ITN 170 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a valid compression file extension for the Linux operating system? .vz .xz .gz .bz2

.vz

Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)? psfiles lsof pstatus pids

lsof

Which of the following utilities can be used by a system administrator to determine which services are responding to network requests? portscan nmap netscan pmap

nmap

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login? /etc/deny.login /etc/banner.conf /etc/nologin.txt /etc/warning.txt

/etc/nologin.txt

Which of the following files contain the path and filename where DNS servers should be configured? /etc/nsswitch.conf /etc/named.conf /etc/resolv.conf /etc/hosts

/etc/resolv.conf

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server? 22/tcp open ssh 23/tcp open telnet 443/tcp open https 993/tcp open imaps

23/tcp open telnet

Which of the following commands can you use to list users who have been locked out by pam_faillock.so? faillock pam_faillock pam_tally2 locklist

faillock

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename? upload filename mput filename put filename get filename

mput filename

Which of the following is the first field of the /etc/passwd file? UID username GECOS GID

username

Which of the following file extensions are used by the Debian Package Manager? .dpm .deb .dpkg .d

.deb

Which of the following files contains the list of shared libraries? /etc/ld.so.conf /etc/ld.so.cache /lib/shared.conf /lib/ld.so.conf

/etc/ld.so.cache

Which of the following is the default desktop environment used by Linux Mint? GNOME KDE Unity Cinnamon

Cinnamon

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do? Configure /etc/crypttab to open the volume and then /etc/fstab to mount it. Configure /etc/fstab to mount the partition. Configure /etc/crypttab to mount the partition. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it.

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

When working with Sendmail, what command can be used to test SMTP support? EHLO telnet HELO smtp

HELO

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take? mtr traceroute tracert tracepath

mtr traceroute tracepath

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database? alias newaliases sendmail mail

newaliases

Which of the following commands will show the current runlevel along with the previous runlevel? runlevel telinit -r init -r echo $RUNLEVEL

runlevel

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password? sudoer user su switchuser

su

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of? TCP UDP ICMP IGMP

UDP

Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running? Kickstart Upstart GRUB POST

Upstart

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? ADSL VPN NTP VLAN

VPN

Which of the following commands can be used to display the current locale of a system? (Choose two.) locale localectl localed syslocale

locale localectl

Which of the following files contains the encrypted passwords for users on a modern Linux system by default? /etc/passwd /etc/pwenc /etc/shadow /etc/psh

/etc/shadow

In which of the following directories can you place files that will be copied to new user directories when new users are created? /etc/rc.d /etc/skel /usr/local/template /usr/local/useradd

/etc/skel

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command? /etc/sudoers /etc/sudo.conf /etc/rc.d/sudoers.conf /etc/su.conf

/etc/sudoers

Which of the following is an on-screen keyboard used with Linux? GOK xkb XK TOKEN

GOK

Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used? ORDER BY HAVING JOIN GROUP BY

GROUP BY

Which of the following system variables can you modify to override the default system timezone within your current shell? TZ TIME LOCALE LC_TZ

TZ

Which of the following commands will change the SELinux security context of a file? sechange secontext chcon scont

chcon

You have started a job running in the background that you want to now bring to the front so that you can watch it execute. Which of the following commands can be used to display the job's output to the terminal? disp fg front jobs -f

fg

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address? local files hosts etchosts

files

Which of the following commands can a user run to display the groups that they are a member of? groupmod --list groups --list groups groupls

groups

Which of the following commands can be used to only show jobs that have been paused. jobs -p jobs -s jobs -n jobs -r

jobs -s

Which of the following commands can you use to view events within the journald database? journald --list journalctl journal --display viewlogs --journald

journalctl

Which of the following commands will show a number of environment variables that start with LC_? localvar locale env printenv

locale

Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer? lp -d printer1 lpoptions -d printer1 lpd -d printer1 lpq --set-default printer1

lpoptions -d printer1

Which of the following commands will generate a new initramfs? mkinitrd mkinit dracut cutram

mkinitrd dracut

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account? su sudo sudoer doas

sudo

Which of the following options can be used with the usermod command to change the description of the user account that is stored in the GECOS field? -g -d -c -s

