrade possibilities?

dmidecode

Which systemctl subcommand will set a particular service to start automatically at boot time?

enable

An administrator creates a shell script. The goal of the script is to update a database by running several commands. When the user runs the script, returning to the parent process should not happen. Which command does the administrator utilize with the script?

exec

What common Linux utility is a menu-driven program that the user utilizes to create, modify, or delete partitions on a storage drive?

fdisk

A Linux systems administrator fears that a mission-critical server is suffering from routine memory exhaustion. As a test, the administrator reboots the server, loads the typical applications, and issues which command to view available physical memory?

free

A developer new to using Git has configured global settings and created a local directory for a project. When trying to use any Git subcommands, the project is not recognized as being managed by Git. Which command should the developer issue to remedy the problem?

git init /dev-project

1.1% complete A user requests that a new user group be renamed from "WIP" to "Development." Which command does the administrator issue to complete this request?

groupmod -n Development WIP

A network engineer evaluates network performance for an organization. There is a complaint that certain servers have poor connection speeds. Which command does the engineer use on the servers to identify possible throughput bottlenecks?

iperf

A user issues the luksOpen command on a storage device that contains data and has no success. What command does the user use to investigate the issue?

isLuks

An administrator looks into optimizing a Linux system by unloading unnecessary kernel modules. To do so, which command does the administrator use to see which modules are currently loaded?

lsmod

A software company has created numerous custom-made processes that run across its Linux server environment. Fortunately, the company has standardized the naming of these custom processes. The company has asked a senior Linux administrator to create a report on all the custom processes and where they are running. All custom processes start with "acme_global-" with a more detailed naming scheme for the last part of the process name. What command should the administrator use to find all these processes and the corresponding names?

pgrep -l acme_global-

A lead developer manages code for all local projects by syncing with a cloud-based Git repository. Occasionally other developers contribute to applications in development using the same platform. What git subcommand does the lead developer use to update a local version of an application in development?

pull

A network administrator troubleshoots firewall permissions. Somehow, unallowed ports on a server are available for connection by remote hosts. Which commands does the administrator consider useful to display listening and non-listening ports on the server? (Select all that apply.)

ss netstat

A Linux systems administrator would like to maintain permissions for users that include write and execute. However, the administrator needs to protect any files from deletion. What does the administrator determine to be the solution?

sticky bit

A user on a Linux system attempts to run a command as a privileged user for a specific command. After evaluating command options, which command does the user utilize?

sudo

A Linux technician is unable to close the nano text editor on their station. A process seems to be stuck, not allowing nano to exit gracefully. The technician has run the top command and identified the PID as 75. What command can the technician enter to force close the unresponsive process?

sudo kill -9 75

Which command will install the software package myapp.rpm and provide a detailed output of the installation process along with a progress bar?

sudo rpm -ivh myapp.rpm

A junior Linux administrator at a logistics company has a service ticket request to install a software package named mileage.rpm on a Linux host. The administrator would first like to see what dependencies they need to install before they install the package. What command will accomplish this?

sudo yum deplist mileage.rpm

A helpdesk technician is working on a user's Ubuntu laptop and notices that the clock is off by several hours because it is set in an incorrect time zone. What command can be run to place the system into a different time zone?

timedatectl

An administrator would like to update the timestamp on a text file. Which command does the administrator issue?

touch

An organization hires a consultant to investigate network issues within a warehouse. There is a complaint that it takes a very long time when trying to open or save files to a server located in the main office. The consultant determines that an indirect path exists between the warehouse and the main office. Which command provides this information to the consultant?

traceroute

A Linux user would like to use the terminal to recursively download a file that is available on a public server. Which command does the user utilize?

wget


Ensembles d'études connexes

Consumer behavior chp 15(exam 2)

View Set

Ch. 7 Colorado Statutes, Rules, and Regulations for Sickness & Accident Insurance Only (2022)

View Set

NUR 397 Chapter 62: Care of Patients Pituitary Adrenal Glad Problems (Hormonal Regulation)

View Set