Linux+ 2022

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A junior administrator needs to unload an older video kernel module. Which of the following commands would BEST accomplish this task? A) modprobe B) chmod C) rmmod D) depmod E) insmod

A

A user needs to modify the IP address of a laptop. Which of the following files can be used to configure the network interface named eth0? A) /etc/sysconfig/network-scripts/ifcfg-eth0 B) /etc/interfaces/eth0.conf C) /system/config/interfaces D) /etc/sysconfig/network/interfaces.cnf E) /system/networking/ifconfig

A

A user wants to use terminal services from a Windows workstation to manage a Linux server. Which of the following should be installed on the Linux server to enable this functionality? A) XRDP B) rdesktop C) SPICE D) VNC

A

Of the following choices, which size would be most appropriate for the /boot partition of a Linux system? A. Between 100 MB and 500 MB B. Between 1 GB and 10 GB C. /boot should not be partitioned separately. D. Less than 5 MB

A

The system that you're working with recently had a hard drive failure, resulting in degraded storage. A new hard drive has been installed and had Linux restored from backup to the drive. However, the system will not boot and instead shows a grub > prompt. Within the grub > prompt, which command will show the current partitions as seen by GRUB? A. Is B. showPart C. partitionlist D. ps

A

Two specific users need access to a directory owned by root where backups are located. Which of the following commands would BEST ensure the specified users can access the backup files? A) setfacl B) chcon C) chmod D) umask

A

You are tasked with deploying several applications to a Linux server. Ideally, each application should be isolated from the host system, utilizing a minimum amount of resources. Which of the following would BEST meet these requirements? A. Containers B. Virtual machines C. OVAs D. OVF

A

You are troubleshooting a Linux system that fails to boot. You suspect that the file system Is corrupt. Which of the following commands would use to prove your suspicions and fix the system? A. fsck B. forcefsck C. fdisk D. dd

A

You are writing a script for a Linux system. Within the script, you want to check the value of a variable. If the variable meets a predefined condition, you want to repeat some code several times. Which of the following statements would BEST meet your needs? A. until B. while C. if D. case

A

You are writing a shell script using bash and need to print the contents of a variable. Which of the following commands can be used to do so? A. echo B. If C. sp D. varpt

A

You discover that an application is creating several zombie processes on a Linux server. Using the system monitor, you identify one of the zombie process PID's is 1234. Which of the following commands will kill the zombie process? A. kill-9 1234 B. kill-01234 C. kill-sSIGCHLD 1234 D. kill 1234

A

A Linux administrator has configured a Linux system to be used as a router. The administrator confirms that two network adapters are properly installed and functioning correctly. In addition, the output of the iptables ""L command appears to contain a complete firewall configuration. Which of the following commands does the administrator need to issue for the router to be fully functional? A) echo "1" > /proc/sys/net/ipv4/ip_forward B) echo "1" > /proc/sys/net/ipv4/ip_default_ttl C) echo "0" > /proc/sys/net/ipv4/tcp_abort_on_overflow D) echo "0" > /proc/sys/net/ipv4/max_connections

A

A junior Linux administrator is optimizing a system in which an application needs to take priority 0 when running the process. The administrator runs the ps command and receives the following output: PID PPID TTY Time CMD 8481 2 pts/17 16:40:00 app 9854 0 pts/17 16:40:00 ps Given this scenario, which of the following steps will address this issue? A) Issue the command renice ""n 0 ""p 8481 B) Issue the command renice ""n 8481 C) Issue the command renice ""p 8481 D) Issue the command renice ""p 0 -n 8481

A

A Linux administrator implemented a new HTTP server using the default configuration. None of the users on the network can access the server. If there is no problem on the network or with the users' workstations, which of the following steps will BEST analyze and resolve the issue? A) Run netstat to ensure the port is correctly bound, and configure the firewall to allow access on ports 80 and 443 B) Run netcat to ensure the port is correctly bound, and configure a static route to the web to allow access on ports 80 and 443 C) Run route to ensure the port is correctly bound, and configure SELinux to allow access on ports 80 and 443 D)Run route to ensure the port is correctly bound, and configure the firewall to allow access on ports 80 and 443

A

A Linux administrator installed a new network adapter and temporarily disabled the network service from starting on boot. The partial output of chkconfig is as follows: network 0:off l:off 2:off 3:off 4:off 5:off 6:off Which of the following commands BEST describes how the administrator should re-enable the network service? A) chkconfig --level 12 network on B) chkconfig --level 12 network on C) chkconfig --level 6 network on D) chkconfig --level 0-6 network on E) chkconfig --level 0 network on

A

A Linux administrator looks at the /etc/timezone file and determines the need to change the time zone from California to New York temporarily. Which of the following commands will accomplish this? A) export TZ=America/New_York B) cat TZ=America/New_York C) sed -f TZ=America/New_York D) printf TZ=America/New_York

A

A Linux administrator must identify a user with high disk usage. The administrator runs the # du ""s /home/* command and gets the following output: 43 /home/User1 2701 /home/User2 133089 /home/User3 3611 /home/User4 Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space. Which of the following commands will accomplish this task? A) du ""a /home/User3/* B) du ""sh /home/User/ C) find . ""name /home/User3 -print D) df ""k /home/User3/files.txt

A

A Linux administrator opens a ticket to have an external hard drive mounted. As a security policy, external storage kernel modules are disabled. Which of the following is the BEST command for adding the proper kernel module to enable external storage modules? A) insmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko B) rmmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko C) modinfo /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko D) depmod /lib/modules/3.6.12-100-generic/kernel/drivers/usb/storage/usb-storage.ko

A

A Linux administrator wants to fetch a Git repository from a remote Git server. Which of the following is the BEST command to perform this task? A) git clone B) git merge C) git config D) git checkout

A

A Linux system is running normally when the systems administrator receives an alert that one application spawned many processes. The application is consuming a lot of memory, and it will soon cause the machine to become unresponsive. Which of the following commands will stop each application process? A) killall application B) pkill -9 application C) kill `pidof application` D) kill -9 `ps ""aux | grep application`

A

A Linux systems administrator is implementing Source Code Management for the web application server configuration files located in /etc/httpd/. Which of the following steps should the administrator perform FIRST? A) Create a new repository using "˜git init' B) Clone the remote repository using "˜git clone' C) Retrieve the remote changes using "˜git commit' D) Configure the directory for git using "˜git config'

A

A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task? A) Use ssh-copy-id to copy each user's public key file to the respective system B) Use curl to copy each user's public key file to the respective system C) Use ssh-copy-id to copy each user's private key file to the respective system D) Use cp to copy each user's public key file to the respective system

A

A Linux systems administrator needs to copy the contents of a directory named "working" on the local working system to a folder /var/www/html on a server named "corporate-web". Which of the following commands will allow the administrator to copy all the contents to the web server? A) scp ""r working/* webuser@corporate-web:/var/www/html B) tar working/* webuser@corporate-web:/var/www/html C) mv working webuser@corporate-web:/var/www/html D) cp ""r working/* webuser@corporate-web:/var/www/html

A

A command has the following listing obtained with Is -la: -rwsr-xr-x 1 suehring suehring 21 Nov 2 13:53 script.sh What does the s denote within the user permissions in the listing? A. The suid bit has been set for this program. B. This is a symlink. C. The file will not be executable. D. The file is a special system file.

A

A database server (DB1) has been intermittently crashing. Because it is integral to operations, you want to ensure personnel are notified as soon as possible after a crash. You want to create a script and schedule it as a cron job to run regularly. Which of the following scripts is the BEST choice to accomplish this task? A. DB1 = 10.1.80.15 ping -c 4 $DB1 > ping.txt 2> tmp/db1 .log if [ -f /tmp/db1 .log j; then echo "DB1 is down" | mail - s "DB1 down" [email protected]" rm /tmp/db1.log fi B. DB1 = 10.1.80.15 ping-c4$db1 >tmp/db1.log if [ -f /tmp/db1 .log j; then echo "DB1 is down" | mail - s "DB1 down" [email protected]" rm /tmp/db1.log fi C. DB1 = 10.1.80.15 ping -c 4 $DB1 > tmp/db1 .log 2> /dev/null if [ -f /tmp/db1 .log ]; then echo "DB1 is down" | mail - s "DB1 down" [email protected]" rm /tmp/db1.log fi D. DB1 =10.1.80.15 ping -c 4 $DB1 > ping.txt 2> tmp/dbl .log while (-f/tmp/db1.log] do echo "DB1 is down" | mail - s "DB1 down" [email protected]" done

A

A file server is sharing a directory called /share between team members inside a company. The fileshare needs to be moved from serverA to /newshare located on serverB with all permissions and attributes preserved. Which of the following commands would BEST achieve this task? A) rsync -aHAX /share/* serverB:/newshare B) mirrorlv /share/* serverB:/newshare C) dd if=/share/* of=serverB:/newshare D) dd if=/share/* of=serverB:/newshare

A

A junior Linux administrator is trying to verify connectivity to the remote host host1 and display round-trip statistics for ten ICMP requests. Which of the following commands should the administrator execute? A) ping ""c 10 host1 B) traceroute ""c 10 host1 C) netstat host1 D) pathping ""c 10 host1

A

A junior administrator of a physical server receives log messages indicating the out-of-memory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file. Which of the following should the administrator use to reduce the output of memory messages? A) mkswap /swapfile; swapon ""a B) free : swapoff / swapfile ; swapon -a C) fallocate ""l 2G /swapfile && swapon ""a D) echo "1" > /proc/meninfo ; swapon / swapfile

A

A junior systems administrator has generated a PKI certificate for SSH sessions. The administrator would like to configure authentication without passwords to remote systems. Which of the following should the administrator perform? A) Add the content of id_rsa.pub file to the remote system ~/.ssh/authorized_keys location. B) Add the content of id_rsa file to the remote system ~/.ssh/authorized_keys location. C) Add the content of id_rsa.pub file to the remote system ~/.ssh/known_hosts location. D) Add the content of id_rsa file to the remote system ~/.ssh/known_hosts location.

A

A junior systems administrator is creating a cron job. The cron job requirements are as follows: Run the hello.sh script every hour (24 times in one day). Run it on Monday only. Given this scenario, which of the following crontab options should be configured to meet these requirements? A) 0 *** 1 hello.sh B) 1 *** 0 hello.sh C) 0 24 ** Monday hello.sh D) 24 *** Monday hello.sh

A

A legacy PATA disk is used to boot the system. You recently added an internal DVD drive to the computer, and now the system will no longer boot. What is the most likely cause? A. The BIOS has identified the DVD drive as the first disk, and therefore the system can no longer find the Linux partition(s). B. The hard drive became corrupt when the DVD drive was installed. C. The hot swap option has not been enabled in the BIOS. D. The DVD drive is not detected by the computer and needs to be enabled first in the BIOS and then in Linux prior to installation.

A

A new HTTPS web service is being deployed on a server. Which of the following commands should the Linux administrator use to ensure traffic is able to flow through the system firewall to the new service? A) iptables ""A INPUT ""p tcp --dport 443 ""j ACCEPT B) iptables ""I OUTPUT ""p tcp --sport 443 ""j ACCEPT C) iptables ""A OUTPUT ""p tcp --dport 443 ""j ACCEPT D) iptables ""I INPUT --dport 443 ""j ACCEPT

A

A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue? A) fdisk, mkswap, swapon -a B) Isof, Ivcreate, mdadm C) free, fack, partprobe D) df, du, rmmod

A

A server, which is used to collect data about the network and datacenter environment via SNMP, is running out of space. Which of the following should the server administrator implement to reduce disk utilization? A) logrotate B) tar -cvf C) Snapshots D) journald

A

A systems administrator has finished building a new feature for the monitoring software in a separate Git branch. Which of the following is the BEST method for adding the new feature to the software's master branch? A) Merge the changes from the feature branch to the master branch. B) Save the changes to the master branch automatically with each Git commit. C) Pull the changes from the feature branch into the master branch. D) Clone the feature branch into the master branch.

