Linux+
You want to edit the ifcfg-eth0 file to configure the eth0 interface. Which directory should you visit to edit this file?
/etc/sysconfig/network-scripts/
If you are using the libvirt API for managing the virtualization solutions, where would you run the libvirtd daemon?
On the VM host server
Which of the following tool does not work with the deb packages but works with deb archive?
apt
Which of the following command will disable the httpd service at a system startup?
chkconfig httpd off
Which of the following command is an alternative to the nmcli command and is based on the Text User Interface?
nmtui
Which module locks the user accounts after multiple failed authentication attempts?
pam_faillock
You create a shell script and attempt to run it. You are prompted with the permission denied error. Before executing a shell script, which permission must you assign it with the chmod command?
+x
You want to display the size of the /etc. directory but do not want to include the subdirectories. Which of the following parameters should you include with the du command for this purpose?
-S
You want to mount all file systems that are listed in the /etc/fstab file. Which parameter of the mount command will help you achieve this?
-a
Which of the following parameter of the journalctl command will display the logs of the last boot of the Linux system?
-b
Which parameter should you use with the quotacheck command to create group quota?
-g
Using the dumpe2fs command, you want to view the superblock information. Which of the following parameter should you use?
-h
To view the filesystem parameters, which of the following parameters should you use with the tune2fs command?
-l
You want to convert an environment variable to a local variable. Which of the following parameter should you use with the export command?
-n
Which of the following parameter of the print command will redirect the given arguments to the history file?
-s
You want to print the detailed information about a package. Which of the following parameter of the ldd command should you use?
-v
Which type of backup can be restored in the least amount of time as compared to the incremental backups? [Choose all that apply]
. Differential C. Full
In the /etc/cryptab file, which of the following fields are mandatory? [Choose all that apply]
. Path to the block device B. /dev/mapper/name
While installing a new Linux system with the SATA drives, you have been told that smartd does not support SATA. You want to enable this support in the /etc/smartd.conf file. You add the following statement: /dev/sda -d sata -H -m [email protected] What else should you do to ensure that SATA is supported by smartd? [Choose all that apply]
. Set the BIOS to legacy mode C. Restart smartd after saving the configuration file
When a non-interactive shell is started, from which file does it read the user-specific startup configuration instructions?
.bashrc
You need to ignore a file or folder from being synchronized. Which file should you create for this purpose?
.gitignore
If you are using the tar command with the -czvf option, which of the type of file will you create?
.tgz
In which directory will you find the fstab file, which contains the information about the mounted filesystems?
/etc
In which directory will you find the logrotate.conf file?
/etc
Which of the following file contains system-wide functions along with the aliases?
/etc/bash.bashrc
If you need to edit the ssh.conf file, in which directory would you find it in?
/etc/init
Which of the directory contains the init shell scripts?
/etc/init.d
Which of the following file controls the start of a service?
/etc/inittab
Which of the following directory is likely to store the config files that are created manually by the administrator?
/etc/modprobe.d
Where are you likely to find the 01-netcfg.yaml file, which you can use to configure a static IP address?
/etc/netplan/
On a CentOS 7 system, you have configured OpenLDAP. You have also specified various attributes, such as domain component ( dc ), distinguished name (dn), and organization (o). You want to now check for the schema. Which file should you open to do this?
/etc/openldap/schema
If you have a shell script that contains environmental variables, in which directory should you place the shell script?
/etc/profile.d/
Which of the following file is executed after all services are started to switch to the multi user level?
/etc/rc.local
If you do not provide a DNS server name with the dig command, which of the following file will it reference?
/etc/resolv.conf
Which file keeps the information about the currently available nameservers?
/etc/resolv.conf
From which file does sshd read its global configuration data?
/etc/ssh/sshd_config
Which of the following is the SSH configuration file for the OpenSSH server>?
/etc/ssh/sshd_config
You want to enable IPv4 forwarding on your system. Which of the following file should you edit?
/etc/sysctl.conf
Which of the following is the first directory in which systemd looks for the unit files?
/etc/systemd/system
Which of the files should you use to view the hard drive details?
/proc/partitions
If you need to find out the kernel versions installed on your Linux system, which directory should you visit?
/usr/lib
If you execute the lastb command, which of the following file does it refer for bad login attempts?
/var/log/btmp
You need to view the failed login attempts. Which file you you open with the cat command?
/var/log/btmp
Which of the following directory contains the authentication and authorization information in Linux?
/var/log/secure
You are currently in run level 3. From which file does the telinit command read the current run level of the system?
/var/run/utmp
You need to configure link bonding to support fault tolerance. Which of the following will meet your requirement? [Choose all that apply]
0 (balance-rr) Round-robin policy D. 3 (broadcast) Broadcast policy 1 (active-backup) Active-backup policy
Refer to the exhibit. Which of the following is the current job(s) in the given exhibit?
1
To how many Volume Group (VG) can a logical volume (LV) belong?
1
You need to create Ethernet bonding in which you have only one Active slave at a time. Which of the following type should you configure?
1 (active-backup) Active-backup policy
You use symmetric encryption on a disk to secure the data. You now need to protect the symmetric key. Identify the methods that can be used to protect the symmetric key. PIN Password Certificate Hashing
1, 2, 3
You are configuring 100 servers in a public cloud. You need to achieve the following goals: Define a unique host name for each server Define a different root password for each server Configure IP addresses on these servers Install and configure agents for server management To do this, you decide to use the cloud-init utility. If you use this utility, which of the following goals are met?
1, 2, 3, 4
You have a software RAID 1 array configured with two disks. While working on the RAID1, you notice that the status is marked as:ARRAY is DEGRADED. You have a spare disk of the same capacity. Identify the correct order of steps that you must perform to fix this issue. Replace the old disk Partition the new disk Reattach the partitions to the RAID array Make GRUB aware of the new disk
1, 2, 3, 4
Identify steps that can help you resolve a kernel panic. Identify the boot process stage during which the kernel panic occurred. Verify if you can boot from an old kernel. Try creating the initramfs file manually Locate if there are missing initramfs file Try to free inodes in the /tmp directory
1, 2, 3, 4, 5
You need to create a Logical Volume on a new hard drive. Identify the correct order of steps that must be performed: Create a new partition on the drive Create an LVM physical volume on the partition Create a Volume Group Create a logical volume Format and mount the logical volume
1, 2, 3, 4, 5
You have created a directory on a Linux system. You want all the files that are created within this directory should inherit the parent directory's permissions only. What should you do? [Choose all that apply.] Use the chmod command to set the setgid Assign the group ownership to the parent directory You need to get the following information: 1. The number of users logged in 2. Last logged in users 3. The current system time 4. The time since the system has been running 5. The system load averaging for 5 minutes You decide to use the uptime command. Which of the following requirements will be met?
1, 3, 4, 5
Which of the following range are the privileged ports?
1-1023
What is the default number of GPT partitions you can create on a disk?
128
How many keys are used in the digital signature?
2
What is the descriptor value assigned to stderr?
2
You need to configure link bonding on a system with a switch that supports it. What minimum number of Ethernet cables would you require?
2
You are working on your Linux system's home directory that contains the following files: plabdocumentpractice-labspilincorporated You want to open the pilincorporated files. What is the minimum number of keystrokes that you would use to open this file?
6
You have a file named plab. You need to append some data to this file. Which of the following operator will you need to use?
>>
If you need to comment a command or line in a shell script, which of the following should be used?
#
You need to create a shell script. Which of the following is the directive that must be added in the first line of the shell script?
#!
Which of the following is a positional parameter?
$1
Which bash parameter returns the exit status of the last executed process?
$?
You have a user named Josh on your Linux system. You need to allow this user to edit a file that requires administrative privileges. You do not want the user to get extra privileges other than just editing the file. To meet this goal, which of the following statement should you add in the /etc/sudoers file?
%newsudo ALL = sudoedit /path/to/file
Which of the following operator should you use to run a command in the background?
&
Which of the following should be used to suppress all expansions?
' '
Which of the following is likely to be used in arithmetic expressions where you are adding two numbers?
()
Which of the following statements are true for local variables? [Choose all that apply]
A local variable cannot be used even by the sub-shell Any process that is not a part of the shell cannot use the local variable
Which of the following statement is true for a path? [Choose all that apply]
A path can be vulnerable to faulty cables It is a connection between the server and storage
Which of the following statement(s) is correct about the self-signed certificate? [Choose all that apply]
A self-signed certificate is signed by its own private key. A self-signed certificate requires two parties to interact for trading public keys. A self-signed certificate can be generated by anyone.
Which of the following files are used for configuring TCP WRAPPERS? [Choose all that apply]
A. /etc/hosts.deny B. /etc/hosts.allow
Which of the following RAID levels can be managed by the mdadm tool? [Choose all that apply]
A. 0 B. 1 C. 5 D. 6 E. 10
Which of the following configuration is possible with MATE? [Choose all that apply]
A. Configuration notifications B. Configuring Networking settings C. Configuring Accessibility settings D. Hiding all desktop icons
You run the following command on a CentOS system: grep swap /etc/fstab However, there is no output. You need to enable swap on boot permanently. Which following steps you must perform to achieve this? [Choose all that apply]
Add a swap partition in the /etc/fstab file B. Run the mkswap /swap.dat command
Your CentOS system has Apache Web server running. The process for Apache Web server is being stopped abruptly. When you check the /var/log file, there are entries that confirm that Out-of-memory (OOM) has killed the Apache process. Which of the following options can help you resolve this issue? [Choose all that apply]
Add more physical memory in the system Disallow the process to overcommit memory Reduce memory for the process
You add a repository name in your CentOS 5 system. After adding the repository, you attempt to upgrade a package and are prompted with the missing dependency errors. You want to avoid the missing dependency errors and upgrade a few packages. What should you do?
