Linux

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following shell declarations should be entered on the first line of a script for a system that uses the bash shell?

#!/bin/bash

A friend sent you a shell script file that is 117 lines long. He says that he wants you to examine code on lines 82 through 87. What command would you enter while in vi Command Mode to go directly to line 82?

#82

In the /etc/shadow file, which character in the password field indicates that the password is an encrypted entry?

$

You need to identify which user accounts on the Linux system have encrypted passwords. Which character in the password field of the /etc/shadow file indicates that an encrypted password is set for the user account?

$

Before you install an RPM package, you want to verify the authenticity of the package and check the digital signature to ensure that it has not been altered. Which rpm option should you use?

--checksig

You are using the cupsctl command to configure the /etc/cups/cupsd.conf file. Which cupsctl option will enable sharing of the locally connected printer to other computers on the network?

--share-printers

Which useradd option displays the default values specified in the /etc/default/useradd file?

-D

Which of the following dpkg options will install a package recursively?

-R

Which of the following repquota options will give quota limits and disk usage for all file systems listed in /etc/mtab?

-a

You are inspecting the superblocks and block information on your file system. You need dumpe2fs to display only the blocks that are reserved as bad in the file system. Which of the following options should you use?

-b

Your ext3 file system has experienced a significant amount of corruption. To examine the file system, you want to use the debugfs utility. Which of the following debugfs options should you use to examine the file system?

-c

Your system time is over thirty minutes different than the time on the NTP time provider. When you use the ntpd command, the time is not updated. Which ntpd option should you include?

-g

You are compressing a file with the tar utility, but you need to ensure you can uncompress the file with the bzip2 utility. Which tar option should you use during the file compression?

-j

You need to view the files within /home/gshant/expfile.bz2, but you want to leave the compressed file unchanged. Which bzip2 option should you use?

-k

Which chage option keeps a user from changing password every two weeks?

-m 33

You suspect your /dev/sda3 partition is in need of repair. Which of the following e2fsck options will repair the errors without any interaction from you?

-p

You have a critical file called yearend.xls. You have set the file permissions so that only the owner of the file can modify it and only group owners can read it. Which of the following file listings show that you have set the permissions correctly?

-rw-r----- 1 george acctg 26256 June 1 04:16 yearend.xls

You have an application whose owner is root, but you want all users to execute the application with root user permissions. Which of the following examples shows correct usage of the SUID flag?

-rwsr--r-- 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx

You have an application whose group is sys, but you want all users, whether or not they are members of the sysadmin group, to execute the application with sysadmin group permissions. Which of the following examples shows correct usage of the SGID flag?

-rwxr-sr-- 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx

Which hwclock option sets the system time to the current hardware clock time?

-s

You need to set the system date and time using the date command. Which date option should you use?

-s

You want to use the date command to set the system time UTC time. Which date option should you use?

-u

Which lpr option should you use to change the page width of the print job?

-w

Which of the following files can be configured to ignore certain file types from being committed to the local Git repository?

.gitignore

During installation, you need to make sure there is plenty of hard disk space allocated to the partition that is going to hold the entire Linux operating system. Which of the follwoing is the BEST mount point for this partition?

/

Which of the following directories MUST be part of the partition that holds the root (/) directory? (Select THREE).

/bin /proc /etc

You are installing Linux on an old computer with an old BIOS, and you are planning the partitions for the hard disk drive. Which of the following directories SHOULD exist in the first 1024 cylinders of the hard disk drive?

/boot

You have installed a new Linux system and you want to make a baseline of system performance. Which of the following files contain baseline information? (Choose TWO).

/cpuinfo /meminfo

Under the Filesystem Hierarchy Standard (FHS), what is the full path to the directory that contains the device files for a Linux system?

/dev

What is the file path and name of the directory that contains device files for hard drives, optical drives, and USB devices?

/dev

You need to configure your Linux system to allow only the root user account to mount the CD-ROM device. Which of the following options should you add to the /etc/fstab file?

/dev/cdrom /media/cdrom -t iso9660 ro,nouser,noauto

Type the full device file name for the second partition on the hard drive with the lowest ID number.

/dev/sda2

Type the full device file name for the first partition on the hard drive with the third lowest ID number.

/dev/sdc1

Which of the following is the associated device file for that terminal?

/dev/tty5

What is the full path and filename of the file that is used to schedule tasks for the anacron daemon?

/etc/anacrontab/

AppArmor has been installed on your computer. Which of the following directories contain your AppArmor profiles?

/etc/apparmor.d/

You want to keep the gshant user from using the at command. What is the full path and filename of the file you should edit?

/etc/at.deny

Which file should you edit if you want to permit specific users to edit their respective crontab file, but deny all other users on the system from editing their crontab file?

/etc/cron.allow

You want to keep the gshant user from editing his respective crontab file in /var/spool/cron, but still allow all other users on the system to edit their respective crontab file. What is the full path and filename of the file you should edit?

/etc/cron.deny

Which file should you edit to schedule a task to execute every week on Saturday?

/etc/cron.weekly

What is the full path and filename of the GRUB 2 file that is used for editing the default behavior of the bootloader menu?

/etc/default/grub

You need to change the default home directory value, which is used by the useradd utility when creating a user account. What is the full path and filename of the file you should edit?

/etc/default/useradd

What is the full path and filename for the DNF configuration file?

/etc/dnf/dnf.conf

What is the full path and filename of the file that contains the file system table for a Linux system?

/etc/fstab

You need to implement disk quotas on your Linux system. You need the quotas on the / directory. What is the full path and name of the file that must be edited to implement quotas for users and groups?

/etc/fstab

You want to mount a number of file systems each time the system is brought up. Which configuration file should hold the configuration information for the file systems to be mounted?

/etc/fstab

A file contains the following entry: sales:x:1001:pclark,mmckay,hsamson Which of the following files contains similar enties?

/etc/group

You have GRUB2 installed on your Linux workstation. You need to make changes to the boot menu. Which files and scripts can you edit to modify the menu entries and behavior of the boot menu? (Select TWO.)

/etc/grub.d/40_custom /etc/default/grub

Which of the following configuration files holds the name of the host?

/etc/hostname

Which of the following files contain information that enables a Linux system to resolve IP addresses to FQDN/host names? (Choose ALL that apply.)

/etc/hosts /etc/resolv.conf

You are modifying the tcpd control files of the xinetd super daemon. Of the two tcpd control files, what is the full path and filename of the file that is applied first?

/etc/hosts.allow

Anna, a system administrator, wants to prevent users from pressing the Ctrl+Alt+Delete key combination to reboot the server. Which configuration file should be modified to change this setting? /sbin/shutdown

/etc/inittab

What is the full path and file name for the file that contains a colon-, space-, tab-, newline-, or comma-delimited list of directories in which to search for libraries?

/etc/ld.so.conf

Your Linux system uses the Line Printer Daemon (LPD) to manage print jobs. What is the full path to the file you should use to edit the LDP configuration?

/etc/lpd.perms

What is the full path and filename of the file you should create to disable user login on a Linux system?

/etc/nologin

What is the full path and filename of the file you should edit to determine the order in which name resolution is completed?

/etc/nsswitch.conf

You are managing system time on your Linux computer, and you need to change the settings to point to a local NTP server IP address. What is the full path and filename of the file you should edit?

/etc/ntp.conf

Which configuration file should you edit to enable Pluggable Authentication Modules (PAM) to check for a file named /etc/nologin?

/etc/pam.d/login

All users at your site are using the bash shell. You want to set a variable that will apply to every user and always have the same value. Which of the following shell configuration files should you place this variable in?

/etc/profile

A number of remote users call to say that they cannot connect via SSH today. When you look at the processes, you see that the daemon is not running. Which command would you use to solve this problem?

/etc/rc.d/init.d/sshd start

The root user attempted to log in to the system using tty and was denied access. The pam_securetty module uses a configuration file to determine which virtual terminals (tty#) that root is allowed to log in from. Which of the following files would the root user check to see which terminals are permitted?

/etc/securetty

What is the full path and filename of the file you should edit to limit the amount of concurrent logins for a specific user?

/etc/security/limits.conf

What is the path and filename of the file in the Linux system that lists all network services, including the port assigned to the service?

/etc/services

What is the full path to the directory that contains a set of configuration file templates that are copied into a new user's home directory when it is created?

/etc/skel

What is the full path and filename of the file you should edit to configure the SSH daemon on the server system?

/etc/ssh/sshd_config

You need to configure which commands are allowed to be used with the sudo command. What is the full path and filename of the file you should edit?

/etc/sudoers

What is the full path and filename of the file you should use to configure the hardware clock to use UTC automatically?

/etc/sysconfig/clock

If you are managing a systemd-based Linux system, which of the following commands cannot be used to bring the enp2s0 interface down?

/etc/sysconfig/network-scripts/ifcfg-enp2s0 down /etc/init.d/network stop

Sam, a system administrator, is implementing measures to harden the Linux systems on the network. Sam wants to modify kernel parameters at runtime to protect the system from syn flood attacks using the sysctl command. Which file would Sam modify to implement the following changes? # TCP SYN Flood Protectionnet.ipv4.tcp_syncookies = 1net.ipv4.tcp_max_syn_backlog = 2048net.ipv4.tcp_synack_retries = 3

/etc/sysctl.conf

If a systemd system is configured to use multi-user.target as the default boot target, which file has a symbolic link (symlink) to the multi-user.target file?

/etc/systemd/system/default.target

What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?

/etc/timezone

Management wants a compilation of specific data to occur every night. The only way to accomplish this task is to copy files throughout all network hosts to one server via TFTP. Which of the following files MUST be edited to enable xinetd to manage TFTP on the Linux server?

/etc/xinetd.d/tftp

What is the full path and file name for the YUM configuration file?

/etc/yum.conf

You are in the process of manually creating the partitions during a Linux installation. Knowing that users will often require a lot of space to store their files, which of the following directories (or mount points) SHOULD be configured on its own partition?

/home

For which of the following directories should you create separate partitions? (Select TWO).

/home /var

The gshant user is attempting to connect to a remote SSH server; however, you need to override the default SSH configurations for the client system when he establishes an SSH session. Which of the following files should you edit?

/home/gshant/.ssh/config

Which of the following directories is specified by Filesystem Hierarchy Standard (FHS) as a mount point for removable media, such as USB storage media, DVDs, CD-ROMs, and Zip disks?

/media

According to the Filesystem Hierarchy Standard (FHS), which of the following directories contains information about the system state and processes?

/proc

What is the full path to the directory that contains information about the system state and processes?

/proc

Which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) channels are being used by each hardware device on the system?

/proc/interrupts

Maria, a system administrator, wants to setup IP forwarding on a server for both IPv4 and IPv6. Which of the following files should be modified to enable IP forwarding? (Choose TWO).

/proc/sys/net/ipv6/ip_forward /proc/sys/net/ipv4/ip_forward

Which of the following directories is the home directory for the root user account?

/root

A Linux user has an executable file named ni that can save a snapshot of network information with the date and time in a log file. The executable ni file is in the /root directory, and /root is the current working directory. Which of the following commands would run the executable file? (Select TWO).

/root/ni ./ni

What command would you enter while in vi command mode to find the term Sam?

/sam

Which of the following directories MUST remain on the same partition? (Select THREE).

/sbin /lib /dev

What is the full path to the directory that contains information about each kernel module installed on the computer?

/sys/module

Which if the following directories typically hold the dynamic libraries on your system? (Select TWO).

/usr/lib/ /usr/local/lib/

What is the full path to the directory that holds the man files on the system?

/usr/share/man

If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the log files are on the same partition as the operating system, this could potentially bring down a Linux computer. Which of the following directories (or mount points) SHOULD be configured on its own partition to prevent this from happening?

/var

What is the full path to the directory that contains data files that change constantly, including email, print jobs, and proxy cache files?

/var

Most Linux distributions propose to create the root (/) and swap partitions by default. To prevent user files and system log files from filling up the / partition, which additional partitions are you MOST strongly advised to create? (Select TWO).

/var /home

What is the full path to the directory that contains log files, including secure, messages, [application], and kern.log?

/var/log

As the network administrator, one of your responsibilities is to analyze and troubleshoot SELinux context violations. In which directory are the SELinux violations recorded?

/var/log/audit

anacron creates a timestamp file that tells you the last time a regularly scheduled job was run. What is the full path and name of the directory that contains these timestamp files?

/var/spool/anacron/

What is the complete path to the directory that will hold the crontab file for the gshant user account?

/var/spool/cron/

During installation, you must create a root user account for the system. Which of the following user account number does this account use?

0

What is the typical default umask value?

022

Which of the following hexadecimal codes represents an extended partition?

0x85

Match the correct /proc directory content on the left with the description on the right.