A

A systems administrator has scheduled a system update for a server. The update includes a resynchronization of the package database and updates to the current packages and the system distribution packages. Which of the following commands contains the proper order of this update? A) apt-get update, apt-get upgrade, apt-get dist-upgrade B) apt-get dist-upgrade, apt-get upgrade, apt-get update C) apt-get upgrade, apt-get dist-upgrade, apt-get update D) apt-get update, apt-get dist-upgrade, apt-get upgrade

A

A systems administrator is configuring options on a newly installed Linux VM that will be deployed to the Pacific time zone. Which of the following sets of commands should the administrator execute to accurately configure the correct time settings? A) cd /etc ln ""s /usr/share/zoneinfo/US/Pacific localtime B) cd /usr/local ln ""s /usr/share/zoneinfo/US/Pacific zoneinfo C) cd /etc/local ln ""s /usr/share/zoneinfo/US/Pacific localtime D) cd /usr/share/local ln ""s /usr/share/zoneinfo/US/Pacific localectl

A

A systems administrator is implementing disk quotas on /home. During the process, the administrator receives the following error: Cannot find filesystem to check or filesystem not mounted with user quota option. Which of the following is the correct order of steps the administrator should follow to resolve this error? A) 1. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it. 2. Remount /home. 3. Create the quota database files and generate the disk usage table. 4. Assign user quota policies. B) 1. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it. 2. Create the quota database files and generate the disk usage table. 3. Remount /home. 4. Assign user quota policies. C) 1. Create the quota database files and generate the disk usage table. 2. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it. 3. Remount /home. 4. Assign user quota policies. D) 1. Assign user quota policies. 2. Verify if /home has quotas enabled in /etc/fstab and, if not, enable it. 3. Create the quota database files and generate the disk usage table. 4. Remount /home.

A

A systems administrator needs to allow the Linux server to receive HTTP connections from Internet hosts. By default, the port for HTTP connections is blocked. Which of the following rules should be added in the firewall to allow this type of connection? A) firewall-cmd --zone=public --add-port=80/tcp --permanent B) firewall-cmd --zone=internal --add-port=80/tcp --permanent C) firewall-cmd --zone=internal --add-port=443/tcp -permanent D) firewall-cmd --zone=public --add-port=443/tcp --permanent

A

A systems administrator notices a large number of autoloaded device modules are no longer needed and decides to do a cleanup of them. Which of the following commands will accomplish this task? A) modprobe -r B) rmmod -c C) insmod -c D) depmod -r

A

A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate. The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue? A) renice -n 10 -p 2864 B) renice -n -10 -p 2864 C) nice -n 5 -p 2864 D) nice -n -5 -p 2864

A

An administrator is reviewing updates in the master online Git repository and notices a file named .htaccess. The file contains passwords and should only be in the administrator's local repository, not the online one. Which of the following would prevent this file from appearing online in the future? A) echo ".htaccess" >> .gitignore B) chown nobody:nodoby .htaccess C) git commit -m "File Update" -x .htaccess D) sed -i 's/#Preserve Hidden=True/Preserve Hidden=True/g' .git/config

A

An administrator needs to change the DNS domain search order of a single Linux host to localize it better. Which of the following files should the administrator edit? A) /etc/nsswitch.conf B) /etc/dhcpd.conf C) etc/dhcpd.conf D) /etc/hosts

A

An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set. Which of the following commands would prevent the script from being killed? A) nohup service network restart B) echo "service network restart" | at now C) service network restart & D) bg service network restart

A

An administrator needs to generate a list of services that are listening on TCP and/or UDP ports. Which of the following tools should the administrator use? A) netstat B) route C) ethtool D) portmap

A

An administrator needs to look at a log for an application on a systemd-based system. There is no log for this application in /var/log. Which of the following is another way to view the application log on this system? A) journalctl ""u application B) watch /var/lib/application/ C) systemctl application.service D) tail -f /var/log/secure

A

An administrator notices that a long-running script, /home/user/script.sh, is taking up a large number of system resources. The administrator does not know the script's function. Which of the following commands should the administrator use to minimize the script's impact on system resources? A) renice B) nohup C) kill D) bg

A

An administrator receives the following message on a remote server: Cannot open display. Which of the following should the administrator have used to log in to the server? A) ssh ""X server.company.com B) xvnc server.company.com C) rdesktop server.company.com D) xrdp ""h server.company.com

A

Ann, a junior Linux administrator, needs to copy software from her local machine to assist in developing a software application on a remote machine with the IP address 192.168.3.22. The file needs to be placed on the /tmp directory. After downloading the RPM to the local machine, which of the following commands would be BEST to use to copy the software? A) scp ~/software.rpm [email protected]:/tmp B) wget [email protected]:/tmp -f ~/software.rpm C) scp [email protected] ~/software.rpm :/tmp D) scp ~/software.rpm [email protected]:/tmp

A

Ann, a junior systems administrator, is required to add a line to the /etc/yum.conf file. However, she receives the following error message when she tries to add the line: root@comptia:~# echo "line" > /etc/yum.conf -su: /etc/yum.conf: Operation not permitted Ann performs some diagnostics to attempt to find the root cause: root@comptia:~# Is -1 /etc/yum.conf -rw-r—r— 1 root root 970 Jan 30 2018 /etc/yum.conf root@comptia:~# lsattr /etc/yum.conf ----i--------e-- /etc/yum.conf root@comptia:~# df -i /etc/yum/conf Filesystem Inodes IUsed IFree IUse% Mounted on /dev/sdal 524288 192861 331427 37% / Which of the following commands should Ann execute to write content to /etc/yum? A) chattr ""i /etc/yum.conf B) setfacl ""m m:rw /etc/yum.conf C) setenforce 0 D) chmod 755 /etc/yum.conf

A

Assuming that a USB disk contains a single partition and is made available on /dev/sdb, which command mounts the disk in /media/usb? A. mount /dev/sdbl /media/usb B. usbconnect /dev/sdb0 /media/usb C. mount /dev/sdb0 /media/usb D. usbmount /dev/sdbl /media/usb

A

During boot of a system with GRUB2, which key can be pressed to display the GRUB menu? A. Shift B. E C. V D. H

A

Given that a company's policy states that users cannot install third-party tools on Window servers, which of the following protocols will allow a Linux GUI to connect to a Windows server? A) RDP B) X11 C) VNC D) NX

A

Homer is trying to connect to a remote Linux server. Unfortunately, the server is rejecting the connection. He suspects that his SSH client is not using the correct encryption algorithms. Which of the following files should he edit? A. ssh_config B. sshd_config C. ip_forward D. scp

A

How many SCSI devices are supported per bus? A. 7 to 15 B. 2 to 4 C. 12 D. 4

A

In which of the following Linux GUI environments would the Konsole application MOST likely be found? A) KDE B) Cinnamon C) MATE D) Gnome E) Unity

A

Lisa has been trying to install an application package using the following rpm command: rpm -i pass.rpm Unfortunately, the command fails indicating a failed dependency. She suspects that the dependencies have already been installed. Which of the following commands can she issue to list all installed RPM packages? A. rpm -qa B. rpm -qpRpass.rpm C. rpm -Va D. rpm -i -nodeps pass.rpm

A

Lisa needs to list all the hidden files within the /etc directory. Which of the following commands would she use? A. Is -la /etc B. Is -Ih /etc C. Is -IZ /etc D. Is -It /etc

A

Maggie is an administrator of a secure server and she is in the DBAdmins group. The DBAdmins group has the following permissions on a file named AppLog. - rwx rw- r-- However, Maggie is unable to make changes to this file. Of the following, what is the MOST likely reason why Maggie cannot make changes to this file? A. The secure server is using SELinux and it is set to enforcing mode. B. The secure server is using SELinux and it is set to permissive mode. C. The secure server is using SELinux and it has been disabled. D. The user does not have adequate permissions to modify the file. E. The chmod command must be used to change the permissions on the file.

A

Maggie is manually searching through a very large file for a specific string of text. Which of the following commands will automate this process for her? A. grep B. Is C. sudo D. rm

A

Management wants to start using an agentless configuration management tool for Linux systems. Which of the following is the best choice? A. Ansible B. Chef C. Puppet D. CFEngine

A

Users in the payroll department are not configured to use DNS due to security concerns. The users ask the junior Linux administrator to configure their workstations to access the payroll server at 192.168.204.11 by the name "Payroll". Which of the following commands should the administrator issue to meet this request? A) echo "192.168.204.11 Payroll" >> /etc/hosts B) echo "˜IPADDR="192.168.204.11" #Payroll' >> /etc/network/interface C) echo "net.ipv4.ip_dynaddr=192.168.204.11 Payroll" >> /etc/sysctl.conf D) echo "nameserver 192.168.204.11 #Payroll" >> /etc/resolv.conf

A

What is the purpose of the & operator (displayed as an ampersand character)? A. When the character is placed at the end of a command, it causes the command to run in the background. B. When the character is placed at the beginning of a command, it causes the command to run in the background. C. It is used to send the output of one command as the input of a second command. D. It separates two commands on the same line causing them to run sequentially.

A

When working with an rpm package file and using rpm2cpio, by default the output is sent to which location? A. STDOUT B. The file cpio.out C. The file a.out D. The file /tmp/cpi.out

A

Which command can be used to add functions and variables to the current shell? A. source B. echo C. en D. src

A

Which command can be used to reboot a system? A. init 6 B. shutdown -h -t now C. init 1 D. refresh-system

A

Which command is used to load a module and its dependencies automatically? A. modprobe B. Ismod C. insmod D. rmmod

A

Which command will output a new CRUB2 configuration file and send the output to the correct location for booting? A. update-grub > /boot/grub/grub.cfg B. update-grub boot > /boot/grub.cfg C. grub-rc.d D. grub-boot

A

Which exit code indicates success for a bash script? A. 0 B. 1 C. 2 D. EOF

A

Which file should you edit when using GRUB2 in order to set things like the timeout? a. /etc/default/grub b. /etc/grub/boot c. /etc/boot/grub.d d. /grub.d/boot

A

Which of the following best describes the purpose of the < operator? A. stdin B. stdout C. stderr D. redirect stdout

A

Which of the following commands changes a file called script.sh such that it can be executed by the owner of the file and no one else? A. chmod 700 script.sh B. chown +x script.sh C. chmod script.sh +x D. chmod 777 script.sh

A

Which of the following commands is a simple pager that is found on most Linux systems? A. more B. pg C. grep D. mr

A

Which of the following commands will correctly change the group ownership of the file called a.out to users? A. chgrp users a.out B. chgrp a.out users C. groupchg a.out users D. grpchg users a.out

A

Which of the following commands will show the contents of the PATH environment variable? A. echo $PATH B. echo PATH C. cat/etc/profile.d D. Is PATH

A

Which of the following configuration management tools is considered agentless? A) Ansible B) Puppet C) Chef D) Salt

A

Which of the following files contains the executable Linux kernel on Linux systems? A. vmlinux B. grub C. efi D. initramfs

A

Which of the following is an operator for redirecting STDOUT and STDERR? A. &> B. > C. ~ D. !

A

Which of the following is modified to reconfigure the boot environment? A) grub.cfg B) grub-mkconfig C) grub2-mkconfig D) update-grub

A

Which of the following is the purpose of the monitoring server role? A) To collect status and performance information about the servers in an environment B) To aggregate web traffic to watch which websites employees are visiting C) To provide user authentication services to a network D) To provide real-time analysis of potential threats to the organization

A

Which of the following packages provides orchestration for Linux in an agentless manner? A. Ansible B. Puppet C. Automat D. vid

A

Which of the following server roles would assign a host IP address? A) DHCP B) DNS C) NTP D) DNS

A

Which of the following statements BEST represents what the term "agentless" means regarding orchestration? A) Installation of a tool is not required on the remote system to perform orchestration tasks B) It automatically removes malware from the remote system during orchestration C) It facilitates version control when using infrastructure as code during orchestration D) A tool can only be accessed remotely to perform orchestration tasks

A

Which of the following would be the BEST solution for a systems administrator to access the graphical user environment of a Linux machine remotely? A) VNC B) RPC C) KDE D) X11

A

Which option of the systemctl command will change a service so that it runs on the next boot of the system? A. enable B. startonboot C. loadonboot D. start

A

You are a technician working in a company with a relatively large network. Homer has a Linux system but complains that he is unable to access the email server. You determine that he can access some other resources on the network. You need to identify where the traffic is blocked between Homer's system and the email server. Which of the following commands should you use? A. traceroute B. ping C. netstat D. ifconfig

A

You are configuring a Linux server to run an application on the network. It needs to load several custom modules when it boots. Which of the following directories would you use to ensure the module settings will be loaded on boot? A. /etc/modprobe.d/ B. /lib/modules/[kernelversion]/ C. /etc/modprobe.conf D. /etc/modules

A

You are navigating through a Linux computer using the terminal. Which of the following commands will you use to display the contents of a directory? A. Is B. chmod C. sudo D. grep

A

You are running a script in the terminal window, but you want to suspend it so that you can access the terminal window. Which of the following commands or key combinations would you use? A. CTRL+Z B. CTRL+C C. kill D. &