Add the yum-skip-brokenm plugin on your system
When you connect to your network, either through a physical wire or remotely, the network access control application validates the state of your system. Your system has a small application installed that communicates with the network access control application. Which of the following solution has the security administrator implemented?
Agent-based, out-of-band
Using the crontab command, which of the following tasks can be performed with the crontab files?[Choose all that apply]
All of the mentioned choices
You have a datastore that has a total of 50 GB. There are four virtual machines that are running, and all of them have thin-provisioned disks. You notice that together they have consumed 49 GB space and there are only 1 GB left. What will be the output if you add 1 GB data on one of the virtual machines?
All virtual machines will fail
If you encrypt a message using a public key, who can decrypt the message? [Choose all that apply]
Anyone who has a private key D. Anyone who has both public and private keys
You need to host an application with a database in the multi-tenancy environment. The environment is on a cloud from a cloud service provider. You will require this application only for three months. However, after that, you want to ensure that if there are any data remnant of the application, it should not be accessible to anyone. What should you do? [Choose all that apply]
Ask the cloud service provider to sign an SLA to destroy the data remnants Encrypt the disk where application and database will reside
Which of the following are user-specific startup files? [Choose all that apply]
B. .profiles C. .bashrc D. .bash_login E. .bash_profile
Which of the following methods are valid for running a shell script named plab.sh? [Choose all that apply]
Bash plab.sh ./plab.sh
You want to sort the running service with the time they took to initialize. You want the highest time taken first. Which of the subcommand of systemctl-analyze should be used for this purpose?
Blame
You want to use a blob on Microsoft Azure to store text files. You will be using the blob for thousands of text files. Which of the following blob will meet your requirement in this situation?
Block
You have an Ubuntu Linux system that has a single hard drive. After continuous read and write errors on the disk, you suspect that the disk has bad sectors. You decide to repair the hard disk using the e2fsck command. How should you repair the disk? [Choose all that apply]
Boot the system with a bootable DVD in a single user mode and run the e2fsck command Connect the hard drive to another system and then repair it using the e2fsck command
In the copy-in mode, which of the following tasks can cpio command perform? [Choose all that apply]
C. List the archive content D. Copy files out of the archive
Where is the user-level global configuration stored on a Windows system?
C:\Users\<username>\.gitconfig
You have several processes that are marked, marked with S, denoting that these are sleeping processes. How should you bring them out of the sleeping state?
Cannot manually wake up the process in sleep mode
You need to deploy a series of Linux virtual machines (VMs) in Microsoft Azure. You need to use an application lifecycle automation tool. With the given choices, which of the following would be most appropriate?
Chef
You need to check the services that are set to automatic start on a CentOS system. Which command should you use for this purpose?
Chkconfig
Identify the output of the following command: git commit -m "[message]"
Commits the staged changes in a new snapshot
Which of the following can be considered as an overlay network? [Choose all that apply]
Content Delivery Network (CDN) Peer-to-peer (P2P) Voice Over IP (VoIP) Virtual Private Network (VPN)
You have a Linux system in the organization that is used by multiple users. You want to configure certain settings in the nanorc file and want these settings to be applied to all users. What should you do?
Copy the file to the /etc directory
Identify the output of the following command: lvcreate -L 100M -m1 -n mirrorlv plabvg
Creates 1 LV that will maintain one copy of data
You want to terminate a running process in the foreground. Which key combination should you use?
Ctrl + C
Which of the following compression algorithm is used by gzip to compress or decompress a file?
DEFLATE
Which of the following type of rules are supported by iptables? [Choose all that apply]
DNAT(Destination Network Address Translation) B. SNAT(Source Network Address Translation)
Support for which of the following was removed in TLS version 1.3? [Choose all that apply]
DSA MD5
Which of the following statement is true for persistent volumes?
Data on the persistent volume can still exist if a Pod is deleted
On a Linux system, you have the following rule: sudo iptables -I INPUT 7 -p tcp --dport 81 -m state --state NEW -j ACCEPT You run the following command: sudo iptables -D INPUT 7 What do you intend to do?
Delete rule number 7
Which of the following is likely to have the most restrictive access control lists?
Demilitarized Zone (DMZ) router
You manage multiple Ubuntu systems that use Personal Package Archives (PPAs) for package installation. You do not want these packages to receive updates. You have been advised to use the sudo apt-get install command with the appropriate option. Which of the following option should help you meet the required goal?
Disable
Refer to the exhibit. You have generated the output using the following command: iotop -oPa Which of the following can be interpreted as an issue?
Disk Write
You want to make changes to the boot order on your Ubuntu system. For this, you want to update the /etc/grub2/grub.cfg file. What should you do? [Choose all that apply]
Edit the /etc/default/grub file C. Run the update-grub command
You are attempting to boot a Linux system that is using GRUB. The operating system (OS) fails to boot. You want to make changes to the kernel parameter to blacklist a module. You must do this with minimum administrative effort. What should you do?
Edit the kernel parameters by selecting the OS on the GRUB menu
After reviewing the recent logs on a server, the security administrator notices that the server recently transferred a large amount of data to an unknown public IP address. What should the administrator do to detect such events? [Choose all that apply]
Enable Heuristic analysis Enable Flow logs
You are using CentOS 7. You execute the following command: SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Max kernel policy version: 28 What is the status of the policy?
Enforcing
You have been handed over a Linux system. You want to find the partition information, which must include the device numbers, both major and minor, and the number of blocks. What should you do to retrieve this information?
Execute the cat /proc/partitions command
You want to view the currently active kernel being used by CentOS. You, however, do not want to make any changes to the currently active kernel. What should you do?
Execute the grub2-editenv list command
You have edited the /etc/default/grub file and updated the GRUB_TIMEOUT variable. You want to apply these changes. What should you do?
Execute the grub2-mkconfig -o /boot/grub2/grub.cfg command
You have a file named plab.txt. You want to read its contents and redirect the output of this file to another file named final.txt in a sorted manner. How should you achieve this goal with a single command?
Execute the sort < plab.txt > final.txt
You want to view the system resource utilization by running the top command. You, however, want to save five iterations of this command in the file. You must achieve this goal with minimum administrative effort. What should you do?
Execute the top -bn 5 > plab.log command
You had captured the top command output in the plab.txt file. You want to run the top command again and capture the output in the same file but without overwriting the previously captured output. What should you do?
Execute the top >> plab.txt command
Before making a differential backup, which of the following backup must be done?
Full
You need to enable an on-screen keyboard for accessibility. You want to ensure that you install the correct package. Which of the following package should you install?
GOK
You have added the following users to the /etc/cron.allow file: BobChrisJason After you save the file, a user named Jenny is still able to run the jobs. What could the reason?
Her name is not added to the cron.deny file
If you are using remote direct memory access (RDMA) technology in your Linux system, which of the following are the direct benefits? [Choose all that apply]
High throughput E. Low CPU utilization Low latency
If you need to back up everything on your system, including operating system, data, and applications, which of the following backup should help you perform?
Image
You are running X Windows on a Red Hat Enterprise Server system. You want to view the SELinux messages in the graphical pop-ups that get displayed whenever there is an Access Vector Cache (AVC) denial. What should you do? [Choose all that apply]
Install the setroubleshoot and setroubleshoot-server packages D. Ensure the setroubleshootd, and auditd daemons are running
Which of the following task can you achieve with the build tool?
It is used for compiling, linking, and packaging code into an executable file
Which of the following is true for multipathing? [Choose all that apply]
It is used to avoid a single point of failure B. It provides redundancy to access a storage device
Which of the following statement is true for the nohup command?
It prevents the command from being aborted when a user logs out
You have created a rule using the following command: auditctl -w /etc/shadow -p wa -k shadow After a while, you had to restart the system. When you execute the command: auditctl -l You notice that the rule is no longer there. What could be the possible cause?
It was a temporary rule that was deleted with the system reboot
You execute the following command: mkdir -p PLAB/PracticeIT/London You need to create the subdirectory with the name London. However, the PLAB/PracticeIT directories do not exist. What will be the outcome of this command?
It will create the PLAB/PracticeIT/London directories
You have a file named plab.txt that contains the following text: apples bananas kiwis oranges pears You execute the following command: cut -b 1- plab.txt What would be the output?
It will display the first byte to the last byte of a line
While performing an NFS-based installation, you do specify only the device but not the path for the installation files. What will be the outcome?
Kickstart file will be used on the specified device
You are working on your Linux system and the shell freezes. You are not able to do anything. You have a lot of unsaved work in a document that you do not want to lose. What are the possible steps that you should perform to resolve this problem? [Choose all that apply]
Kill the Gnome shell Switch to another TTY
Which of the following compression algorithm is used by xz?