-c

Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time? /usr/local/bin/timecalc /etc/localtime /sbin/tickadj /sbin/timeadj

/etc/localtime

Which of the following does a Linux kernel use to store the value of epoch time? The number of days since January 1, 1900 The number of minutes since January 1, 1900 The number of seconds since January 1, 1970 The number of milliseconds since January 1, 1980

The number of seconds since January 1, 1970

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration? The minimum password length has to be at least 3 characters long. There must be at least 3 characters that are different from their previous password. Users must use at least 3 characters as numbers in their passwords. Users cannot re-use their last 3 passwords.

Users must use at least 3 characters as numbers in their passwords.

What command looks for a Makefile and uses the information within it to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture? configure install make install make

make

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services? RADIUS TACACS+ SSH NTP

TACACS+

In which directory would a system administrator store scripts that should be run monthly by the cron daemon? /var/cron/monthly /etc/crontab/monthly /var/crontab/monthly /etc/cron.monthly

/etc/cron.monthly

Which of the following files does the hostnamectl command modify to set the hostname on a machine? /etc/hostname /etc/host.conf /etc/hosts.conf /etc/hostname.conf

/etc/hostname

Which of the following is a valid APIPA address? 127.0.0.1 169.254.38.101 10.11.12.13 192.168.1.17

169.254.38.101

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them? agentless declarative configuration imperative configuration agent-based

declarative configuration

Which kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory? SIGINT SIGKILL SIGQUIT SIGTERM

SIGQUIT

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service? netfilter iptables ufw TCP Wrapper

TCP Wrapper

After a background process has been started, what command below can be used to move it to the foreground? fg fgnd fgd b2f

fg

Which of the following commands will display the number of seconds that have elapsed since January 1, 1970? date +%s date --epochdiff datetime --epoch datetime -s

date +%s

The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket? /tmp/log /var/log.sock /etc/rsyslog.socket /dev/log

/dev/log

In which file can you configure rules for logging on a Linux system? /etc/rsyslog.conf /etc/syslog.rules /etc/syslog.rules.conf /etc/syslogd.conf

/etc/rsyslog.conf

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

/etc/services

What is the path to where the journald.conf file is located? /etc/systemd/journald.conf /etc/journald/journald.conf /etc/rsyslogd/journald.conf /etc/rsyslog/journald.conf

/etc/systemd/journald.conf

In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory? /usr/local/zoneinfo /usr/zoneinfo /etc/zoneinfo /usr/share/zoneinfo

/usr/share/zoneinfo

Which of the following commands will display detailed information for network hardware? lsnet hwdisp --network lshw --net ethtool

ethtool

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command? DSA (sign only) RSA (sign only) RSA and RSA RSA and Elgamal

RSA and RSA

Which of the following is not a valid Apparmor command? aa-enforce aa-trust aa-unconfined aa-complain

aa-trust

Which type of CM software can connect to inventory members via SSH to perform configuration management activities? Agent-based BLOB agentless Kickstart

agentless

Which of the following commands can you use to search available repository information? (Choose two.) apt-cache apt-query apt query apt

apt-cache apt

Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system? apt-get update apt-get upgrade apt-get upgrade all apt-get update-all

apt-get upgrade

A system administrator wants to schedule a task to run at 11 pm, but knows that she will not be in the office at that time. Which of the following commands can she use to schedule this task to run that night while she is at home? exec run at atq

at

Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.) at -l atq at -q at -d

at -l atq at -q

Which of the following command can be used to remove a job from the list of pending jobs? (Choose all that apply.) at --remove atrm at -r at -d

