linux studyin
Fred suspects that one of the servers he manages is experiencing a memory leak. Which of the following is the best tool for Fred to use to confirm this issue? a. htop b. lsmem c. lscpu d. free
htop
You wish to obtain a list of quotas for users of the /home filesystem to verify that users are within their soft and hard limits. Which command should you use? a. repquota b. quota c. cat /proc/quotas d. edquota -l
repquota
Bob wants to configure a full backup to run once per week on each UNIX and Linux system on his network. He wishes to use the same tool on each system to perform the backup. What tool is Bob likely to choose to perform backups?
tar
Theo has created a virtual machine with a virtual disk configured to only use a minimal amount of hard disk space. The computer has a one terabyte drive, and even though he has created an 800 GB virtual disk, the host operating system is still showing 600 GB free space. Which of the following technologies is Theo's system using? a. JSON b. YAML c. thin provisioning d. thick provisioning
thin provisioning
Which of the following attributes can be given to a file using the chattr command in order to prevent the file from being modified in any way (even by the root user)? a. append only b. extent c. read-only d. immutable
ummutable
Which of the following file extensions might be used as part of a shell script filename? a. .exe b. .ps c. .so d. .sh
.sh
Sawyer needs to ensure that a configuration file for a new application shows up in new user directories as new users are added to the system. Where should Sawyer place a copy of this file to ensure that it shows up in the new user home directories? a. /etc/profile b. /etc/skel c. /etc/useradd d. /etc/profile.d
/etc/skel
Which of the following settings for umask would ensure that the user and group permissions are not affected while the other does not have read, write, or execute? a. 770 b. 007 c. 777 d. 077
007
Sam has installed Linux Mint onto his laptop along with a new desktop environment based on GNOME 3. What is the most likely desktop environment that he is using? a. XFCE b. Cinnamon c. MATE d. KDE
Cinnamon
Which service is used to automatically assign IP addresses to hosts when they join a network? a. FTP b. DHCP c. DNS d. NTP
DHCP
Which of the following locale environment variables overrides all of the others when it is set? a. LC_OVERRIDE b. LC_LANG c. LC_ALL d. LC_LOCALE
LC_ALL
Jerry manages a number of Linux servers that reside in different branch offices for his company. He needs a secure way to perform maintenance, check on the status of backups, and start and stop services without traveling to those offices. Which of the following is Jerry most likely to use? a. SSH b. Telnet c. HTTPS d. NTP
SSH
Which of the following can be used within a Kubernetes cluster to allow microservices to communicate to each other in a secure way? a. Ingress controller b. Ambassador container c. Service mesh d. Load balancer
Service Mesh
Which of the following technologies is a platform independent protocol that can be used to graphically connect to a Linux computer? a. RDP b. Telnet c. VNC d. SSH
VNC
Which of the following are valid servers for the graphical component of the Linux operating system? (Choose two.) a. Wayland b. X11 c. GNOME d. KDE
Wayland X11
Hanna needs to find any error messages that have been generated by the kernel. Where would she look for that information? a. /var/log/kern.log b. /var/log/secure c. /var/log/messages d. /var/log/lastlog
a. /var/log/kern.log
Tabitha has been asked to install a container within her company's Kubernetes cluster that will provide for monitoring capabilities. What type of container is Tabitha most likely to install? a. Sidecar container b. Ambassador container c. Ingress controller container d. Load balancing container
a. Sidecar container
Using the output below, determine which of the following is true: drwxr-xr-x 4 jsmith finance 128 Feb 21 2023 ProjectX a. The permissions could have been set using the command - chmod 755 ProjectX. b. The listing is for a file named ProjectX. c. The file has the delete flag set and will be deleted when the recycle bin is emptied. d. The command - chown finance:jsmith ProjectX - could have been used to set ownership of this file.
a. The permissions could have been set using the command - chmod 755 ProjectX.