LZMA2
You are having a problem in getting the USB drive being detected to your system. You run the following command to verify if the ports are enabled: lspci | grep USB With the output of this command, you verify that the ports are enabled and detected. You, then, run another command: lsmod | grep USB However, you do not get to see any output. What should you do?
Load the USB modules using modprobe
You have a Linux server with critical data. The server is hosted in a data center and can only be remotely connected. You are performing administrative tasks on this server in a secure manner. You do not want a user to have more than the required privileges. What should you do?
Login as a regular user and use the sudo command
You have a directory that contains several important files. You need to protect these files from deletion and ensure that even the root user cannot delete, modify, or write to them. What should you do?
Make the files immutable
Which of the following tasks can be accomplished with systemctl? [Choose all that apply]
Manage services B. Change system states C. Work with the configuration files Check service status
You have disabled the memory overcommitting on your CentOS system by setting the following value: overcommit_memory=2 When you run the swapoff command, you are prompted with the following error: swapoff: /dev/sda2: swapoff failed: Cannot allocate memory What could be the possible cause?
More memory is allocated to the applications than physical memory
Which of the following is responsible for updating the /etc/mtab file?
Mount command
Which of the following device-mapper provides multiple paths with failover to a single device?
Multipath
You have an NFS server, and multiple clients configured. You want to configure Kerberos authentication for NFS shares. Before you proceed with the authentication, which of the following must be configured on the network for Kerberos to work successfully? [Choose all that apply]
Name resolution Network Translation Protocol (NTP)
Which of the following does PKI offer through digital signature?
Non-repudiation
You have a Linux system with two network adapters on which you want to configure multi-homing that is persistent. You assign the IP address on both the network adapters and connect them to two different networks. What else should you do?
Nothing else needs to be configured
Which value should you provide with the following command to disable a service at the system startup?: chkconfig httpd _______
Off
You execute the following egrep command: egrep -C 0 '(P|I)Labs' PLAB.txt You want to search for the specified pattern in the command. In this scenario, what would be the output of this command?
PLabs will be the output
Which of the following are character devices found in the /dev/ directory? [Choose all that apply]
Parallel printer ports D. Serial port
You had updated the kernel on a Linux system that has Nvidia display adapter. When you restart the system. Cinnamon continues to crash. Which should you perform to resolve this issue? [Choose all that apply]
Purge the Nvidia drivers Install the Nvidia drivers
You have a file with the following permissions: -rwSrwxr-x 1 plab plab 0 Mar 27 12:12 plab What type of permissions does the owner have?
Read and write
You are unable to create files on a Linux system. When you execute the df -I command, you notice that the inodes usage is 100%. You also notice that the disk is only 50% full. What should you do to free up the inodes? [Choose all that apply]
Reboot the server Find and delete files that are not required
You have several udev rules in the /etc/udev/rules.d/ directory. You have made significant changes to one rule from this directory. What should you do next without much administrative effort?
Reload the rules
You have recently installed Ubuntu on a desktop. When you boot the system, you notice that except for the wallpaper, it does not display the side launcher, the unity, or the dash. How should you resolve this problem with minimum administrative effort?
Remove Compiz from the system
What should be done before removing a primary group for a user?
Remove the user
You issue an lpr command to print a file. However, you notice that the request is hanging locally and is not being transmitted to the printer. How should you resolve this issue?
Review the lpsched log
You need to troubleshoot system performance issues on a Linux system. You want to get the system-level information as well as single process level. The system performance must be logged so that you can perform performance analysis later. What should you do?
Run the atop command
You want to view the total used and the free inodes on your disk. You want to also view the report for the percentage of inodes used. What should you do?
Run the df -I command
You want to ensure console security for an Ubuntu server in your organization. You do not want any user to press Ctrl+Alt+Del to reboot the server intentionally or accidentally. To achieve this goal, how will you disable Ctrl+Alt+Del?
Run the sudo systemctl mask ctrl-alt-del.target command
You have several udev rules in the /etc/udev/rules.d/ directory. You want to govern the udev daemon. What should you do?
Run the udevadm control command
You have made changes to the environment variables int the /etc/default/grub file. You need to ensure that you also update the grub.cfg file in the /boot/grub2/ directory. What should you do?
Run the update-grub command
Which of the following can be used to log events generated by ACLs?
SELinux
If you configure DenyHosts on your Linux server, which of the following are you trying to secure?
SSH
Identify the output of the following command: usermod --home /tmp plab
Set the /tmp as the home directory for the plab user
You want to assign the ownership to the users and groups of a directory named plab. The owner of the files within the directory should not have the ownership. What should you do? [Choose all that apply.]
Set the setguid on the directory Set the setuid on the directory
You have a Linux system on which you want to sync time with one of the internal NTP servers. You need to ensure that the time of the Linux system is properly synced with the NTP server. What should you do? [Choose all that apply]
Stop the ntpd daemon B. Run the ntpdate command C. Install the ntpdate command
You have just installed DHCP package on your Linux system. You want to configure the system as the DHCP server. You attempt to start the DHCP server with the default dhcpd.conf file. You are prompted with the following error: Starting ISC DHCP server: dhcpdcheck syslog for diagnostics. ... failed! What could be the possible cause?
Subnet is not defined
If you are allowing port 23 using access control lists, which protocol are you allowing?
Telnet
You want to block traffic from the specific IP address using ipset. To do this, you perform the following steps: Install ipset on the CentOS system Create a blacklist with hash:ip Add rules in the blacklist After doing these tasks, what else should you do as the next step to ensure the blocking works in the desired manner?
Test the ipset rules
You execute the following command: ls -l /proc/self You get the following output: lrwxrwxrwx 1 root root 64 Mar 26 13:22 /proc/self -> 12345 What will be the outcome after the output is displayed?
The /proc/12345 directory will be deleted.
You have a dual-core system that runs Linux. You run the uptime command and get the following output: 12:10:12 up 10:49, 3 user, load average: 1.00, 0.50, 3.50 How should you interpret this output?
The CPUs are idle by 150% over the last 5 minutes
You have a Windows 10 system on which you want to install Ubuntu and make it dual boot. The system uses UEFI firmware. You want to check the EFI partition on the Windows 10 installation before installing Ubuntu. You, however, do not see the EFI partition. What could be the probable cause?
The EFI partition is hidden, and there is no drive letter assigned
You create a link between two files using the following command: ln PLAB1.txt PLAB2.txt The PLAB1.txt contains the following text: This is a virtualization scenario. After creating the link, you add the following text in the PLAB1.txt file: Welcome to PLAB! What would be the outcome in this scenario?
The PLAB2.txt file will be updated with the text
You execute the following command: cat plab.txt What will be the output of this command? [Choose all that apply]
The cat command will ignore the stdin C. The cat command will read the plab.txt file
Identify the correct statement(s) for a repository. [Choose all that apply]
The configuration file for a repository has the extension .repo The repository configuration files are stored in the /etc/yum.repos.d/ directory
If the firewalld.conf file is missing, how does firewalld function?
The internal defaults of firewalld are used
You have a Linux system that has 2 GB RAM. You run the following command: cat /proc/meminfo You notice that the only ~900 MB of memory is being displayed. To verify this, you run the free command and get the same result. What could be the possible cause?
The kernel is configured with 1 GB RAM only
You configure NAT on a Linux system with two Ethernet adapters. You want to verify the connection tracking table. To do this, you run the following command: cat /proc/net/ip_conntrack However, you are prompted with the following error: cat: /proc/net/ip_conntrack: No such file or directory What could be the possible cause of this error?
The kernel module responsible for connection tracking is not loaded
Identify the output of the following command: git pull --no-commit <REMOTE>
The local repository pulls the changes but does not merge a new commit
After configuring a Kerberos server, you receive the following error:kinit: krb5_get_init_creds: unable to reach any KDC in realm PLAB.COM Which of the following could be the possible cause of this error? [Choose all that apply]
The name resolution is not working properly The Kerberos server is not available or shut down
You have executed the following command: cat * >/tmp/out 2>/dev/null However, when you want to view the contents of the /dev/null file, you execute the following command: wc /dev/null However, you get the following output: 0 0 0 /dev/null What could be the possible issue?
The output is never stored in the /dev/null file, so it is always empty
On a CentOS system, you run the following command to find the child processes of a process: pgrep -P httpd You get the list of the child process. Then, you run the following command: pgrep -P " " The response is returned as 1, 2. What is the probable reason?
The quotes are considered as 0
You run a server that is configured with RAID5 using five SATA hard drives. These are labeled as sda1, sdb1, sdc1, sdd1, and sde1. The sdc1 disk has failed and is not recognized by the RAID5 array. You run the following command to remove it: mdadm --manage /dev/md0 --remove /dev/sdc1 However, you are prompted with the following error: mdadm: hot remove failed for /dev/sdc1: No such device or address What could be the possible cause?
The sdc1 disk was not detected in the RAID array during boot
Which of the following happens to a service when it is masked?
The service cannot be started
A printer has been configured on a new Linux system. When you print a document, the printer prints the document, but the printed document only contains garbled text. What could be the possible issue?
The system has wrong print drivers configured
You run the fsck command and get an exit code, which is 2. What does this indicate?