1) Displays the boot options that were given to the kernel at boot time. cmdline 2) Displays information about the computer's CPU. cpuinfo 3) Displays information about the current kernel version. version 4) Displays all the direct memory access assignments for the computer. dma

Match the term on the left with its characteristic on the right. (Each term can be used more than once.)

1) Has a .so or .so.version extension.Dynamic Library 2) Increases the size of the application.Static Library 3) Has an .a filename extension.Static Library 4) Is typically stored in /usr/lib/ and /usr/local/lib/.Dynamic Library 5) Can degrade program load time if the library is already in use by another program.Dynamic Library

What is the correct order for the boot phases of a Linux computer?

1. BIOS 2. Boot loader 3.OS kernel 4.system or init

During a Fedora distribution installation, you choose to add a regular user account. The only other user that has been added to the system was root. Which of the following user IDs is MOST likely to be associated with the new user?

1000

Given this entry in the /etc/passwd file: pmallory:x:1001:1050:Paul Mallory:/home/pmallory:/bin/bash Which of the following is the user ID associated with this entry.

1001

What is the default nice value for a process not executed with the nice command?

0

What does the netstat -a command show?

All listening and non-listening sockets

Which of the following statements BEST describes the PATH environment variable?

It contains the directory prefixes used to search for programs and files.

Which of the following network services or protocols uses TCP/IP port 22?

SSH

Given the command ls > myfiles which of the following describes the results?

The stdout of the ls command is redirected to the myfiles file.

The hard disk in your Linux laptop has almost reached its maximum storage capacity. You would like to add more hard disk storage but there is no room internal to the computer. Which of the following device types is BEST to use if you want to achieve the fastest throughput?

USB

Which of the following is the maximum number logical partitions allowed on an extended partition?

Unlimited

You have connected a new printer to a systemd-based Linux server. You cannot print to the new printer from a user workstation on the network. What tasks should you complete on the server first? (Select TWO.)

Use rpm -qi cups or dnf list cups to make sure the CUPS daemon is installed Use systemctl status cups to make sure the CUPS printing service is running.

Which of the following statement describes file globbing?

Using wildcards to match specific files.

What would you enter at the command prompt to display a file's type?

file

Which of the following utilities would you use to search a path for files that match a given name?

locate

Which command displays information on all USB devices connected to the computer?

lsusb

Which of the following utilities is used to manage and monitor software RAID devices?

mdadm

You need to mount the CD-ROM device to the /media/cdrom directory. What command should you enter at the command prompt?

mount /dev/cdrom /media/cdrom

As the IT System Administrator, you recently setup a new DHCP server, DHCP_03. You want to test connectivity on port 53 from other servers on the network. Which of the following commands will accomplish that task?

nc -zv DHCP_03 53

Which utility would you use to view current connections and active sessions and ports on a computer?

netstat

You would like to see how many different computers are currently connected to your local workstation. Which of the following commands would allow you to do this?

netstat

What should you enter at the command prompt to display both listening and non-listening sockets on your Linux system?

netstat -a

You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but you are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

netstat -r

Which of the following commands merges two files on a line-by-line basis and separate each line with a tab? join

paste

You need to see who has permissions to the sales_projection_q2 file. You use ls -l sales_projection_q2 and receive the following information: drwxr-xr-x 22 pclark acct 4096 Jun 19 15:01 sales_projection_q2 Which user owns this file? (Your answer is case-sensitive.) Which group owns this file? (Note: your answer is case-sensitive.)

pclark acct

You want to view all currently-running processes that include getty in the process name. Which command would you use?

ps -A | grep getty

You are using LVM on your Linux system to manage hard disk partitions. What command do you enter to scan for physical volumes on the system?

pvscan

You are an IT consultant for a small company. The company wants to increase the security of their small network. You want to move their passwords from the /etc/passwd file to the /etc/shadow file. Which of the following utilities will BEST accomplish this task?

pwconv

The /home/gshant/smp directory contains several files. The directory and files need to be removed. The current working directory is /home/gshant. What would you enter at the command prompt to remove the smp directory and all the files it contains?

rm -r /home/gshant/smp

Within the /var directory is a subdirectory named backup. Ken, a Linux administrator, needs to delete the directory backup and any files that it contains. He changes directory focus to /var. Which of the following commands deletes the directory named backup and any file it contains?

rm -r backup

The /home/gshant/smp directory is empty and needs to be removed. The current working directory is /home/gshant. What would you enter at the command prompt to remove the smp directory?

rmdir /home/gshant/smp

Which of the following utilities would you use to view the routing table? (Select TWO. Each option is a complete solution.)

route ip route show

As a system administrator, you are going to add a static route for host 195.157.66.221, 255.255.255.0. Your default gateway is 192.168.5.1, but you want this route to use gateway 192.168.7.1. Which commands will accomplish this task? (Select TWO. Each option is a complete solution.)

route add -net 195.157.66.0 netmask 255.255.255.0 gw 192.168.7.1 ip route add 195.157.66.0/24 via 192.168.7.1

What command will upgrade an RPM package only if an earlier version is already installed on the system?

rpm -F

You are experiencing a problem with a network server. You want to bring the system down and try reseating the cards within it before restarting it. Which command runs poweroff.target to shut down the system in an orderly manner?

systemctl isolate poweroff.target

What would you enter at the command prompt to find out whether cups.service is running?

systemctl status cups.service

What is the core process for a systemd-based Linux system?

systemd

Which of the following is responsible for bringing up other units and services when boot targets are changed?

systemd

You need to back up Jane's files in her /home/user/jane directory. Which command will create an archive of these files in the /root directory? (Select TWO).

tar -cvf /root/jane.tar /home/user/jane tar -czvf /root/jane.tgz /home/user/jane

You have a tape archive mounted in /dev/rmt12. You need to get a list of the file contents. Which command will list the contents?

tar -tf /dev/rmt12

You have a SCSI tape drive st0. You want to back up the contents of /var/oracle. Which command will perform the backup?

tar -vcf /dev/st0 /var/oracle

You need to restore a file, yearend.xls, from the archive 013004.tar.gz in the backup directory. The file needs to be restored to /home/accounting. Which command will perform the restore?

tar -xzvf /backup/013004.tar.gz /home/accounting/yearend.xls

Which command would you use to look for a potential resource hog on a workstation?

top

Which of the following commands transposes characters in a text steam?

tr

Which of the following apt-get options will upgrade all installed packages to the latest versions using the information in /etc/apt/sources.list?

upgrade

Which of the following commands produced this output? 06:14:11 up 139 days, 24 min, 5 users, load average: 0.12, 0.33, 0.48

uptime

You need to create a user account with the following parameters: Login name: pmorrill Comment: Paul Morrill Home directory: /home/pmorrill_temp UID: 683 Which of the following commands should you use?

useradd -c "Paul Morrill" -d /home/pmorrill_temp -u 683 pmorrill

Which of the following commands creates a volume group named backup and initializes it by adding the third disk in a Linux system to the volume group?

vgcreate backup /dev/sdc

You are using LVM on your Linux system to manage the existing volumes. After adding and initializing the fourth hard drive to the system and creating a physical volume, what command should you use to add it to the backup volume group?

vgextend backup /dev/sdd

What do you enter at the command prompt to edit the /etc/sudoers file?

visudo

Which command operator pipes the output of one command as the input of another command?

|

Which port number is used by the IMAP protocol?

143

Which of the following are not valid IP addresses? (Select THREE).

145.8.260.7 45.22.156.256 257.0.122.55

Which port number does SNMP use?

161

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select THREE).

172.18.188.67 10.0.12.15 192.168.12.253

You are the administrator for a small network of Linux hosts. Your network does not communicate with the internet and does not use DNS. When you add a new host named ENERGY7 to the network, which entry should be added to the /etc/hosts files?

192.168.0.34 ENERGY7 #Reception Area

Which of the following are true about the ASCII character set? (Choose TWO.)

Does not include international symbols. Uses a seven-bit encoding technique.

In the /etc/shadow file, which character in the password field indicates that a standard user account is locked?

!

When creating a bash script, it is important to document the purpose of the script. Which of the following is a valid comment?

# Comment text

Which dpkg option completely removes a package and its configuration files?

-P

A user has requested that each time she presents credentials to log in, a particular entry be written to a log file. This action will only apply to her, and she is using the bash shell. Which of the following configuration files is the BEST to modify to enable this action?

.profile

Which of the following paths represents the root directory?

/

Which directory contains the configuration file for GRUB 2?

/boot/grub2/

You are preparing to mount a device local to your system. Which directory holds the device files?

/dev

You have added several new hard disks to your system. After partitioning and formatting, you have modified a configuration file to mount these new file systems automatically. You want to document the change you made. Which of the following configuration files would you document?

/etc/fstab

Which file shows the currently mounted volumes?

/etc/mtab (mount tab)

When managing DNF, what is the full path to the directory where should you place .repo files?

/etc/yum.repos.d/

When managing YUM, what is the full path to the directory where you should place .repo files?

/etc/yum.repos.d/

What is the full path to the directory that contains user data for all standard users on the system?

/home

You have been currently using a cable to connect your Linux laptop to the company network. You are now, however, required to attend several meeting a week in other parts of the building and you would like to be able to bring your laptop with you, but still need access to the network while in the meeting. Which of the following device types would BEST meet your needs?

WiFi

Which component of the X11 Window System controls the placement and appearance of windows on a Linux computer?

Window Manager

Which of the following is a key difference between VPN tunnel and transport modes?

With transport mode, only the payload of the IP packet is encrypted, and the original IP headers are left intact.

Which of the following are examples of a Linux display server? (Select TWO).

X11 Wayland compositor

Which X11 Window System element is the MAIN system component?

X11 Server

Which X11 Window System element is the MAIN system component?

X11 server

Your company has implemented both Linux and Window servers. The system administrators use Windows desktops, so they have access to Windows administration tools. They routinely access the Windows servers using Windows Remote Desktop. Which of the following implementations would allow the system administrators to connect to the Linux systems using Windows Remote Desktop?

XRDP

Which of the following is a valid metacharacter that can be used in the bash shell to escape or ignore the shell's special meaning for the character that immediately follows?

\

Which of the following nano editor keyboard shortcuts will display help text which includes a list of all keyboard shortcuts.

^G (Ctrl+G)

Which awk/sort command combination displays a sorted list of usernames in the /etc/passwd file?

awk -F: '{print $1}' /etc/passwd | sort

What would you enter at the command prompt to start a new Bourne-again shell (bash) session?

bash

You have a gedit process with a job ID of 6. Which command would you enter at the command prompt to send the process to the background?

bg 6

Which of the following commands removes print job 11 from the hp7 printer?

cancel -P hp7 11

Which of the following commands can be used to combine the content of three files into a single text stream?

cat

Which of the following commands will display which boot options were given to the kernel at boot time?

cat /proc/cmdline

You need to get detailed information about the system memory. Which of the following commands will display that information?

cat /proc/meminfo

Which of the following commands sorts the contents of the wordlist1 and wordlist2 files and sends the result to standard output?

cat /usr/wordlist1 /usr/wordlist2 | sort

Which of the following commands sorts the combined contents of the wordlist1 and wordlist2 files and sends the results to both the screen and a file named sortedwordlist?

cat /usr/wordlist1 /usr/wordlist2 | sort | tee sortedwordlist

You are writing a bash script that lists the contents of a file. You would like to have any stderr messages sent to a file. Which of the following commands will write the error message to a file?

cat projects 2> projects.err

Which of the following commands gives the same results as cat < turbo?

cat turbo

What chage command should you enter at the command prompt to set the password for jsmith to expire after 60 days and give a warning 10 days before it expires?

chage -M 60 -W 10 jsmith

What would you enter at the command prompt to change the group ownership for the devstyle.txt file to rand in the present working directory?

chgrp rand devstyle.txt

You are the team lead for a marketing project. Only the members of the team3 group should have read/write permissions to a document called project_data.doc. You want to ensure that no one on the team will delete the document by accident. Your user name is bsmith.A long listing of the file is as follows: -rwxr-xr-x 1 bsmith team3 7260 June 22 2004 project_data.doc Which of the following commands will accomplish this task?

chmod 1664 project_data.doc

You need to set the SUID permission on a file named rider. Which of the following commands will accomplish this task?

chmod 4777 rider

You must change ownership of a script called myscript so that only the user owner has read/write access to it and only the user owner and group owner have execute permissions. Which of the following commands will accomplish this task?

chmod 750 myscript

A file named acctg needs to have the SGID permission set on it while keeping all other permissions at their present value. Which of the following commands will accomplish this task?

chmod g+s acctg

Troy, a system administrator, created a script to automate some daily administrative tasks. Which of the following commands would make Troy's script, /scripts/dailytasks, executable by everyone, but writable only by its owner?

chmod u=rwx,go=rx /scripts/dailytasks

There is a directory called projects owned by the user cmarcela and the group rd. cmarcela has left the company. You need to give ownership of the projects directory, its files, and its subdirectories to the user ebates, who is a member of the mgmt group. Which of the following commands should you use to change the user ownership?