A

You have configured a Linux server in your DMZ with a static IP address of 10.80.1.10. You created an iptables rule to always accept SSH connections from your computer. You now want to create an iptables rule to block all SSH connections from any other IP address. Users that try to connect will see an error indicating the connection was refused. Which of the following rules is the BEST choice to achieve this? A. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j REJECT B. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j DROP C. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j FORWARD D. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j DISCARD

A

You need to create a new empty git repository called repo. Which of the following sequences accomplishes this task? A. mkdir repo; cd repo; git init —bare B. mkdir repo; git init repo/ C. git init repo -md D. git create repo/

A

You receive a file with a .Izma extension. Which command can you use to decompress this file? A. xz B. Iz C. gz D. bzip

A

You want to configure a Linux server to collect log entries from other servers and network devices. What would you use to configure the rules for processing these log messages? A. /etc/rsyslog.conf B. systemctl C. /var/log/messages D. /etc/sysconfig/syslog

A

You want to configure three NICs on a Linux server so one is normally used, but the other NICs can take over if the first NIC fails. Which of the following bonding modes should you use? A. Mode 1 B. Mode 4 C. Mode 5 D. Mode 6

A

You want to determine the MAC address of a Linux system. Which of the following is a valid command that would give you this information? A. ip addr B. ipconfig -a C. mac-a D. sysconfig

A

You want to modify the LANG environment value to use US English Unicode. Which of the following commands would you use? A. export LANG=en_US.UTF-8 B. export $LANG=en_US.UTF-8 C. cat LANG D. echo $LANG

A

You want to view the current settings of the LC_AII environment variable only. Which of the following commands would you use? A. echo $LC_ALL B. cat $LC_ALL C. locale D. localectl

A

A systems administrator wants to download a package from a remote server. Which of the following are the BEST commands to use for this task? (Choose two.) A) wget B) curl C) make D) zip E) tar F) nc

A, B

A junior Linux administrator is performing version control on a Git repository. The administrator is given a list of tasks to complete: - List the currently installed Git release. - Show the status reporting of the clone. Which of the following commands would allow the administrator to complete these tasks? (Choose two.) A) git clone --progress B) git clone --dissociate C) git --version D) git --help E) git clone --recursive F) git clone -shared

A, C

A technician wants to secure a sensitive workstation by ensuring network traffic is kept within the local subnet. To accomplish this task, the technician executes the following command: echo 0 > /proc/sys/net/ipv4/ip_default_ttl Which of the following commands can the technician use to confirm the expected results? (Choose two.) A) traceroute B) route C) tcpdump D) ip E) arp F) iperf

A, C

A Linux administrator built a GitLab server. Later that day, a software engineer tried to access the server to upload the repository during the final step of installation. The software engineer could not access the website. Which of the following firewall rules would allow access to this site? A) iptables ""A INPUT ""p tcp ""m multiport --dports 80,443 ""m conntrack ""cstate ESTABLISHED ""j ACCEPT B) iptables ""A INPUT ""p tcp ""m multiport --dports 80,443 ""m conntrack ""cstate RELATED, ESTABLISHED ""j ACCEPT C) iptables ""A INPUT ""p tcp ""m multiport --dports 80,443 ""m conntrack ""cstate NEW, ESTABLISHED ""j REJEC D) iptables ""A INPUT ""p tcp ""m multiport --dports 80,443 ""m conntrack ""cstate NEW, ESTABLISHED ""j ACCEPT

B

A Linux administrator is adding a static IP address to a network interface on a Linux system. The administrator modifies the ifcfg- eth0 configuration file with the following settings: DEVICE: ETH0 BOOTPROTO: DHCP IPADDR: 192.16.20.10 NETMASK: 255.255.255.0 ONBOOT: NO USERCTL: NO After the administrator restarts the Linux server, the system is not connected to the network. Which of the following configuration settings needs to be changed? A) Set BOOTPROTO to BOOTP and USERCTL to yes. B) Set BOOTPROTO to BOOTP and USERCTL to yes. C) Set USERCTL to yes and ONBOOT to no. D) Set NETMASK to 255.255.0.0 and ONBOOT to yes.

B

A Linux administrator is restoring the SELinux contexts on an entire system. Which of the following commands is the BEST option to complete this task? A) setfacl ""bR / && reboot B) touch /.autorelabel && reboot C) touch .autorelabel & reboot D) setenforce 0 && reboot

B

A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal? A) # grep ""i IP "${ip addr show} production.company.com" > /etc/resolv.conf B) # echo "192.168.1.100 production.company.com" >> /etc/hosts C) # hostnamectl set-hostname "192.168.1.100 production.company.com" D) # ip addr add 192.168.1.100/24 dev eth0 && rndc reload production.company.com

B

A Linux administrator is using a public cloud provider to host servers for a company's website. Using the provider's tools, the administrator wrote a JSON file to define how to deploy the servers. Which of the following techniques did the administrator use? A) Platform as a service B) Build automation C) Automated configuration D) Infrastructure as code

B

A Linux administrator needs to take stock of USB devices attached to the system. Which of the following commands would be BEST to complete this task? A) lspci B) lsusb C) cat /proc/USB D) modprobe -""usb

B

A Linux engineer is troubleshooting a newly added SCSI device for a Linux server that needed more disk space without rebooting. The engineer discovers that the new device is not visible by the Linux kernel in fdisk -l output. Which of the following commands should be used to rescan the entire SCSI bus? A) echo ' ' > /sys/class/scsi_host/host0/scan B) echo "- - -" > /sys/class/scsi_host/host0/scan C) echo - - - > /sys/scsi/scsi_host/host0/scan D) echo "- - -" > /sys/scsi/scsi_host/host0/scan

B

A Linux server has multiple IPs. A Linux administrator needs to verify if the HTTP server port is bound to the correct IP. Which of the following commands would BEST accomplish this task? A) route B) netstat C) host D) ip E) nslookup

B

A company wants to ensure that all newly created files can be modified only by their owners and that all new directory content can be changed only by the creator of the directory. Which of the following commands will help achieve this task? A) umask 0012 B) umask 0022 C) chmod ""R 0644 D) chmod ""R 0755 /

B

A developer using a Linux system wants to retrieve a remote Git repository from a Git server located on the Internet. Which of the following arguments would be the BEST choice? A. merge B. clone C. commit D. push

B

A junior administrator is configuring local name lookups for fully qualified domain names in an isolated environment. The administrator is given a checklist and must accomplish the following tasks: - Add localhost with loopback address. - Add 192.168.192.12/24 to resolve to database01.comptia.org Given this scenario, which of the following steps should the administrator perform to accomplish these tasks? A) Open the /etc/nsswitch.conf file with a file editor and add the following lines: 127.0.0.1 localhost 192.168.192.12 database01.comptia.org B) Open the /etc/hosts file with a file editor and add the following lines: 127.0.0.1 localhost 192.168.192.12 database01.comptia.org C) Open the /etc/network file with a file editor and add the following lines: 127.0.0.1 localhost 192.168.192.12 database01.comptia.org D) Open the /etc/dhcpd.conf file with a file editor and add the following lines: 127.0.0.1 localhost 192.168.192.12 database01.comptia.org

B

A junior administrator needs to unload an older video kernel module. Which of the following commands would BEST accomplish this task? A) insmod B) Modprobe C) rmmod D) chmod

B

A junior systems administrator created a new filesystem /dev/sda1 with mountpoint /data and added it to the /etc/fstab for auto-mounting. When the systems administrator tries to mount the file system, the system refuses. Given the output below: Which of the following steps is necessary? A) Change the dump column to 1 and run the mount -a command. B) Change the options to auto,dev,sync,rw,nosuid and run the mount -a command. C) Change the filesystem from /dev/sda1 to /dev/sda2 and reboot. D) Change the mount point to data and reboot.

B

A member of the production group issues the following command: echo "Monday through Friday" > /production_docs/days The command fails to execute, so the user obtains the following output: drwxr--r-- root production 0 Jun 16 2018 production -rw-r--r-- production production 4096 Jun 14 2018 days Which of the following commands should the user execute to BEST fix the issue? A) chmod g+w production to change the permissions of the days file B) chown production to change the ownership of the production_docs directory C) chgrp root production_docs/days to change the group ownership of the production_docs/days file D) chmod g+S production to set the GUID on the production_docs directory

B

A network administrator is configuring a Linux computer that will be used for network security. He plans to use it to inspect and handle network-based traffic using iptables. Which of the following network devices will server most likely mimic? A. Web server B. Firewall C. Database server D. Name server

B

A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth? A) echo "kill bluetooth" > /etc/modprobe.d/kill-bluetooth B) echo "blacklist bluetooth" > /etc/modprobe.d/blacklist-bluetooth C) echo "rmmod bluetooth" > /etc/modprobe.d/rmmod-bluetooth D) echo "modprobe bluetooth" > /etc/modprobe.d/modporbe-bluetooth

B

A new user has been added to a Linux machine. Which of the following directories would contain the user's default files? A) /etc/inittab B) /etc/skel C) /etc/passwd D) /etc/login.defs

B

A systems administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used. Which of the following files should be watched by the agents? A) /etc/rsyslog.conf B) /var/log/audit/audit.log C) /var/log/kern.log D) /var/log/monitor

B

A systems administrator is unable to reach other devices on the network and the Internet. The server is configured with the IP address 192.169.1.50/24 on eth0. The server's router is 192.168.1.1. The administrator reviews the output of route ""n: Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.2.1 0.0.0.0 UG 1024 0 0 eth0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 Which of the following commands should the administrator run to correct the issue? A) route add ""net 192.168.10.0 netmask 255.255.255.0 gw 192.168.2.1 eth0 B) route del default gw 192.168.2.1 eth0; route add default gw 192.168.1.1 eth0 C) route host gw 192.168.1.1 eth0 D) route add 192.168.1.1 default 192.168.1.50 eth0

B

A systems administrator needs to retrieve specific fields from a CSV file. Which of the following tools would accomplish this task? A) sort B) awk C) print D) echo

B

A systems administrator observes high latency values when reaching a remote web server. Which of the following commands will help determine and isolate issues on the network side? A) dig B) mtr C) route D) netstat

B

A systems administrator wants to mount an ISO to access its content. Using /mnt as a mount point, which of the following is the correct syntax? A) mount -o loop -t iso /mnt B) mount -o loop /tmp/image.iso /mnt C) mount -o loop /dev/kvm /mnt D) mount -o iso9660 /dev/sr0 /mnt

B

A user attempts to use the mount -a command but gets the following error: mount: mount point /mnt/test does not exist. Which of the following commands best describes the action the Linux administrator should take NEXT? A) mdadm ""p /mnt/test B) mkdir ""p /mnt/test C) mkfs /mnt/test D) mount ""a /mnt/test

B

A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user's account? A) passwd -u user -G root B) pam_tally2 --user=user --reset C) usermod -u user -G root D) chage -1 user=user -reset

B

An administrator is logged into a server remotely and wants to determine if the system is a VM. Which of the following commands would assist with this? A) vmstat B) dmesg C) ps D) top

B

An administrator needs to create a shared directory in which all users are able to read, write, and execute its content but none of the regular users are able to delete any content. Which of the following permissions should be applied to this shared directory? A) rwxrwxrws B) rwxrwxrwt C) rwxrwxrwx D) rwxrwxrwr

B

An administrator needs to deploy 100 identical CentOS workstations via PXE boot. Which of the following should the administrator use to minimize the amount of interaction with the consoles needed? A) Ghost image on a distribution server B) Kickstart script C) Hard disk duplicator D) Ubiquity script

B

An administrator needs to kill the oldest Bash shell running in the system. Which of the following commands should be issued to accomplish this task? A) ps axjf | grep bash to obtain PID kill -9 PID B) ps ""eo pid,etime,cmd | grep bash (to obtain PID) kill -9 PID C) killall -15 -o bash D) ps ""eo pid,etime| grep bash (to obtain PID) killall -9 PID

B

An administrator notices the HISTSIZE variable is 50, using the commands below: HISTSIZE=50 - export HISTSIZE The administrator rechecks the HISTSIZE value using echo HISTSIZE but gets no value. Which of the following commands should the administrator use to retrieve its value? A) grep $HISTSIZE B) printenv | grep $HISTSIZE C) printf HISTSIZE D) echo HISTSIZE

B

An administrator reviews the following configuration file provided by a DevOps engineer: Tasks : - name rinstall php-fpm from repo yum: name: php-fpm state: present - name:Install mysql from repo yum: name: mysql-server state: present Which of the following would the application parsing this file MOST likely have to support? A) JSON B) YAML C) AJAX D) SOAP

B

An analyst is trying to determine which public IP addresses are managed by Company A, but the script is not working correctly. for ip in $(cat ip-list.txt) do whois $ip I grep "Company A" > /dev/null if [ $? -ne 0 ] then echo "$ip" fi done Which of the following explains what is wrong with the script? A) The for should be changed to while in the loop. B) $(cat ip-list.txt) should be changed to `cat ip-list.txt` in the for statement. C) The -ne flag should be changed to -eq in the if statement. D) The > should be changed to 2> in the do statement.