The system should be rebooted
On a Red Hat Enterprise Server (RHEL) 7 system, you run the following command: sysctl net.ipv4.conf.all.forwarding=0 After that, you verify and the net.ipv4.conf.all.forwarding has a value of 0. When you reboot the server and then run the following command: cat /proc/sys/net/ipv4/conf/all/forwarding You notice that value of /proc/sys/net/ipv4/conf/all/forwarding is again changed to 1. What could be the possible issue?
The tuned service is overriding the sysctl values
The security administrator of PLAB Inc. performs a NULL scan on a Web server that is protected by a firewall. After executing the NULL scan using NMAP, the security administrator does not receive any response on port 21 and 80. What could be the probable cause?
These are open ports
Your / partition has 1.5 GB of total disk space and the /usr/lib/modules takes up 1.2 GB. It has various versions of kernels installed. How should you reclaim the space on the / partition?
Uninstall the older version of kernels
You need to communicate with the processes on the same system. Which of them will provide optimal performance and would be fast?
Unix Socket
Which of the following counter types are used for /sys/block/$DEVICE/stat?
Unsigned long integer
The network administrator has implemented a virtual machine in an MPLS cloud that is owned by the organization. A domain user attempts to connect to the virtual machine but is not able to connect. The user is not able to access the application hosted on the virtual machine. The network administrator uses a laptop, which is not part of the domain, connects to the network, and is able to connect to the virtual machine. The network administrator checks the user's system, which is part of the domain, and finds that the user's system is configured with the proxy configuration and uses a PAC file. What should the network administrator do next to determine the cause of this issue?
Use Wireshark to capture packet
You have a Website that runs MySQL in the backend. You start to experience problems when Out of Memory (OOM) starts to kill MySQL process as soon as it starts. You want to resolve this issue. Which of the following methods can possibly help troubleshoot this issue? [Choose all that apply]
Use a swap file or swap partition B. Check the memory usage C. Check the MySQL and system log files D. Kill the stopped jobs
You are the network administrator for an organization. In this organization, employees are using many Internet-based services. You want to implement an egress traffic enforcement policy to protect the internal network. You want to define this policy as per the organization's security policy. To do this, which of the following tasks must you perform? [Choose all that apply]
Use exceptions in the firewall policy if they do not match the security policy Create and allow the list of Internet-accessible services Implement content-exit control for specific content types
You execute the ls command to list the files in the current directory. However, you notice that you are not able to view the hidden files. You want to list the hidden files using the ls command. What should you do?
Use the -a parameter with the ls command
You have a file named plab.txt that is empty. You want to use the xargs command to read the plab.txt file. You want to ensure that if the file is empty, the command should not run and should not generate any output. Which of the following parameter should you use in this scenario? [Choose all that apply]
Use the -r parameter
You have a disabled profile in the /etc/apparmor.d/disable/ directory. You need to enable this profile. What should you do? [Choose all that apply]
Use the apparmor_parser -a command Use the rm command to remove the symbolic link to the profile
You have created a directory on a Linux system. You want all the files that are created within this directory should inherit the parent directory's permissions only. What should you do? [Choose all that apply.]
Use the chmod command to set the setgid Assign the group ownership to the parent directory
You have a Red Hat Enterprise Linux (RHEL) 7 system on which the I/O scheduler is set to CFQ. You want to change the I/O scheduler to Deadline only for the current session until the system restarts. What should you do?
Use the echo 'deadline' > /sys/block/sda/queue/scheduler command on the system
You have created a new partition on a hard drive in CentOS Linux system. You used fdisk to create this partition. You create a filesystem on the new partition. When you save the partition information, you are prompted with the following error: Re-reading the partition table failed.: Device or resource busy How should you resolve this error? [Choose all that apply]
Use the hdparm -z command C. Reboot the system D. Run the partprobe command after exiting fdisk
You have a CentOS system in which multiple hard drives are installed. You want to check the storage speed and the storage I/O latency. You want to track if there are storage performance issues. What should you do?
Use the ioping command
On a Linux system, you have third-party applications running. You want to view the library dependencies of an application binary that you had downloaded from untrusted sources for testing. What should you do?
Use the objdump command
You have a file of 10 GB size. You want to copy this file to a remote server but compress it before it is transferred. What should you do?
Use the rsync command with the -z parameter
You attempt to log on to a newly installed Ubuntu system using the root user. You have been told that the root user does not have any password. However, when you attempt to log in, you are prompted with an authentication failure message. You need to install a package but want to use the restrictive administrative privileges. What should you do?
Use the sudo command
You have several udev rules in the /etc/udev/rules.d/ directory. You want to process the rule file immediately. What should you do?
Use the udevadm trigger command
You have a CentOS system. You want to display the system's virtual memory statistics. You also want to display memory, paging, and disk activities. Which of the following command should help you achieve this?
Use the vmstat command
Which of the following information is maintained in the /etc/passwd file? [Choose all that apply]
Username B. The user ID number (UID) Login shell E. Encrypted password F. User's group ID number (GID)
Which of the following separates the real file system from the operating system and system services?
VFS
Identify the reason when you should run the following command: sudo systemctl daemon-reload
When a file or directory is deleted
Which of the following statements are true for the firewalld runtime configuration? [Choose all that apply]
When the firewalld service starts, the permanent configuration becomes the runtime configuration The runtime configuration is the effective configuration applied to the firewall
Which of the following operating system initially introduced the Common Internet File System (CIFS)?
Windows
You need to configure a printer on an Ubuntu system. You want to make changes to the /etc/cups/cupsd.conf file. Before making changes to this file, which of the following task must you perform? [Choose all that apply]
Write protect the original configuration file C. Make a copy of the original configuration file
On a newly installed Fedora system, you want to determine if you are running a Wayland session or Xorg. To do this, you need to click on the gear icon on the login screen. However, you notice that the gear icon is missing on this screen. What could be the possible reason?
You are using a passwordless account.
You have a CentOS system from where you have configured XRDP. You need to connect to a Windows 8 system, which is located on a different network. You have opened the 3389 port on Windows firewall and network router. You have also configured 3389 in the xrdp.in file. You test the connection using SSH, and it works fine. However, you are not able to establish a connection using XRDP. What could be the possible cause?
You did not open port 3389 on the CentOS firewall.
You have set the SELinux status to Disabled from Enforcing. You attempt to confirm this by running the getenforce command, which still shows the status as Enforcing. The Disabled status is not applied. What could be the possible cause?
You did not restart the system before the getenforce command
You are trying to list all lines that contain the text find_config in the /etc directory. You execute the following command: grep "^etc" /home/find_config With the execution of this command, you get only two lines mentioning find_config. When you manually check, you get 15 lines with the same text. What could the probable cause of this issue?
You need to put a / before etc
You need to re-partition a disk that is part of a RAID, which is currently running on a Linux system. You want to ensure that the RAID stays intact and is not broken. What should you do?
You need to stop the RAID array first
Which of the following metacharacter defines the whole numbers 0-9?
\d
Which file(s), if exist on a user's system, do not require the user to authenticate, and authentication takes place between the user's system and remote system? [Choose all that apply]
authorized_keys D. authorized_keys2
Which of the following looping construct should you use if you have to choose from multiple conditions?
case
You have a plab.txt file that contains the following content: HelloPLABUsers You want to generate another file plab1.txt and add the same content using a single command. Which of the following command will help you achieve this?
cat > plab1.txt << EOF Hello PLAB Users EOF
You have a file named plab.txt that contains a few paragraphs of text, which comprises of upper- and lower-case letters. You want to convert all text to upper case. For this you want to use the tr command. Which of the following would provide the desired output? [Choose all that apply]
cat plab.txt | tr "[a-z]" "[A-Z]" cat plab.txt | tr "[:lower:]" "[:upper:]"
Which of the following is an example of an absolute path?
cd /foo/bar
You want to display a string of text without spaces. For example, you want to display Practice IT Labs as PracticeITLabs - as one word. To achieve this goal, you want to use the echo command. Which of the following command would generate the desired output?
echo -e "Practice \bIT \bLabs"
If you need to enable IP forwarding, which of the following command will enable it immediately?
echo 1 > /proc/sys/net/ipv4/ip_forward
Which of the following command displays a list of environment variables that have been exported?
env
With which of the filesystems can you use the resize2fs command? [Choose all that apply]
ext3 C. ext2 D. ext4
You have thousands of files in your home directory. You want to list out all the files that are with the extension .txt. To do this, which of the following method will meet your requirements?
find . -type f -name "*.txt"
Which of the following commands list the branches of the repository and indicate the current branch with a*?
git branch
Which command should you execute to initialize a directory as the Git repository?
git init
Which command will combine the specified branch's history into the current branch?
git merge [branch]
You need to save the GRUB2 configuration. You want the configuration file to be saved in your home directory. To do this, which of the following command should be used?
grub2-mkconfig -o ~/grub.cfg
Identify the command that you will use to print the effective user ID for a user named john.
id -u john
Which of the following looping construct is mainly used for making a single decision?
if
You need to install a module into a running kernel. Which of the following command should you use?
insmod
Which of the following package should you use to perform automatic loading of the saved iptables rules?