chown -R ebates projects

Which of the following commands make sales the group owner of the /sales/report file? (Select TWO. Each answer is an independent solution.)

chown .sales /sales/report chown :sales /sales/report

You use ls -l /home/sales/sales_projection_q2 and get this information: drwxr-xr-x 22 pclark acct 4096 Jun 19 15:01 sales_projection_q2 Which of the following commands will change the user owner to jyoung and the group owner to sales?

chown jyoung:sales /home/sales/sales_projection_q2

You would like to make it harder for malicious users to gain access to sensitive information. Which of the following techniques can be used to remap the root directory to include only certain directories and files?

chroot jail SSH

Given the following bash script: #!/bin/bashdeclare -i count=5until [ $count -lt 3 ]doecho count $countcount=count-1done Which of the following shows the output from this script?

count 5 count 4 count 3

Which of the following command copies the entire /temp directory with all of its files, sub-directories, and files in the sub-directories to the /home/gshant directory. (Select TWO. Each answer represents an independent solution.)

cp -R /temp /home/gshant cp -r /temp /home/gshant

A Linux administrator is logged in as root and needs to copy a file named letter.doc from the USB flash drive mounted under /media/usb. Which of the following commands will copy the file from the USB flash drive to the root user's home directory?

cp /media/usb/letter.doc /root

Tom, a shell script developer, knows that the date +%A command gives the current local weekday name (Sunday, Monday, Tuesday, ...). Which of the following commands will copy the authentication log file, /var/log/auth.log, to a new file that with a filename that includes the current local weekday name?

cp /var/log/auth.log ~/auth$(date +%A).log

You want to restore files with the extension .cfg from an archive called configs.cpio. Which command will perform the restore?

cpio -ivd "*.cfg" < /mnt/hdd2/configs.cpio

Which command could you use to verify whether a crontab file exists for the thobbs user?

crontab -l -u thobbs

After logging in as root, you need to manage the crontab files for your Linux system. Which command should you use to edit the crontab file for the gshant user account?

crontab -ue gshant

You are configuring the /etc/cups/cupsd.conf file. Which command should you use to prevent remote printers from being displayed on the local system?

cupsctl --no-remote-printers

A system administrator is configuring a package manager to access packages from a local repository and take advantage of a local repository's transfer speed. Which of the following commands can be used to pull packages from an online repository? (Select THREE).

curl wget rsync

Which of following commands displays information found in the second column of the tab delimited ~/smarts file?

cut -f2 ~/smarts

Which of the following is the BEST command to use when creating a disk image?

dd

Which utility allows you to make an exact copy of a file?

dd

While writing a shell script, you want to perform some arithmetic operations. Which of the following commands is used to create an integer variable?

declare -i variablename

You are requested to help a user who reports that he has no more local storage space. You go to his system and log in as the root user. Which of the following commands will display the available disk space on all partitions? (Select TWO).

df df -h

A user is trying to access a file system mounted at /mnt/sdb1, but receives an error that states No such file or directory. Which commands can you use to see the current mount points? (Select TWO).

df mount

When creating an ext2 or ext3 file system, a fixed number of inodes is assigned. Which of the following commands shows the number of inodes, number of free inodes, and number of used inodes?

df -i

You have created a separate partition for the sales team and mounted it to the /sales directory. The team is about to begin a new project, and they want to make sure there is enough disk space to hold upcoming files. Which of the following commands will show you the amount of free space?

df /sales

You are troubleshooting a workstation that is having trouble while browsing the internet. You want to perform some tests on name resolution. Which utility would give you the most information?

dig

Which of the following commands can be used to retrieve the IP address and/or the FQDN or hostname information from a DNS server? (Choose ALL that apply.)

dig nslookup host

You used DNF to list the Ruby packages that are available to install. You see that there is a package available that is called ruby. What DNF command do you use to install this Ruby package?

dnf install ruby

Removing unnecessary software increases the security of your Linux system. If your system uses RPM for package management, what can you enter at the command prompt to look for unnecessary software that might be installed on your system?

dnf list installed

You have users who need to do some programming projects in the Ruby programming language. What DNF command do you use to find out whether there is a Ruby package available for installation on the Linux server?

dnf list ruby

You have installed a package called mathpac with DNF. After a system upgrade, the package is not working correctly. Which of the following commands should you try first to get the package to function?

dnf update mathpac

A script named myscript contains the following command line: echo $1 $2 $3 The following command is typed in an interactive shell. myscript dog cat bird frog Which of the following will be displayed in the interactive shell?

dog cat bird

What dpkg command would you enter at the command prompt to search for packages that have been partially installed on the system?

dpkg -C

What dpkg command would you enter at the command prompt to list information about a currently installed Debian package?

dpkg -p

Which of the following commands will reconfigure an already installed package?

dpkg-reconfigure

What command would you enter at the command prompt to list all files and directories in the badams home directory along with a file size and a total amount of space taken up by the directory?

du -ac /home/badams

Which of the following command allows you to use an alternative superblock when the primary superblock has been corrupted?

e2fsck -b 16385 /dev/sda1

A technician recently added a new disk drive to a system, and the drive is not available. Which of the following commands scans the host bus adapter (HBA) and detects the newly added drive?

echo "- - -" > /sys/class/scsi_host0/scan

Anna, a technician, executed a command to display the contents of a file and received the output. [user@linux ~]$ cat myfile.txtat: myfile.txt: No such file or directory Which of the following commands would Anna enter to find out the exit code that was returned by this command?

echo $?

You want to view the number of commands your bash shell is set to save by examining the current HISTSIZE environment variable. You don't want to have to scroll through all the environment variables. Which of the following commands is the BEST way to determine the current value of the HISTSIZE variable?

echo $HISTSIZE

Which of the following commands shows the value of the LANG environmental variable currently set for the language the operating system uses?

echo $LANG

Which of the following commands would display this output? Frank said, "Linux is fun!"

echo Frank said, \"Linux is fun\!\"

Which of the following commands will open the quota file for a specific user?

edquota -u

Which command should you enter at the command prompt to change the quota settings for the gshant user?

edquota -u gshant

You are searching the standard input for any line containing "JAMESTOWN" at the end of a line. Which egrep constructor should you enter at the command prompt?

egrep JAMESTOWN$

Two users should have identical settings, yet one is having problems with the display on his screen, and you suspect there is a difference in their environment variables. Which of the following commands displays all of the environment variables?

env

Which command displays all the environment variables defined in the shell?

env

As a Linux user, you have access to an executable file named myapp. It's found in the current directory, but not in the command path. What would you enter at the command prompt to start the myapp file and replace the shell with myapp process?

exec ./myapp

You have used su to switch to the root user account to do system administration tasks. Now you want to revert back to your regular user account. Which command should you use?

exit

You need to set the COMP variable to the value 1745. Which of the following commands sets the variable so it is inherited by subsequent child shells?

export COMP=1745

You recently used the HOST=FS4 command. Which of the following commands should you use to change the HOST variable to a global variable that will be inherited by subsequent child shells and processes?

export HOST

Tim, a technician, created a local variable named val and set it to 5000 at the bash prompt. Tim wants to use the variable in a script. But when the script is executed, the value of val is not set to 5000. Which of the following commands would allow Tim to set a global variable that would be available to the script?

export val=5000

The system requirements for a new Linux computer show that the system will primarily be used to store documents of small size. Which of the following file systems would be the MOST efficient at storing these documents on a Linux system?

ext4

Which of the following Linux file systems support journaling?

ext4

Which of the following is the MOST common Linux file system?

ext4

Which of the following commands/command sequences can be used to view the partition information on the first hard disk? (Select TWO.)

fdisk -1 fdisk /dev/sda, then press p

Which of the following commands partitions the second hard disk on a Linux system?

fdisk /dev/sdb

You have several processes running in the background, as shown by the jobs command below: [1]+ Running gedit & [2]+ Stopped crontab e Which command will bring the gedit program to the foreground?

fg 1

You need to find all files in the /home/gshant directory that are larger than 300K. You change your directory to /home/gshant. What would you enter at the command prompt to find these files?

find -size +300k

Which of the following commands finds all of the files on the system that have either blue or gold in their names?

find / -name '*blue*' -o -name '*gold*'

Which of the following commands finds files with the .txt extension in the /home/gshant directory?

find /home/gshant -name '*.txt'

You are accessing the /home/shants/depsmark text file through a terminal connection. The file has long lines of text, yet your terminal only shows 75 characters per line. Which of the following commands will limit the lines in the file to the limits on the terminal?

fmt -w 75 /home/shants/depsmark

Which partition management utility can be used to define and change various different GUID partition configurations without committing the configuration to the disk until the w command is used?

gdisk

You have installed a new blank hard drive on you Linux system. This is the second drive on the system, so it is represented in the file system by the /dev/sdb file. You need to create GUID partitions on this drive. What command do you use to start the GUID disk management utility to create partitions on the /dev/sdb drive?

gdisk /dev/sdb

What command would you enter at the command prompt to start the gedit program in the background?

gedit &

What is the result of the nohup gedit & command?

gedit will start in the background and persist in the background after logging out of the shell

A script developer is working on some new features for the administering Linux servers and wants to add the features without changing the master branch. Which of the following is the BEST command to use?

git branch

A technician wants to obtain the ABRT repository from a git online service. Which of the following commands should be used?

git clone [email protected]:abrt / abrt.git

Cindy, a technician, created a perl script named server-info.pl that used for gathering server information. Cindy wants to add the file to the repository and has executed the command git add server-info.pl. Which of the following commands should she execute NEXT?

git commit -m "Adding server-info.pl script"

After installing Git and before the first commit is made, the user.name and user.email properties need to be configured. Which of the following commands are used to configure these properties?

git config

Which of the following is the BEST command for initializing a new Git repository?

git init

Which of the following is the BEST command for showing the commit history of a repository?

git log

Which of the following is the BEST command used to join a branch to a master?

git merge

Alberto, a system administrator, is working with another system administrator, Leroy, to update the bash scripts used on various servers. The bash scripts are stored in a Git repository. Alberto updated a script that may have also been updated by Leroy. Which of the following commands SHOULD Alberto execute before he commits his changes to the repository?

git pull

Lydia, a developer, recently made changes to some files and wants to update the changes on the master branch. Which of the following is the BEST command to use for this purpose?

git push

You are working on a Linux distribution that uses systemd. Which non-symlink file in the /usr/lib/systemd/system/ directory is used to start the services necessary for multiple users, networking, and a graphical display?

graphical.target

Which if the following commands displays the user groups that dblair is a member of?

grep -e dblair /etc/group

Which of the following commands displays all the lines in the blue_and_gold file that do not contain the word 'Karen'?

grep -v Karen blue_and_gold

An application named ABCD is generating system errors when it starts. Which of the following commands searches the system message log file for these errors?

grep ABCD /var/log/messages

Which of the following commands displays all lines within the MTS file that have the word "world" within them?

grep world MTS

You are the administrator for a small company. You need to create a new group for users in the sales department. You need to name the group sales. Which command will accomplish this task?

groupadd sales

You have a group named temp_sales on your system. The group is no longer needed, and you want remove the group. Which of the following is the BEST command for accomplishing this task?

groupdel temp_sales

Due to a merger with another company, standardization is now being imposed throughout the company. As a result of this, the sales group must be renamed marketing. Which of the following is the BEST command to use to rename the group?

groupmod -n marketing sales

What would you enter at the command prompt to display the primary and secondary group memberships for the gshant user account?

groups gshant

Which of the following commands will help you to determine which version of GRUB is installed on your Linux system?

grub-install -v grub2-install --version

After updating the settings in the /etc/default/grub file, you know the changes must be written to the grub.cfg file before they will be used. What would you enter at the command prompt to write the changes to the grub.cfg file?

grub2-mkconfig -o /boot/grub2/grub.cfg

Which of the following commands should a Linux user enter to see a list of all the commands the user recently ran at the command prompt?

history

When a Git repository is created using git init, Git creates a directory named .git. This directory contains all the information necessary for that repository to work correctly. Which of the following directories contain the scripts that are run during each Git phase?

hooks

What would you enter at the command prompt to find the IP address for the xyzcomp.com domain?

host xyzcomp.comv

Your site is dependent upon the use of the rlogin utility for remote access. For security reasons, you want to prevent the hosts in the marketing department from accessing the payroll server, but allow all others to do so. Which of the following files should you use to create this restriction?

hosts.deny

You want to configure CUPS from a web browser. Which URL address and port should you enter within the web browser's address field?

http://localhost:631

You need to set the hardware clock to the same value as the system clock. Which command should you use?

hwclock -w

Which of the following commands will display information about the RAID devices on the computer?

hwinfo --listmd

You are working with the RPM package acroread-8.1.3-51.6.i586.rpm. Match the naming convention term on the left with the associated file name segment on the right.

