ITN 170, Chapt 10-14
What is the most commonly used LAN protocol? IPX/SPX TCP/IP UDP/IP DLC
TCP/IP
The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket? A-/dev/log B-/etc/rsyslog.socket C-/tmp/log D-/var/log.sock
A
Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer? lpq --set-default printer1 lpd -d printer1 lpoptions -d printer1 lp -d printer1
lpoptions -d printer1
Which of the following files does the hostnamectl command modify to set the hostname on a machine? /etc/hostname /etc/host.conf /etc/hosts.conf /etc/hostname.conf
/etc/hostname
On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? /etc/inittab /etc/cmd.conf /etc/keys.conf /etc/init.conf
/etc/inittab
Which of the following file extensions are used by the Debian Package Manager? .dpkg .dpm .d .deb
.deb
If no level of compression is specified, the gzip command assumes what compression level? 5 6 7 4
6
Which of the following utilities will allow you to view information about virtual memory usage on a Linux system? vmpager vmstat reporter. vmctl vmmview
vmstat
Which of the following is not a valid compression file extension for the Linux operating system? .gz .bz2 .vz .xz
.vz
In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? public DMZ trusted internal
DMZ
Which of the following is the log file where Dandified YUM writes its log entries? yumd.log dnf.log dnf.rpm.log dyum.log
dnf.rpm.log
Which of the following commands can be used to view the quota for a user? quota --view jmith edquota -u jsmith quotadisp jsmith quotas jsmith
edquota -u jsmith
What PostgreSQL command-line utility backs up PostgreSQL database settings? pg_dump pg_backup pg_restore pg_dumpall
pg_dump
Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? ethstat finger ping transit
ping
Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? ping -4 server1 ping -c 4 server1 ping server1 ping -n 4 server1
ping -c 4 server1
What command looks for a Makefile and uses the information within it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? make install make install configure
make
Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server? 22/tcp open ssh 23/tcp open telnet 993/tcp open imaps 443/tcp open https
23/tcp open telnet
The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? 8 128 48 32
48
You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of? ICMP IGMP UDP TCP
UDP
What zone configuration file contains a PTR record used to identify the loopback adapter? /var/named/named.local /etc/named.conf /etc/named.loop /var/named/named.ca
/var/named/named.local
Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.) A-cat /etc/shadow B-read /etc/shadow C-getent /etc/shadow D-show /etc/shadow
A, C
Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? A-dpackage.log B-dpm.log C-dpkg.log D-packages.log
C
When working with Sendmail, what command can be used to test SMTP support? telnet HELO EHLO smtp
HELO
Which of the following commands will display detailed information for network hardware? lshw --net hwdisp --network lsnet ethtool
ethtool
What is the complete path and filename of the file where ports and their associated protocols are defined? ___________
/etc/services
Which of the following is a valid APIPA address? 169.254.38.101 10.11.12.13 192.168.1.17 127.0.0.1
169.254.38.101 Correct. The 169.254.0.0 through 169.254.255.255 range of IP addresses has been designated for use by the Automatic Private IP Address (APIPA) method of assigning IP addresses when a DHCP server is unavailable and an address has not been statically assigned.