iptables-persistent
On a Linux system, aux | grep firefox, you notice that firefox is running multiple instances that have different process IDs. You want to kill all the instances of firefox. Which of the following methods should you use? [Choose all that apply]
kill -9 $(pgrep firefox) B. killall firefox C. ps aux | grep -ie firefox | awk '{print $2}' | xargs kill -9 D. pkill -f firefox
Where does the ssh program record the host keys for individual users?
known_hosts
You want to view the recent logins done by all users. Which of the following command should you use?
last
You want to execute the ls command but want to ensure that the stdout is redirected to a file, but stderr is listed on the screen. Which of the following command can help you meet this requirement?
ls /etc/passwd plab > stdout
You want to list all the block devices attached to your CentOS system. Moreover, you need to get the details of the devices, such as name, type, size, mountpoint, fstype, and model. Which of the following command should you use?
lsblk
You manage a Linux system. You have been asked to generate the device tree in the system. You also want to list the hardware path for each device. You decide to use the lshw command. Which of the following command will generate the desired output?
lshw -short
Which command will display the information about a specific logical volume?
lvscan
Which of the following command should you use to find information about a module that does not have a file name?
modinfo
Which of the following can be defined as the orchestration attributes? [Choose all that apply]
name B. description C. desired_state D. objects E. tags
In the /etc/sysctl.conf file, which of the following statement should you add to enable IPv6 forwarding?
net.ipv6.conf.all.forwarding=1
Refer to the exhibit. Which of the following tool should you use to get the output as shown in the exhibit?
netcat
Refer to the exhibit. Which of the following command will provide the output similar to this?
nmcli
You want to display the value of a single variable. Which command should you use?
printenv
Which of the following directions are true for chains? [Choose all that apply]
remote-to-local local-to-remote remote-to-remote
You need to view the log messages maintained by rsyslogd. Which of the following files should you review ?
rsyslog.conf
You need to check the state of a service and find out whether the service is in running state. Which of the following command should you use?
service <service> status
You need to print the name and value of each shell variable available. Which of the following command will help you achieve this?
set
You want to use the su command in the same manner as the sudo command. The root account is configured with a password. Which of the following command will help you achieve this?
su -c <command>
To prevent file globbing, which of the following special characters can be used? [Choose all that apply]
the single quote (') backward slash (\) double quote (")
You want to create a file named plab. However, you want that this file should not be created if another file with the same name already exists. Which of the following command should help you achieve this goal?
touch -c plab
In the /dev/disk/by-* directory, which of the following is responsible for creating the symlinks?
udev
Which of the following loop works in the same manner as while loop?
until
To create a user quota, which command should you execute?
userquota
Which of the following command will rebuild the LVM cache file by scanning the disks for volume groups?
vgscan
You need to find out the currently logged in users and their processes. Which command should you use?
w
Which of the following loop runs until a statement becomes true?
while
If you need to defragment an XFS filesystem, which of the following command should you use?
xfs_fsr
You need to create a non-editable clone of a Git repository. Which parameter should you use with the git clone command? [Choose all that apply]
--bare --mirror
Which file is read in the absence of .bash_profile and ~/.bash_login profiles?
.profile
When you create a group with the groupadd command, what is the default value of MAX_MEMBERS_PER_GROUP?
0
If you are running a system in the multi-user environment with the network environment, which sysvinit run level are you in?
3
You need to switch to a multi user environment with network support in text mode. Which run level should you use for this purpose?
3
You need to allow a user to remotely log in using SSH but want to restrict the user's access only to the home directory. Other users should be allowed to access and write to their home directories as well as the other directories on the server. What should you do?
Configure chroot jail for the user to write to the home directory only
You want to configure the sendmail service to accept messages from the cron. Sendmail should be configured to accept cron job reports. However, it should also be configured not to accept any messages from the network. What should you do?
Configure it to listen to the local loopback address
You have a legacy vendor application that does not accept passwords longer than six characters. You, after a recent audit, have been advised to use complex passwords that are at least eight characters long. However, you need to mitigate this issue and ensure that you can work around. What should you do?
Configure multifactor authentication with the existing passwords
Your organization uses distributed authentication using the Network Information Service (NIS). You need to disable a user account immediately. To do this, you modify the /var/yp/ypetc/passwd file and make appropriate changes to disable the user account. What else should you do?
Push the passwd file to all NIS clients
You configure AppArmor on SUSE Linux. You also configure a policy that prevents specific programs from running when a user is logged in. If a policy violation occurs, you want to permit it but log the violation. What should you do?
Put the profile in the complain mode
You create a profile that you want to test out for violations. You want the access violations to be logged in the system log, but the actions should be permitted. What should you do?
Put the profile in the complain mode
You are using Ubuntu on your system. You run the aa-status command and find out that processes are running in the unconfined state. You verify and conclude that these processes have a profile defined. What should you do to resolve this issue? [Choose all that apply]
Restart the system Restart the processes
You are running a Linux system. You use the top command to view the currently running processes. Based on the output, you want to kill a process with process ID 2500. However, you want the process to release its resources gracefully and save its progress. What should you do?
Run the following command: kill -SIGTERM 2500
You boot your system after making a change, and the system does not boot. You are stuck at the initramfs console. You type exit and you receive a message that the filesystem is corrupt. How should you repair this?
Run the fsck command
You are viewing the /var/log/cron file using the less command. You want to display the line numbers before the start of each line. What should you do?
Run the less -N /var/log/cron command
You are using a Linux system. You need to display the information for a device that is in the Customized Devices object class. What should you do?
Run the lsdev command with the -C parameter
After installing an Ethernet card, you want to view its IRQ as it is seen by the PCI bus. You do not want to view as it is seen by the kernel. What should you do?
Run the lspci command with the -b parameter
You have connected a brand-new USB drive to your Linux laptop. You are not sure whether the USB drive is detected or not. You want to verify that the USB is successfully connected to the laptop. What should you do? [Choose all that apply]
Run the lsusb command B. Run the dmesg | grep -i USB command C. Run the usb-devices command
You are experiencing slow network connectivity with your Linux server that is located in a data center. You run the mtr command: mtr -rw 192.168.1.10 However, you do not find any packet loss in the generated report. You need to resolve this issue. Which of the following are the possible methods to detect the issue? [Choose all that apply]
Run the mtr command from your system at a faster interval D. Run the mtr command from the Linux server and target your system
The security administrator suspects that there are hosts on the network that should not be there. The administrator wants to perform a network scan, with minimum effort, to find how many live hosts are there on the network. What should the security administrator do in this scenario?
Use the Nmap tool with the -sP parameter on a single host
You configure AppArmor on an Ubuntu system. You want to track all the processes that have no associated profiles with them. This server is Internet-facing and has several applications running. You need to check for the unconfined processes that have an active network connection. You need to protect these processes from being attacked by a hacker. What should you do?
Use the aa-unconfined command with the paranoid option
Your Linux system takes a lot of time to read and write information on the disks. You want to generate the disk usage to be able to troubleshoot this problem. What should you do?
Use the iostat command
The Linux system that you are using is not connecting to the network. The ping command also fails. You want to first check the network adapter, eth0, status on the system. What should you do?
Use the ip addr command
You issue the lpr command to print a file. You know that the command is successful and print request has been sent to the printer. However, the printer does not print the file. You verify that the printer is on and connected to the network. You also verify that the printer has papers. What else should you do to resolve this issue? [Choose all that apply]
Use the lpq command to check your jobID B. Wait for the document to print C. Use the lpstat command to check your jobID D. Restart the printer
You have a file named plab.txt. You want to prevent this file from being overwritten. What should you do?
Use the mv command with the -n parameter
You want to transfer files from your Linux system to another Linux system on the network. You want to ensure that the transfer is fast, and it compresses the file while being transferred. The fils should be copied on the destination system in the decompressed format. What should you do?
Use the scp command with the -C parameter
You have a Linux system with SELinux configured. You want to view the denials that have occurred. Along with this, you want to save the denials. What should you do?
Use the seaudit tool
You have a file named plab.txt. You need to replace the word plab with PracticeIT. You want to do this with one single command. What should you do?
Use the sed command
You need to change the SELinux mode from Enforcing to Permissive only for the current session. When you log off, the mode should reset itself back to Enforcing. What should you do?
Use the setenforce 0 command
You have to execute two commands in a single attempt. You want the output of the first command to be the input of the second command. What should you do?
Use the | operator
You have a dual-boot system with Windows 10 and Ubuntu system. You want to verify if your system is running UEFI. Which of the two methods can help you verify this? [Choose all that apply]
Verify if the /sys/firmware/efi directory exists Install and then run efibootmgr
The security administrator has discovered several vulnerabilities in an off-the-shelf application but is not sure whether these vulnerabilities are known and published. What should the administrator do to find this out?
Verify with the CVE database
You work on a CentOS system as a regular user. You want to assign a nice value of -10 to a new process that needs to be started. You execute the following command: sudo nice -10 ./plab.sh When you run the ps command, you notice that the nice value of 10 is assigned instead of -10. What could be the probable cause?
You did not add another - (hyphen) before -10.
You work on a CentOS system as a regular user. You need to start a new process with the nice value of -10. To do this, you execute the following command: nice - -10 ./plab.sh You are prompted with the following error: nice: cannot set niceness: Permission denied What could be the probable cause?