i586 Architecture type 8.1.3 Version number acroread Package name 51.6 Release number

Which keys are generated when you execute the ssh-keygen command with no options? (Select TWO.)

id_rsa id_rsa.pub

You need to temporarily change the IP address of the network interface (enp2s0) to 192.168.1.50. The network interface's IP address is currently set to 10.0.1.50. Which of the following commands would achieve the desired result?

ifconfig enp2s0 192.168.1.50

As you troubleshoot the network connection for your Linux system, you discover that the eno32 interface is down. Which command should you use to start the interface?

ifup eno32

The enp2s0 interface is currently down. What can you enter at the command line to start the enp2s0 interface?

ifup enp2s0

You are experiencing a problem with a SysV init network server. You want to bring the system down and try reseating the cards within it before restarting it. Which command completely shuts down the system in an orderly manner?

init 0

The enp2s0 network interface has already been assigned the IP configuration 172.16.1.123/16. Which command would you use to temporarily configure a second IP address of 192.168.0.123/24 for this network interface?

ip addr add 192.168.0.123/24 dev enp2s0

You need to set an IP address for enp2s0 to 192.168.15.2 with a subnet mask of 255.255.255.0. Which commands are correct? (Select TWO).

ip addr add 192.168.15.2/24 dev enp2s0 ifconfig enp2s0 192.168.15.2 netmask 255.255.255.0

Which commands display the IP address and subnet mask values configured on a workstation? (Select TWO).

ip addr show ifconfig

You have just made IP configuration changes in the ifcfg-enp2s1 file. You do not want to restart the Linux system or restart the network service to put these changes into effect. There are two ip commands you can use to put these changes into effect. What is the first ip command you enter at the command line to put these changes into effect? What is the second ip command you enter at the command line to put these changes into effect?

ip link set enp2s1 down ip link set enp2s1 up

After the acquisition of another company, you are in a position where you must add another network to the existing routing tables. Which of the following commands would you use to accomplish this task? (Select TWO. Each option is a complete solution.)

ip route add 11.12.13.14/24 via 201.12.3.4 route add -net 11.12.13.14/24 gw 201.12.3.4

As a system administrator, you need to add a static route so that you can reach host 195.156.76.122, 255.255.255.0 and the device eno32 to find the target network. Which commands will accomplish this task? (Select TWO. Each option is a complete solution).

ip route add 195.156.76.0/24 dev eno32 route add -net 195.156.76.0 netmask 255.255.255.0 dev eno32

Given the following bash script, #!/bin/bashfor i in $(ls)doecho item: $idone Which of the following shows possible output if the script is executed from Bill's home directory?

item: Desktop item: Documents item: Downloads

Which of the following commands will merge two files based on identical fields of text?

join

Linux systems that use SysVinit (init) use the syslogd daemon to manage logging. Which of the following daemons is used on newer system-based distributions to provide a local system log file?

journald

Match the vi command on the left with the description of the cursor movement the on the right.

k-Move the cursor up a line. h-Move the cursor one space to the left. i-Move the cursor one space to the right. j-Move the cursor down a line.

To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select TWO).

20 21

As an administrator, you are tasked with configuring an Apache web server by modifying the /etc/apache2/apache2.conf file. You open the file in vi. As you're looking at the file, you knock your spill-proof drink container onto the keyboard. It rolls over several keys as you try to pick it up. Now there are extra characters everywhere in the text buffer. Which of the following commands can you use to exit vi without saving any changes that were made to the text buffer?

:q!

Which of the following vi key combinations should you press while in Insert Mode to save the file you are working on and quit?

<Esc>:wq

Which is the most correct description for 3DES?

3DES is a very secure mode of the DES algorithm encryption method that encrypts data three times using a 168-bit key.

Which of the following is the maximum number of primary partitions that can be created on a single hard disk drive?

4

You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?

53

Which of the following statements best describes the function of the repquota /home -vu command?

A summary of disk usage and quotas is displayed for the users who have files within /home.

You want to allow any host from westsim.com to have access to your system. Which of the following line items would you add to the /etc/hosts.allow file to accomplish this task?

ALL: .westsim.com

You want to allow any host from westsim.com to have access to your system except a system called testsvr.westsim.com. Which of the following line items would you add to the /etc/hosts.allow file to accomplish this task?

ALL: .westsim.com EXCEPT testsvr.westsim.com

Which of the following actions can be used to define a persistent alias?

Add the command defining the alias to the appropriate shell configuration file.

Which of the following is a key difference between agent-based orchestration and agentless orchestration? (Choose TWO).

Agentless orchestration does not require a proprietary software agents to be installed on the managed hosts. Agent-based requires that proprietary software is installed on each device you wish to monitor.

Gloria, a Linux administrator, used the gdisk utility to create eight partitions on a new hard drive. Which of the following BEST describes the partitions Gloria has created?

All eight partitions are the same. They are simply partitions. There are no primary, extended, or logical partitions.

Which of the following actions does the dpkg -l (lowercase L) command perform?

All packages with names that match a specified pattern are displayed

Which of the following is displayed when the uname -a command is run?

All system information

You would like to use SSH port tunneling to work on a remote system. You also need to ensure that all data that you send to the remote system is encrypted. Which SSH configuration option, in the /etc/ssh/sshd_config file, needs to be set yet to yes?

AllowTCPForwarding

Which of the following are valid IPv6 addresses? Select all that apply.

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

For Linux files, the default permission is 666, and the default umask is 022. When a new file is created, it will be assigned 644 (rw-r--r--) permissions. If the umask is set to 027, what permissions will be assigned for newly created files?

640 (rw-r-----)

You are called into the office of a newly hired manager. He has copied a file from his old place of work onto his new workstation, but is now receiving an error message that access is denied each time he tries to access the file. He is not the owner of the file or a member of the group the file is associated with. Which of the following represents the LEAST set of file permissions needed for him to be able to read and write to the file?

666

After opening a file in vi, you want to switch from Command Mode to Command Line Mode. What key invokes Command Line Mode?

:

Tom, a Linux administrator, has installed a new hard disk. He creates two primary partitions, sdb1 and sdb2, and one extended partition, sdb3. He formats sdb1 with ext3 and sdb2 as a swap area. When Tom attempts to format sdb3 as a swap area, he is unable. Which of the following explains why Tom can't format sdb3?

An extended partition can't be formatted.

What is the purpose of the find / type f -perm -o=x -ls command?

Audit files in the root directory that have execute permissions for others.

What is the purpose of the find / type f -perm -u=s -ls command?

Audit files in the root directory that have the SUID bit set.

Tim, a system administrator, wants to simplify the provisioning and disabling of user accounts. Which of the following server roles should Tim install and configure?

Authentication server

Which system component verifies the hardware and passes control of the computer to the boot loader?

BIOS

You have an anacrontab file with the following settings: RANDOM_DELAY=35 START_HOURS_RANGE=17-23 #period in days delay in minutes job-identifier command1 5 cron.daily nice run-parts /etc/cron.daily7 20 cron.weekly nice run-parts /etc/cron.weekly@monthly 50 cron.monthly nice run-parts /etc/cron.monthly Between which hours of the day will tasks scheduled with anacron start to run? Between 5:00 p.m. and 11:00 p.m. If the system was down during the time period a weekly task was scheduled to run, what is the minimum amount of time anacron will wait to run a task after the system is back up? 20 minutes If the delay for daily tasks is 5 minutes, how much time will anacron add to the delay of 5 minutes before it runs the scheduled daily task? A random chosen number of minutes between 0 and 35

Between 5:00 p.m. and 11:00 p.m. 20 minutes A random chosen number of minutes between 0 and 35

As a network administrator, you have had several users ask for a way in which they could connect their phones to their Linux computer, without the use of wires. Which of the following device types would BEST meet these user's needs?

Bluetooth

A user sends two print jobs to the Marketing printer (the default printer). She notices the printer is stalled on the first document and uses the lprm - command. What will be the result?

Both of her jobs will be deleted.

You have a user who has difficulty typing. She is constantly pressing keys multiple times by accident. Which keyboard accessibility option should you enable?

Bounce keys

Which of the following is the standard shell for MOST Linux computers?

Bourne-again shell (bash)

Your company recently setup a VPN and wants to use a digital certificate for authentication instead of a pre-shared key. Which of the following server roles would allow the company to provide this functionality internally instead of using an external provider?

Certificate Authority

You are asked to help a user who is complaining that file system errors are being reported during boot-up. When you reboot the user's system, you see errors on sda2. Which of the following strategies will check the file system on sda2 and fix the errors?

Change to single user mode and run fsck /dev/sda2.

Which of the following desktops was derived from GNOME 3, follows traditional desktop metaphor conventions, and is the primary desktop environment for the Mint distribution?

Cinnamon

Your company is running a critical business application. The executive team wants to ensure the server is available at all times, even in the event of a server failure. Which of the following server roles would be used to provide a failover server in the event of a system failure?

Clustering

Match the vi mode on the left to the correct definition on the right.

Command Mode -The initial vi mode used when vim is started. It has commands that cut and replace text, and it is the mode vi uses to enter the other modes. Command Line Mode-The vi mode that works with the file system. Use it to save files after editing them. Edit Mode - The vi mode that vim uses to write and edit text in the file.

Your company develops applications to run on Linux systems. You currently have four teams working on a different aspect of the same application. Which of the following server roles would give you the BEST method for testing all team members' code without effecting your part of the project or your operating system and personal files?

Containers

Which of the following describes the effects of the tune2fs -j /dev/sdb1 command?

Converts the /dev/sdb1 device to ext3

Which of the following steps must be completed after creating a logical volumes so that the logical volume can be used to store files?

Create file systems on the volumes and mount them.

Which of the following would enable the rsync service to be managed by the xinetd super daemon?

Create the rsync file in /etc/xinetd.d

While editing a script using gedit, you discover that you no longer have access to your current terminal session and need to check the values of some variables the script is using. Which of the following commands will send the gedit process to the background so you can regain access to the current terminal?

Ctrl + Z

The graphics driver was recently updated on a system. Now, the graphical user interface (GUI) is not displaying, preventing the user from logging in. You need to access the system locally to login. Which of the following commands will access the virtual terminal tty2?

Ctrl+Alt+F2

Which of the following man page sections shows a list of options available for a Linux command and explains what the options do?

DESCRIPTION

Users are complaining that they are unable to connect to any servers or the internet. Based on the symptoms they describe, you suspect that the users are not being assigned the correct IP addresses. Which of the following server roles would be the BEST role to work with to correct this issue?

DHCP

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts are assigned the same IP address. Which protocol can you implement on your network to help prevent problems such as this?

DHCP

Which network service would you use to get the IP address from the Fully Qualified Domain Name (FQDN) hostname?

DNS

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which of the following protocols should you implement?

DNS

Which of the following provides security for datagram-based applications by allowing them a communication method designed to prevent eavesdropping, tampering, and message forgery?

DTLS

Alex, a webmaster, is implementing an order processing system on the company's website. Which of the following server roles should Alex implement with the order processing application?

Database

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gateway

Which routing component is used to forward packets to remote networks?

Default gateway

Which of the following are Python scripts classified as intrusion prevention software that provide dynamic rule sets to automate the rules iptables use to filter network traffic? (Choose TWO.)

DenyHosts Faill2ban

After running ps -ef, you notice a number of processes that display getty. You are not familiar with that process and want to make sure it is not malicious, so you check the man pages and find that is a valid Linux process that manages physical or virtual terminals (TTYs). What should you do NEXT?

Determine the process is not a concern.

Which of the following is a characteristic of a symbolic link?

Distinct (non-duplicate) inode.

You have found a patch for the Samba server on your system. The patch is a .rpm package. Which of the following procedures is the MOST correct for installing the package?

Download the package. Run rpm -Uvh on the package to install the update.

Yesterday, you created a new swap area for your system. Today, after rebooting the system, you find that the swap area is not mounted. What should you do to ensure that the swap area is mounted each time the system boots?

Edit /etc/fstab and add the swap partition.

You have a dual-boot system with a Linux and Windows operating systems. You need to configure the GRUB 2 bootloader to display the menu for 12 seconds before it automatically boots the default operating system. Which of the following is the BEST first step to configure the bootloader?

Edit the timeout parameter in the /etc/default/grub file to say GRUB_TIMEOUT=12.

Which of the following describes an IPv6 address? (Select TWO).

Eight hexadecimal quartets 128-bit address

You manage a Linux server that occasionally needs to provide ftp services at irregular intervals. To save on resources, you want to have the ftp server service running only when it is needed, and stopped the rest of the time. Which of the following solutions would satisfy these requirements and require the LEAST amount of effort?

Enable the ftp service to be managed by the xinetd service.

You want to limit Telnet access to three specific users. Which of the following strategies will BEST accomplish this goal?