B

An operator finds a user is having issues with opening certain files. Which of the following commands would allow the security administrator to list and check the SELinux context? A) ls -1 B) ls ""Z C) ls ""D

B

How can you assign the value of a path of /usr/bin/gcga to a variable called gcga so that it is an environment variable? A. export $gcga=/usr/bin/gcga B. export gcga =/usr/bin/gcga C. gcga=/usr/bin/gcga D. $gcga=/usr/bin/gcga

B

Lisa entered the following command at the Linux terminal: cat /proc/meminfo What information will this command show to her? A. Disk information B. RAM information C. Processor information D. Kernel statistics

B

Lisa is tasked with creating a compressed archive of all the files stored in the /var/ mail directory. Her system has both the tar and bzip2 packages installed. Which of the following commands should she use? A. tar -cvf mailfiles.tar.bz2 /var/mail/ B. tar -jcvf mailfiles.tar.bz2 /var/mail/ C. tar-zcvf mailfiles.tar.bz2 /var/mail/ D. tar -xvzf mailfiles.tar.bz2 /var/mail/

B

Lisa, a Linux administrator, suspects a single user may be consuming a large amount of disk space so she runs the "du -s /home" command. It gives her the following output: 132 /home/Homer 2705 /home/Maggie 239492/home/Bart 9482 /home/Marge Lisa needs to find out which files in Bart's home directory are using the most disk space. Which of the following commands would she use? A. du -sh /home/Bart/ B. du -a /home/Bart/* C. du -k /home/Bart/ D. du -a /home/Bart/*.mp3

B

Lisa, a Linux server administrator, is tasked with ensuring that SSH uses only specific algorithms. Which of the following files should she edit? A. ssh.config B. sshd_config C. hosts D. inittab

B

Seymour added a second NIC to a Linux system and configured it to act as a router within the school network. However, testing showed that IP packets are not being routed between the NICs. What should he check? A. Verify the ip_forward file has the value "on" B. Verify the ip_forward file has the value "1 " C. Verify the ip_route file has the value "on" D. Verify the ip_route file has the value "1 "

B

Users are unable to connect to a server using HTTPS. The administrator runs the following command on the remote system: $ netstat tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN Then, the administrator runs the following command from a local workstation: $ nmap PORT STATE 80 open 443 closed 22 open Which of the following steps should the administrator take to address the issue? A) Configure the application to run on an active port B) Allow port 443 through the firewall C) Update the self-signed certificate D) Start the application to run on port 443

B

What is the maximum number of primary partitions available on an MBR partitioning system? A. 2 B. 4 C. 1 D. 5

B

What is the purpose of the > operator (displayed as a greater than symbol)? A. To use the output of a command as text to append a file B. To use the output of a command as text to replace or overwrite a file C. To use the output of a command as input to the next command D. To separate two commands on the same line

B

What is the purpose of the || operator (displayed as two bar symbols)? A. When placed between two commands, it causes the second command to run only if the first command succeeds. B. When placed between two commands, it causes the second command to run only if the first command fails. C. It is used to create or overwrite a file with the output of a command. D. It is used to cause a command to run in the background.

B

When working with a SysV system, which chkconfig option will display all services and their runlevels? A. --reload B. --list C. --all D. --Is

B

When working with disk partitions through a tool like fdisk, you see the type 0x82. Which type of partition is this? A. Linux B. Linux swap C. NTFS D. FAT

B

Which command and option are used to update a Debian system to the latest software? A. apt-update B. apt-get upgrade C. dpkg -U D. apt-cache clean

B

Which command enables you to view the current IRQ assignments? A. view /proc/irq B. cat /proc/interrupts C. cat /dev/irq D. less /dev/irq

B

Which command is used to obtain a list of USB devices? A. usb-list B. Isusb C. Is-usb D. Is —usb

B

Which file contains a list of users who are not allowed to create cron scheduled tasks? A. /etc/cron.users B. /etc/cron.deny C. /etc/cron.allow D. /etc/cron.userlist

B

Which of the following BEST describes containers running on a Linux system? A) Containers only need the namespaces functionality to run on a Linux system available since kernel 2.6. B) Containers use the cgroups and namespaces functionalities to isolate processes and assign hardware resources to each of those isolated processes. C) Containers only need the cgroups functionality for running on a Linux system. Namespaces is not a Linux kernel functionality needed for creating and managing containers. D) Containers need a hypervisor to run on a Linux system. Cgroups namespaces are functionalities used for the kernel but not for running containers.

B

Which of the following BEST describes the purpose of the X11 system? A) X11 provides telephony capabilities B) X11 provides graphical display capabilities C) X11 provides networking capabilities D) X11 provides command line capabilities

B

Which of the following Linux server roles would be used to assign IP addresses to hosts? A. BIND B. DHCP C. NTP D. VPN

B

Which of the following best describes the concept of infrastructure as code? A. The management of switches and routers using compiled programs B. The management of servers and other systems using scripting, source code management, and automation C. The deployment of hardware using Agile methodologies D. Planning for bugs in infrastructure code and allowing time to fix them

B

Which of the following commands adds /usr/local/ lib to the LD_LIBRARY_PATH when using the bash shell? A. set PATH=/usr/local/lib B. export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/ usr/local/lib C. LD_LIBRARY_PATH=/usr/local/lib D. connectpath LD_LIBRARY_PATH=/usr/ local/lib

B

Which of the following commands can be used to execute a command with a customized environment? A. set B. env C. run D. crun

B

Which of the following commands initializes a physical disk partition for use with LVM? A. Ivmcreate B. pvcreate C. fvcreate D. Ivinit

B

Which of the following commands removes an expiration from an account? A. sudo chage -I username B. sudo chage -E -1 username C. sudo chage -E now username D. sudo chage —noexpire username

B

Which of the following commands, when used with git, retrieves the latest objects from a repository and attempts to incorporate those changes into the local working copy of the repository? A. fetch B. pull C. retr D. get

B

Which of the following configuration files should be modified to disable Ctrl+Alt+Del in Linux? A) /etc/securetty B) /etc/inittab C) /etc/security/limits.conf D) ~/.bash_profile

B

Which of the following is a good first troubleshooting step when a hard disk is not detected by the Linux kernel? A. Unplug the disk. B. Check the system BIOS. C. Restart the web server service. D. Run the disk-detect command.

B

Which of the following is not typically used to store libraries? A. /lib B. /etc/lib C. /usr/lib D. /usr/local/lib

B

Which of the following is the BEST reason for not storing database files in the /var directory? A) Files in /var do not have strict file permissions B) If log files fill up /var, it might corrupt the database C) The number of files in /var is limited by the available inodes D) The /var filesystem is not fast enough for database files

B

Which of the following is the purpose of the vmlinux file on a Linux system? A) To start a Linux virtual machine B) To provide the executable kernel for the system C) To enable resource access to the network D) To prevent a Linux kernel panic

B

Which of the following is true of Linux swap space? A. Swap is used to hold temporary database tables. B. Swap is used as additional memory when there is insufficient RAM. C. Swap is used by the mail server for security. D. Swap is used to scrub data from the network temporarily.

B

Which of the following terms is used in orchestration and automation scenarios to refer to the collection of devices being managed? A. Device collection B. Inventory C. Machines D. UsableObjects

B

You administer an older Linux server in your network. You want to prevent users from rebooting the system using the Ctrl+Alt+Del keys. What file should you modify? A. runlevel B. inittab C. chkconfig D. hosts

B

You are configuring Linux-based laptop computer and want to view details on all the wireless interfaces. Which of the following commands would show you only the wireless interfaces? A. ifconfig B. iwconfig C. ss D. brctl

B

You are examining a problem report where a USB disk is no longer available. Which command is used to obtain a list of USB devices? A. usb-list B. Isusb C. Is-usb D. Is --usb

B

You are tasked with configuring a Linux system to display a message to all users have they log on. Which of the following is the BEST solution? A. Create a PKI B. Modify the MOTD file C. Modify the lecture_file D. Enable telnet

B

You are troubleshooting a Linux system that is acting erratically. You suspect that the problem is related to an older video kernel module. Which of the following commands would you use to unload this module and test your theory? A. Ismod B. modprobe C. insmod D. depmod

B

You came across an unused Linux computer within your company. However, the root password isn't known. Which of the following methods is the BEST one to use to set a new root password? A. Edit the /etc/passwd file.a B. Boot int0 single-user mode and reset the password with the "passwd" command. C. Edit the /etc/shadow file. D. Boot into run level 0 and reset the password with the "passwd" command.

B

You have configured a Linux server in your DMZ with a static IP address of 10.80.1.10? You created an iptables rule to always accept SSH connections from your computer. You now want to create an iptables rule to block all SSH connections from any other IP address. Users that try to connect will not see an error indicating the connection was refused. Which of the following rules is the BEST choice to achieve this? A. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j REJECT B. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j DROP C. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j FORWARD D. iptables -A INPUT -p TCP -d 10.80.1.10 -dport 22 -j DISCARD

B

You manage a Linux server and have recently installed an application for routine monitoring. You discover that it is taking up too many resources and you need to set the application process to run with a priority of 10. Using the "ps" command, you discover that the PID is 5678. Which of the following commands would meet your needs? A. renice -p 10-pid 5678 B. renice-n 10-p 5678 C. renice -p 5678 -n 10 D. renice -n 5678

B

You need to create a shared directory called certs for employees. All employees should be able to read, write, and execute the contents of this directory. Regular users should not be able to delete any files. Which of the following permissions should be set on this share? A. rwxrwxrwT B. rwxrwxrwt C. rwxrwxrwx D. rwxrwxrws

B

You need to determine the status of the default printer on a Linux system. Which of the following commands would you use? A. Ipr B. Ipq C. ptrstat D. tar

B

You need to determine whether LDAP integration is working correctly. In order to do so, you would like to obtain a list of users, as read by /etc/ nsswitch.conf. Which command can be used for this purpose? A. getuser B. getent C. usermod D. userlist

B

You need to set up several Linux web servers ensuring they are all set up alike. A senior administrator directed you to provision these servers using a tool that will set up the servers by reading a text file. Which of the following BEST describes the reason for using this process? A. To ensure the servers are configured in conjunction with the software development life cycle planning phase. B. To ensure the servers are provisioned consistently while minimizing manual tasks. C. To ensure the server's configuration information are documented within the organization's change management plan. D. To ensure the servers provide users with a user-friendly experience.

B

You started a script in the terminal window that you expected to run for less than a few seconds. However, it's been more than a few minutes and it still hasn't stopped. Which of the following commands or key combinations would you use to terminate the script? A. CTRL+Z B. CTRL+C C. nohup D. crontab

B

You suspect that a Linux web server is experiencing performance spikes during the weekends due to increased usage. You want to create reports that you can analyze to verify your suspicions. The reports should include information on memory usage, system calls, and CPU utilization. Which of the following will best meet your goal? A. vmstat B. sar C. uptime D. sysctl

B

You want to update the PATH environment variable. Which of the following steps should you take? I. Modify the PATH element in the /etc/profile file using a text editor. II. Modify the PATH element in the /etc/profile.d file using a text editor. III. Enter. /etc/profile after making your changes. IV. Enter. /etc/profile.d after making your changes. A. I and II B. I and III C. II and III D. I and IV

B

Your organization has decided to start using an agent-based configuration management tool for Linux systems. Which of the following is the BEST choice? A. Ansible B. Puppet C. PuTTY D. Git

B

Your organization's DMZ includes a server used as a time server. It periodically sends an NTP client-to-server query to an Internet-based NTP server to synchronize its time. Internal clients use it to synchronize their time with client-to-server queries. You want to block any potential DDoS attacks on this server from the Internet. Which of the following would be the BEST option? A. Block outgoing traffic on the border firewall using port 123. B. Block incoming traffic on the border firewall using port 123. C. Block outgoing traffic on the internal firewall using port 123. D. Block incoming traffic on the internal firewall using port 123.