You did not execute the command with the root privileges
Which of the following is the parameter for systemctl to start a service that is in the stopped state?
Start
On a new Ubuntu installation, you want to change display settings. However, you notice that the /etc/X11/xorg.conf file is missing. What should you do? [Choose all that apply]
Start gdm using the console You can create this file manually.
You need to change the hostname for a remote system. To be able to do this, you execute the following command: hostnamectl set-hostname -H plablinux01 In this case, which protocol will the hostnamectl command use to connect to the remote system?
ssh
Which of the following commands can be used to avoid entering passwords when the SSH key is used? [Choose all that apply]
ssh-add ssh-agent
On a CentOS system, you need to find your username. Which command should you use for this purpose?
whoami
If you want to make changes to any unit file, in which directory should you make the change?
/etc/systemd/system
When you execute the useradd command to add a new user, which of the following files are edited? [Choose all that apply]
/etc/shadow /etc/group /etc/gshadow /etc/passwd
You have been asked to add a Message of the Day (MOTD) on a Linux server. You need to add the following message: This server is the property of Practice Labs. All actions on this server will be logged! To be able to add MOTD, which file should you edit?
/etc/motd
You need to configure the nameservers for a static IP address on your system. Which of the following would be the correct file to edit?
/etc/network/interfaces
You want to prevent the root user from directly logging on to the console. Which of the following file should you edit?
/etc/securetty
When you create a user using the useradd command, from which directory are the files and directories copied to the user's home directory?
/etc/skel/
If you need to configure NAT connections on the external interfaces, which files must you edit for UFW? [Choose all that apply]
/etc/ufw/sysctl.conf /etc/default/ufw
What is the descriptor value assigned to stdout?
1
With the df command, which of the following is the default value used for displaying the disk space?
1 K
You have been asked to change the umask value of a directory to meet the following goals: Owner must have read, write and execute permissions on the directory. Group must have read/execute permissions on the directory . Others should have read permissions You decide to change the umask to 027. Which of the goals have been met?
1 and 2
You need to perform context modification on a Red Hat Enterprise Linux (RHEL) system. You want to achieve the following: Restore the context for the mounted filesystems Restore the context for a package's file Find files with the unexpected context Restore the context of a file To meet these goals, you decide to use the fixfiles command. If you use this command, which of the following goals will be met?
1 and 2
PLAB Inc. has many servers in their datacenter. These include: Three DNS servers Two DHCP servers A domain controller Four file servers Multiple Web servers All servers are located on the same network. All file servers contain sensitive information. Recently, one of the Web servers is breached due to a lateral movement within the network. The security administrator has been asked to do the following: Prevent lateral movement in a breach Avoid inappropriate administrative access to the servers Each action on the server must be tracked To meet the required goals, the security administrator suggests the following actions: Move the public facing servers to a new DMZ Use a jump box that allows access to the servers Use jump box as a single point of entry to the servers in DMZ Restrict Internet access on the jump server Enable strong logging on the jump server Identify the actions that fulfill the requirement stated in the scenario?
1, 2, 3, 4, 5
You want to view the filesystem statistics on a Red Hat Enterprise Linux (RHEL) system. You want to display the following information using the df command: List all filesystems List their total block size List the used space List the free space List the percentage of disk space used Their mount directory information Type of filesystem You decide to use the -a parameter. With the use of this parameter, which of the following goals are met?
1, 2, 3, 4, 5, 6
You need to install the CentOS Linux on multiple systems. You decide to use the PXE method for installation. From the given list, identify the steps that you must perform: Install and configure DNSMASQ Server Install SYSLINUX Bootloaders Setup PXE Server Configuration File Create CentOS 7 Local Mirror Installation Source Start and Enable Daemons System-Wide Open Firewall and Test FTP Installation Source
1, 2, 3, 4, 5, 6,
You have a Linux installation that is dual-booted with the Windows 10 installation. You use the GRUB bootloader on this system. You want to protect this system from any bootloader configuration changes. To do this, you need to: Prevent access to the single user mode Prevent access to the GRUB console Prevent access to the dual-boot operating system You decide to enable the bootloader password. Which of the above would you be able to achieve thus?
1, 2, and 3
You have downloaded the extract-vmlinux script from GitHub. You will need to use this script to decompress and extract the Linux kernel image. You perform the following steps: Create a temporary directory and copy the kernel image in it. Use objdump to disassemble the kernel image Find symbols in /boot/System.map Identify the steps that were necessary the decompress and extract the kernel image.
1, 2, and 3
You start a large download on your Linux system. However, you find the Web browsing is slow. You want to perform traffic shaping to avoid bandwidth saturation. To do this, you decide to use the wondershaper script. You want to meet the following goals: 1. Use low latency for interactive traffic 2. Web browsing takes place at reasonable speed along when the downloads and uploads are in progress 3. Uploading file does not impact the file downloads or vice versa With the use of wondershaper script, which of the following goals will be met?
1, 2, and 3
You start a large download on your Linux system. However, you find the Web browsing is slow. You want to perform traffic shaping to avoid bandwidth saturation. To do this, you decide to use the wondershaper script. You want to meet the following goals: Use low latency for interactive traffic Web browsing takes place at reasonable speed along when the downloads and uploads are in progress Uploading file does not impact the file downloads or vice versa With the use of wondershaper script, which of the following goals will be met?
1, 2, and 3
You are planning to use Infrastructure as a code. You have been asked to use the best practices. Which of the following best practices should you plan to use? Code everything Document as much as possible Implement version control Test, integrate, and deploy changes Use modular infrastructure code
1, 3, 4, 5
You need to get the following information: The number of users logged in Last logged in users The current system time The time since the system has been running The system load averaging for 5 minutes You decide to use the uptime command. Which of the following requirements will be met?
1, 3, 4, 5
You are configuring SNMP v3 on a CentOS 7 system. You have performed the basic configuration and now need to permit the port for SNMPv3 through iptables. Which port should you allow through iptables?
161
Refer to the exhibit. Out of the given list of services and their ports, which of the following port is used by the postfix service?
25
You want to block SMTP traffic using access control lists. Which of the following port should you block?
25
With the 32-bit Windows operating system installed on a disk formatted with MBR, what is the maximum partition size you can create?
2 TB
You want to calculate the throughput of a large file transfer that you have completed. It took you 32 hours to transfer a 3 TB file. What would be the throughput if you use the following formula: (3 * 1024 * 1024 * 8) / (32 * 60 * 60)
218.45 Mb/sec
You are running a MySQL server on a Linux system. You need to optimize the page cache for the MySQL server. You want to make this change as a permanent one, so that page cache remains optimized. Which page cache value would be most optimal for MySQL?
50
In IPSec, which port is used by the Authentication Header (AH)?
51
When you use the dd command with the obs parameter, what is the default number of bytes written at a time?
512
Which of the following port is used by default when the rsync command uses a double colon and a URL?
873
You are developing an application that will use OAuth. You want to ensure that you are able to implement OAuth2.0 in the application securely. Which of the following methods would help you achieve this? [Choose all that apply]
A. Always verify the SSL certificate B. Store the hashed value of client secrets in the database C. Always make use of the SSL D. Use short-lived tokens and always refresh them E. Configure a lifetime for the access tokens
You have an application in GitHub. You get the following E-mail: Subject: Page build failedThe page build failed with the following error:There was a YAML syntax error on line `line_number` column `column_number` in `filename`: `syntax_error`. Which of the following can help identify the possible causes of the errors ? [Choose all that apply]
A. Check for the tab characters in the file B. Check for space between the key value and colon before the value C. Verify multi-line entries' values D. Check for the indentations
Which of the encryption algorithms are supported by the zip format? [Choose all that apply]
A. DES B. RC4 C. Triple DES D. RC2
Which of the programs can be used to open a .tar file? [Choose all that apply]
A. File Viewer Plus B. GNU Tar C. Incredible Bee Archiver D. 7-Zip
Which of the following are necessary directories in a local repository on a CentOS system? [Choose all that apply]
A. updates B. centosplus C. extras D. base
Which compression algorithm is used by the gzip2 tool to compress and decompress a file?
Burrows-Wheeler
You need to assign a static IP address to a newly installed Linux system. You need to ensure that the IP address is permanently assigned and is used across multiple system boots. What should you do?
Add the IP address in the /etc/network/interfaces file
You install a new Linux system. After assigning the IP address, you want to add the name server for name resolution. You have three name server IP addresses and want to add them in a specific order. What should you do?
Add the IP addresses in the /etc/resolv.conf file
You have a Webserver installed. You want to allow the HTTPD scripts to write to the Webserver directories labeled as public_content_rw_t. To do this, you need to enable the allow_httpd_sys_script_anon_write Boolean. What should you do? [Choose all that apply]
B. Run the setsebool allow_httpd_sys_script_anon_write on command C. Run the setsebool allow_httpd_sys_script_anon_write 1 command
You have a network adapter installed on a PCI bus in a Linux system. You want to determine the manufacturer information along with the kernel driver information. What should you do? [Choose all that apply]
B. Use the lspci command C. Use the ethtool command
Several Salespeople of your organization are always on the move and access their E-mails through mobile and laptop. You want to use the strongest method to authenticate these users. Which of the following method should you configure?