Enter IP address enries for the three users in the /etc/hosts.allowfile.

You are the system administrator of a test lab that uses the Linux operating system. For security reasons, your lab is not connected to the corporate network. Therefore, you are not able to resolve host names via the corporate DNS server. You want to be able to connect to the lab computers using hostnames, but you do not have the resources to bring up your own DNS server. Which of the following solutions would satisfy your requirements?

Enter the IP addresses and host names for all of the lab computers in the /etc/hosts file on each of the machines in the lab.

Your ISP has changed the IP addresses of their DNS servers. What would you need to do on your Linux system to still be able to continue resolving host and fully qualified domain names if you use statically assigned IP address information?

Enter the IP addresses of the new DNS servers into the /etc/resolv.conf file.

You have just installed a new Linux system, which is using the Wayland system. Which of the following is a VALID statement regarding this system?

Events captured from the keyboard are sent to the Wayland compositor and then the Wayland client, where the rendering takes place.

Which of the following is a valid IPv6 address?

FEC0::AB:9007

Your company uses both Linux desktops and Windows desktops. Which of the following server roles should be used to provide a central location for users of both operating systems to share files?

File server

When configuring the SSH daemon using the /etc/ssh/sshd_config file, which options can be set to either prevent or allow unrestricted access to all GUI features on the client? (Select TWO).

ForwardX11Trusted X11Forwarding

Which of the following desktops is the default for many Linux distributions, such as Fedora and Ubuntu?

GNOME

You are editing the /etc/default/grub file. Which option should you use to set the default operating system?

GRUB_DEFAULT=

Which of the following commands configures the shell to retain 300 recently used commands in the ~/.bash_history file for multiple shell sessions?

HISTFILESIZE=300

Which environment variable affects the number of past commands stored in memory in the current shell session?

HISTSIZE

Which values are set for the following environment variables? Type echo $variable at the prompt to answer the question. The variables are case sensitive. HOME

HOME /root LANG en_US.UTF-8 SHELL /bin/bash TERM linux

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select TWO).

Hexadecimal numbers 32 numbers grouped using colons

Which accessibility options adjusts the background and text colors to improve readability?

High contrast

If you are viewing the contents of a man page, which key can you press to get back to the beginning of the page?

Home

Carlos, a system administrator, needs to set up a VPN tunnel from a branch office to the main office. Data security is a high priority. Which of the following will allow the IP packets to be encrypted and encapsulated in a new IP header that is sent through the VPN tunnel?

IPSec

You need the DNF utility to check specific URLs for RPM repositories. Which of the following locations should you add the URLs to?

In .repo files within the /etc/yum.repos.d/ directory

Which of the following represent a typical Linux backup type? (Choose FIVE.)

Incremental Differential Snapshot Full Image

Which of the following situations is most likely to cause a dependency problem?

Installing two different packages that both include /usr/lib/graphlib.

Orchestration is the automated configuration, coordination, and management of computer systems and software. Orchestration takes advantage of several tasks that are usually automated to create a more complex workflow. Which of the following workflows needs can be satisfied by orchestration? (Choose FOUR).

Inventory Automated builds and code deployments Configuration management Server provisioning

Which of the following are multifactor authentication supported by Linux? (Select THREE.)

Iris pattern Fingerprint One-time password (OTP)

A Linux system can determine the time and date in which of the following ways? (Select TWO).

It can use NTP to set time. It can set the system clock to the local time.

Which of the following desktops emulates a Windows desktop, especially in the location of the menu options and bottom panel bar?

KDE

Which of the following are popular Linux desktops? (Choose FIVE).

KDE Cinnamon GNOME Unity Mate

Which of the following nano text editor features makes it easier for beginners to learn than the vi text editor?

Keyboard shortcuts are displayed at the bottom of the editor.

During the process of troubleshooting a resource issue on a server, the technician entered the following command and received the output showing zombie processes. [user@centos7]#ps aux |grep Z USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND ljenkins 2346 0.0 0.0 0 0 ? Z 08:44 0:02 [kdmflush] ljenkins 3365 0.0 0.0 0 0 ? Z 08:64 0:14 [bioset] ljenkins 3812 0.0 0.0 0 0 ? Z 09:31 0:05 [bioset] ljenkins 4957 0.1 0.0 0 0 ? Z 10:16 0:35 [email-client] ljenkins 5276 0.1 0.0 0 0 ? Z 12:04 0:45 [email-client] What should the technician do NEXT to resolve the issue with zombie processes?

Kill the parent process.

You are trying to pipe data from the cat command to another program, but the data output does not make sense. You believe that the system's locale is corrupting the output. To test your hypothesis, you decide to change a locale environment variable. Which of the following changed variable would MOST likely produce correct data?

LANG=C

Which environment variable overrides all other locale settings and sets all locales to the same setting?

LC_ALL

Which environment variable specifies additional directories to search for library files not listed in /etc/ld.so.conf?

LD_LIBRARY_PATHv

You work for a growing small business where the executives are traveling and working remotely. Which of the following would offer the BEST protection for sensitive data on their laptops?

LUKS disk encryption

What effect does the ulimit -t 600 command have on a Linux system?

Limits CPU time for a process to 10 minutes.

Within the /etc/security/limits.conf file, you notice the following entry: @guests hard maxlogins 3 What effect does this line have on the Linux system?

Limits the number of maximum logins from the guest group to three.

Which of the following describes link-local IPv6 addresses? (Select THREE).

Link-local IPv6 addresses must be assigned to any network interface on a Linux system. Link-local IPv6 addresses are not routable. Link-local IPv6 addresses begin with FE8, FE9, FEA, or FEB

Running Linux and Windows on the same physical computer. Infrastructure as a Service (IaaS). Used by Google on many of the physical products it sells. Manages intelligent devices, such as automation and control equipment.

Linux virtualization, Linux and Cloud computing, Linux on mobile devices, Embedded Linux

Which of the following lines in the /etc/cups/cupsd.conf file will configure CUPS to listen for print jobs coming in on the server's network interface with the IP address 192.168.0.1 through the IPP port?

Listen 192.168.0.1:631

You are the only Linux administrator for a very small company. You are constantly asked to fix one problem or another as they occur. Which of the following is the BEST way to log into the system each morning?

Log in as a regular user and then use su as needed to solve problems.

Capturing a timeline of events that have taken place on the computer in the form of a file. A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. Increases response time to back-end servers by distributing the workload across the available servers. A computer that provides indirect internet access to the computers in your network.

Logging, VPN, Load balancer, Proxy

Which of the following desktops were started by an Arch Linux user in response to the negative reception of GNOME 3 and continue to follow the GNOME 2 code base?

MATE

What is the name of the hash function used to verify the public key for an SSH connection?

MD5

You are attempting to ping the FQDN of a computer on the internet, but are not getting a response. What is the problem?

Pinging the FQDN of a computer does not give you enough information to know what the problem is.

Which of the following server roles would you implement to provide services offered by CUPS and IPP?

Print server

You want to enable public key authentication on the server. Which option in the /etc/ssh/sshd_config file needs to be set?

PubkeyAuthentication yes

Which of the following technologies can used to set up passwordless SSH logins by distributing a server SSH certificate?

Public key infrastructure (PKI)

Which of the following functions does the dpkg --configure command perform?

Reconfigures an unpacked package

You obtain your applications and updates in RPM format. Which of the following distributions is your system based on?

Red Hat

What does the lprm command do?

Removes jobs from the line printer print queue

Which of the following statements BEST describes the repeat key keyboard accessibility option?

Repeat keys affect how quickly the action associated with the key is repeatedly performed when the key is pressed and held down.

In an effort to secure the internal network, the system administrator has implemented a host-based firewall and set up explicit allow and deny statements for specific ports and services. Some of the employees are complaining they can no longer access the applications they need. The server was on the internal network connected to an internal router, which is connected to the DMZ and an external router to the internet. Which of the following is the most likely causing problems?

Restrictive ACLs on the firewall.

You have previously installed the package mplayer and wish to remove it from your computer. Which of the following removal methods should you use?

Run the command rpm -e mplayer.

You are attempting to ping another computer on the internet by its IP address, but you are not getting a response. You do get a response when you ping a host on your own network. Which of the following options would help you better determine where the problem is?

Run traceroute on the IP address of the computer on the internet.

You need to manage a process in the foreground by pressing Ctrl+C on the keyboard. Which signal code is sent to the process?

SIGINT

Which of the following industry-standard management systems can be used by agentless orchestration? (Choose FOUR).

SNMP CIM SSH WMI and WinRM

A protocol used to communicate with and monitor network devices and servers. A protocol used to securely log on to remote systems using encryption. Resolves (or maps) the fully qualified domain names (FQDNs) to IP Addresses. A program responsible for accepting HTTP (Hypertext Transfer Protocol) requests from clients. Web server

SNMP, SSH, Name server, Web server

Which of the following provides a complete open-source solution for remote access to virtual machines?

SPICE

Which version of SSH supports the Rivest, Shamir Adleman (RSA), and Digital Signature Algorithm (DSA) encryption standards?

SSH2

Which of the following virtual private networks (VPNs) utilizes digital certificates to ensure that only the intended recipients can view and use the data sent?

SSL/TLS

Roberto, a help desk technician, received a call from Sally. She was not able to change to a directory that she owns. The following is the output from the commands that Sally entered: [sally@linux ~]$ ls -aldrw-rw-rw-. 2 sally sally 6 Mar 14 16:08 Reports[sally@linux ~]$ cd Reports/bash: cd: Reports/: Permission denied[sally@linux -]$ Based on the output, which of the following describes the problem?

Sally does not have the eXecute permission as owner of the directory.

Which of the following systemd unit-specific sections describes how to manage services or applications on the server?

Service

Which of the following will prevent a user from booting a computer, booting from removable devices, and changing UEFI/BIOS settings?

Set a UEFI/BIOS password.

For Linux systems where physical access could be compromised, which of the following best practices should be implemented to prevent a user from booting into single user mode with root access?

Set a bootloader password.

If an attacker boots into single user mode, they are logged in automatically as the root user without being required to enter the root password. Which of the following is the BEST measure should you take to prevent this event from happening?

Set a bootloader password.

You have just installed a new program that will be used by all users on the computer. After installation, you log in as a regular user, and you try to run the program. The program stops and displays the following error: Error: not running as root What should you do so that all users can run this program?

Set the SUID on the program.

For what purpose would you edit the /etc/localtime file?

Set the current time zone.

IPv6 is configured using several methods. In which method do clients use Neighbor Discovery Protocol to send router solicitation and router advertisement messagesto learn the subnet prefix and default gateway as part of an automatic interface ID generation process?

Stateless autoconfiguration

The ls command in the current working directory gives the following listing: lrwxrwxrwx 1 root root 4 2010-11-05 mydata -> shantsgems-rwxr-xr-x 1 root root 382 2010-10-05 shantsgems Which of the following is true of the files in this listing?

The mydata file is a symbolic link to the shantsgems file.

Leroy tries to copy some files to an ext3 volume and received the following error: "No space left on device." Leroy executes the df command and determines that there is sufficient space to copy the files. He also verifies that he has permission to copy the files. Which of the following BEST describes Leroy's problem?

The number of inodes has been exhausted.

You are viewing the /etc/passwd file, and you notice the following entry: pclark:x:1001:1001:Petunia Clark:/home/pclark:/bin/bash What statement BEST describes this entry?

The pclark password is stored in the /etc/shadow file.

IPv6 uses 128-bit addresses. The address contains two 64-bit components. What is the first 64-bit component called? What is the last 64-bit component called?

The prefix The interface ID

Mario, a technician, executed pgrep -u sally and received the following result: 1036 Which of the following describes the result?

The process ID of the process that was executed by the user sally.

Which of the following describes Infrastructure as Code (IaC)?

The process of managing and provisioning computer data centers.

You have a system with more than one Linux operating system installed. During the system's bootup process, which component loads a splash screen, allowing you to choose which operating system you want to run?

The secondary boot loader

Ted, a Linux user, creates symbolic links in his home directory to a set of files in their /data directory using the ln -s command. Later, a system administrator deletes the files in the /data directory. What happens to the symbolic links that Ted created?

The symbolic links still exist in Ted's home directory, but they are useless because the link has been broken.

While reading about file system permissions in Linux, you discover that the default permissions assigned to new files when they are created are rw-rw-rw- (666 octal), and new directories are rwxrwxrwx (777 octal). However, when you create a new file in a directory called /data, the permissions assigned are rw-r--r--. Which of the following BEST explains the results you are seeing?

The umask must be set to 0022 and, therefore, block the write permission for the group owner and everyone else.

What would be the outcome of the following command? userdel -r jjones

The user account, jjones, would be deleted along with jjone's home directory.

What information about print jobs does the lpq utility display? (Select TWO).

The username of the person who submitted the job. A numerical job ID that can be used to manipulate the job from other utilities.