atrm at -r at -d

Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.) rmgroup rmg groupdel delgroup

groupdel delgroup

What command can be used to view and modify the date and time within the BIOS? clock date hwclock clkmod

hwclock

Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds? systohc --compare compare --hw2sys hwtosys -c hwclock -c

hwclock -c

Which of the following commands can be used to convert files between different character encodings? iconv conv convert transform

iconv

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? netctl eth0 up ifup eth0 int eth0 up interface eth0 --status up

ifup eth0

Which of the following will invalid entries in the GRUB2 configuration cause? kernel warning automatically skipping invalid entries kernel panic and halt the system kernel error with confirmation to skip invalid entries no error, automatically skipping invalid entries until a valid entry is found

kernel panic and halt the system

After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem? make install make make image make clean

make install

Which of the following can be used preceding a command to prevent a process from terminating when the parent process terminates? bg runat & nohup

nohup

Which of the following permissions should a standard user have on the /etc/shadow file? read read and write read, write, and execute none of the above

none of the above

What PostgreSQL command-line utility backs up PostgreSQL database settings? pg_dumpall pg_dump pg_restore pg_backup

pg_dump

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection? finger ping transit ethstat

ping

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? ping -4 server1 ping server1 ping -c 4 server1 ping -n 4 server1

ping -c 4 server1

Which of the following commands can be used to terminate a process by the process name? kill pkill stop pskill

pkill

Which of the following commands will show a list of process names along with their process ID (PID)? (Choose two.) ps proc top jobs

ps top

What command is used to display the lineage of a process by tracing its PPIDs until the init daemon? psbranch pstree psparent pshead

pstree

Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process? n p r d

r

Which of the following commands can you use to send a print job to printer1? (Choose all that apply.) lp -d printer1 mydocument.txt lpr -d printer1 mydocument.txt lpr -P printer1 mydocument.txt lp -p printer1 mydocument.txt

lp -d printer1 mydocument.txt lpr -P printer1 mydocument.txt

Which of the following commands will display a list of Systemd units sorted by the time they took to load? systemd-analyze blame systemd --listload systemctl --listload systemctl-analyze --blame

systemd-analyze blame

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.) logentry mklog systemd-cat logger systemd-make

systemd-cat logger

Which of the following commands will shut down a Linux system? (Choose all that apply.) runlevel 0 telinit 0 shutdown -h now poweroff

telinit 0 shutdown -h now poweroff

Which of the following commands can be used to trace an IPv6 route? (Choose two.) trace6 traceroute6 tracert6 tracepath6

traceroute6 tracepath6

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface? wshark tshark ushark nshark

tshark

Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use? zones timezones zoneselect tzselect

tzselect

Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command? sudoer sudoers edsudo visudo

visudo

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system? vmpager vmctl vmmview vmstat

vmstat

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.) GET wget curl wwwretr

wget curl

Which of the following commands will set the default runlevel of a Linux system? systemctl --set-default runlevel5.target systemctl set-default runlevel5.target systemctl --default runlevel5.target systemctl set-init runlevel5.target

systemctl set-default runlevel5.target

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance? testwr noop cfq deadline

testwr

Which of the following commands will list the time zones available on a Linux system? date --timezones timedatectl list-timezones timezones tzlist

timedatectl list-timezones

Which of the following states describe a process that is waiting for a parent process to release its PID? wait suspended zombie dead

zombie

The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use? apt rpm zypper dnf

zypper

If incompatible X Windows settings are configured, where will the errors that are generated be written to? ~/.xsession-errors ~/.xerror ~/.xwin-error /var/log/xwindows.error

