Linux+ cp 10- 13 HW

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

What command can you use to view journald log entries on a system that uses Systemd?

journalctl

Which command within the command-line FTP utility can be used to change the current directory on the local computer?

lcd

Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?

ldconfig

Which command would you use to unlock a user account?

passwd -u username

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data

Which option to the rpm command can be used to remove a package from the system?

e

PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?

True

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?

sa19

Which of the following commands can be used to display memory statistics? (Choose all that apply.)

sar, vmstat, free

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True

Which command can be used to temporarily alter the primary group associated with a given user?

newgrp

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

Most source code is typically available on the Internet in tarball format or as a git repository. True or False?

True

Which of the following UFW commands can be used to view configured firewall rules?

ufw status

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

Which command is used to delete a user account?

userdel username

Which command can you use to lock a user account?

usermod -L username

Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?

yum search oobla

UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?

False

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?

/srv/ftp

The IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

lp -d Printer1 file, lp file

What must you do to transform your computer into a DNS server? (Choose all that apply.)

Create NIS maps, Run the name daemon (named)., Create zone files.

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?

/etc/resolv.conf

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?

/etc/sysconfig/network-scripts/ifcfg-enp8s0

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

Which of the following commands can be used to remove the test DPM package, including any test configuration files?

apt purge test

Which command can be used to list containers that are currently running on the operating system only?

docker ps

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

facility, priority

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

ifconfig, nmcli, ping, iwconfig

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?

make

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

The daemons associated with network services listen for network traffic associated with a particular _____.

port

The process of sending print jobs from the print queue to the printer is called _____.

printing

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)

the CREATE DATABASE statement within the PostgreSQL utility., the createdb command.

When a printer is disabled, ________.

the print queue accepts jobs into the print queue and holds them there until the printer is enabled again

When a printer is rejecting requests,____________.

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

host hostname, dig hostname, nslookup hostname

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

mtr

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route, ip

Which file stores the Apache configuration in Fedora 28?

/etc/httpd/conf/httpd.conf

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

Which dump level indicates a full backup?

0

Which of the following are stand-alone daemons? (Choose all that apply.)

Apache (httpd), DNS (named)

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

Which DNS resource record is an alias to other records?

CNAME

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?

False

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

Which option to the dpkg command can be used to list the files that comprise a package?

-L

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

./configure

Which filename extension indicates a tarball?

.tar.xz

Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)

LUKS, GPG

Which Windows program is often used to connect to a Linux server via SSH?

Putty

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?

Run the newaliases command.

What are best practices for securing a local Linux server? (Choose all that apply.)

Use encryption for files and network traffic., Ensure that SELinux or AppArmor is used to protect key services., Lock the server in a server closet.

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

VNC, ssh -X

What is the term used to describe a user providing a user name and password to log in to a system?

authentication

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

Which command can be used to create an image backup of a partition?

dd

Before a computer can use a router, what configuration information must it be provided?

default gateway

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

ssh-keygen, ssh-copy-id

Which of the following commands creates an archive?

tar -zcvf /dev/st0 *

What is the name of the utility used to rotate log files?

logrotate

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

/etc/hosts, DNS

When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

False

Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing?

CD

Which of the following must you perform to share a directory using NFS? (Choose all that apply.)

Edit the /etc/exports file., Start or restart the NFS daemons., Run the exportfs -a command.

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running.

To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

True

You can clear a log file simply by redirecting nothing into it. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

Standalone daemons are started on demand using xinetd. True or False?

False

Which option can be added to the ls or ps command to view the SELinux label?

_Z

Files that have been compressed using the xz utility typically have the ______ extension.

.xz

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

Which of the following port numbers is associated with SSH?

22

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility.

Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

False

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or False?

False

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

False

The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?

False

To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command. True or False?

False

You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?

False

Most log files on the system are found in which directory?

/var/log


संबंधित स्टडी सेट्स

AP Gov. Semester 1 Exam - Chapter 2: Terms, Reading Guides, Section Reviews, and AofC Quiz

View Set

AP European History Second Semester Final Practice Test 3

View Set

Operations with Fractions, Mixed Numbers

View Set

AP Chemistry Brown Chapter 8, Bonding

View Set

CEH Module 2: Footprinting and Reconnaissance

View Set