The following line is a sample entry in the /etc/shadow file: lclark:$ab7Y56gu9bs:12567:0:99999:7::: What does the second field represent?

The users encrypted password.

Given the following bash script, what is the output if the user enters Kali? #!/bin/bashecho 'Which Linux distribution do you like? 'read distro case $distro inubuntu)echo "Ubuntu is based on Debian.";;centos|rhel)echo "CentOS and RHEL are RPM based distributions.";;windows)echo "That is not a Linux distribution.";;*)echo "This is an unknown Linux Distribution.";;esac

This is an unknown Linux distribution.

What is the purpose of the -N option in the following command? ssh -f -N -L 2345:mail.mydomain.com:110 [email protected]

To ensure that SSH does not execute a remote command.

Which of the following is the main purpose of the xinetd service?

To receive client requests for network services and start and stop them on demand.

Using the vi editor in Insert Mode, you made a few changes to the /boot/grub/grub.conf file. You now need to switch to command mode, save the changes, and quit. Which of the following keystrokes and commands should you use? (Select TWO.) (Each answer is a required part of the solution.)

Type :wq Press the Esc key

Which of the following character sets is a variable length encoding standard of Unicode that uses one to four 8-bit bytes to support many languages and most commonly used on Linux?

UTF-8

Which of the following popular Linux firewalls are based on Netfilter? (Choose THREE).

Uncomplicated Firewall (UFW) IPTables firewalld

Which of the following desktops was the default for Ubuntu until 2017?

Unity

After arriving at work in the morning, you turn on your Linux workstation and attempt to visit an internet news site. After a few minutes, your web browser times out telling you that the website is unavailable. Which of the following troubleshooting steps would help you determine the cause of this issue? (Choose TWO).

Use the traceroute command to traceroute the FQDN and IP address of the website you are trying to reach. use the ping command to ping the FQDN and IP address of the website you are trying to reach.

Which of the following orchestration attributes are typically configured? (Choose TWO).

User name, title, and employee ID for user orchestration. Start and stop time.

Which of the following users MOST benefit from the sticky keys accessibility option?

Users who have difficulty pressing multiple keys at the same time.

Which file system is a FAT32 file system for Linux?

VFAT

Linux provides technology that allows the user to remotely view a graphical user interface and control mouse and keyboard events.Which of the following technologies establishes a connection with a remote computer using a viewer on one end and a server on the remote end?

VNC

Maria, a user, is working remotely from a hotel while traveling for business. Maria needs to access some sales resources on the company's network. Which of the following would allow Maria to securely access the resources she needs?

VPN

Which of the following is a characteristic of a hard link?

Valid inode for the file data even if the original file is deleted.

Which of the following functions does the rpm -V command perform?

Verifies that an RPM package is free from errors.

A service account is created by the system or an application and cannot be used to log in to the system. Which of the following methods can be used to verify that a service account cannot login to the system?

View the entry for the service account in /etc/passswd and look for /sbin/nologin.

A developer calls you with a problem. She was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. It has now entered runaway mode. The PID number is 2345. She attempted to stop the process with the standard kill command, but it had no effect. Which command would you use to assure that the process will terminate?

kill -9 2345

A service specialist from your company calls you from a customer's site. He is attempting to install an upgrade to the software, but it will not install; instead, it he receives messages stating that he cannot install the program until all non-core services are stopped. You cannot remotely access the machine, but the representative tells you that there are only four processes running, and their PID numbers are 1, 10, 100, and 1000. With no further information available, which command would you recommend the representative run?

kill 1000

After a severe lightning strike nearby, a number of processes seem to be running on the server in runaway mode. Which utility terminates these processes by name, and not just by process ID number?

killall

You have been asked to temporarily fill in for an administrator who has just been fired. This administrator was known to have lax security standards, and you suspect that passwords are still kept in the /etc/passwd file. Which of the following entry within the passwd file would indicate that the passwords are stored there?

kolton:34uyx:431:0:Back Door:/root:/bin/bash

Which of the following commands shows failed login attempts on the system?

lastb

What would you enter at the command prompt without options to reload the library cache every time libraries are added or removed and update the symbolic links?

ldconfig

Which of the following commands reloads the libraries for the /bin/bash executable, but does not update the cache? ldd /bin/bash

ldconfig -N /bin/bash

Which of the following commands should you use to change the location of the default file used to search for libraries?

ldconfig -f

What would you enter at the command prompt to display the shared library information for executables?

ldd

Which of the following commands displays all of the shared library information for the /bin/bash executable?

ldd -v /bin/bash

Which of the following DNF options will display whether updates are available for RPM packages?

list updates

Which of the following yum options will display whether updates are available for RPM packages?

list updates

What commonly predefined alias is configured to run the ls -l command?

ll

You need to create a symbolic link to the /usr/share/zoneinfo/EST time zone file that permanently alters the time zone for the system. What should you enter at the command prompt to accomplish this task?

ln -s /usr/share/zoneinfo/EST /etc/localtime

A technician is configuring a server with four network interface cards to use a round robin scheduling algorithm. This algorithm transmits packets on the first available network interface. Which of the following is provided by this configuration?

load balancing

Your Linux system was installed for you while you were living in the United States of America. You have since been transferred to a satellite office located in Wood Walton, England, and have taken your computer with you. Since England uses the larger A4 paper size, you would like to change the LC_PAPER locale environment variable. Which of the following is the BEST shell command to use for this purpose?

localectl

Which of the following commands is used to find a specific file on a Linux system? (Select TWO. Each answer represents an independent solution.)

locate find

Which of the following commands manages, compresses, renames, and deletes log files based on a specific criteria such as size or date?

logrotate

Which of the following commands removes all files from the print queue? lpc remove

lpc clean

Which command will show the contents of ALL the print queues on your Linux system?

lpq -a

You want to send the yearend.txt file to the acctg printer. Which command should you use?

lpr -P acctg yearend.txt

What should you enter at the command prompt to print 23 copies of the comparables file on the homeprint printer?

lpr -P homeprint -#23 comparables

You need to view the contents of the /home/jerrys directory. What would you enter at the command prompt to show all the contents, including hidden files and directories?

ls -a /home/jerrys

Which of the following commands displays an expanded listing that includes the owner and size of all the files in the /etc directory?

ls -al /etc

A directory intended to be used only by administrators keeps filling with files. Which of the following commands would you use to see only the names of the users saving files in the directory?

ls -l | cut -d " " -f5

A user attempts to view the contents of a directory, but the output of the ls -l command scrolls beyond the limit of one console window. Which of the following commands would allow the users to see the full listing of the directory?

ls -l | less

Ann, a Linux script developer, is trying to debug a shell script that has the command ls -s in it. She suspects that an error is occurring, and she wants to send the results of the operation and any errors to a file named ~/Friday in order to examine it later. Which of the following commands should she use?

ls -s &> ~/Friday

You want to archive some configuration files to the floppy drive. You are using the cpio utility. Which line will create the archive on the floppy?

ls /etc/*.conf | cpio -ovd > /dev/rfd0

Which of the following commands will display the attributes of a /boot/grub/grub.conf file?

lsattr /boot/grub/grub.conf

Anna is attempting to unmount the mount point /mnt/data. The umount command failed and displayed error message stating that the device is busy. Anna suspects there my be an open file causing the issue. Which of the following commands will show Anna a list of open files?

lsof

Which of the following commands will display information about the PCI devices installed on the system?

lspci

Which of the following commands creates a logical volume named video from the home volume group and configures it with 2 TB of disk space?

lvcreate -L 2T -n video home

You are using LVM on your Linux system to manage the existing volumes. What command do you enter to scan for logical volumes on the system?

lvscan

You are working on a Linux system and need more information about the uname command. What would you enter at the command prompt to learn about the uname command syntax and options?

man uname

Fred, a Linux administrator, needs to create the directory /var/oracle/database/9i. Only the directory /var currently exists. The current working directory is the root of the filesystem. Which of the following commands will create the directory path?

mkdir -p /var/oracle/database/9i

Which of the following commands formats the second partition on the fourth disk drive with the ext3 file system?

mke2fs -j /dev/sdd2

You need to create an ext4 file system on the first partition on the second hard disk drive. What command should you enter at the command prompt?

mkfs.ext4 /dev/sdb1

One of the Linux servers for the accounting department needs additional memory to fix recent performance issues. You have ordered the memory, but it is backordered, so you decide to add a swap partition to the server to help the performance issues immediately. Which of the following commands will add a swap partition to the first partition on the third hard drive?

mkswap /dev/sdc1

A number of new file systems have been added to the server and you want them to be active now. You also do not want to bring the server down. Which command makes the changes active?

mount -a

You have partitioned and formatted a new hard drive, sdc. You want to mount the first partition on sdc to directory /mnt/newdisk. Which command will perform the mount correctly?

mount /dev/sdc1 /mnt/newdisk

You are working on a Linux distribution that uses systemd. Which file in the /usr/lib/systemd/system/ directory is text-based and used to start the services that support multiple users and support networking?

multi-user.target

Which of the following commands will move a file from one location to another?

mv

Which of the following commands will change the /home/pmallory/reports file's name to reports.bak?

mv /home/pmallory/reports /home/pmallory/reports.bak

Joe, a bash script developer, is trying to debug a shell script named myscript. Which of the following commands would record the output of the script in a text file?

myscript >> testfile.txt

Which of the following statements is true about the command myscript < mydata.txt?

myscript receives input (stdin) from mydata.txt

Which of the following commands utilize command substitution? (Choose TWO.)

myvar=`sort -r names.txt` myvar=$(sort -r names.txt)

Which of the following commands could you use to view your local system's default gateway? (Choose ALL that apply.)

netstat -r ip route list route

Which of the following commands starts the gedit program with a priority one above the default nice priority?

nice -n -1 gedit

What would you enter at the command prompt to start the gedit process with the highest priority possible?

nice -n -20 gedit

Which of the following statements BEST describes the nl -s ": " myfile command?

nl adds the number, a colon, and a space to the front of each line in the file.

You need to increase the security of your Linux system by finding and closing open ports. Which of the following commands should you use to locate open ports?

nmap

What should you enter at the command prompt to scan for open TCP ports on your Linux system?

nmap -sT

Which of the following commands manages the NTP daemon from the command line?

ntpd

Which of the following NTP configuration utilities is deprecated and should be avoided when possible?

ntpdate

You want to display the contents of ~/franksdep in hexadecimal format. You change to your home directory. How should you enter the command at the command prompt?

od -x franksdep

Given the following command sequence: echo 'blue orange green brown' | while read a b c d; do echo output: $b $c $a $d; done Which of the following is the correct output?

output: orange green blue brown

While in vi Command Mode, you copy a whole line of text to the general buffer. You then navigate to a different location in the file. Which of the following commands will paste the copied text?

p

Marco recently made some partition changes, and the kernel is not recognizing the partitions. Which of the following commands should Marco use to resolve the problem?

partprobe

Which of the following utilities would you typically use to lock a user account?(Select TWO. Each answer represents an independent solution.)

passwd usermod

You suspect that the gshant user account is locked. What should you enter at the command prompt to see the status of the gshant user account?

passwd -S gshant

Which of the following commands would allow you to see whether a remote computer is reachable?

ping

The /sbin/grpck process is not responding and needs to be killed. There are multiple instances that were spawned and need to be terminated. Which of the following commands will terminate all instances of the grpck process?

pkill -SIGTERM -f grpck

You want to change the port that SSH listens on. You are going to edit the /etc/ssh/sshd_config file. Which line, when added to the file, will change the listening port to 1066?

port 1066

You are working with a bash script, and there are multiple variables being used. Which of the following commands can be used to determine which commands are environment variables and which are shell variables? (Choose TWO).

printenv set

You have recently answered calls from a number of users who cannot access the mail server. Which utility would you use to quickly see if the sendmail service is running?

ps

Which command displays all the processes that are running in the most detail?

ps -ef

Which command displays the PPID?

ps -f

Which of the following is a pair of virtual character devices that provide a bidirectional communication channel? (One end of the channel is called the master; the other end is called the slave.)

pseudo-terminal (pty)

Which of the following commands initializes a physical volume?

pvcreate

You have added a third hard disk to your Linux system. What command would you use to initialize a physical volume on this disk for later use by the Logical Volume Manager?

pvcreate /dev/sdc

What would you enter at the command prompt to display the current working directory?

pwd

What is the name of the package that must be installed if you want to use disk quotas on your Linux system?

quota

Which command should you enter at the command prompt to display the current user's quota limits and disk usage?

quota

Which of the following commands displays the disk usage and quota limits for the development group?

quota -g development

After creating the aquota.user and aquota.group files in the /home directory, what command should you enter to enable quotas for the /home directory?

quotaon /home

Which of the following sets of permissions represent the minimal permissions required to allow a user to list the contents of a directory?

