Linux Final PRCC
You are installing Linux on an old computer with an old BIOS, and you are planning the partitions for the hard disk drive. Which of the following directories SHOULD exist in the first 1024 cylinders of the hard disk drive? /var /boot /home /bin
/boot
Which system component verifies the hardware and passes control of the computer to the boot loader? BIOS CMOS Init OS kernel
BIOS
Which of the following is the standard shell for MOST Linux computers? Bourne-again shell (bash) Bourne shell Korn C-shell tcsh
Bourne-again shell (bash)
Which of the following Linux bridge modes is the default? Bridged Routed NAT Isolated
Bridged
Which routing component is used to forward packets to remote networks? Default gateway Subnet mask IP address Host name
Default Gateway
You are the administrator for a small company. You need to create a new group for users in the sales department. You need to name the group salessales. Which command will accomplish this task? addgroup sales groupadd -r sales groupadd sales addgroup -x sales
groupadd sales
Two users should have identical settings, yet one is having problems with the display on his screen, and you suspect there is a difference in their environment variables. Which of the following commands displays all of the environment variables? echo env display print
env
Which partition management utility can be used to define and change various different GUID partition configurations without committing the configuration to the disk until the w command is used? gdisk parted fdisk lsblk
gdisk
Which is the default signal sent to processes by the kill utility? -1 -2 -9 -15
-15
You suspect your /dev/sda3 partition is in need of repair. Which of the following e2fsck options will repair the errors without any interaction from you? -p -f -n -b
-p
Which of the following paths represents the root directory? / /root /home/root /boot
/
When creating a bash script, it is important to document the purpose of the script. Which of the following is a valid comment? // Comment text $ Comment text # Comment text !! Comment text
// Comment text
You are preparing to mount a device local to your system. Which directory holds the device files? /local/dev /devices /opt/dev /dev
/dev
A file contains the following entry: sales:x:1001:pclark,mmckay,hsamson Which of the following files contains similar enties? /etc/group /etc/shadow /etc/gshadow /etc/passwd
/etc/group
Which of the following configuration files holds the name of the host? /etc/hostname /etc/hosts /etc/networks .rhosts
/etc/hostname
You have installed a new Linux system and you want to make a baseline of system performance. Which of the following files contain baseline information? (Choose TWO). /cpuinfo /ps.aux /top /meminfo /systat
/meminfo /cpuinfo
Which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) channels are being used by each hardware device on the system? /proc/interrupts /proc/devices /proc/dma /proc/irqs
/proc/interrupts
Which of the following directories is the home directory for the root user account? /root / /home /home/root
/root
Which of the following are valid IPv6 addresses? Select all that apply. 6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1 A82:5B67:7700:AH0A:446A:779F:FFE3:0091 165.15.78.53.100.1 343F:1EEE:ACDD:2034:1FF3:5012
141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552
Out of concern for security, you convinced your boss to stop allowing Telnet access to the network. Now, remote connections are only made through ssh. Which port must you allow through the firewall for ssh access? 22 23 24 25
22
Which of the following is the maximum number logical partitions allowed on an extended partition? 1 2 4 Unlimited
4
Which of the following is the maximum number of primary partitions that can be created on a single hard disk drive? 2 4 8 Unlimited
4
As an administrator, you are tasked with configuring an Apache web server by modifying the /etc/apache2/apache2.conf file. You open the file in vi. As you're looking at the file, you knock your spill-proof drink container onto the keyboard. It rolls over several keys as you try to pick it up. Now there are extra characters everywhere in the text buffer. Which of the following commands can you use to exit vi without saving any changes that were made to the text buffer? :q! :q :wq :x
:q!
Which of the following actions can be used to define a persistent alias? Add the command defining the alias to the appropriate shell configuration file. Use the alias command at the shell prompt with the -P option. Add the command defining the alias to the $ALIAS environment variable. Add the command defining the alias to the /etc/default/alias.conf file.
Add the command defining the alias to the appropriate shell configuration file
When implementing a network gateway, implementing a firewall, or increasing performance, multiple NICs can be added to a computer. Which of the following can be implemented on VMs to provide this capability? Dual-homed NICs An overlay network A bridged network An switch in isolated mode
Dual-homed NICs
You want to limit Telnet access to three specific users. Which of the following strategies will BEST accomplish this goal? Set a limit for Telnet in the /etc/inetd.conf file.. Enter IP address entries for the three users in the /etc/hosts.allowfile Enter the three users' IP addresses in the /etc/usertty file. Create invalid remote shells for all but the three users allowed access.
Enter IP address entries for the three users in the /etc/hosts.allowfile
Which of the following desktops is the default for many Linux distributions, such as Fedora and Ubuntu? KDE MATE Unity GNOME
GNOME
You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model should you use? IaaS SaaS PaaS DaaS
IaaS
Which of the following situations is most likely to cause a dependency problem? Installing two different packages that both include /usr/lib/graphlib. Upgrading the library /usr/lib/biglib from version 1.4 to version 1.6. Several applications using the /usr/lib/biglib library. Upgrading the kernel from 2.4.6 to 2.4.12.