Karen wants to see which partitions are currently mounted on a Linux workstation. Which of the following commands could she use to see this information? a. cat /proc/mounts b. cat /proc/filesystems c. cat /etc/fstab d. cat /etc/mounts
a. cat /proc/mounts
Kaylee is managing a system that uses SysV system initialization. She wants to make sure that iptables starts when the system is booted. Which of the following should Kaylee run? a. chkconfig --add iptables b. chkconfig +iptables c. service iptables start d. chkconfig-new -service=iptables -startup=1
a. chkconfig --add iptables
Which of the following commands can be used to see a list of the currently mounted filesystems? (Choose all that apply.) a. df b. du c. mount d. cat /etc/mtab
a. df c. mount d. cat /etc/mtab
Paige is working on a Linux workstation and has just rebooted after configuring GRUB2. However, the system halts with a kernel panic. She reboots the workstation using a live Linux rescue disc. After correcting the GRUB2 configuration options, what command does she need to run to rebuild the grub.cfg file? a. grub2-mkconfig b. grub2 --mkconfig c. mkgrub2 d. grub2-rebuild
a. grub2-mkconfig
Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run? a. iptables -F b. netfilter --reset c. firewall-rule --clear-all d. firewall --reset --reconfigure
a. iptables -F
Which of the following commands can be used to format a disk partition as ext4? (Choose all that apply.) a. mke2fs b. mkfs c. tune2fs d. fsck
a. mke2fs b. mkfs
Kane has just made changes to the /etc/default/grub file on a Linux server running GRUB2. What is the next step that Kane needs to perform? a. run grub2-mkconfig b. run grub2-install c. copy the /etc/default/grub file to the /boot directory d. copy the /etc/default/grub file to /boot/grub/grub.conf
a. run grub2-mkconfig
Which of the following commands can be used to view the ports to which a system is listening? (Choose all that apply.) a. ss b. netstat c. trace d. pstrace
a. ss b. netstat
Natalie wants to use an existing server to deploy a new virtual machine. The new virtual machine will initially only need 20 GB of disk space but is expected to grow at a rate of 5 GB per month. She wants to set the size for the virtual hard drive to 512 GB. However, the server that she intends to use has a 2 TB hard drive with only 100 GB of free disk space. What can Natalie use to accomplish this task? a. thin provisioning b. thick provisioning c. VHD defragmentation d. hard disk degaussing
a. thin provisioning
Ciara has created a shell script that works just fine in the shell where she developed it. However, when she tries to execute it in a subshell some of the environment variables don't seem to be correct. How can she resolve this issue? a. use the export command to make them available to subshells b. log out and log back in again to make them available at a profile level c. use the set command to recreate the environment variables within the subshell d. reboot the Linux workstation that she is using
a. use the export command to make them available to subshells
Which of the following commands can be used to show the list of jobs scheduled with the at daemon? a. atl b. atlist c. at --show d. atq
atq
Which of the following might you expect to see as the first line of a bash shell script? a. # CreatedBy: John Doe b. #!/bin/bash c. !#/var/bash d. #!/etc/bash
b. #!/bin/bash
Which of the following options can be used with the dpkg command to remove a specified package from a system, including any configuration files used by the package? a. -p b. -P c. -r d. -R
b. -P
What option to the ps command will show the SELinux context? a. -X b. -Z c. -b d. -s
b. -Z
When the useradd command is used to add a user to a Linux system, which two files are used that contain configuration information such as default location for email, password expiration information, minimum password length, and so on? a. /etc/useradd.conf b. /etc/login.defs c. /etc/default/useradd d. /etc/default/logins.conf
b. /etc/login.defs c. /etc/default/useradd
Which of the following would be a valid entry for the cron daemon to execute a script named myscript in the root user's directory at 5 am on the first day of every month? a. 5 0 1 * * /root/myscript b. 0 5 1 * * /root/myscript c. * * 1 * 5 /root/myscript d. * * 1 5 * /root/myscript
b. 0 5 1 * * /root/myscript
Which of the following is the output of the fdisk command when no options are specified? a. A list of existing partitions that the Linux system knows about. b. A usage screen showing the options available to be used with the fdisk command. c. A prompt to choose a hard drive to work with. d. An error message, as fdisk is a Windows command. The comparable Linux command is cfdisk
b. A usage screen showing the options available to be used with the fdisk command.