B

n administrator is troubleshooting an application that has failed to start after the server was rebooted. Noticing the data volume is not mounted, the administrator attempts to mount it and receives this error: [root@localhost comptia]# mount /dev/datavg/datalv /data mount: special device /dev/datavg/datalv does not exist Upon checking the logical volume status, the administrator receives this information: [rootdlocalhost comptia]# lvs LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert root centos -wi-ao---- <6.20g swap centos -wi-ao---- 820.00m datalv datavg -wi 500.00m [rootdlocalhost comptia]# Which of the following can be said about the data logical volume, and how can this problem be resolved? A) The file system is read-only. The administrator should remount it as read-write with the command mount -o remount.rw /data. B) The logical volume is not active. The administrator should make it active with lvchange -ay /dev/datavg/datalv and then mount it. C) The logical volume file system has become corrupted. The administrator should repair it with xfs_repair /dev/datavg/datalv and then mount it. D) The logical volume is OK but the /dev special files are missing. The administrator should recreate them by running /dev/MAKEDEV.

B

Which of the following would allow remote users to access a corporate server? (Choose two.) A) File server B) VPN server C) SMTP server D) DHCP server E) NTP server F) SSH server

B ,F

A junior systems administrator is configuring localization option environment variables. The administrator is given a checklist of tasks with the following requirements: - View current settings of the LC_ALL environment variable only. - Modify the LANG environment variable to US English Unicode. Given this scenario, which of the following should be performed to meet these requirements? (Choose two.) A) stty B) echo $LC_ALL C) export LANG = en_US.UTF-8 D) export $LANG = en_US.UTF E) cat $LC_ALL F) locale

B, C

A junior systems administrator is scanning archive.tar files with an antivirus scanner. The administrator is given the following tasks: List all files that are in the archive.tar files. Extract all files from the archive.tar files. Which of the following actions should be performed to meet these requirements? (Choose two.) A) tar -r archive.tar B) tar -tvf archive.tar C) tar -uvz archive.tar D) tar -av archive.tar E) tar -A archive.tar F) tar -xf archive.tar

B, F

A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen? A) /etc/hosts B) /etc/motd C) /etc/issue D) /etc/services

C

A Linux administrator attempts to install the package newprogram.x86_64.rpm using a package manager. The administrator receives a warning indicating the command that was run was using a deprecated package manager. Which of the following commands should the administrator use to avoid the warning and install the newprogram.x86_64.rpm program? A) # dpkg -i newprogram.x86_64.rpm B) # apt-get install newprogram.x86_64.rpm C) # dnf install newprogram.x86_64.rpm D) # rpm -e newprogram.x86_64.rpm

C

A Linux administrator is using a Linux system as a router. During the tests, the administrator discovers that IP packets are not being sent between the configured interfaces. Which of the following commands enables this feature for IPv4 networks? A) echo "1" > /proc/sys/net/ipv4/ip_route B) cat /proc/sys/net/ipv4/ip_route > 1 C) echo "1" > /proc/sys/net/ipv4/ip_forward D) echo "1" > /proc/sys/net/ipv4/ip_net

C

A Linux administrator needs to configure a new firewall without an existing ACL to allow incoming web traffic. The firewall must log the allowed network traffic. Which of the following command sequences would accomplish this task when they are executed in order? A) iptables ""I INPUT ""m multiport ""p tcp --dports 80,443 ""J LOG iptables ""I INPUT ""m multiport ""p tcp --dports 80,443 ""J ACCEPT B) iptables ""A INPUT ""p tcp --dport 80 ""J ACCEPT iptables ""A INPUT ""p tcp --dport 443 ""J ACCEPT iptables ""A INPUT ""p tcp --dport 80 ""J LOG iptables ""A INPUT ""p tcp --dport 443 ""J LOG C) iptables ""A INPUT ""p tcp --dport 80 ""J LOG iptables ""A INPUT ""p tcp --dport 443 ""J LOG iptables ""I INPUT ""p tcp --dport 80 ""J ACCEPT iptables ""I INPUT ""p tcp --dport 443 ""J ACCEPT D) iptables ""A INPUT ""m multiport ""p tcp --dports 80,443 ""J LOG iptables ""A INPUT ""m multiport ""p tcp --dports 80,443 ""J ACCEPT

C

A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts URL. Which of the following commands would allow the administrator to download the current contents of the URL before updating? A) dig www.comptia.org/contacts B) yum list www.comptia.org/contacts C) curl www.comptia.org/contacts D) apt-get www.comptia.org/contacts

C

A Linux storage administrator wants to create a logical volume group. Which of the following commands is required to start the process? A) mkfs.xfs B) lvcreate C) vgcreate D) pvcreate

C

A Linux systems administrator installed a new web server, which failed while attempting to start. The administrator suspects that SELinux is causing an issue and wants to temporarily put the system into permissive mode. Which of the following would allow the administrator to accomplish this? A) sestatus 0 B) chcon httpd_sys_content_t /var/ C) setenforce 0 D) echo SELINUX=PERMISSIVE >> /etc/sysconfig/selinux

C

A drive connected to USB will be considered to be which type of device? A. Medium B. Coldplug C. Hotplug D. Sideplug

C

A four-drive Linux NAS has been improperly configured. Each drive has a capacity of 6TB, for a total storage capacity of 24TB. To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID configuration? A) RAID 03 B) RAID 50 C) RAID 10 D) RAID 01

C

A junior Linux administrator is updating local name resolution to support IPv6. The administrator issues the command cat /etc/hosts and receives the following output: 127.0.0.1 localhost Which of the following actions should the administrator perform to accomplish this task? A) Modify the /etc/hosts file, and add the ipv6 localhost entry to the file. B) Modify the /etc/hosts file, and add the 0.0.0.0 localhost entry to the file. C) Modify the /etc/hosts file, and add the ::1 localhost entry to the file. D) Modify the /etc/hosts file, and add the ipv4 localhost entry to the file.

C

A junior Linux administrator needs to access production servers using a secure SSH protocol. Which of the following files should contain the public key to gain remote access to the server? A) /etc/sshd/ssh.conf B) /etc/authorized_keys C) ~/.ssh/authorized_keys D) ~/ssh/authorized-keys

C

A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility? A) VMDK B) OWASP C) OVF D) VDI

C

A raw VM image is being compressed with bzip2 and copied to a flash drive at /dev/hdb for off-site use by the marketing department. Which of the following command lines accomplishes this task? A) cp ""a ""r /vm/mktg.img bzip2 /dev/hdb/mktg.img.zip B) cp /vm/mktg.img | bzip2 /dev/hdb/mktg.img.bz2 C) bzip2 ""c /vm/mktg.img | dd of=/dev/hdb D) mv /vm/mkgt.img | bzip2 /dev/hdb/mkgt.img.bz2

C

A site reliability engineer updated the latest configuration management scripts and committed them to a workstream called either test or patch. A Linux administrator wants to ensure these latest workstreams are able to be retrieved to the server. Which of the following is the BEST Git attribute to use? A) branch B) log C) pull D) fetch

C

A storage administrator in a virtualized environment has been told by a user that there is no space left on the volume to which the user can write. However, a check reveals that there is 20GB of unused space. Which of the following explains the discrepancy? A) The drive is not formatted B) The drive space is overallocated C) The drive is thin provisioned D) The drive is thick provision eager zeroed

C

A storage administrator in a virtualized environment has been told by a user that there is no space left on the volume to which the user can write. However, a check reveals that there is 20GB of unused space. Which of the following explains the discrepancy? A) The drive space is overallocated B) The drive is thick provision eager zeroed C) The drive is thin provisioned D) The drive is not formatted

C

A systems administration team has decided to treat their systems as immutable instances. They keep the desired state of each of their systems in version control and apply automation whenever they provision a new instance. If there is an issue with one of their servers, instead of troubleshooting the issue they terminate the instance and rebuild it using automation. Which of the following is this an example of? A) Inventory B) Orchestration C) Infrastructure as code D) Agentless deployment

C

A systems administrator configured a new kernel module, but it stopped working after reboot. Which of the following will allow the systems administrator to check for module problems during server startup? A) lsmod B) modinfo C) dmesg D) modprobe

C

A systems administrator has deployed a Linux server based on an Anaconda process with all packages and custom configurations necessary to install a web server role. Which of the following could be used to install more Linux servers with the same characteristics? A) /root/anaconda.auto B) /etc/sysconfig/anaconda.cfg C) /root/anaconda-ks.cfg D) /etc/sysconfig/installation.cfg

C

A systems administrator is enabling quotas on the /home directory of a Linux server. The administrator makes the appropriate edits to the /etc/fstab file and attempts to issue the commands to enable quotas on the desired directory. However, the administrator receives an error message stating the filesystem does not support quotas. Which of the following commands should the administrator perform to proceed? A) mount ""o remount /home B) quotacheck -cg C) quotaon /home D) edquota /home

C

A systems administrator received a request to change the hostname to a new name. Which of the following file configurations should be changed to fix the hostname in the server? A) /etc/resolv.conf B) /etc/sysconfig/nsswitch.conf C) /etc/hosts D) /etc/sysconfig/network

C

A systems administrator receives a report that the web server is not running after a planned system reboot. After starting the web server manually, which of the following commands should the administrator issue to ensure the web server starts at boot time? A) systemctl service on B) systemctl service enable C) systemctl enable <name>.service D) systemctl on <name>.service

C

A systems administrator wants to disable the Linux Kernel WatchDog Timer Driver for security purposes. Which of the following will accomplish this task? A) Remove the watchdog=1 from the /usr/modules/watchdog.conf file. B) Add watchdog=0 to the /etc/modprobe.conf file. C) Add blacklist watchdog to the /etc/modprobe.d/blacklist file. D) Rename the /etc/modprobe.d/watchdog file to watchdog.off instead.

C

A user has connected a Bluetooth mouse to a computer, but it is not working properly. Which of the following commands should the systems administrator use to fix the issue? A) modprobe ""r bluetooth B) depmod ""i Bluetooth C) insmod bluetooth D) lsmod ""i bluetooth

C

All users are reporting that they cannot connect to the SFTP server. The administrator runs a scan: starting nmap 4.11 at 2018-06-16 EST not shown: 1456 closed ports PORT STATE SERVICE 53/tcp open dns 80/tcp open http 957/tcp open unknown MAC Address 08:00:00:00:00:00 ( computer systems ) nmap finished = 1 ip address ( 1 host up ) scanned in 1.497 seconds You have mail in /var/spool/mail/root Which of the following would allow the administrator to fix the problem? A) Allow SFTP connections on port 20 and 21 using /etc/sysconfig/iptables. B) Allow SFTP connections on port 25 using /etc/sysconfig/iptables C) Allow SFTP connections on port 22 using /etc/sysconfig/iptables. D) Allow SFTP connections on port 1456 using /etc/sysconfig/iptables.

C

Amie Pie wants to access the GUI of a Linux server remotely. Which of the following tools would be the BEST choice? A. mate B. Cinnamon C. VNC D. KDE

C

An administrator has a CSV file named hosts.csv. The contents of hosts.csv include the following: 192.168.2.57,lnx1prd.example.com,Linux,Production 192.168.2.58,lnx2prd.example.com,Linux,Production 192.168.1.4,server15.example.com,Windows,Development The administrator needs to create a second comma-separated list of only the Linux server IP addresses. Which of the following commands would achieve this need? A) for ip in $(awk ""F, "˜{print $1}' hosts.csv | grep "Linux"); do echo ""n "$ip,"; done B) for ip in $(grep "Linux" hosts.csv | sed "/$1//'); do echo ""n "$ip,"; done C) for ip in $(grep "Linux" hosts.csv | cut ""d"," ""f1); do echo ""n "$ip,"; done D) for ip in $( cut ""d"," ""f1 hosts.csv | grep "Linux"); do echo ""n "$ip,"; done

C

An administrator has modified the configuration file for a service. The service is still running but is not using the new configured values. Which of the following will BEST remediate this issue? A) renice -10 B) service start C) kill -HUP D) init 0

C

An administrator has written the following Bash script: #!/usr/bin/sh for i in 'cat /home/user/iplist.txt' do nslookup $i done echo All necessary files exist in the correct locations. However, when the administrator executes /home/user/test.sh the following error is received: No such file or directory - Which of the following is the MOST likely cause of the error? A) The formatting of the file is incorrect. B) The script is not executable. C) The shebang points to the wrong path. D) Nslookup is not installed.