~/.xsession-errors

Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.) cat /etc/shadow getent /etc/shadow show /etc/shadow read /etc/shadow

cat /etc/shadow getent /etc/shadow

Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files? diskdup bkup cpio sysbackup

cpio

Which of the following commands will show the current user cron jobs that have been created for the currently logged in user? cronjobs --list cron --list cron -l crontab -l

crontab -l

Which command can be used at a BASH command prompt to obtain a Web page? apachect1 ab curl webpage

curl

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem? chkdisk fsck chkfs blocks

fsck

Which of the following will display entries from the Name Service Switch libraries? nsslist nss getent dispdet

getent

Which of the following commands will generate a GPG public/private key pair? gpg --new-key gpg --gen-key gpg-generate gpg-key --generate

gpg --gen-key

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? ifconfig server1 host server1 hostnamectl set-hostname server1 set hostname="server1"

hostnamectl set-hostname server1

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this? dhcpaddr eth0 ifconfig eth0 ethconfig 0 netconfig eth0

ifconfig eth0

Which of the following log files contains information and error messages generated by the Linux kernel? wtmp dmesg kern.log secure

kern.log

Which of the following files holds the configuration information for GRUB Legacy on Ubuntu Linux systems? grub.conf menu.conf menu.lst grub.lst

menu.lst

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen? tar -ngac tar -cfza tar -czvf tar -nzaf

tar -czvf

Which of the following commands can be used to delete a user account? deluser rmuser userdel expireuser

userdel

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? /etc/hosts /etc/nsswitch.conf /etc/resolv.conf /etc/named.conf

/etc/nsswitch.conf

What zone configuration file contains a PTR record used to identify the loopback adapter? /var/named/named.ca /etc/named.conf /var/named/named.local /etc/named.loop

/var/named/named.local

Where are scheduled commands stored on Ubuntu Linux systems? /var/spool/cron/atjobs /etc/at/ /tmp/at /var/spool/at

/var/spool/cron/atjobs

Where is the default document root directory for the Apache Web server? /usr/local/html /var/www/html /usr/share/local/html /var/html

/var/www/html

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website? internal trusted DMZ public

DMZ

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet? DHCP NTP DNS NIS

DNS

Which of the following SQL statements can be used to delete a table from a database? DELETE TABLE table_name; DROP FROM database TABLE table_name; ALTER DATABASE database DROP TABLE table_name; DROP TABLE table_name;

DROP TABLE table_name;

Which of the following does the -r option for the gpg command specify? Encrypt for the user id given. Retrieve keys for given key ID. Revoke keys from the key server. Remote key server to query.

Encrypt for the user id given.

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables? FULL OUTER JOIN INNER JOIN LEFT JOIN RIGHT JOIN

INNER JOIN

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table? INSERT INTO users (firstname, lastname) values ('George', 'Washington'); INSERT ('George', 'Washington') INTO users (firstname, lastname); ALTER TABLE users SET firstname = 'George', lastname = 'Washington'; UPDATE users SET firstname = 'George', lastname = 'Washington';

INSERT INTO users (firstname, lastname) values ('George', 'Washington');

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory? Kerberos TFTP Telnet Syslog

Kerberos

Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence? Bounce Keys Repeat Keys Sticky Keys Slow Keys

Sticky Keys

Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments? GNOME KDE XFCE mutter

XFCE

Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10? /var/log/* tty10 rsyslog tty10 *.* /dev/tty10 all /dev/tty10

*.* /dev/tty10

Which of the following options for the gpg command will specify the key that should be retrieved? --get-key --request --recv-keys --get

--recv-keys

Which of the following options for the gpg command will attempt to use the gpg agent and if it cannot will ask for a passphrase? --gpg-agent --use-agent --agent --try-agent

--use-agent

Which of the following options for the iptables command will delete all rules for all chains? -D -R -F -C

-F

Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale? LC_* LC_ALL LANG TZ

LANG

What DNS resource record type is used to provide the IP address for the e-mail server for a zone? NS MX SOA CNAME

MX

What option can be added to the dpkg command to remove a specified package from the system, including any configuration files used by the package? -d -P -D -r