Henry manages the DevOps team at his company. He hears a lot of terms used to describe the day-to-day job functions of his team. Some of those functions include things like build automation and infrastructure automation. These could be considered part of which terminology? a. Iaas b. IaC c. PaaS d. XML
b. IaC
Which of the following character sets allow you to implement the Unicode standard? a. ASCII b. UTF-8 c. ISO-8859 d. Latin1
b. UTF-8
Git creates a snapshot of each version of your files. What are these snapshots referred to? a. clones b. commits c. repositories d. branches
b. commits
Jack needs to be able to determine which modules are currently loaded on a Linux server. Which of the following commands could he use to gather this information? a. insmod b. lsmod c. showmod d. show modules
b. lsmod
Leonard wants to obtain a new version of a container image from a container registry. What option to the docker command can he run? a. build b. pull c. images d. get
b. pull
Jake needs to find out which RPM package a file named bluefish belongs to. Which of the following commands could he use to find his answer? a. rpm -qi bluefish b. rpm -qf bluefish c. rpm -qF bluefish d. rpm -if bluefish
b. rpm -qf bluefish
You are investigating a DHCP issue on your company's network and decide to analyze the packets that are being sent and received on a Linux workstation. Which of the following could you use to see the contents of the packets arriving at the workstation? (Choose two.) a. netstat -a b. tcpdump c. Wireshark d. nbtstat
b. tcpdump c. Wireshark
Craig has just run the ssh-keygen command on his workstation. What is the default path and filename for the new private key that was generated? a. ~/.ssh/id_rsa.pvt b. ~/.ssh/id_rsa c. ~/.ssh/id_rsa.pub d. ~/.ssh/id_rsa_private
b. ~/.ssh/id_rsa
Carter is worried about limited disk space on the drive where /var exists. He wants to ensure that every week a new log file is created and that any log files older than 4 weeks are deleted. Where would Carter configure these options? a. /var/logrotate.conf b. /var/log/rotate.conf c. /etc/logrotate.conf d. /etc/log/rotate.conf
c. /etc/logrotate.conf
Linux stores a history of all login sessions in a log file that must be viewed using the who or last command. Which of the following files do these commands use to view this information? a. /var/log/wlogins b. /tmp/wlogins c. /var/log/wtmp d. /var/log/secure
c. /var/log/wtmp
Which of the following commands will list all users except for the root account? (Choose all that apply.) a. grep -v root /etc/passwd b. grep -x root/etc/passwd c. cat /etc/passwd | grep -v root d. cat /etc/passwd | grep -x root
c. cat /etc/passwd | grep -v root a. grep -v root /etc/passwd
Hanna wants to schedule a job to run every Monday morning at 9 am. Which of the following commands can she use to create the schedule? a. cronjob -e b. cron --edit c. crontab -e d. cron -e
c. crontab -e
Which of the following commands can be used to make a block by block copy of one drive to another without regard for filenames? a. cp b. cpio c. dd d. copy
c. dd
Which of the following commands will execute a container image continuously, and map port 8080 on the host to port 333 inside the container? a. docker exec -p 8080:333 image1 b. docker exec -p 333:8080 image1 c. docker run -d -p 8080:333 image1 d. docker run -d -p 333:8080 image1
c. docker run -d -p 8080:333 image1
John needs to remove the subdirectory named temp2 as well as all of the files that it contains. Which of the following commands could John use to accomplish this task in one step? a. rmdir -r temp2 b. rmdir temp2 c. rm -r temp2 d. del temp2
c. rm -r temp2
A junior system administrator comes to ask for your assistance. He was given instructions to activate the third partition on the second hard drive to use as virtual memory. It has already been formatted and initialized as swap. Which command could you suggest that the junior system administrator use? a. mkswap /dev/sdb3 b. mkswap /dev/sdc2 c. swapon /dev/sdb3 d. swapon /dev/sdc2
c. swapon /dev/sdb3
Keri is getting frustrated that her workstation wants to do a filesystem check upon boot on a frequent basis. Which of the following could she use to change how frequently the system forces a filesystem check to be run? a. e2fsck b. fsck c. tune2fs d. tunefs
c. tune2fs
When using AppArmor, the restrictions for each program are stored within text files named for the program under which directory? a. /etc/sysctl/ b. /etc/security.d/ c. /etc/security/ d. /etc/apparmor.d/
d. /etc/apparmor.d/
Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify? a. /root/.profile b. /root/.bashrc c. /etc/profile d. /etc/bashrc
d. /etc/bashrc
Bradley wants to quickly map a hostname to an IP address of an internal server that he wants to access by name but that has no DNS entries. Which of the following files could he modify to enable accessing the server by name from his workstation? a. /etc/sysconfig/network b. /etc/resolv.conf c. /etc/nsswitch.conf d. /etc/hosts
d. /etc/hosts
What is the path and filename where Linux stores the configured network services and their associated ports for a system? a. /var/services.conf b. /etc/rc.d/services.conf c. /etc/ports d. /etc/services
d. /etc/services
Jan is a DevOps Engineer that is in charge of setting up a new Configuration Management software. The software they've been using required a piece of software to be installed on the virtual machines and containers in their environment, whereas the new Configuration Management software he's in charge of deploying does not. What kind of CM is Jan deploying? a. Kickstart b. log shipping c. agent based d. agentless
d. agentless
Which of the following commands will create a new file containing a list of users along with their login shell? a. cat /etc/passwd | columnize -c:1,7 > usershells b. chop -d: -f1,7 /etc/passwd > usershells c. cat /etc/passwd | grep users,shells > usershells d. cut -d: -f1,7 /etc/passwd > usershells
d. cut -d: -f1,7 /etc/passwd > usershells
David is running a newer version of Fedora Linux but found an article on a security website about a recently discovered vulnerability in the version of Z shell that is running on his machine. He wants to update to the newer version of Z shell from an online repository while removing any older versions during the process. Which of the following commands would he run to perform this action? (Choose all that apply.)