C

An administrator is installing an application named ycda on a Linux system. Developers told her the application should be installed with the following permissions: • The owner of the ycda application should have read, write, and execute permissions. • The owner group of the ycda application should have read and execute permissions. • All other users should not have any permissions for the ycda application. Which of the following commands should be used to meet these requirements? A. chmod 067 ycda.exe B. chmod 661 ycda.exe C. chmod 760 ycda.exe D. chmod 770 ycda.exe

C

An administrator is tasked with increasing the size of the volume /dev/vg/lv to 20GB. Which of the following BEST illustrates the steps the administrator should take? A)vgextend ""L20G /dev/vg/lv; resizelv /dev/vg/lv B) mkfs ""L20G /dev/vg/lv; tune2fs /dev/vg/lv C) Ivextend ""L20G /dev/vg/lv; resize2fs /dev/vg/lv D) parted ""L20G /dev/vg/lv; remount /dev/vg/lv

C

An administrator is uncomfortable allowing users to log in as root. Which of the following ensures that root logins are disallowed? A) usermod -U root B) usermod -G root C) usermod -L root D) usermod -B root

C

An administrator notices a directory on a web server named /var/www/html/old_reports that should no longer be accessible on the web. Which of the following commands will accomplish this task? A) chgrp root /var/www/html/old_reports B) chown apache /var/www/html/old_reports C) chmod 000 /var/www/html/old_reports D) setenforce apache /var/www/html/old_reports

C

An administrator receives a warning about a filesystem filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the filesystem. Which of the following commands would BEST assists the administrator in identifying the problem? A) pgrep largelogfile B) ps ""ef | grep largelogfile C) lsof | grep largelogfile D) pkill /tmp/largelogfile

C

An issue was discovered on a testing branch of a Git repository. A file was inadvertently modified and needs to be reverted to the master branch version. Which of the following is the BEST option to resolve the issue? A) git merge master testing B) git branch -b master file C) git checkout master - file D) git stash branch master

C

Ann, a Linux administrator, wants to edit a configuration management file. When she opens the file to edit, her text editor reports that the file has been opened in read-only mode. She then tries to edit the file as root by elevating via sudo and is still unable to save any changes. The error message in her text editor says that the read-only option is set on the file. Ann checks the permissions on the file and sees the following: -rw-rw-r-- 1 root wheel 30 Jun 13 15:38 infrastructure.yml Which of the following commands is the BEST option to allow her to successfully modify the file? A) chmod o+w infrastructure.yml B) chmod 600 infrastructure.yml C) chattr -i infrastructure.yml D) chown root: infrastructure.yml

C

During the final step of staging new Linux hardware, GRUB2 is installed to the system drive. Which of the following BEST describes the role of GRUB2 in a new Linux installation? A) It provides a menu for running special shell scripts. B) It provides a method to partition a hard drive. C) It provides a method to pass parameters to the Linux kernel on startup. D) It provides a menu for creating administrator task shortcuts.

C

During the initialization process for a Linux system using SysVinit, which runlevel corresponds to single user mode? A. Runlevel 5 B. Runlevel SU C. Runlevel 1 D. Runlevel 6

C

In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms. Which of the following files should be edited to accomplish this? A) /etc/ssh/known_hosts B) /etc/ssh/ssh_config C) /etc/ssh/sshd_config D) ~/.ssh/ssh_config

C

Lisa is doing some administrative work on a Linux computer and realizes she needs administrative privileges. Which of the following commands would she use to elevate her privileges? A. grep B. chmod C. sudo D. Isof

C

Maggie is tasked with ensuring that all Linux servers support local name resolution for IPv6. On one server, she issues the following command: cat /etc/hosts The output is: 127.0.0.1 localhost What should she add to the hosts file to meet the requirement? A. 0.0.0.1 ip6-localhost B. localhost ipv6 C. ::1 ip6-localhost D. ip6-loopback

C

Marge notices that a disk that should have a lot of free space is actually filling up. She identifies a log file (/tmp/applog) as the culprit. She deletes the file, but the space is not returned to the disk. Which of the following commands would be the BEST choice to help her identify the reason for this behavior? A. pkill applog B. ps C. Isof I grep applog D. pgrep applog

C

The development team has automated their software build process so each time a change is submitted to the source code repository, a new software build is compiled. They are requesting that the Linux operations team look into automating the deployment of the software build into the test environment. Which of the following is the benefit to the development team for implementing deployment automation? A) To ensure the build commits are also deployed to the test environment B) To enable notifications when builds are deployed to the test environment C) To streamline the deployment process for deploying builds into test environments D) To ensure software builds in test are not accidentally deployed to production

C

The umask reports as 022. What is the permission that will be in effect for a newly nonexecutable created file? A. u+rw, g+r, w+r B. 755 C. 022 D. a+r

C

Using which of the following control mode commands is the correct way to substitute all occurrences of /dev/sdc with /dev/sdd while editing a file in vi? A) :s/\/dev\/sdc/\/dev\/sdd B) :s/\/dev\/sdc/\/dev\/sdd/g C) :s/\/dev\/sdc/\/dev\/sdd D) :s//dev/sdc//dev/sdd

C

What is the purpose of the » operator (displayed as two greater than symbols)? A. To use the output of a command as text to create or overwrite a file B. To run the second command on a line only if the first command succeeds C. To use the output of a command as text to append a file D. To separate two commands on a line

C

Which command will create an image of the /dev/sdal disk partition and place that image into a file called output.img? A. dd if=sda of=/dev/sdal B. dd if=output.img of=/dev/sdal C. dd if=/dev/sdal of=output.img D. echo /dev/sdal > output.img

C

Which command will watch the Apache log at /var/log/httpd/ access.log and continually scroll as new log entries are created? A. watch /var/log/httpd/access.log B. tail /var/log/httpd/access.log C. tail -f /var/log/httpd/access.log D. mon /var/log/httpd/access.log

C

Which device is used as the terminal for the current process? A. /dev/termcur B. /dev/tdev C. /dev/tty D. /dev/curproc

C

Which of the following BEST describes containers used on a Linux system with the LXC framework? A. They only need cgroups to create an isolated environment. B. They only need namespaces to create an isolated environment. C. They use both cgroups and namespaces to create an isolated environment. D. They use both cgroups and namespaces to create isolated environments that each run with their own kernel.

C

Which of the following best describes the /proc filesystem? A. /proc contains information about files to be processed. B. /proc contains configuration files for processes. C. /proc contains information on currently running processes, including the kernel. D. /proc contains variable data such as mail and web files.

C

Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD? A) PXE B) NFS C) UEFI D) GRUB

C

Which of the following characters or character sequences begins a comment in a bash script? A. /* B. // C. # D. '

C

Which of the following commands enables the sticky bit for a user on a file called homescript.sh? A. chmod +sticky homescript.sh B. chmod 755 homescript.sh C. chmod u+s homescript.sh D. chown u+sticky homescript.sh

C

Which of the following commands provides the functionality of the "ping" and "traceroute" commands? A. nmap B. netcat C. mtr D. arp

C

Which of the following commands will let a Linux user know the PCI devices that are installed in the system? A) cat /proc/devices/pci B) lsdev C) lspci D) lsdev

C

Which of the following is true about Type 2 hypervisors? A) Only Type 2 hypervisors allow direct access to CPU virtualization features. B) Type 2 hypervisors are often called bare-metal or native hypervisors. C) Type 2 hypervisors run on top of another general purpose OS. D) Type 2 hypervisors offer a performance increase to the guests in comparison to a Type 1 hypervisor.

C

Which option for the grub2-mkconfig command sends output to a file instead of STDOUT? A. -stdout B. --fileout C. -o D. -f

C

Which option given at boot time within the GRUB configuration will boot the system into single-user mode? A. single-user B. su C. single D. root

C

Which option given to a yum command will install a given package? A. update B. configure C. install D. get

C

Which option given to a yum command will install a package? A. update B. configure C. install D. get

C

Which option to chgrp will change group ownership of all files within a given directory? A. -directory B. -d C. -R D. -V

C

Which option to chown recursively changes the ownership? A. -f B. -R C. -a D. -m

C

Which option to rmmod will cause the module to wait until it's no longer in use to unload the module? A. -test B. -b C. -w D. -unload

C

Which option to umask will display the permissions to be used in a POSIX format? A. -P B. -p C. -S D. -v

C

Which option within a systemd service file indicates the program to execute? A. StartProgram B. Shortcut C. ExecStart D. Startup

C

Which system logging facility is used for messages from the kernel? A. syslog B. kernel C. kern D. system

C

Within which directory will you find the repositories used by Yum? A. /etc/yum.conf B. /etc/repos C. /etc/yum.conf.d D. /etc/yum.repos.d

C

Within which file are details of the current package repositories stored on a Debian system? A. /etc/apt.Iist B. /etc/sources.Iist C. /etc/apt/sources.Iist D. /etc/apt.d/sources.list

C

You are attempting to install a new package on a Debian system from a repository. The package does not seem to exist. Which of the following commands updates the package cache for a Debian system? A. apt-get cache-update B. apt-cache update C. apt-get update D. apt-get upgrade

C

You are running a lengthy script in the terminal window. You entered a command to suspend it so that you could access the terminal window. You now want to enter a command to cause the script to continue running in the background. Which of the following commands or key combinations would you enter? A. CTRL+Z B. CTRL+C C. bg D. fg

C

You are testing a script in the terminal that you expect to run for over an hour. The last time you ran it, it filled up the /var/log directory with log file entries. You think you corrected the problem but want to monitor it as it is running in the terminal. Which of the following key combinations could you enter to meet your goals? A. CTRL+C bg watch df /var/log B. CTRL+C fg watch df /var/log C. CTRL+Z bg watch df /var/log D. CTRL+Z fg watch df/var/log

C

You are troubleshooting a storage problem, and a Serial ATA (SATA) disk or mount point may be missing. Which of the following identifiers is used by SATA disks? A. /dev/hdX B. /dev/sataX C. /dev/sdX D. /disk/sataX

C

You are troubleshooting an issue with a Linux system. The user is having problems connecting to the email server (main). You want to display round trip statistics for four ICMP packets. Which of the following commands indicate the BEST choice? A. ping mail1 B. traceroute mail1 C. ping-c 4 mai11 D. ip mail1

C

You are trying to delete a file named study.txt from the current directory. You execute the "ls-1" command and see the following entry for the file: Irwxrwxrwx 1 mint mint 4096 Jan 5 07:45 study.txt -> ./Documents/linux.txt Which of the following commands would you use to delete this entry? A. del study.txt B. rm ./Documents/linux.txt C. unlink study.txt D. ln -rm study.txt

C

You have added a second NIC to a Linux server and configured it as router. However, testing shows it is not routing packets as expected. Which of the following commands is the BEST choice to resolve this problem? A. echo "1 " > /etc/chkconfig -routing B. echo "1 " > /proc/sys/net/ipv4/enable C. echo "1 " > /proc/sys/net/ipv4/ip_forward D. echo "1 " > /proc/sys/net/ipv4/route

C

You have added another router in your network. This router provides a path to a network with limited access but as an administrator, you need to access this network. Which of the following commands would be the BEST to add another gateway path for your computer? A. ifconfig B. host C. route D. dig

C

You have enabled FTP on a Linux server so that mobile sales personnel can periodically download files. You want to provide a layer of protection to thwart potential attacks. Which of the following would support this goal? A. Modify the MOTD file B. Block FTP at the firewall C. Change the default ports D. Enable auditd

C

You have lost the password for a server and need to boot into single user mode. Which option given at boot time within the GRUB configuration will start the system in single user mode to enable password recovery and/or reset? A. single-user B. su C. single D. root

C

You manage a server running SELinux. Apu has reported that he can't open some files on the server. Which of the following commands can you use to list and check the security context of the files? A. Is-a B. Is -B C. Is-Z D. Is -R

C

You need to create an archive of a Linux system disk as a backup. Which of the following will meet this goal? A. gzip B. xz C. dd D. SHA

C

You need to send output from a command to a log file. Overwriting the contents of the log file is acceptable. Which of the following characters is used to redirect output in such a way as to fulfill this scenario? A. I B. < C. > D. &

C

You notice that a Linux server drive space is slowly filling up. You suspect that the problem is that an application is writing data to one or more log files in the /var/log directory. You want to continuously monitor the space used in this directory. Which of the following commands could be used to meet this objective? A. df -watch /var/log B. watch mount /var/log C. watch df/var/log D. mount -watch /var/log

C

You received a configuration file from a developer. The following text shows the contents: Tasks: - name: Download and install haproxy yum: name: haproxy state: present - name: Install mysql from repo yum: name: mysql-server state: present What would be MOST likely be used to programmatically read this file? A. JSON B. XML C. YAML D. HTTP

C

You recently installed Linux on a Server using Anaconda to streamline the process. You also added all the packages necessary for the server to host a web application and then configured the server to host this application. It's ready to go live but management asks you configure another Linux server with the same packages and configurations for testing updates. Which of the following would be the BEST to simplify this task? A. anaconda.install B. anaconda.auto C. anaconda-ks.cfg D. anaconda.cfg

C

You want to test connectivity to the mail server in your DMZ using ping and record the results. The mail server has the IP address of 10.10.80.10. However, while it is running, you want to enter additional commands in the terminal. Which of the following commands will meet these requirements? A. ping 10.10.80.10 B. ping 10.10.80.10 > pingmail.txt C. ping 10.10.80.10 > pingmail.txt & D. bg ping 10.10.80.10 > pingmail.txt

