Quiz 13-14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When performing a sar �u command, you notice that %idle is consistently 10%. Is this good or bad?

Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing?

CD

Which DNS resource record is an alias to other records?

CNAME

Which of the following steps is not a common troubleshooting procedure?

Delegate Responsibility

Which of the following technologies can encrypt files stored on a filesystem within a Linux system?

GPG

Which of the following is NOT required to share a directory using NFS? (Choose all that apply.)

Mount the directory to the /etc/exports directory using the mount command.

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?

Run the newaliases command.

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

TRUE

Which command within the command-line FTP utility can be used to change the current directory on the local computer?

lcd

Which file stores the Apache configuration in Fedora 28?

/etc/httpd/conf/httpd.conf

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?

/srv/ftp

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running.

The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?

FALSE

When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

FALSE

You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?

FALSE

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

TRUE

PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?

TRUE

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

TRUE

To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

TRUE

What will the command sar �W 3 50 do?

Take 50 swap statistics every 3 seconds.

Which command can be used to list containers that are currently running on the operating system only?

docker ps

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

Which of the following commands can NOT be used to display memory statistics?

iostat

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

Which of the following can be used to create a database within PostgreSQL?

the CREATE DATABASE statement within the PostgreSQL utility.

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data

Which item below is NOT a best practice for securing a local Linux server?

Ensure that you are logged in as the root user to the server at all times.

Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

FALSE

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

FALSE

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

Which of the following UFW commands can be used to view configured firewall rules?

ufw status

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?

sa19


Ensembles d'études connexes

Circumference and Area of a circle

View Set

Chapter 2: What is Construction Management?

View Set

Introduction to Sales Contract in Indiana

View Set

Honors English 2 Semester 1 Final study guide

View Set

There Are Three Types of Failure AOW W.8

View Set

Chapter 12 Vocabulary - Motivation and Emotion

View Set