-P

Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system? -i -U -u -F

-U

What option can be used with the ps command to display an entire list of processes across all Terminals, including daemons? -a -f -e -l

-e

When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file? -c -v -s -a

-v

If a process state is currently showing as uninterruptible sleep, which letter will show in the output of the ps command? S U N D

D

Which of the following can be used to graphically remotely administer a Linux machine? RDP Telnet FTP VNC

VNC

What is contained in the DISPLAY variable on a Linux system running the X window system? The resolution of the monitor connected to the Linux system. Which X server the client is supposed to connect to by default. The display manager that should be used. How many monitors are connected to a Linux system.

Which X server the client is supposed to connect to by default.

Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system? tar wget APT YUM

YUM

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default? APT DPM DNF Zypper

Zypper

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter? ip bridge netbr brstat brctl

brctl

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed? dpm.log dpkg.log dpackage.log packages.log

dpkg.log

Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires? usermod --expiry jsmith chage -u jsmith chage -l jsmith lsuser jsmith

chage -l jsmith

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time? cloud-init Docker Hub Kickstart OVF

cloud-init

On a system running NetworkManager, which of the following commands can be used to view or modify connection information? netman nm netctonf nmcli

nmcli

Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.) deluser usermod -r userdel usermod -d

deluser userdel

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system?\ dmidecode biosinfo lsuefi hwls

dmidecode

Which of the following is the log file where Dandified YUM writes its log entries? dnf.log dyum.log dnf.rpm.log yumd.log

dnf.rpm.log

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.) domain comptia.org order hosts, bind 10.1.15.60 server10 nameserver 10.1.1.4

domain comptia.org nameserver 10.1.1.4

Which of the following commands can be used to modify configuration options for DPM packages after they have been installed? dpkg-configure dpkg-reconfigure dpkg-update dpkg-config

dpkg-reconfigure

Which of the following is the default window manager used by the GNOME version 3 desktop environment? mutter metacity wmaker kwin

mutter

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) q netstat --udp netstat -t udp netstat udp

netstat -u netstat --udp

Which of the following types of DNS records need to be configured to facilitate email delivery? CNAME PTR MX IMAP

MX

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? 8 32 48 128

48

Which of the following ports would be used to resolve a domain name to an IP address? 443 23 53 69

53

What FTP command runs a shell on the local computer? ~ # ! *

!

Where are the files stored that contain information for all of the time zones that could be recognized by a Linux operating system? /etc/timezones /var/zoneinfo /usr/share/zoneinfo /var/local/timezones

/usr/share/zoneinfo

Which of the following files stores information about failed logins on a Linux system? /var/log/btmp /var/log/wtmp /var/log/nolo /var/log/failed

/var/log/btmp

Which of the following is the highest value that can be set for the nice value which would result in a greater chance of a lower priority? 20 19 10 0

19

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.) 21 22 23 80

21 23

Which of the following environment variables can you change the value of to set the default printer on a Linux system? (Choose two.) PRINT PRINTER LPDEFAULT LPDEST

PRINTER LPDEST

Which of the following are examples of multifactor authentication? Password and PIN Thumbprint reader and facial recognition Password and fingerprint reader A USB token and a Common Access Card

Password and fingerprint reader

Which of the following is a valid Linux initialization process? Systemd GRUB SysV GRUB2

Systemd SysV

Which of the following commands can be used to view the quota for a user? quota --view jmith quotadisp jsmith quotas jsmith edquota -u jsmith

edquota -u jsmith

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

Which of the following commands will list missing libraries as not found if a necessary library is not installed? ldd ldconfig ldso ldchk

ldd

Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation? rpm -ivh --nodeps package.rpm rpm -ivhn package.rpm rpm -i --ignoredeps package.rpm rpm -in package.rpm

rpm -ivh --nodeps package.rpm

Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation? rpm -iah packagename.rpm rpm -iap packagename.rpm rpm -ivh packagename.rpm rpm -ivp packagename.rpm

rpm -ivh packagename.rpm

Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image? splash timeout wait timer

timeout

Which of the following does Click Assist do? Simulates a right click by holding down the left mouse button. Simulates a right click by holding down the Ctrl key on the keyboard. Simulates a left click by holding down the left shift key or a right click by holding down the right shift key. Reads the text for buttons on the screen so the user knows what they may be clicking on.