C

A Linux administrator retrieved a repository of files from a Git server using git clone. The administrator wants to see if a configuration file was added to the repository. Which of the following Git arguments should be used to see the recent modifications? A) pull B) init C) fetch D) log

D

A systems administrator needs to install a new piece of hardware that requires a new driver. The driver should be manually installed. Which of the following describes the order of commands required to obtain module information, install the module, and check the log for any errors during module installation? A) modinfo, insmod, modprobe B) lsmod, modprobe, modinfo C) lsmod, insmod, dmesg D) modinfo, insmod, dmesg

D

A systems administrator wants to install a new application that requires the newmod kernel module. Which of the following commands should the systems administrator use? A) lsof newmod B) lsmod newmod C) modinfo newmod D) modprobe newmod

D

A systems administrator downloads an application's source files, compiles the application, and installs it per the application's installation instructions. When trying to run the application, the system states: $ occmd bash: occmd: command not found"¦ Running the locate command shows it does exist in the following location: /opt/occmd/bin/occmd Which of the following should the administrator do to allow the command to run properly? (Choose two.) A) echo "#!/bin/bash \n ${which occmd}" > /usr/bin/occmd.sh B) mv /opt/occmd ~/ && ln ""s ~/occmd/bin/occmd ./occmd C) echo "export PATH=$PATH:/opt/occmd/bin" >> ~/.bashrc D) sudo ln ""s /opt/occmd/bin/occmd /usr/local/bin/occmd E) cd /opt/occmd/bin && chmod +x ./occmd && restorecon ""rv * F) sudo mv /opt/occmd/bin/occmd /etc/bin/

C, D

A technician wants to secure a sensitive workstation by ensuring network traffic is kept within the local subnet. To accomplish this task, the technician executes the following command: echo 0 > /proc/sys/net/ipv4/ip_default_ttl Which of the following commands can the technician use to confirm the expected results? (Choose two.) A) traceroute B) ip C) arp D) iperf E) tcpdump F) route

C, F

You are not able to reach the getcertifiedgetahead.com website but Internet sources indicate that the site is not down. You want to identify where the packets are stopping to troubleshoot the problem. Which of the following commands would be the BEST choice? A. arp getcertifiedgetahead.com B. Ping getcertifiedgetahead.com C. host getcertifiedgetahead.com D. traceroute getcertifiedgetahead.com

D

You are tasked with investigating an unscheduled restart of a Linux server. You decide to check for successful logins prior to the unscheduled restart. Which of the following commands would you use? A. who B. id C. uptime D. last

D

A Linux administrator is helping the security team troubleshoot an SELinux policy violation incident. Which of the following would be the BEST utility command to display SELinux violation and AVC denial messages? A) journalctl | grep sealert B) aureport | grep AVC C) cat /var/log/messages | grep selinux D) sealert ""a /var/log/audit/audit.log

D

A Linux administrator is testing a new web application on a local laptop and consistently shows the following 403 errors in the laptop's logs: type=AVC msg=audit(126552035 : 37232):avc:denied {read} for pid=24941 cora=nginx nme="/home/user1" /dev/sdal ino=2 scontext=unconfined u:system r:httpd t:s0 tcontext=system u:object r:httpd sys content:s0 A Linux administrator is testing a new web application on a local laptop and consistently shows the following 403 errors in the laptop's logs: A) httpd_enable_homedirs = 1 B) httpd_enable_cgi = 1 C) httpd_enable_scripting = 1 D) httpd_can_network_connect = 1

D

A Linux administrator needs every new file created on a directory to maintain the group permissions of the same directory. Which of the following commands would satisfy this requirement? A) chmod +s <directory> B) chmod o+s <directory> C) chmod u+s <directory> D) chmod g+s <directory>

D

A Linux administrator needs the "tech" account to have the option to run elevated commands as root. Which of the following commands would BEST meet this goal? A) # sudo ""i tech B) $ su "" tech ""c "/bin/bash" C) # groupadd ""u tech ""g root D) # usermod ""aG wheel tech

D

A Linux administrator needs to back up the folder /usr/domain, and the output must be a gzip compressed tar. Which of the following commands should be used? A) tar ""cv domain.tar.gz /usr/domain B) tar ""cvf /usr/domain domain.tar.gz C) tar ""czvf domain.tar.gz /usr/domain D) tar ""czvf domain.tar.gz /usr/domain

D

A Linux administrator needs to remove a USB drive from a system. The unmount command fails, stating the device is busy. Which of the following commands will show the reason for this error? A) lsusb | grep /mnt/usb B) mount | grep /mnt/usb C) mount | grep /mnt/usb D) lsof | grep /mnt/usb

D

A Linux administrator needs to schedule a cron job to run at 1:15 p.m. every Friday to report the amount of free disk space on the system and to send the output to a file named "freespace". Which of the following would meet this requirement? A) 15 13 6 * * df > /freespace B) 13 15 * * 5 df > /freespace C) 15 1 * * 6 df > /freespace D) 15 13 * * 5 df > /freespace

D

A Linux administrator wants to configure log messages of critical or higher severity levels from the cron utility to be logged to the console. Which of the following will accomplish this objective? A) Edit the /etc/logrotate.conf file to include the line cron.emerg.* /dev/console B) Edit the /etc/rsyslog.d/conf file to include the line cron.emerg.* /dev/console C) Edit the /etc/logrotate.d/cron file to include the line cron.emerg.* /dev/console D) Edit the /etc/rsyslog.conf file to include the line cron.emerg.* /dev/console

D

A Linux administrator wants to obtain a list of files and subdirectories in the /etc directory that contain the word "services". Once the files and subdirectories are discovered, they should be listed alphabetically in the /var/tmp/foundservices file. Which of the following shell scripts will accomplish this task? A) #/bin/bash find ""name services ""sort </var/tmp/foundservices B) #/bin/bash locate /etc ""sort ""name services > /var/tmp/foundservices C) #/bin/bash find /etc ""name services ""sort > /var/tmp/foundservices D) #/bin/bash find /etc ""name services | sort > /var/tmp/foundservices

D

A Linux server needs to be accessed, but the root password is not available. Which of the following would BEST allow an administrator to regain access and set a new known password at the same time? A) Boot into single-user mode and reset the password via the chage command. B) Boot into single-user mode and reset the password by editing the /etc/shadow file. C) Boot into single-user mode and reset the password by editing the /etc/passwd file. D) Boot into single-user mode and reset the password via the passwd command.

D

A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file. Which of the following is the BEST reason to do this? A) To document the infrastructure so it can be included in the system security plan B) To validate user requirements have been met within each regional datacenter for compliance C) To ensure the administrator follows the planning phase of the systems development life cycle D) To define the infrastructure so it can be provisioned consistently with minimal manual tasks

D

A Linux user wants to give read-only permissions to a directory and its contents. Which of the following commands will allow the user to accomplish this task? A) chmod ""R 600 /new_directory/ B) chmod 600 /new_directory/ C) chmod 400 /new_directory/ D) chmod ""R 400 /new_directory/

D

A company wants to provide internal identity verification services for networked devices. Which of the following servers should be installed? A) DHCP B) DNS C) VPN D) CA E) SSH

D

A configuration management tool running every minute is enforcing the service HTTPd to be started. To perform maintenance, which of the following series of commands can be used to prevent the service from being started? A) systemctl stop httpd && systemctl hide httpd B) systemctl disable httpd && systemctl hide httpd C) systemctl stop http & systemctl mask httpd D) systemctl stop httpd && systemctl mask httpd

D

A junior Linux administrator is installing patches using YUM. The administrator issues the following command: yum list installed The output of the command is as follows: Loaded plugins: fastmirror, langpacks Existing lock /var/run/yum.pid: another copy is running as pid 5180. Another app is currently holding the yum lock; waiting for it to exit.. The other application is yum Memory: 26 M RSS (r415 MB VSZ) Started: Fri Jun 15 08:05:15 2018 - 2:18:48 ago State: Traced/Stopped pid: 5180 Given this scenario and the output, which of the following should the administrator do to address this issue? A) renice ""n 9 ""p 5180 B) top | grep yum C) killall yum D) ps ""ef | grep yum

D

A junior Linux administrator needs to ensure a service will start on system boot. Which of the following commands should be used to accomplish this task? A) chkconfig <service> on B) systemctl <service> bootup C) crontab install <service> D) service <service> enable

D

A system ran out of storage space on a particular mount and will not allow anything to be written to disk. The df command shows there are 6GB free on the mount, and there is no inode exhaustion. This issue has happened before due to a known large log file that was not being rotated. The administrator remembers the file name but cannot remember the location of the log file or which process is writing to it. Which of the following would be the BEST solution to correct this issue while maintaining availability? A) Use the locate command to find where the large log file is located and delete it B) Use the du command to find where the large log file is located and delete it C) Use the lsof command to find where the large log file is located and truncate it D) Use the ps command to find which process is writing to the log file, and then kill and restart the process

D

A systems administrator installs a simple package, but the Linux system returns the following error: rpmdb open fails. To verify if there is a problem in the RPM database, the systems administrator runs the following command: #yum check error: db4 error(11) from dbenv->open: Resource temporarily unavailable error: cannot open Packages index using db4 - Resource temporarily unavailable (11) error cannot open Packages database in /var/lib/rpm CRITICAL:yum:main: Error: rpmdb open fails Which of the following commands should the systems administrator run NEXT to resolve this issue? A) cd/var/lib/rpm; rpm -qd; rpm --rebuilddb; yum clean all B) cd/var/lib; rpm -qa; rm -f _db*; clean all C) cd/var/lib/rpm; rpm --rebuilddb ; rm -f _db*; yum clean all D) cd/var/lib/rpm; rpm -qa; rm -f _db*; yum clean all

D

A systems administrator is troubleshooting an intermittent network connection at the IP address 192.168.1.23. The administrator wishes to monitor the connection at five-minute intervals for one hour. Which of the following commands will accomplish this task? A) ping -i 5 192.168.1.23 B) ping -c 60 -i 100 192.168.1.23 C) ping -c 12 192.168.1.23 D) ping -c 12 -i 300 192.168.1.23

D

A systems administrator must clean up all application files in the directory /var/log/app. However, the company's security policy requires the files to be kept on the backup server for one year. The Linux server has only the tar and bzip2 packages installed. Which of the following commands will package and compress the files? A) tar ""cvf applicationfiles.tar.bz2 /var/log/app/* B) tar ""zcvf applicationfiles.tar.bz2 /var/log/app/* C) tar ""xvf applicationfiles.tar.bz2 /var/log/app/* D) tar ""jcvf applicationfiles.tar.bz2 /var/log/app/*

D

A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error: No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space. Which of the following BEST describes a possible cause for this error? A) The filesystem is formatted with a 4MB block size. B) The /tmp directory is not mounted. C) The /tmp directory has been set with an immutable attribute. D) The filesystem ran out of inodes.