Which of the following is the first field of the /etc/passwd file? A-username B-GID C-GECOS D-UID
A
Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation? rpm -ivh --nodeps package.rpm rpm -ivhn package.rpm rpm -in package.rpm rpm -i --ignoredeps package.rpm
rpm -ivh --nodeps package.rpm
Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.) curl GET wwwretr wget
wget, curl
Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default? Zypper DNF DPM APT
Zypper
Which of the following commands can be used to modify configuration options for DPM packages after they have been installed? dpkg-configure dpkg-update dpkg-reconfigure dpkg-config
dpkg-reconfigure
Which of the following commands will list missing libraries as not found if a necessary library is not installed? ldchk ldso ldd ldconfig
ldd
Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10? all /dev/tty10 *.* /dev/tty10 /dev/tty10 is the location console 10 that it should write to. rsyslog tty10 /var/log/* tty10
*.* /dev/tty10
Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) udevadm control -R udevadm control -r udevadm --reload udevadm control -Rall C
udevadm control --reaload udevadm control -R
Which of the following commands can be used to delete a user account? A-rmuser B-deluser C-userdel D-expireuser
C
Which type of CM software can connect to inventory members via SSH to perform configuration management activities? Agent-based agentless BLOB Kickstart
agentless
Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password? su switchuser user sudoer
su
If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? testwr noop deadline cfq
testwr
Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? tshark nshark wshark ushark
tshark
The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use? dnf apt rpm zypper
zypper
Which of the following options for the iptables command will delete all rules for all chains? -C -F -R -D
-F
Where is the default document root directory for the Apache Web server? /var/www/html /usr/share/local/html /var/html /usr/local/html
/var/www/html
Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services? RADIUS NTP TACACS+ SSH
TACACS+
What command can be used to view and modify the date and time within the BIOS? date hwclock clock clkmod
hwclock
Which of the following commands will display the print jobs in the print queue for printer1 only? lpstat -o printer1 lpq -p printer1 lpq -d printer1 lp -j printer1
lpstat -o printer1
What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename? upload filename mput filename get filename put filename
mput filename
Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.) nameserver 10.1.1.4 domain comptia.org 10.1.15.60 server10 order hosts, bind
nameserver 10.1.1.4 domain comptia.org
On a system running NetworkManager, which of the following commands can be used to view or modify connection information? nmcli nm netman netctonf
nmcli
Which of the following files contains the list of shared libraries? /etc/ld.so.cache /lib/ld.so.conf /lib/shared.conf /etc/ld.so.conf
/etc/ld.so.cache
Which of the following commands can be used to display socket information out to the terminal screen? ss opensocks woolsocks sstat
ss
Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen? tar -czvf tar -cfza tar -ngac tar -nzaf
tar -czvf
Which of the following commands can be used to trace an IPv6 route? (Choose two.) trace6 tracert6 traceroute6 route. tracepath6
traceroute6 tracepath6
What FTP command runs a shell on the local computer? ~ * ! #
!
Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.) 21 80 23 22
21 23
Which of the following commands can you use to search available repository information? (Choose two.) apt-query apt apt-cache apt query
apt apt-cache
Which of the following commands will change the SELinux security context of a file? secontext chcon scont sechange
chcon
You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? /etc/nsswitch.conf /etc/hosts /etc/resolv.conf /etc/named.conf
/etc/nsswitch.conf
Which of the following files contain the path and filename where DNS servers should be configured? /etc/nsswitch.conf /etc/resolv.conf /etc/hosts /etc/named.conf
/etc/resolv.conf
In which of the following directories can you place files that will be copied to new user directories when new users are created? /usr/local/useradd /usr/local/template /etc/rc.d /etc/skel
/etc/skel
Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? /etc/sudo.conf /etc/rc.d/sudoers.conf /etc/sudoers /etc/su.conf
/etc/sudoers
What is the path to where the journald.conf file is located? /etc/rsyslog/journald.conf /etc/systemd/journald.conf /etc/rsyslogd/journald.conf /etc/journald/journald.conf
/etc/systemd/journald.conf
Which of the following files stores information about failed logins on a Linux system? /var/log/btmp /var/log/nolo /var/log/wtmp /var/log/failed
/var/log/btmp
Which of the following ports would be used to resolve a domain name to an IP address? 443 69 23 53
53
Which of the following is a valid SQL statement for adding a new row of data to a SQL database table? INSERT ('George', 'Washington') INTO users (firstname, lastname); ALTER TABLE users SET firstname = 'George', lastname = 'Washington'; INSERT INTO users (firstname, lastname) values ('George', 'Washington'); UPDATE users SET firstname = 'George', lastname = 'Washington';
INSERT INTO users (firstname, lastname) values ('George', 'Washington');
Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? TFTP Telnet Kerberos Syslog
Kerberos
What DNS resource record type is used to provide the IP address for the e-mail server for a zone? NS CNAME SOA MX
MX
Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires? chage -u jsmith usermod --expiry jsmith chage -l jsmith lsuser jsmith
chage -l jsmith
Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time? cloud-init OVF Kickstart Docker Hub
cloud-init
Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) netstat -u netstat --udp netstat -t udp netstat udp
netstat -u netstat --udp
If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? brstat brctl ip bridge netbr
brctl
Which of the following files does a TCP wrapper check before starting a network daemon? /etc/daemon.allow and /etc/daemon.deny /etc/wrapper.allow and /etc/wrapper.deny /etc/hosts.allow and /etc/hosts.deny /etc/tcp.allow and /etc/tcp.deny
/etc/hosts.allow and /etc/hosts.deny
What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? NTP DNS NIS DHCP
DNS
Which of the following does the -r option for the gpg command specify? Retrieve keys for given key ID. Revoke keys from the key server. Remote key server to query. Encrypt for the user id given.