Installing two different packages that both include /usr/lib/graphlib
Which of the following desktops emulates a Windows desktop, especially in the location of the menu options and bottom panel bar? GNOME Unity KDE MATE
KDE
Which remote desktop technology offers access from most common platforms such as Linux, Windows, Mac, iOS, Android, and Rasberry? VNC XRDP NX SPICE
NX
Which of the following templates, which use the JSON file format, can be copied and used to create multiple containers, that run the same applications? OVF OVA YAML Container image
OVF
Your company is deploying ten new virtual machines. You have planned the disk space for anticipated future growth. However, the hypervisor currently doesn't have enough disk space for the all the disks that need to be allocated. You have placed an order for additional storage that will be added to the hypervisor. You must have all ten servers operational before your order will arrive. You determine that overbooking the storage space will work in the short term. Which of the following storage provisioning options should be selected? Persistent Non-persistent Thick provisioning Thin provisioning
Persistent
You obtain your applications and updates in RPM format. Which of the following distributions is your system based on? Debian Slackware Red Hat Xandros
Red Hat
What does the lprm command do? Send e-mail about the line printer status. Remove jobs from the line printer print queue. Redirect output to the line printer print queue. Reschedule jobs for the line printer print queue.
Remove jobs from the line printer print queue
In an effort to secure the internal network, the system administrator has implemented a host-based firewall and set up explicit allow and deny statements for specific ports and services. Some of the employees are complaining they can no longer access the applications they need. The server was on the internal network connected to an internal router, which is connected to the DMZ and an external router to the internet. Which of the following is the most likely causing problems? The DMZ is blocking access. The internal network router is now misconfigured. Restrictive ACLs on the firewall. The external network router is now misconfigured
Restrictive ACLs on the firewall.
For what purpose would you edit the /etc/localtimefile? Set the current time zone. Set the hardware clock time. Set the system date and time. Change the value of the time zone (TZ) environment variable
Set the current time zone.
What is the effect of the following command? chage -M 60 -W 10 jsmith Sets the password for jsmith jsmith to expire after 60 days and gives a warning 10 days before it expires. Sets the password for jsmith jsmith to expire after 6 days and gives a warning 10 days before it expires. Deletes the jsmith jsmith user account after 60 days and gives a warning 10 days before it expires. Forces jsmith jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it. Sets the password for jsmith jsmith to expire after 6 days and gives a warning 10 days before it expires.
Sets the password for jsmith jsmith to expire after 60 days and gives a warning 10 days before it expires
Which of the following BEST describes the role of the Linux desktop? The Linux desktop adds a series of tools and utilities to make the GUI useful. The Linux desktop takes the information from the display server and renders it so that it can be displayed on the screen. The Linux desktop controls the placement and appearance of windows on a Linux computer. The Linux desktop manages input devices such as the mouse and keyboard and controls output to monitors and printers.
The Linux desktop manages input devices such as the mouse and keyboard and controls output to monitors and printers.
Which command could you use to see the path that a packet traveled across a network to a remote host? route traceroute ping ifup
Traceroute
Which of the following devices is a hotplug device? RAM (Random Access Memory) chips CPU (Central Processing Unit) PCI Express cards USB flash drives
USB flash drives
Which of the following character sets is a variable length encoding standard of Unicode that uses one to four 8-bit bytes to support many languages and most commonly used on Linux? ASCII UTF-8 LANG LC_ALL
UTF-8
Which of the following users MOST benefit from the sticky keys accessibility option? Users who have difficulty pressing multiple keys at the same time. Users who press single keys multiple times by accident. Users who press and hold down keys by accident. Users who need a tactile representation of the keys.