r-x

A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. To ensure that the CPU gives preference to other processes, you need to lower the daemon's priority. The PID number is 2345. Which command would you use to decrease the daemon's priority?

renice -n 10 2345

As a system administrator, you want to block (reject) any packets from 170.122.0.0, 255.255.0.0. Which command will block those packets?

route add 170.122.0.0 netmask 255.255.0.0 reject

You have replaced the default gateway on your network. The gateway had used the IP address of 201.12.3.4, and you must remove it from the routing table. Which command would you use to accomplish this task?

route del default gw 201.12.3.4

You are attempting to install an RPM package on your Linux system, but the system tells you that a newer package is already installed. Which of the following commands will install the RPM package over the existing installed package?

rpm --force

You are attempting to install an RPM package on your Linux system, but the system tells you the package has dependencies that are not installed. What would you enter at the command prompt to force RPM to override the need to install the dependencies?

rpm --nodeps

Without installing an RPM package, you want to check for all of the package's uninstalled dependencies. Which of the following commands should you use?

rpm --test

You have an RPM package called mathpac that is not working correctly. You have downloaded the latest package. Which of the following commands should you use to install the latest mathpac package?

rpm -U mathpac

You need to install the package apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm. Which of the following commands will perform the installation? (Select TWO).

rpm -ih apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm rpm -Uh apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm

Which of the following commands queries the system for all installed RPM packages?

rpm -qa

You need to determine which files are associated with the metacity RPM package. Which of the following commands should you use?

rpm -ql metacity

Which of the following utilities should you use if you need to extract a file from an RPM package file?

rpm2cpio

You are limiting the total amount of memory a user can take up when they use the X Windows System. Which of the following limit keywords should you use?

rss

Which sed flag or option allows you to exchange one string of characters for another string of characters in a file?

s

A technician executed a command that collects various OS usage statistics, provides report capability, and saves system activity information. Which of the following commands produced the following output?

sar

Which of the following is the BEST command for viewing SELinux errors?

sealert

Which of the following utilities will substitute an existing string with a new string within a file?

sed

Which of the following sed commands replaces all the occurrences of the string foo with the string bar in myfile.txt?

sed -e 's/foo/bar/g' myfile.txt

You want to configure the NTP daemon to receive time from pool.ntp.org. What entry should you place in the /etc/ntp.conf file?

server pool.ntp.org

You are a network administrator for your company. A user calls to complain that his Firefox browser is not working as it did the day before. Knowing that you recently updated the SELinux profile for Firefox, you suspect the change you made is causing the issue. You want to troubleshoot the issue by switching the profile to permissive mode. Which of the following is the BEST command to use in this situation?

setenforce

You were recently asked to manage the SELinux implementation at your company. Since you are still coming up to speed on this technology, you have not yet mastered the process of creating or making major changes to SELinux policies. However, an employee has just called you complaining that they don't seem to be able to accomplish a task with a particular application. After scanning through the SELinux policy for that application, you notice that there is a method that can be used to enable the desired function. Which of the following is the BEST command for enabling that feature without editing the policy?

setsebool

You have just finished installing an updated kernel on your email server that has been patched to solve a security vulnerability and wish to reboot as soon as possible. This is a busy time of day, and you do not want the server down any longer than necessary. Which option prevents fsck from running after the reboot and allows the system to boot faster?

shutdown -f

You have informed users that you need to bring the machine down at the end of the day to perform routine maintenance. However, prior to shutting the system down, you want to send a message to users to give them fifteen minutes to save data and exit the system. Which of the following is the BEST command to use?

shutdown -h +15 It is time for a shutdown!

You need to shut down the system immediately and send a message to logged in users to allow running processes to close gracefully. Which of the following is the BEST to use?

shutdown -h now

Which of the following commands will display each line in a text file in alphabetic order?

sort

From the bash command prompt, which of the following commands directly executes /usr/bin/scripts/cleanup.sh?

source /usr/bin/scripts/cleanup.sh

Which daemon, or service, provides port tunneling to encrypt non-secure protocols such as email and X server traffic?

ssh

Which ssh option should you enter at the command prompt to set up an SSH tunnel for X server traffic?

ssh -X

You need to connect to a remote system whose host name is abc.def.com and execute a shell script called daily-backup.sh that backs up some files. The username that has permissions to execute that script is bubba. Which command should you run to make the connection?

ssh -l bubba abc.def.com

After getting calls about users not being able to print, you check the status of cups.service and find that it is not running. What would you enter at the command prompt to run cups.service?

systemctl start cups.service

What should you enter at the command prompt to check the TCP wrapper configuration on your system?

tcpdchk

Which command reads from standard input (stdin) and writes to both standard output (stdout) and a file?

tee

A user is experiencing some slowness and wants to view an interactive listing of running processes to see if there is a process that is causing the problem. Which of the following commands displays an interactive listing of running processes? (See exhibit.)

top

You need to determine the priority of several processes. Which command should you enter to identify the process ID and nice value for each process?

top

You need to see a listing of running processes and system status such as memory and CPU usage. Which command will produce the listing?

top

PAM is configured on your system to look for the presence of the nologin file in the /etc directory. If the nologin file exists, user login is disabled, and only the root user can log in. If your current working directory is root's home directory, which command would you enter to quickly create an empty nologin file in the /etc directory?

touch /etc/nologin

Which of the following commands will change the /home/gshants/smile file's modification and last accessed times to the current time?

touch /home/gshants/smile

Which utility is similar to traceroute, but does not require elevated privileges?

tracepath

Which command could you use to see the path that a packet traveled across a network to a remote host?

traceroute

You are having trouble contacting a host on another network. ping fails, but you would like to get more information about the router in the path where the communication stops. Which of the following utilities would you use?

traceroute

You need to convert the file system of /dev/sdb3 from ext2 to ext3 without affecting the data on the drive. What command and option should you enter at the command prompt?

tune2fs -j /dev/sdb3

You need to create a large number of files, and you would like to ensure that you, the user owner, are the only person that has read and write permissions to the files. The files will be located in a number of different directories that already contain other files you don't want modified. How could you BEST create these files with the correct permissions using the LEAST amount of effort?

type umask 0066 to change your umask

Which command should you use to change the time zone (TZ) environment variable? (Select TWO).

tzconfig tzselect

What do you enter at the command prompt to prevent the shell from using too much of the system's resources?

ulimit

A user calls the help desk. Each time he creates a new text file, permissions of 640 are applied to the file, and he must use chmod to set them to 644. What command should you enter in the user's profile to set the default permission for newly created files to 644?

umask 0022

Which of the following apt-cache options will show the missing dependencies in the package cache?

unment

Partition /dev/sdb2 is mounted to /mnt/temp. You need to unmount /dev/sdb2. Which commands would you use? (Select TWO). (Each option is a complete solution.)

unmount /dev/sdb2 unmount /mnt/temp

Which of the following commands deletes a variable?

unset

After using the locate command, you discover some of your files are not being listed in the search results. What would you enter at the command prompt to update the /var/log/locatedb file?

updatedb

An employee named Bob Smith, whose username is bsmith, has left the company. Your supervisor has instructed you to delete his user account and home directory. Which of the following commands would produce the required outcome? (Select TWO).

userdel -r bsmith userdel bsmith;rm -rf /home/bsmith

A user with an account name larry has just been terminated from the company. There is good reason to believe that the user will attempt to access and damage files in your system in the very near future. Which command below will disable or remove the user account from the system and remove his home directory?

userdel -r larry

The user emcmann has been transferred from the accounts payable department. She was assigned to several secondary groups that gave her rights to sensitive files and systems. You need to remove her from all her current secondary groups right away. Enter the command that will remove emcmann from all secondary groups.

usermod -G "" emcmann

You have just created the lsmith user account and need to assign this new user to the secondary groups admin and acct. Enter the command you would use to add lsmith to the admin and acct secondary groups.

usermod -G acct,admin lsmith

You have performed an audit and have found active accounts for employees who no longer work for the company. You want to disable those accounts. Which command example will disable a user account?

usermod -L joer

You need to modify the group membership for the cjensen user to add the staff group to his list of secondary group memberships. He needs to keep his existing secondary group memberships. Which command option will add cjensen to the staff group without removing him from the other groups?

usermod -aG staff cjensen

One of your users, Karen Scott, has recently married, and is now Karen Jones. She has requested that her username be changed from kscott to kjones. Which of the following commands will accomplish this task without changing other values?

usermod -l kjones kscoot

A programmer named Brandon calls with an issue. He is currently using the C shell each time he logs in, but his manager has told him to start using the Bash shell. Which command will change brandon's shell to the desired setting?

usermod -s /bin/bash brandon

You attempt to unmount a volume using the umount /dev/sdd3 command, but you receive a device is busy error message. Which of the following strategies will be MOST likely to allow you to unmount the file system? (Select TWO).

vFind and close any open files on the file system, and try to unmount again. Make sure your current working directory is not on the file system and try to unmount again

Which of the following are valid ways to assign a variable a value in a bash script? (Choose TWO.)

variable1=Hello declare -i num1=4

Mary, a technician, is troubleshooting memory and performance issues on a system. Mary executed a command to show information about processes, memory, paging, block IO, traps, disks, and CPU activity. Which of the following commands did Mary use to produce the output below?

vmstat

You need to block all users from logging in to the Linux system while you resolve a serious issue. You first need to force all active users to logout. What the command should you enter to display a list of all active users?

w

At the command prompt, how would you enter a command that will print the line count, word count, and byte count respectively in the /home/gshant/servepath file?

wc -lwc /home/gshant/servepath

You use a program on your Linux system called photorec. What would you enter at the command prompt to display the path to the photorec binary file?

which photorec

Which command overcomes the 128 KB shell command size restriction by breaking up long lists of arguments?

xargs

You have an xfs file system in your Linux computer. You need to display the XFS file system parameters, such as the block size and inode data structures. Which of the following commands should you use? (Select TWO). (Each answer is an independent solution.)

xfs_info xfs_growfs -n

You have an XFS file system in your Linux system represented by /dev/sdb1. You need to copy all the filenames on the drive to the /reviewxfs file. You must be able to read the filenames in the /reviewxfs file. Which of the following commands should you use?

xfs_metadump -o /dev/sdb1 /reviewxfs

Which of the following is the super daemon that is most commonly found in modern Linux distributions?

xinetd

Which of the following is an advantage of xinetd over inetd?

xinetd uses separate configuration files for each managed service.

A technician has been given a work order to install the Apache webserver on a system configured with a YUM repository. Which of the following commands will install the webserver?

yum install httpd

You used YUM to list the python packages that are available to install. You see that there is a package available that is called python. What YUM command do you use to install this python package?

yum install python

You have users who need to do some programming projects in the Python programming language. What yum command should you use to find out if there is a python package available to install on the Linux server?

yum list python

You have installed a package called mathpac with yum. After a system upgrade, the package is not working correctly. Which of the following commands should you FIRST try to get the package to funciton?

yum update mathpac

What yum command would you enter at the command prompt to determine which package contains the /usr/lib/libstlport_gcc.so file?

yum whatprovides /usr/lib/libstlport_gcc.so

What YUM command would you enter at the command prompt to download an RPM package without installing it to the system?

yumdownloader

What command would you enter while in vi command mode to copy an entire line of text to the general buffer?

yy

Anna, a system administrator, wants to set a global variable that can be used each time she logs in. Currently, she has to set the variable each time a terminal is opened. Which of the following files would need to be modified to make a global variable persistent? (Choose TWO.)

~./bash_profile /etc/profile

After a user starts a bash session and the script in /etc/profile is applied, if all of the following files exist, which will be run next?

~/.bash_profile

Which of the following files would you use to create aliases that are applied when a specific user starts a bash session? (Select TWO. Each answer is an independent solution.)

~/.bashrc ~/.profile

Where does the client store SSH keys that are used to establish an SSH session? (Select TWO).

~/.ssh/known_hosts /etc/ssh/ssh_known_hosts

Which of the following is the maximum number of GUID partitions that can be created using the gdisk utility?

128

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select TWO).

110 25

Out of concern for security, you convinced your boss to stop allowing Telnet access to the network. Now, remote connections are only made through ssh. Which port must you allow through the firewall for ssh access?

22

Which port does Telnet use?

23

Which of the following sets of octal permissions would allow everyone to execute the following file as if they were the root user? -rwxr-xr-x 1 root root 8045 July 24 2018 myscript

4755

You are editing the crontab file and want an entry to run every hour at five minutes past the hour. Which of the following entries will accomplish this task?

5**** /home/emmett/example.sh

You have a Linux system with 8 GB of RAM installed. You plan to use this system as a server. How much space should you plan to partition for the swap file?

8 GB

Which of the following methods should you use to configure dynamic libraries on a Linux system? (Select TWO).

Modify /etc/ld.so.conf to add the path of the libraries. Use the LD_LIBRARY_PATH environment variable to specify additional directories to search for library files.