D

A user requested a USB serial device to be added to a desktop computer. The device has built-in kernel driver support. The administrator tested the device installation and access, but the user cannot access the serial port. Each time the user attempts to access the device, an error log is created that shows the user does not have permission to use the serial port. Which of the following will add a user to the group that has serial port capabilities? A) usermod ""a ""G modem $USER B) usermod ""a ""G root $USER C) usermod ""a ""G serialport $USER D) usermod ""a ""G dialout $USER

D

According to the FHS, what is the correct location for site-specific data for a server? A. /etc B. /var C. /tmp D. /srv

D

After querying a file, you see the following partial output: search getcertifiedgetahead.com nameserver 72.52.206.134 nameserver 72.52.230.233 What file did you query? A. /etc/hosts B. /etc/network C. /etc/dhcp/dhclient.conf D. /etc/resolv.conf

D

An administrator is attempting to block SSH connections to 192.168.10.24 using the Linux firewall. After implementing a rule, a connection refused error is displayed when attempting to SSH to 192.168.10.24. Which of the following rules was MOST likely implemented? A) iptables ""A ""p tcp ""d 192.168.10.24 ""-dport 22 ""j DROP B) iptables ""A ""p tcp ""d 192.168.10.24 ""-dport 22 ""j REFUSE C) iptables ""A ""p tcp ""d 192.168.10.24 ""-dport 22 ""j FORWARD D) iptables ""A ""p tcp ""d 192.168.10.24 ""-dport 22 ""j REJECT

D

An administrator is reviewing suspicious activity on a server and needs to determine which users logged into the system within the past 24 hours. Which of the following commands should the administrator run to determine this? A) usermod B) id C) who D) last

D

An administrator needs a bootable USB for installing a new Linux machine. The administrator downloaded the image file and named it as Linux_OS.iso in the / tmp directory. Which of the following commands will accomplish that task? A) dd in=/tmp/Linux_OS.iso out=/dev/sdb bs=512 B) dd input=/tmp/Linux_OS.iso of=/dev/sda bs=512 C) dd if=/tmp/Linux_OS.iso out=/dev/sdb1 bs=512 D) dd if=/tmp/Linux_OS.iso of=/dev/sda bs=512

D

An administrator needs to create a file named hello in the home directory that contains the following text: it's me! Which of the following commands would accomplish this goal? A) mv ~/hello cp "it's me!" > ~/hello B) mkdir ~/hello touch ~/"it's me!" C) type ~/hello print "it's me!" D) touch ~/hello echo "it's me!" > ~/hello

D

An administrator needs to see a list of the system user's encrypted passwords. Which of the following Linux files does the administrator need to read? A) /etc/passwd B) /etc/skel C) /etc/pw D) /etc/shadow

D

An administrator needs to see the type of CPU that a server is running. Which of the following files contains this information? A) /dev/proc/cpu B) /etc/devices/info.conf C) /sys/dev/cpuinfo D) /proc/cpuinfo/proc/cpuinfo

D

An engineer is working on a production application deployment that requires changing a web application property file called server.property that is managed by the Git version control system. A cloned copy of the remote repository in which the server.property file exists is on the local desktop computer. The engineer makes appropriate changes to the files, saves it as server.property, and executes git commit ""m "changed the property file" server.property. Which of the following commands did the engineer fail to perform? A) git merge server.property B) git init server.property C) git push server.property D) git add server.property

D

Ann, a user, has created a new directory and noticed that permissions on the new directory are as follows: drwx------. 1 ann ann 0 Jun 11 08:20 work Which of the following should the administrator do to restore default permissions for newly created directories? A) Run chmod command to update permissions. B) Modify directory ownership to ann:ann with chown. C) Execute chattr command to restore default access. D) Change umask value in /etc/profile.

D

Configuration of udev devices is done by working with files in which directory? A. /udev/devices B. /devices/ C. /udev/config D. /etc/udev

D

Due to security policies, a restriction was implemented that forbids direct access to the database server. The junior administrator needs to connect using SSH tunneling. Which of the following commands allows the junior administrator to connect from a desktop? A) ssh ""L dbserver.local:5432:localhost:95432 [email protected] B) ssh ""L 95432:localhost [email protected] C) ssh ""L 5432:localhost dbserver.local:5432 postgres D) ssh ""L 9432:localhost:5432 [email protected]

D

How can you assign the value of an IP address to a variable called mail? A. $mail="10.1.80.11" B. var mail = "10.1.80.11" C. unset mail = "10.1.80.11" D. mail="10.1.80.11"

D

Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry: joe:x:505:505::/home/joe:/bin/false Which of the following commands should the administrator execute to resolve the problem? A) useradd ""s /bin/bash joe B) passwd ""u joe C) chage ""E -1 joe D) usermod ""s /bin/bash joe

D

Joe, a user, reports that he is no longer able to write files to his home directory. Upon inspection, the Linux administrator discovers that attempting to create a new file gives the following error: No space left on device. However, the disk and partition are not full. Which of the following commands would be BEST for the administrator to use to continue troubleshooting this problem? A) fdisk /dev/sda B) rm -Rf ~/.* C) fsck -y /dev/sda1 D) df -i

D

Lisa administers a Linux server in the DMZ. She suspects hackers have been trying a brute force attack to guess the passwords. Which of the following would be the EASIEST to use to identify all unsuccessful login attempts? A. The Isof command B. The chmod command C. The klist command D. The pam_tally2 command

D

Lisa tried to install an application package using the following rpm command: rpm -i pass.rpm Unfortunately, the command failed indicating a failed dependency. She knows that all of the dependencies have already been installed but suspects that RPM just doesn't recognize them. What command can she issue to ignore the dependency error and install the package anyway? A. rpm -qa pass.rpm B. rpm -ev pass.rpm -nodeps C. rpm -U pass.rpm D. rpm -i -nodeps pass.rpm

D

Maggie has finished the development of a new module for an application hosted in a separate Git branch. She now needs to add this module to the applications master branch. Which of the following would be the BEST method for doing so? A. Pull the changes from the separate branch into the master branch. B. Clone the separate branch. C. Commit the changes in the separate branch. D. Merge the changes from the separate branch into the master branch.

D

Management has decided they want to enable Bluetooth on all corporate Linux laptops. Which of the following commands would be the easiest to use to accomplish this goal? A. rmmod B. dmesg C. whitelist D. modprobe

D

On a UEFI-based system, which of the following invokes GRUB2 from the EFI command prompt? A) /grub2.efi B) EFI/grub2.efi C) boot//EFI/grub2.efi D) /boot/EFI/grub2.efi

D

On a system using SysVinit, in which directory are startup and shutdown scripts for services stored? A. /etc/init-d B. /etc/init C. /etc/sysV D. /etc/init.d

D

The Linux FHS defines the directory structure and directory contents of Linux distributions. Where should virtual file systems be located? A. /sbin B. /var C. /dev D. /proc

D

What is one reason a device driver does not appear in the output of Ismod, even though the device is loaded and working properly? A. The use of systemd means drivers are not required for most devices. B. The use of initramfs means support is enabled by default. C. The system does not need a driver for the device. D. Support for the device has been compiled directly into the kernel.

D

What is the command to display the default target on a computer running systemd? A. systemctl defaults B. update-rc.d defaults C. systemctl runlevel D. systemctl get-default

D

What is the purpose of the | operator (displayed as a bar symbol)? A. It is used to separate commands on the same line. B. It is used to append a file with the output of a command. C. It is used to cause a command run in the foreground. D. It is used to pipe the output of one command into the next command.

D

Which command can be used to obtain a list of currently loaded kernel modules? A. insmod B. modlist C. Is --modules D. Ismod

D

Which command can be used to view the kernel ring buffer in order to troubleshoot the boot process? A. Isboot B. boot-log C. krblog D. dmesg

D

Which command is used to determine the libraries on which a given command depends? A. Idconfig B. librarylist C. listdeps D. Idd

D

Which command is used to update the links and cache for shared libraries on the system? A. Idcache B. cache-update C. link-update D. Idconfig

D

Which of the following commands installs GRUB into the MBR of the second SATA disk? A. grub2-install /dev/hdb2 B. grub2-install /dev/sda2 C. grub2-config /dev/sda D. grub2-install /dev/sdb

D

Which of the following commands would show the default printer on a Linux system? A) lpr B) lpq C) lspci D) lpstat

D

Which of the following is a difference between YAML and JSON? A) YAML has been deprecated for JSON. B) JSON only uses curly brackets, while YAML only uses square brackets C) JSON is used in web development, while YAML is used solely in back-end systems. D) Users can comment in YAML but not in JSON

D

Which of the following is the correct method for invoking the bash shell for a script, typically found as the first line of the script? A. #!/BASH B. #!bash C. #!/bash D. #!/bin/bash

D

Which of the following is the template for the grub.cfg file? A) /boot/efi B) /etc/sysct1.conf C) /etc/grub2.cfg D) /etc/default/grub

D

Which of the following will provide a list of all flash, external, internal, and SSD drives? A) lspci B) lsusb C) lsmod D) lsblk

D

Which, if any, file extension is required in order for a bash script to execute? A. .sh B. .bash C. .bat D. No special extension is necessary

D

While creating a file on a volume, the Linux administrator receives the following message: No space left on device. Running the df ""m command, the administrator notes there is still 50% of usage left. Which of the following is the NEXT step the administrator should take to analyze the issue without losing data? A) Run the df ""h command and notice the space exhaustion B) Run the df ""B command and notice the block size C) Run the df ""k command and notice the storage exhaustion D) Run the df ""i command and notice the inode exhaustion

D

Within which partition will the EFI system partition typically be mounted? A. /etc/efi B. /efi C. /sys/efi D. /boot/efi

D

You are comparing the differences between YAML and JSON. Which of the following statements is true? A. YAML only uses curly braces while JSON only uses square brackets. B. JSON can be used with Git, but YAML cannot. C. JSON has been deprecated for YAML. D. YAML uses the hash character (#) for comments, but JSON doesn't.

D

You are helping a user who reports a problem connecting to a website. You suspect it may be a DNS issue. Which of the following commands would be the EASIEST to verify that the system can resolve the site's name using DNS? A. fsck B. ipset C. nmcli D. host

D

You are leading a development team and want to create an empty Git repository for an upcoming development project. Which of the following commands would you use? A. clone B. merge C. config D. init

D

You are troubleshooting a server that periodically crashes. After running the top command, you see that the system has 23 zombie processes from an application with a PID of 29. Which of the following commands should you run to stop these zombie processes without stopping the parent application? A. kill-9 29 B. kill-129 C. kill-3 29 D. kill -s SIGCHLD 29

D

You have added a new file system to a Linux system. What file should you modify to ensure that the file system persists through reboots? A. /etc/crypttab B. /dev/ C. /etc/mtab D. /etc/fstab

D

You have configured a second IP address on a Linux server and plan to use the second address for a web server. After completing the configuration, you want to verify that the web server port is bound to the second IP address. Which of the following would BEST meet your needs? A. traceroute B. tracepath C. route D. netstat

D

You have connected a USB disk to the system and need to find out its connection point within the system. Which of the following is the best method for accomplishing this task? A. Rebooting the system B. Viewing the contents of /var/log/usb.log C. Connecting the drive to a USB port that you know the number of D Running dmesg and looking for the disk

D

You have obtained a USB drive that includes a bootable Linux operating system. What should you manipulate on a computer to allow it to boot using this USB drive? A. PXE B. NFS C. ISO D. UEFI

D

You need to print output from a bash script such that single quotes appear in the outputted string. Which character should be used as an escape sequence in order to get the single quotes into the output? A. / B. ' C. " D. \

D

You need to securely copy all the files from a folder on production server to a similar folder on a testing server. Which of the following commands would you use? A. cp B. tar C. mv D. scp

D

You need to update the contents of a web page on a Linux server. However, you don't have a copy of the web page on your current system and you don't want to recreate it from scratch. Which of the following commands would be the BEST choice to download the page? A. apt-get B. lvm C. yum D. curl

D

You recently configured a Linux server but during testing you notice many out-of-memory error messages. The server has all the memory slots filled so you can't add additional physical memory. However, the disk has free space available and space has been allocated for a swap file named /swapfile. Which of the following commands could be used to eliminate these errors? A. fallocate -l 3G /swapfile ; swapon -a B. free : swapon -a C. free ; vmstat ; swapon -f=/swapfile D. mkswap /swapfile ; swapon -a

D

You want to view a summary of protocol statistics on a Linux system. Which of the following commands would you use? A. dig B. nslookup C. ifconfig D. netstat

D

A Linux administrator is updating iptables rules and is given the following tasks: Output a list of iptables rules. Remove all iptables rules. Which of the following actions should be performed from the terminal console to accomplish these tasks? (Choose two.) A) iptables -A B) iptables -I C) iptables -C D) iptables -L E) iptables -N F) iptables -F

D, F

Joe, a member of the accounting group on a Linux system, is unable to write a file called "taxes" in the accounting shared directory. The ownership and permissions on the directory and file are as follows: accounting drwxrw-r-- user = ann, group = accounting taxes -rw-r--r-- , user = ann, group = accounting Which of the following commands would allow Joe to write to the file? (Choose two.) A) chgrp taxes accounting B) chgrp accounting taxes C) chmod 774 accounting D) chmod g+x accounting E) chmod u+x accounting F) chmod 777 taxes

D, F

Which of the following are Linux desktop managers? (Choose two.) A) GUI B) VNC C) X11 D) KDE E) SPICE F) GNOME

D, F

A junior systems administrator is upgrading a package that was installed on a Red Hat-based system. The administrator is tasked with the following: - Update and install the new package. - Verify the new package version is installed. Which of the following should be done to BEST accomplish these task? (Choose two.) A) apt-get <package name> B) apt-get upgrade C) yum upgrade D) rpm ""e <package name> E) yum install <package name> F) rpm ""qa

E, F


Ensembles d'études connexes

Psych History ch. 10, ch. 11, ch. 12, & ch. 13

View Set

Info. Man.: Terminologies, Data Names, and definition Classification of Attributes

View Set

NEC 2017 Printreading Trade Compentency

View Set

Complete Node.js Developer Course (Udemy by Andrew Mead)

View Set

Biology Ch 8 Photosynthesis Study Guide

View Set