Biometric
You enable your Linux Web server with the PKI-based login. When you connect to this Web server, you are not prompted for the password. With this configuration, which of the security risks are you avoiding?
Brute-force attack
Which file(s), if exist on a user's system, do not require the user to authenticate, and authentication takes place between the user's system and remote system? [Choose all that apply]
C. authorized_keys D. authorized_keys2
You have the Apache Web server running on your Linux system. You use this Web server to test the Websites that you develop on your system. Although, this system is on the network, you do not want anyone to access these Websites. The access should be limited only to your system. What should you do? [Choose all that apply]
Configure Iptables to accept local connections and drop others Edit the apache.conf file and replace *:80 with 127.0.0.1:80
You have a network of 100 systems and 10 servers. You want to be able to detect a rogue system or device if it is present on the network. Which two steps must you perform to achieve this goal? [Choose all that apply]
Create a baseline for network assets B. Perform continuous monitoring
You administer a Linux-based network of a single subnet. You have an internal Website that multiple users' access using the domain name. Recently, users have started to complain that the Website is no longer accessible. When you test, you can browse the Website only by its IP address, but not by the URL. You also attempt to ping another computer on the network with its name, but unable to do so. What could be the probable cause?
DNS server is probably unresponsive
You perform a vulnerability assessment. In the assessment, you conclude that the edge router is accessible through port 22, making the router insecure. You need to secure this router. What should you do?
Disable SSH
Using your Linux system, you are attempting to detect a network printer using its IP address. However, you are prompted with the following error: Unable to locate printer How should you possibly resolve this issue? [Choose all that apply]
Disable firewall on your system E. Use the system-config-printer command Add a rule for the printer in firewall
You have a Linux system on which several applications are installed. You install gcc 5.1.0 on this system manually and find that many of the applications stopped working. When you attempt to start an application, you are prompted with the following error: GLIBC_2.1X not found You must resolve this issue without re-installing the system. What are the possible solutions that can help you resolve this issue? [Choose all that apply]
Downgrade the GCC and GLIBC package Re-install all the applications that have issues
Which of the following type of program is dependent on the external shared libraries?
Dynamically linked
You have an Ubuntu 14.04 installation on a system. You want to edit the default theme as well as change the background image. Which of the following activities can help you achieve this?
Edit the/etc/default/grub file
You want to export a virtual machine for the users who are not part of the vCenter Server 6.5 inventory in your organization. You want to create a single compressed file that the users can import. What should you do?
Export the file as an OVF file and share with the users
You attempt to install PostgreSQL 9.3 on an Ubuntu system, using the following command: sudo apt-get install postgresql-9.3 However, you are prompted with the following error: Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: postgresql-9.3 : Depends: postgresql-client-9.3 but it is not going to be installedDepends on postgresql-common (>= 142~) but 134wheezy4 is to be installedE: Unable to correct problems, you have held broken packages. What is a possible solution to resolve this issue? [Choose all that apply]
First, install wheezy and then install PostgreSQL Raise the apt.postgresql.org priority
Which of the following statements are true for the global variable? [Choose all that apply]
Global variables can pass the stored value from the current shell to the sub-shell B. PATH and PS are examples of global variables
Review the following statements: GPIO=22 cd /sys/class/gpio ls echo $GPIO > export ls Which of the following is the output of these statements?
GPIO22 does not exist but it exists when it is exported to the application space
You are configuring OpenLDAP on a Linux system. You want to make changes to the /etc/openldap/slapd.conf file and complete the configuration. Before making changes to this file, which of the following step must be performed?
Generate the LDAP administrator's password
You manage a network that consists of servers and hardware from different vendors. You have been asked to integrate a method of centralized authentication, authorization, and accounting (AAA). The users must be securely and centrally authenticated before they can access network resources. Which of the following should you implement?
Implement RADIUS on the network
You have installed and configured a new server. You have copied a large amount of information on this server that will be used by the Sales team, which will make frequent changes to the information. You need to ensure that updated information is always available even if the server becomes unavailable. What should you do?
Install and configure a cluster and add the server to the cluster
You need to install a new Linux system, which has multiple hard drives. You want to ensure that if the operating system (OS) corruption or compromise takes place, the data should not be tempered. You also want to have the optimal performance of the system. To be able to achieve this goal, how should you partition the system?
Install the OS and applications on one hard drive and data on another hard drive
Which type of framework is Fail2ban?
Intrusion Prevention System
Which of the following is true for stateless firewalls? [Choose all that apply]
It does not track the network connection state It is also known as an access control list (ACL) It does not statefully inspect the traffic
You execute the following command: ls -l /etc/passwd plab At present, the plab file does not exist. What will be the output of this command?
It will list the passwd file and generate an error for the plab file
You create the following Here document: wc -w <<EOF> This is an online lab environment.> Practice Labs.> 100% hands-on experience for the learner.> EOF What can you expect as the output?
It will provide the word count as 14
You delete the crash dump of a specific problem that was generated by abrt. The same problem reoccurs. How will abrt handle this problem?
It will record it as a new problem
You have Red Hat Enterprise Linux (RHEL) running as a virtual machine in VMware Workstation. You open a terminal and execute the following command: echo "- - -" > /sys/class/scsi_host/plabsrv/scan What would be the possible output of this command?
It will send a rescan request to add a new hard drive without rebooting the system
Refer to the exhibit. Which of the following structures are being displayed?
JSON
After you run the ps aux command and find that there are several zombie processes, you want to kill these zombie processes. What should you do?
Kill the parent process of the zombies
You are working on a Red Hat Enterprise Linux (RHEL) system. You run the following command to mount the CD-ROM: mount /dev/cdrom /mnt The CD-ROM is mounted, and you are able to use it. When you reboot the system, you notice that the CD-ROM is no longer mounted. You need to keep the CD-ROM mounted across the reboots. What should you do?
Make an entry of the mount in the /etc/fstab file
Identify the outcome of the following statements: auth required pam_env.so auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth required pam_deny.so auth required pam_tally2.so deny=3 onerr=fail unlock_time=900
No check with the PAM stack will be performed
You have executed a command to query the DNS server for the domain, www.google.com. When you run this command, you get the following information: Non-authoritative answer:Name: www.google.comAddress: 172.217.166.36 Which command would have you executed to get this output?
Nslookup
You have configured iperf on both client and server. You want to test the client and server for maximum throughput by conducting the bi-directional tests. You need to run the following command: iperf -c 198.168.1.5 -d Where should you run this command to meet your objective?
Only on the client system
You have recently installed Ubuntu on a system. You want to use the sudo command. Therefore, you need to add your account to the /etc/sudoers file. How should you open this file in a recommended way?
Open it with the visudo command
In the /etc/group file, which of the following field is optional and can be left blank?
Password
You have recently implemented application streaming on a Linux system on your network. You have made the following configuration:Enforced encryptionConfigured the session timeoutConfigured access control on the application streaming serverWith this configuration, you should be able to prevent which of the following attack?
Prevent the eavesdropping attack
You have a system that has Ubuntu 16.04 installed. You then install Windows 10 on the same system. After installing Windows, when you attempt to boot Ubuntu, it fails. You need to ensure that you are able to boot from Ubuntu without too much administrative efforts.
Re-install GRUB from the Ubuntu 16.04 installation DVD
You are installing the GRUB2 on the Master Boot Record (MBR) of the primary hard drive of your system. The hard drive is /dev/sda. You have created the configuration file for GRUB2. You have also installed the GRUB2 in the MBR. What else should you do to ensure GRUB2 is installed properly?
Reboot the system
You have a process with the process state marked with D, signifying the process is in Uninterruptible sleep. You need to ensure that the process comes out of this state. Which of the following solution should you apply?
Reboot the system to fix the issue
You have containers configured on your Linux system. When containers are in use, you get the Out Of Memory Exceptions (OOME). What could be the possible method to correct this error?
Reduce the memory used by the application in the container
You have updated a profile in the /etc/apparmor.d/tunables directory. You now have the updated profile that you want to use. After updating the profile, what else must you do ensure that the updated profile is used without impacting the other profiles?
Reload the profile
After you execute the createrepo command, you notice that several cache files are generated. What should you do with these files?
Remove them
You have written the following rules file with the name 90-usb.rules. You have stored it in the /etc/udev/rules.d/ directory. The rules are as follows: ACTION=="add", ATTR{idVendor}=="0bb4", ATTR{idProduct}=="2008", RUN+="/bin/mkdir /home/john/Desktop/plab" ACTION=="remove", ATTR{idVendor}=="0bb4", ATTR{idProduct}=="2008", RUN+="/bin/rmdir /home/john/Desktop/plab" The added rule works fine and creates the plab dir when you attach the device, but the remove rule fails and does not remove the plab directory when you remove the device. How should this be corrected?
Replace ATTR{idVendor} & ATTR{idProduct} with ENV{ID_MODEL}
If you use NX technology, which of the following would you be able to achieve? [Choose all that apply]
Run audio Sharing network devices Session recording File transfer
You have a Linux server with SELinux configured. On your server, you have file and directory permissions, ACLs, and SELinux contexts configured. When you attempt to create a file in one of the directories, you get the access denied error. You verify that you have read, write, and execute permissions on the directory. How should you narrow down the problem without reducing the security of the system?
