Linux
Any command can be started in the background by appending that an _____to the end of the command line.
&
The mount point for the removable medium is_________
/run/media/<user>/<label>
Which log file is security and authentication-related messages and errors?
/var/log/secure
Given a network mask of 255.255.0.0, how many bits are for the network part?
16
____is a distributed network of servers that maps host names to IP addresses.
DNS
The term OpenSSH refers to the software implementation of the_______
Secure Shell
_____has a huge number of options that can be provided to describe exactly what kind of file should be found.....
find
[user@host ~]# tar cf archive.tar file1 file2 file3 What does the 'f' do in the options area of the command?
it represents the file name of the archive to operate on
Which command is used to test connectivity only
ping
For tar to be able to archive the selected files, it is mandatory that the user executing the tar command is able to ______ the file(s).
read
Only the____ user can set a password to any value.
root
If you want to create a remote interactive shell as the current user, the correct command is _____
ssh remotehost
Key generation is done using the _______ command.
ssh-keygen
___________provides a method for activating system resources, server daemons, and other processes, both at boot time and on a running system.
systemd
If you have to edited the sshd_config file,___________________
you can simply restart the ssh daemon
When synchronizing files, which option is necessary to porvide handling for 'hardlinks'?
-H
Various aspects of the OpenSSH server can be modified in the configuration file found in which directory
/etc/ssh
Red Hat Enterprise Linux 7, the systemd journal is stored in ________ by default, and its contents are cleared after reboot.
/run/log
Messages related to startup are logged in_____
/var/log/boot.log
UID___is always assigned to the superuser account, root.
0
When configuring an appropriate amount of Memory and CPUs, you should consider that Red Hat Enterprise Linux 7 requires a minimum of ___.
1 CPU, 1024MB of memory
Similar to the tail -f command, journalctl -f outputs the last____lines of the journal and continues to output new journal ent...
10
Which virtual console contains a shell prompt with root access, contains a stored history of us.......
2
Which virtual console contains a shell prompt with root access, contains a stored history of useful commands
2
An IPv4 address is a ___ number, normally expressed indecimal as four octets ranging in value from 0 to 255, sep....
32 bit
Which of the following kill signals is considered an unblockable?
9
The Linux version of ps supports three option formats. Which of the following can have grouped options and cannot be used with a dash?
BSD
What does it mean when the state of service is "static"?
Can not be enabled, but may be started by an enabled unit automatically
Yum install cowsay will do which of the following?
Install the software package for cowsay, including any dependencies
________is a full virtualization solution built into the standard Red Hat Enterprise Linux Kernel
KVM
The process of adding a new file system to the existing directory tree is called
Mounting
"[root@serverX~]#yum-config-manager --add-repo"http://dl.fedoraproject.org/pub/epel/7/X86_64?"' What is the root user.......
enabling a third party repository
If you want to close a remote connection, other than shutting down the remote system you can use the command_______
exit
Each log message is categorized by a_________.
facility and priority
A______is an organized structure of data-holding files and directories residing on a storage device, such as a physical disk...
file system
A____is an organized structure of data-holding files ad directories residing on a storage device.....
file system
What will this command do? journalctl -p err
filter the output of the journal command to only list any log entry with Non-critical error condition or above
What does the /dev/sda1 refer to in Linux filesystem?
first disk, first partion
A____ is a new directory entry with a reference to an existing file on the file system.
hard link
The ___ command displays or temporarily modifies the system's fully qualified host name.
hostname
The_____ command is used to show information about the current logged-in user.
id
The letter d in the service "atd" means what.
it's a "daemon" program
What commands you use if you wanted to kill all processes for the user luke?
killall -9 -uluke
The _____package is a hypervisor-independent virtualization API to securely manage virtual machines by providing.....
libvirt
Linux implements the _________ calculation as a representation of expected service wait times, not only for CPU but also for disk and network I/O.
load average
The ______command searches a pregenerated database for file names or file paths and returns the result....
locate
The command su without a target user means you want to ________.