Your company has been expanding the number of servers in the company's data center, and there is an increased need to gather metrics, watch process states, work with logs, watch services states and file system usage. Which of the following sever roles should be installed to provide this functionality?

Monitoring

You have a user who has difficulty using the mouse. Which of the following keyboard accessibility options would BEST aid this user?

Mouse keys

Which of the following describes network interface bonding?

Multiple network interface cards are aggregated into a single bonded interface.

Users are complaining that the clocks for their operating systems do not match the current time for the location in which they live. Which of the following server roles is BEST for correcting this issue?

NTP

Which remote desktop technology offers access from most common platforms such as Linux, Windows, Mac, iOS, Android, and Rasberry?

NX

In which boot process stage is the root partition mounted?

OS kernel

Which component is responsible for loading and executing the initial process?

OS kernel

Which of the following statements best describes the effects of having only the gshant user account listed in the /etc/at.allow file?

Only gshant and root can use the at command.

Which of the following is a free, open-source scriptable screen reader that works with the GNOME desktop?

Orca

You want the directory /sbin/special to be include in the PATH environment variable. You also want to keep all the current directory entries currently in the PATH variable. Which of the following commands would you use?

PATH=$PATH:/sbin/special

Which of the following functions does the -d option perform when using the apt-get command to install a package? Package installation is simulated without an actual installation.

Packages are downloaded to the system, but not installed.

What is the name of the partition management utility that will both create GUID partitions and create file systems on those partitions?

Parted

You have a systemd Linux system that is configured to boot into the graphical.target by default. The system seems to be running much slower than normal. You need to reboot the system, but you want it to boot into a single-user target unit with no network access so you can perform troubleshooting tasks and get the system running normally again. What should you do before you reboot?

Set the default boot target torescue.target.

Which of the following describes the function of the export command?

Sets environment variables.

What is the effect of the following command? chage -M 60 -W 10 jsmith

Sets the password for jsmith to expire after 60 days and gives a warning 10 days before it expires.

Setting the SUID flag is a powerful and useful feature. It can have weaknesses associated with its use. Which of the following statements identifies a weakness?

Setting the SUID flag for an application or process owned by the root user is a potential security hole.

A system was installed by an emloyee that is no longer with the company, and that employee used a non-standard root password that was not documented.Which mode must you boot the system into to reset the lost root password?

Single user mode

Given the following bash script: #!/bin/bashmynumber=5guess=0echo -e "I am thinking of a number from 1 to 10\n"read -p "Enter guess: " guessif (( guess == mynumber ))thenecho "That is correct!"elif (( guess != mynumber )); thenecho "Sorry, that is not my number!"fi Which of the following would be displayed if the number 12 is entered as the guess?

Sorry, that is not my number!

Match the locale environmental variable name on the left with the description on the right.

Specifies personal name format. LC_NAME Specifically used an override for LC_MESSAGES. LANGUAGE A special variable for overriding every other evironment setting. It sets all locales to the same setting. LC_ALL Defines every locale setting at once while allowing further individual customization via the LC_* settings. LANG

Your system is currently running the multi-user.target. You want to enable bluetooth.service to run when graphical.target is loaded. There are two commands you must enter from a command prompt to accomplish this task. Drag the commands on the left to the appropriate step number on the right. Not all of the commands on the left will be used.

Step One systemctl isolate graphical.target Step Two systemctl enable bluetooth.service

Which of the following special permissions prevents a file's deletion by anyone except the file's owner?

Sticky Bit

Which of the following is the primary role of a mail transfer agent (MTA)?

Store messages so they can be downloaded or send email to a destination MTA.

Drag the permission string on the left to the category on the right. Some permission strings will not be used.

Symbolic link lrwxrwxrwx Hard link -rwxr-xr-x

A user type has the following qualities: Created by default during the Linux installation Used by the system for specific roles Not used to log into the system Which of the following user types has these qualities?

System or service user

You are an application developer. You are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?

TCP

You open the /etc/nsswitch.conf file and observe the following line: hosts: files dns What is the result of this configuration?

The /etc/hosts file takes precedence over information obtained from a DNS server when resolving domain names.

Which of the following statements BEST describes the effects of the split -50 -d -a 3 AllNames FiftyNames- command if there are 103 lines and 240 bytes in the file?

The AllNames file is split into three files containing 50 lines or less. The output is FiftyNames-001, FiftyNames-002, and FiftyNames-003.

You are asked to troubleshoot a problem on a user's computer. When the user types the name of any website he recives a message stating, "The page cannot be displayed." You determine that nothing has changed on the computer. What is MOST LIKELY the problem?

The DNS server is down or not reachable.

Which of the following statements BEST describe the purpose of the Filesystem Hierarchy Standard (FHS)? (Select TWO).

The FHS allows software installation routines to predict where to place configuration files. The FHS allows users to predict where to find system configuration files.

Drag the GRUB 2 file or directory on the left to the correct description on the right.

The GRUB2 configuration file (non-editable). /boot/grub2/grub.cfg The GRUB2 directory for script files. /etc/grub.d/ The GRUB2 configuration file (editable). /etc/default/grub The script that identifies kernels on the root device and creates menu entries. 10_linux The script file that allows menu entries to be modified. 40_custom

What will be the result of the following command? host www.somedom.com

The IP address of the computer www.somedom.com would be displayed.

Which of the following BEST describes the role of the Linux desktop?

The Linux desktop adds a series of tools and utilities to make the GUI useful.

You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open connection to the host, on port 23. No connection could be made because the target machine actively refused it." What may be the problem?

The Telnet server is not running.

Which of the following describes the effects of the ls -l /usr/bin >> /tmp/list.txt command?

The contents of the /usr/bin directory are written to a file named /tmp/list.txt. Previous files contents are kept, and the new information is added at the end of the file.

Which of the following has a process ID (PID) of 1?

The initial process

Your computer is using AppArmor. Which of the following commands is BEST to use for troubleshooting an AppArmor profile?

aa-complain

You have just started protecting your computer while running Firefox using AppArmor. After a short time, employees start to complain that some of the features they use frequently are no longer functioning. After a quick check, you discover that these features should be working and decide not to protect Firefox anymore. Which of the following is the BEST command to quickly stop protecting Firefox?

aa-disable /etc/apparmor.d/usr.bin.firefox

You are running AppArmor on your system. Which of the following commands will show all of the processes from the /proc filesystem with TCP or UDP ports that are not protected by AppArmor profiles?

aa-unconfined --paranoid

When configuring bonding on two network interfaces, the technician wants to configure one interface to take over if the other interface fails. Which of the following bonding modes should be used to provide a hot standby?

active-backup, or mode 1

Which command displays a list of the currently defined aliases on the system?

alias

Mary Brown is a Linux user with the username mbrown. Mary has a directory named logs in her home directory that is regularly updated with new log files when certain system events occur. She runs the following commands several times a week to check this directory: cd /home/mbrown/logs ls -al She wants a persistent alias named logcheck to run these two commands. What command would you enter into her shell configuration file to create this persistent alias?

alias logcheck="cd /home/mbrown/logs;ls -al"

Which of the following commands creates a shortcut that can be used to run the tail -f /var/log/messages command?

alias sysmesg="tail -f /var/log/messages"

Which of the following commands stores the output of the ls -a command in a shell variable named allfiles?

allfiles=$(ls -a)

If a system is down at the time a recurring regularly scheduled task is supposed to run, which task scheduling service will run the task when the system is back up again?

anacron

Which of the following commands searches man pages for a specific keyword? (Select THREE.)

apropos,man -k,whatis

You are working on a Debian distribution of Linux. You want to retrieve information about the Debian package database on the system. Without using any command options, what command will provide the information you need?

apt-cache

You are working on a Debian distribution of Linux. You need to install a package, but you do not want to manually install all the dependencies for the package. Without using any command options, what command should you use?

apt-get

Which of the following statements correctly describe the differences between the apt-get remove and apt-get purge commands? (Select TWO).

apt-get purge - removes the package and the configuration files. apt-get remove - removes a specified package, but leaves the configuration files.

You have installed a package called mathpac with apt-get. After a system upgrade, the package is not working correctly. Which of the following commands is the MOST correct method to get the package to work?

apt-get upgrade mathpac

Which of the following Debian package management utilities provides the front end for APT?

aptitude

Which of the following commands removes a job from the at queue? (Select TWO. Each answer is an independent solution.)

atrm at -d

What should you enter at the command prompt to remove tasks 2 and 3 in the at queue?

atrm 2 3

Login blocking is enabled using the Pluggable Authentication Modules (PAM) module. What line needs to be in the /etc/pam.d/login file to configure PAM to check and see if a file named /etc/nologin exists?

auth requisite pam_nologin.so

As you configure your client for public key authentication, you decide to generate the DSA key pair. You would like to configure the client to automatically provide the private key passphrase when needed so that you do not need to type the passphrase for every new SSH connection to a server. Which command should you use in conjunction with the ssh-agent bash command? (Enter the command and options as if you are at the command prompt.)

ssh-add ~/.ssh/id_dsa

You are configuring public key authentication on your client system. Which command enables the passphrase agent?

ssh-agent bash

When using DSA to establish an SSH session, what is the name of the key that the SSH server will send to the client? (Enter the name of the key only.)

ssh_host_dsa_key.pub

Which of the following public keys is sent from the SSH server to the SSH client when they are in the process of establishing a session with the SSH1 protocol?

ssh_host_key.pub

You are currently logged in using the badams account. You want to view the contents of the /etc/inittab file, but you are not allowed to with the badams account. Which command could you use to view the file?

su -c "cat /etc/inittab" -I

You have logged in as a regular user when a frantic phone call comes in. The ABCD process must be started on the server now, but can only be run by root. Which command would you use to start this process?

sudo ABCD

A user, ljenkins, contacts the help desk about an error received while removing a file from their home directory. The user received the following error when trying to use the rm command to remove the file: [ljenkins@fileserver]$ rm report.txtrm: remove write-protected regular empty file 'myfile2.txt'? yrm: cannot remove 'myfile2.txt': Operation not permitted While troubleshooting the issue, you list files in directory to see if you can discover the issue: [ljenkins@fileserver]$ ls -altotal 4drwxr-xr-x. 2 ljenkins ljenkins 24 Feb 25 12:04 .drwx 15 ljenkins ljenkins 4096 Feb 25 11:04 ..-rw-rw-r--. 1 ljenkins ljenkins 346 Feb 25 11:32 report.txt When prompted to remove the write-protected file, ljenkins entered yes and received an "Operation not permitted" error message. As the help desk technician, you attempt to remove the file with root privilages and recive the same error message. You decide to view the file attributes and receive the following output: [helpdesk@fileserver]$ lsattr ----I----------- ./report.txt Which of the following commands would resolve the problem and allow the file to be deleted?

sudo chattr -i report.txt && rm report.txt

Which of the following partitions functions as virtual memory for a Linux system?

swap

You have a Linux system with two activated swap partitions, sda3 and sdb2. Which of the following commands can you use to deactivate only the sda3 swap partition?

swapoff /dev/sda3

You created a swap area on sda3, but it is not activated. What command will activate this swap partition?

swapon /dev/sda3

You are working on a systemd-based Linux distribution. Which command can you use to manage the services and targets?

systemctl

You are experiencing a problem with one particular server. Each time it boots, it goes into single-user mode even though no warnings or errors are reported. You want to verify that it is configured to boot to the multi-user.target unit, just as all your other servers are. This system is running systemd. Which command would you use to see which boot target is set as the default?

systemctl get-default

You are on a systemd system. Without rebooting the system, you want to change from the currently running target unit to a target that supports networking, supports multiple users, and displays a graphical interface. What command should you enter to accomplish this tak?

systemctl isolate graphical.target

You need to perform some system maintenance on a systemd system, and you want to prevent users from logging on while you do so. Which command should you run?

systemctl isolate rescue.target

Unnecessary network services might provide attackers with an entry point for an attack. To view a list of services, or units, installed or running on a systemd-based system, what could you enter at the command prompt?

systemctl list-units

After making changes to the configuration of anaconda.service, you must make those changes take effect. Which single command should you enter to make this service use the new configuration?(Note that there is no reload option with this service.)

systemctl restart anaconda.service

Alex, a webmaster, recently deployed a new web server. After checking external access to the new web server, he was unable to communicate on port 80. Alex verified that the host-based firewall's configuration had been changed and that the httpd service is running. Which of the following commands will most likely resolve the communication issue?

systemctl restart firewalld

The current default boot target is a multi-user.target, but you want to use this system as a desktop workstation. You need a boot target that supports multiple users, supports networking, and has a graphical display. This is a systemd system. What command should you enter to change the default boot target to one that meets these needs?

systemctl set-default graphical.target


संबंधित स्टडी सेट्स

Core History US Colonization: Pre and Post

View Set