Encrypt for the user id given.
Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used? ORDER BY GROUP BY HAVING JOIN
GROUP BY
Which of the following files does the hostnamectl command modify to set the hostname on a machine? /etc/hosts.conf /etc/host.conf /etc/hostname.conf /etc/hostname
/etc/hostname
If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? /etc/banner.conf /etc/nologin.txt /etc/deny.login /etc/warning.txt
/etc/nologin.txt
The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? netctl eth0 up ifup eth0 int eth0 up interface eth0 --status up
ifup eth0
What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? -d -D -r -P
-P
Which of the following commands can be used to pause a printer named Printer1? cupsdisable -c Printer1 cupsreject -p Printer1 cupsdisable Printer1 cupsreject Printer1
cupsdisable Printer1
Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them? agent-based agentless imperative configuration declarative configuration
declarative configuration
Which of the following commands can you use to list users who have been locked out by pam_faillock.so? pam_tally2 locklist pam_faillock faillock
faillock
When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file? -c -v -a -s
-v
Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.) A-delgroup B-rmgroup C-rmg D-groupdel
A, D
In which file can you configure rules for logging on a Linux system? A-/etc/syslog.rules B-/etc/rsyslog.conf C-/etc/syslog.rules.conf D-/etc/syslogd.conf
B
Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled? A-usermod -d 15 jsmith B-usermod -x 15 jsmith C-usermod -e 15 jsmith D-usermod -f 15 jsmith
D
Which of the following SQL statements can be used to delete a table from a database? DROP FROM database TABLE table_name; ALTER DATABASE database DROP TABLE table_name; DELETE TABLE table_name; DROP TABLE table_name;
DROP TABLE table_name;
You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this? dhcpaddr eth0 ifconfig eth0 ethconfig 0 netconfig eth0
ifconfig eth0
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem? make clean make make install make image
make install
Which of the following options can be used with the usermod command to change the description of the user account that is stored in the GECOS field? A.-c B.-s C.-d D.-g
A
Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.) A-mklog B-systemd-cat C-logger D-systemd-make E- logentry
B C
Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables? INNER JOIN RIGHT JOIN LEFT JOIN FULL OUTER JOIN
INNER JOIN
Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? VLAN ADSL VPN NTP
VPN
Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system? YUM tar APT wget
YUM
Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system? apt-get upgrade apt-get upgrade all apt-get update-all apt-get update
apt-get upgrade
Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files? sysbackup cpio diskdup bkup
cpio
Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.) deluser userdel usermod -r usermod -d
deluser userdel
When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.
known_hosts
Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation? rpm -ivh packagename.rpm rpm -iah packagename.rpm rpm -ivp packagename.rpm rpm -iap packagename.rpm
rpm -ivh packagename.rpm
Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? doas su sudo account. sudoer
sudo