Run the audit2why command
You have a group named ftpusers. You want to list the members of this group without having to read through the /etc/group file manually. What should you do? [Choose all that apply]
Run the awk -F':' '/ftpusers/{print $4}' /etc/group command B. Run the libuser-lid -g ftpusers command C. Run the grep 'ftpusers' /etc/group command D. Run the members ftpusers command
You manage a Linux system. You have been advised to disable Bob's local account on this system with immediate effect. You are required to ensure that Bob is not able to use the account on this system. What should you do? [Choose all that apply]
Run the usermod -L Bob command on the system Edit the /etc/shadowfile and add * as the first character in the second field for Bob's account
You have recently configured a new network, which has multiple routers and switches. You want to be able to remotely login into the routers and switches and manage and monitor these devices in a secure manner. Which of the following will be most appropriate to implement on all devices to achieve the desired results?
SNMPv3 and SSH
You attempt to execute the ssh command on a Linux system, but you are prompted with a message that the system cannot find the ssh program. What could be the possible cause?
SSH path is not set with the $PATH variable
With which of the following Linux flavor will you use the Zypper command to install a package? [Choose all that apply]
SUSE OpenSUSE
You create a new directory named plab. You want to ensure that you, as the owner, and the group is able to navigate into the directory and access files. You should be able to write to the files, but the group should be able to view the files. Others should not be able to enter the directory. What should you do?
Set the permission to 750
You have created a new directory named plab. You assign 744 as the permissions on the directory. A user complains that he is not able to navigate into the directory and gets the permission denied error. You want to ensure read and execute permissions for the Group and execute permissions for Others. To meet this goal, how should you resolve this error?
Set the permission to 751
All your organization's internal Websites are using HTTP protocol. After an attack on one of the Websites, you decide to implement HTTPS on all the Websites. However, the management does not allocate any additional funds for this job. What would be your best solution to secure the Websites?
Setup an internal CA and issue certificates
Which of the following product uses the vmm command?
System Center Virtual Machine Manager
You are compiling the source of TShark on your system, which does not have the zlib library installed. With the supported library, what will be the outcome?
TShark will compile but will not be able to read compressed files
You have a virtual Linux server hosted in the cloud environment. You run the getenforce command and find that SELinux is set to Disabled. You make the following changes to the /etc/selinux/config file: SELINUX=enforcing SELINUXTYPE=targeted SETLOCALDEFS=0 You save the config file and reboot the system. After the system reboots, you run the getenforce command and find SELinux is still in the disabled state. What could be the possible cause? [Choose all that apply]
The Linux system's kernel is not configured with SELinux E. The bootloader is disabling the SELinux
You execute the following command on the Red Hat Enterprise Linux system: ps -eZ | grep -E '(auditd|sshd)' The following output is generated: system_u:system_r:auditd_t:s0 root 3934 ? 00:00:00 /sbin/auditdsystem_u:system_r:kernel_t:s0 root 3946 ? 00:00:00 [kauditd]system_u:system_r:sshd_t:s0-s0:c0.c1023 root 4159 ? 00:00:00 /usr/sbin/sshdunconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 What can be interpreted with the following output? [Choose all that apply]
The first column is the security context for the mentioned process It is possible to have multiple processes use the same security context B. Each process has only one security context
You need to get the updated report on the system performance of a Linux system. You execute the sar command, but it does not provide any update. What could be the possible cause?
The hard drive is full
You have a file named plab.txt. The current owner of the file is plabuser, and the group is also the plabuser. You execute the following command: sudo chown :plabsales plab.txt What would be the outcome of this command?
The plabsales group will now be the group of the file
You have modified an iptables rule. You run the following command: service iptables save When you run this command, you are prompted with the following error:iptables: Saving firewall rules to /etc/sysconfig/iptables: /etc/init.d/iptables: line 274: restorecon: command not found. What could be the possible cause?
The policycoreutils package is not installed
You execute the Dracut command to create the initramfs image. However, you are prompted with a message that the image already exists. You need to overwrite this image by creating a new image. What should you do?
Use the -force parameter with the Dracut command
You have one QLogic HBA card in a system that runs Red Hat Enterprise Linux 5.3. When you boot the system, the HBA is not detected. You run the following command: ll -d qla2xxx However, the command does not display any output. How should you possibly resolve this issue?
Update the device drivers
You have added new hardware to your system and updated the /etc/modules.conf file. You need to rebuild the ramdisk now to initialize the hardware drivers. What should you do? [Choose all that apply]
Update the grub2.conf file with the ramdisk name D. Run the mkinitrd script
You attempt to install a package on a new Ubuntu installation. However, you are prompted with the following error: The following packages have unmet dependencies... How should you resolve this error? [Choose all that apply]
Update the repo sources Run the apt-get command with the -f parameter
You have MySQL installed on a Linux server. You configure a service to talk to the MySQL server using the loopback address. You also configure remote access to the server by editing the following file: /etc/mysql/my.cnf You change the following values: bindaddress: 127.0.0.1 to bindaddress: 192.168.1.10 After you do this, the service is no longer able to connect to MySQL. You, however, are able to connect to the MySQL server remotely. What should you do?
Use 0.0.0.0 as the value for the bindaddress
An application developer has a homegrown application that needs to be deployed on a hypervisor. When the application is deployed, it should run with the required dependencies.The application must also be deployed with a specified level of isolation from other applications. It should not be using the shared kernel. What approach should you use to deploy this application?
Use Linux containers to containerize the application and deploy using the hypervisor
You are using a Linux system with 4 TB hard drive with a single partition. You unmount the hard drive and plug it into another system that also runs the same flavor of Linux. The hard drive is recognized, but its only partition does not show up. You run the following command: parted /dev/sdb The partition is displayed. However, when you type the print command, the partition does not show up. Without losing the information, you need to fix this issue. What should you do? [Choose all that apply]
Use testdisk to analyze the disk Re-build the partition table with the partprobe command
Which of the following is used as an intermediate step in the boot procedure?
Vmlinux
You are part of the plab group and want to change ownership of the PLABData directory to another group named Sales. You are not part of the Sales group. To change the ownership, you run the following command: Chgrp Sales PLABData However, you are prompted with the following error: chgrp: changing group of `PLABData: Operation not permitted What could be the possible cause? [Choose all that apply]
You are not part of the Sales group You are not performing this operation as a root user
You have one Linux system on which SELinux is disabled. You need to enable it. To do this, you run the following command: setenforce 0 However, you are prompted with the following message: 'setenforce: SELinux is disabled' You have now also made changes to the /etc/selinux/config file to start SELinux in permissive mode. SELinux, however, is still disabled. What should you do?
You need to restart the system after making changes
You need to create a service file. Which of the following command would be most appropriate for this purpose?
chkconfig <service> --add
You execute a command on a Linux system and get the following output: ; <<>> DiG 9.7.3-PLAB-9.7.3-2.el6 <<>> PLAB.com;; global options: +cmd;; Got answer:;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62863;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 3 ;; QUESTION SECTION:;PLAB.com. IN A ;; ANSWER SECTION:PLAB.com. 37 IN A 209.132.183.81 ;; AUTHORITY SECTION:PLAB.com. 73 IN NS ns4.PLAB.com.PLAB.com. 73 IN NS ns3.PLAB.com.PLAB.com. 73 IN NS ns2.PLAB.com.PLAB.com. 73 IN NS ns1.PLAB.com. ;; ADDITIONAL SECTION:ns1.PLAB.com. 73 IN A 209.132.186.218ns2.PLAB.com. 73 IN A 209.132.183.2ns3.PLAB.com. 73 IN A 209.132.176.100 ;; Query time: 13 msec;; SERVER: 209.144.50.138#53(209.144.50.138);; WHEN: Thu Jan 12 10:09:49 2012;; MSG SIZE rcvd: 164 Which of the following command have you executed?
dig
Which of the following command will display super block and blocks group information about a filesystem?
dumpe2fs
Which command should you run to display a partition label?
e2label /dev/sda1
You want to display the value of the HOSTNAME variable. Which command should you use?
echo
You have a list of items that you want to iterate until the list is exhausted. Which of the following loop would be most appropriate to use in this scenario?
for
You need to view the SSID name for a specific wireless network. Which of the following command should you use?
iwconfig
You need to display information about the currently loaded modules in your Linux system. Which of the following command should you use?
lsmod
Recently, an attacker has exploited unused running services on a Linux Web server. You want to verify the currently open connections to the Web server immediately. Which of the following should you use?
netstat
You want to view the state of the SELinux Booleans in the following format: SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Max kernel policy version: 28 Policy booleans:abrt_anon_write off abrt_handle_event off abrt_upload_watch_anon_write on antivirus_can_scan_system off antivirus_use_jit off auditadm_exec_content on authlogin_nsswitch_use_ldap off Which of the following command would provide this output? [Choose all that apply]
sestatus -b getsebool -a
On a Debian system, you are editing the /etc/pam.d/common-password file. Which keyword and value should you add at the end of the following line if you need to ensure that the user must use one uppercase letter in the password: password requisite pam_pwquality.so retry=3
ucredit=-1
You have a plab.txt file that contains the following text: apples bananas kiwis oranges pears You want to use the wc command to count the number of lines, words, and bytes. Which of the following command should you use?
wc plab.txt