Users who have difficulty pressing multiple keys at the same time
Which of the following is the MOST common Linux file system? XFS JFS ext4 ReiserFS
XFS
You need to set the SUID permission on a file named riderrider. Which of the following commands will accomplish this task? chmod rider 1777 chmod 1777 rider chmod 2777 rider chmod 4777 rider
chmod 4777 rider
You must change ownership of a script called myscriptmyscript so that only the user owner has read/write access to it and only the user owner and group owner have execute permissions. Which of the following commands will accomplish this task? chmod 750 myscript chmod 771 myscript chmod 611 myscript chmod 755 myscript
chmod 750 myscript
A Linux administrator is logged in as root and needs to copy a file named letter.docletter.doc from the USB flash drive mounted under /media/usb. Which of the following commands will copy the file from the USB flash drive to the root user's home directory? cp /media/usb/letter.doc home: cp /media/usb/letter.doc /root cp /dev/usb/letter.doc /root cp /mnt/usb:letter.doc /root
cp /media/usb/letter.doc home:
Which command could you use to verify whether a crontab file exists for the thobbsthobbs user? crontab -l -u thobbs crontab -e - u thobbs crontab - r -u thobbs crontab -a -u thobbs
crontab -l -u thobbs
Which of the following is the BEST command to use when creating a disk image? pack cpio dd gzip
dd
Which of the following commands will help you to determine which version of GRUB is installed on your Linux system? grub2-install --version grub-install -v grub1.98- install V update-grub
grub2-install--version grub-install-v
Which of the following commands should a Linux user enter to see a list of all the commands the user recently ran at the command prompt? history clear chsh uname
history
Which of the following commands will display information about the RAID devices on the computer? hwinfo --listmd lsusb lspci modprobe -r
hwinfo -- listmd
Which of the following commands will merge two files based on identical fields of text? paste pr join od
join
Which of the following utilities would you use to search a path for files that match a given name? locate type cat tail
locate
Which of the following commands manages, compresses, renames, and deletes log files based on a specific criteria such as size or date? lastlog logger dmesg logrotate
logrotate
Which of the following commands will check for dependencies before removing the debugdebug module from the kernel? modprobe -r debug rmmod debug rmmod -r debug modprobe -rd debug
modprobe -r debug
Joe, a bash script developer, is trying to debug a shell script named myscript. Which of the following commands would record the output of the script in a text file? echo myscript >> testfile.text myscript | testfile.text myscript >> testfile.txt myscript | echo | testfile.txt
myscript >> testfile.txt
You need to increase the security of your Linux system by finding and closing open ports. Which of the following commands should you use to locate open ports? netstat nmap traceroute nslookup
nmap
Which of the following commands initializes a physical volume? pvcreate pvscan lvcreate vgcreate
pvcreate
You are an IT consultant for a small company. The company wants to increase the security of their small network. You want to move their passwords from the /etc/passwd file to the /etc/shadow file. Which of the following utilities will BEST accomplish this task? cp shadow sync pwck
pwconv
Which of the following commands displays the disk usage and quota limits for the development group? quota -g development repquota development quotacheck -g development edquota -g development
quota -g development
Which of the following commands deletes the directory named backup and any file it contains? rm backup/* rm backup rm -r backup/* rm -r backup
rm
Which commands display the IP address and subnet mask values configured on a workstation? (Select TWO). netstat route arp show ifconfig ip addr
show ifconfig ip addr
You need to shut down the system immediately and send a message to logged in users to allow running processes to close gracefully. Which of the following is the BEST to use? shutdown -h now shutdown -s shutdown -m now shutdown -r shutdown -hk now
shutdown -h now
You need to connect to a remote system whose host name is abc.def.comabc.def.com and execute a shell script called daily-backup.shdaily-backup.sh that backs up some files. The username that has permissions to execute that script is bubbabubba. Which command should you run to make the connection? netstat abc.def.com bubba ping abc.def.com:bubba ssh -l bubba abc.def.com ssh abc.def.com:bubba
ssh -l bubba abc.def.com
You have logged in as a regular user when a frantic phone call comes in. The ABCD process must be started on the server now, but can only be run by root. Which command would you use to start this process? su ABCD sudo ABCD exit ABCD ABCD /root
sudo ABCD
Which of the following partitions functions as virtual memory for a Linux system? swap / /srv /var
swap
You are working on a systemd-based Linux distribution. Which command can you use to manage the services and targets? systemctl initctl telinit insserv
systemctl
Which of the following is responsible for bringing up other units and services when boot targets are changed? systemd init systemctl service
systemd
A user calls the help desk. Each time he creates a new text file, permissions of 640 are applied to the file, and he must use chmod to set them to 644. What command should you enter in the user's profile to set the default permission for newly created files to 644? umask 640 umask -640 umask 0022 umask 0027
unmask 0022
Which of the following apt-cache options will show the missing dependencies in the package cache? stats unmet pkgnames showpkg depends
unmet
Which of the following commands deletes a variable? unset rm declare -r typeset -r
unset
Which of the following commands produced this output? 06:14:11 up 139 days, 24 min, 5 users, load average: 0.12, 0.33, 0.48 uptime w top ps
uptime
You have performed an audit and have found active accounts for employees who no longer work for the company. You want to disable those accounts. Which command example will disable a user account? usermod -L joer usermod -l joe usermod -d joer usermod -u joer
usermod -L joer
You have installed a package called mathpacmathpac with yum. After a system upgrade, the package is not working correctly. Which of the following commands should you FIRST try to get the package to funciton? yum remove mathpac and then yum install mathpac rpm -U mathpac yum update mathpac yum upgrade mathpac
yum upgradfe mathpac
After a user starts a bash session and the script in /etc/profile is applied, if all of the following files exist, which will be run next? ~/.bash_profile ~/.bash_login ~/.profile ~/.bash_logout
~/.bash_profile