d. dnf upgrade zsh
Mary has been locked out of her account after failing to correctly enter her password three times. As the system administrator, you need to unlock her account. Which of the following commands would unlock Mary's account assuming that you are using pam_faillock.so module? a. faillock --unlock --user mary b. pam_faillock --unlock --user mary c. pam_faillock --reset --user mary d. faillock --reset --user mary
d. faillock --reset --user mary
Which of the following commands could be used to access data on a CD? a. umount /media/cdrom /dev/cdrom -t iso9660 b. mount /media/cdrom /dev/cdrom -t iso9660 c. umount -r -t iso9660 /dev/cdrom /media/cdrom d. mount -r -t iso9660 /dev/cdrom /media/cdrom
d. mount -r -t iso9660 /dev/cdrom /media/cdrom
Which of the following commands could be used to turn off quotas? a. edquota --off b. quotas --disable c. edquota --disable d. quotaoff
d. quotaoff
Joe is having issues connecting to a particular server by FQDN but can successfully ping the server's IP address. Which of the following tools should he use next to troubleshoot the issue? a. mtr b. getent c. dig d. traceroute
dig
Which of the following commands can be used to view the hardware detected by the Linux kernel during bootup? a. lsdev b. lshw c. dmesg d. lspci
dmesg
Which of the following commands will display a list of the exported variables in the shell? a. env b. echo $LIST c. set d. print $LIST
env
Which of the following loops processes a list of values? a. while b. for c. case d. until
for
Gary is using git for a software development project. He wants to download the updated copy of the main branch from the original repo. Which of the following commands can be used to do this? a. git pull origin main b. git download origin main c. git-update origin main d. git origin main
git pull origin main
Patrice has just set up a new Linux server. She has already configured a full backup to run every Sunday morning. She wants to create an additional backup every day to ensure that less data would be lost in the event of a mid-week failure. She wants to use the least amount of disk space possible for these additional backups. Which of the following should she configure? a. incremental b. differential c. snapshot d. full
incremental
Catherine wants to connect her laptop running Linux to a wireless network. Which of the following utilities can she use to make that connection? a. ifconfig b. iwconfig c. wifi-connect d. ifcfg
iwconfig
Ezra wants to see if there have been any failed logins recently on one of the Linux web servers by someone attempting to gain unauthorized access. Which of the following commands can he use to see this information? a. last b. lastb c. last --failed d. failuser
lastb
Sheila needs to see a list of pending print jobs on a system. Which of the following commands can she use to display those jobs? a. lpq b. lpc c. lpr d. lprm
lpq
Which of the following utilities can be used to create and manage a software RAID configuration after installation? a. mdconf b. raidconf c. mdadm d. raidadm
mdadm
Which command can be used to view detailed information about a specific kernel module? a. modprobe b. insmod c. lsmod d. modinfo
modinfo
Spencer needs to run a manual backup process that may take a few hours to run just before she leaves for the day. Which of the following commands can she preface the backup process command with to ensure the process continues running after she logs out? a. bg b. nohup c. continue d. run
nohup
Simon is writing a shell script and wants to display the status of the script as commands execute. Which of the following commands would display messages out to the screen? (Choose two.) a. export b. echo c. lprint d. printf
printf echo
Zachary is analyzing running processes using the top utility. Without exiting the top utility, he wants to change the nice priority level of a process. What key can Zachary use to change the nice level? a. c b. n c. p d. r
r
Which of the following commands can be used to reboot a Linux system? (Choose all that apply.) a. reboot b. init 0 c. telinit 6 d. init 6 e. telinit 0
reboot telinit 6 init 6
Check My Work Which of the following processes could cause a Linux system to have a high load average over the last 15 minutes? a. zombie b. memory leak c. runaway d. OOM
runaway
Which of the following commands displays the previous and current runlevels on a Linux system? a. runlevel b. runlevels c. init d. telinit
runlevel
What command could be used to give a user permissions on a file that they do not own without also giving access to everyone else in any of the groups that the user is part of? a. chmod b. setfacl c. acl-set d. permit
setfacl
Kenneth wants to install a network service as a sandboxed application. Which of the following commands can he use? a. yum b. snap c. flatimage d. dpkg
snap
Carlos manages a Linux system that users can SSH into in order to perform certain tasks. However, he has just installed a critical patch and wants to reboot the server to ensure that it has fully taken effect. Which of the following commands should he use to ensure that a reboot will not interrupt any logged in users? a. whoami b. wall c. id d. uname -a
wall
Emily wants to download a file from a web server but doesn't have a GUI installed. Which of the following tools could she use to download a file using the command line from the web server? (Choose two.) a. httpget b. curl c. gcc d. wget
wget curl
COME BACK HERE
COME BAAAAACK