login as the root user
"[root@serverX~]#mount/dev/vdb1/mnt/mydata' In reference to this command, the directory 'mydata' is referred to as.
mounting point
-rw-rw-r-- bart simpson file 1 Which of the following is true about the output?
others can view the contents of file1, but can't execute or write
TO VIEW PROCESS INFORMATION, USE THE________command.
ps
The______root account on linux is roughly equivalent to the local Administrator account on Windows.
root
The ___ command transfers files from a remote host to the local system or from the local system to a remote host.
scp
Which special permission will allow a user to run a executable file (command) as the user(ownership) of the file and not the user
setuid
If an interactive tool is preferred when uploading or downloading files to a SSH server, the _____ command can be used.
sftp
The ss command is used to display__
socket stastics
The command 'ln -s' will creat a
soft link
If you wanted to check the status of the ssh daemon which command would you use?
systemctl status sshd.service
In Red Hat Enterprise Linux 7, process ID 1 is______, the new init system
systemd
The____________daemon provides an improved log management service that collects messages from the kernel, the early stages of the boot process, standard output and error of daemon as they start up and run, and syslog.
systemd-journald
One of the oldest and most common commands for creating and working with backup archives is the ____ com.....
tar
The GID range used when a new group is added to the Linus OS is dictated by:
the /etc/login.defs file
A linux user can mount the device file of the partition holding the file system or _______
the UUID
The __________program is a dynamic view of the system's processes, displaying a summary header followed by a process or thread list similar to ps information.
top
Every process on the system has a _______, which is an octal bitmask that is used to clear the permissions of new files and directories that are created by the
umask
The locate database is automatically updated every day. The root user can perform an update of the database with.......
updatedb
So,_____permissions override________permissions, which override______ permissions.
user;group;others
Launch the Virtual Machine Manager from the menu Applications> System Tools>Virtual Machine Manager, or run the....
virt-manager
The device file/dev/vdb means that it is referring to a disk in a____
virtual machine
To see a list of users that are currently logged in, you can use the command_______________
w
In Red Hat Enterprise Linux 7, all members of group ______ can use sudo to run commands as any user, including root.
wheel
The ___command searches numerous repositories for packages and their dependencies so they may be in.....
yum
The first time a user use ssh to connect to a particular server, the ssh command stores the server's public key in the user's
~/.ssh/known_hosts
chmod770 is produces what result on a file?
-rwxrwx--- file
When using the tar utility, which option (switch)is needed to list the contents of an archive?
-t
If the subnet mask of an IP address is 255.255.0, CIDR notation would specify a network prefix of ____.
/24
A standard logging system based on the ________ protocol is built into Red Hat Enterprise Linux.
Syslog
In regards to RPM naming, what does architecture refer to?
The processor type required for a specific package
In regards to RPM naming, what does term architecture refer to ?
The processor type required for specific package
There are several reasons to update the kernel. What command can be should be used to install a new kernel?
Yum update kernel
The configuration domain name is determined when you select:
a system host name
The useradd command is used to_________.
add a user to the /etc/passwd file
RHEL physical system can be configured as virtual host. Which of the following is considered an advantage to doing this?
all of the above
Which one of these is a basic task performed with Red Hat Subscription Management tools?
all of the above
In regards, to default permissions, the mkdir command creates new directories with
all permissions set to read, write, and excute
What command can be used to change password policies for a user?
chage
Which command will add the excute permission for everyone of file 5?
chmod a+x file5
'[root@serverX ~]$ tar cjf /root/logbackup.tar.bz2/var/log' What will this command do?
create a bzip2-compressed archive of /var log
The ____ service keeps the usually-inaccurate local hardware clock (RTC) on track by synchronizing it to the con.....
cronyd
_________are processes that wait or run in the back ground performing various tasks.
daemons
Which virsh subcommand should be used to use an XML configuration to create and boot a virtual.....
destroy
To get an overview about the file system mount points and the amount of free space available,run the___command.....
df
The command: nmcli con show --active
displays a list of only active connections