Simulates a right click by holding down the left mouse button.

While the top command is running, what key can be pressed to change the nice value of a process? n r p v

r

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.) udevadm --reload udevadm control -r udevadm control --reload udevadm control -R

udevadm control --reload udevadm control -R

Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled? usermod -f 15 jsmith usermod -d 15 jsmith usermod -x 15 jsmith usermod -e 15 jsmith

usermod -f 15 jsmith

What command can be used to display the contents of a file that was compressed with the compress utility? acat zcat cat ccat

zcat

Which of the following can you use to configure firewall rules for IPv6 on a Linux system? ip6tables fw --ipv6 netfilter -6 fw6

ip6tables

Which of the following commands can be used to schedule very frequent recurring tasks, such as running once every minute? run watch do while

watch

What is the most commonly used LAN protocol? UDP/IP IPX/SPX TCP/IP DLC

TCP/IP

Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list? apt upgrade apt upgrade all apt update apt-upgrade

apt upgrade

Which of the following commands can be used to pause a printer named Printer1? cupsreject -p Printer1 cupsdisable -c Printer1 cupsreject Printer1 cupsdisable Printer1

cupsdisable Printer1

If no level of compression is specified, the gzip command assumes what compression level? 4 5 6 7

6

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed? /23 /24 /27 /28

/27

Which of the following is the full path and file name where the Debian Package Manager repositories can be configured? /etc/dpm/repositories.conf /etc/apt/sources.list /etc/apt.source.conf /etc/dpm.conf

/etc/apt/sources.list`

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs? /etc/cron.deny /etc/cron.d/cron.deny /etc/cron.allow /etc/cron.d/cron.allow

/etc/cron.deny

Which of the following files does a TCP wrapper check before starting a network daemon? /etc/tcp.allow and /etc/tcp.deny /etc/hosts.allow and /etc/hosts.deny /etc/wrapper.allow and /etc/wrapper.deny /etc/daemon.allow and /etc/daemon.deny

/etc/hosts.allow and /etc/hosts.deny

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination? /etc/inittab /etc/keys.conf /etc/init.conf /etc/cmd.conf

/etc/inittab

Which of the following files is where the default runlevel is set on some Linux systems? /etc/inittab /etc/init.d/init /etc/rc.d/init.conf /etc/rc.d/init.d/init.conf

/etc/inittab

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented? Kerberos OTP Finger CUPS

OTP

You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped working. What is another way that you can exit out of the top program? ctrl-c ctrl-q ctrl-w ctrl-x

ctrl-c

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered? mailqueue mailq mail --queue mail -q

mailq

Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357? sigkill 1357 killall 1357 kill -15 1357 kill -9 1357

kill -9 1357

Which of the following commands will display the print jobs in the print queue for printer1 only? lpstat -o printer1 lpq -d printer1 lpq -p printer1 lp -j printer1

lpstat -o printer1

Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest? md4sum md5sum sha256sum sha1sum

sha256sum

Which of the following commands can be used to display socket information out to the terminal screen? opensocks ss woolsocks sstat

ss

Which of the following is a special group that provides its members with the ability to run the su and sudo commands? sudoers adm wheel sys

wheel


Ensembles d'études connexes

MATH 41 | ULTIMATE REVIEW (Ch. 1-3, 10.2, 10.3, 10.4)

View Set

2019/20 JROTC Academic Competition Q Bank

View Set

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set

IB Computer Science Case Study 2018

View Set