Linux+ Exam #3 Chapters 10 - 14

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which option to the dpkg command can be used to list the files that comprise a package?

-L

Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system?

-U

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

./configure

Which of the following file extensions are used by the Debian Package Manager?

.deb

Files that have been compressed using the xz utility typically have the ______ extension.

.xz

Which filename extension indicates a tarball?

.xz

Which of the following files contains the list of shared libraries?

/etc/ld.so.cache

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

/etc/services

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?

/srv/ftp

Which of the following files stores information about failed logins on a Linux system?

/var/log/btmp

Which dump level indicates a full backup?

0

Chapter 11 You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

If no level of compression is specified, the gzip command assumes what compression level?

6

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

Which of the following are stand-alone daemons? (Choose all that apply.)

DNS (named) Apache (httpd)

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility.

What are best practices for securing a local Linux server? (Choose all that apply.)

Ensure that SELinux or AppArmor is used to protect key services. Lock the server in a server closet. Use encryption for files and network traffic.

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?

False

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?

Newaliases

Chapter 12 Which Windows program is often used to connect to a Linux server via SSH?

Putty

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

Chapter 13 You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?

Run the newaliases command.

Which of the following hashing algorithm commands reduces the chances of collisions due to the bit length of the message digest?

Sha256sum

What is the most commonly used LAN protocol?

TCP/IP

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

True

Most source code is typically available on the Internet in tarball format or as a git repository. True or False?

True

PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?

True

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default?

Zypper

Which of the following commands can you use to search available repository information? (Choose two.)

apt apt-cache

Which of the following commands can be used to remove the test DPM package, including any test configuration files?

apt purge test

Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system?

apt-get upgrade

What is the term used to describe a user providing a user name and password to log in to a system?

authentication

Chapter 10 You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.)

cat /etc/shadow getent /etc/shadow

Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires?

chage -l jsmith

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?

cloud-init

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

Which of the following commands can be used to pause a printer named Printer1?

cupsdisable Printer1

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?

declarative configuration

Before a computer can use a router, what configuration information must it be provided?

default gateway

Which of the following commands will display detailed information for network hardware?

ethtool

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

facility, priority

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

Which of the following commands can be used to display memory statistics? (Choose all that apply.)

free sar Vmstat

Which of the following will display entries from the Name Service Switch libraries?

getent

Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.)

groupdel delgroup

Which of the following commands can a user run to display the groups that they are a member of?

groups

Chapter 13 What command can be used to view and modify the date and time within the BIOS?

hwclock

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up?

ifup eth0

What command can you use to view journald log entries on a system that uses Systemd?

journalctl

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer?

lpoptions -d printer1

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

nslookup hostname host hostname dig hostname

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?

ping -c 4 server1

The process of sending print jobs from the print queue to the printer is called _____.

printing

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.)

systemd-cat logger

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen?

tar -czvf

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

Which of the following UFW commands can be used to view configured firewall rules?

ufw status

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

Chapter 10 Which of the following commands can be used to delete a user account?

userdel

Which command is used to delete a user account?

userdel username

Which command can you use to lock a user account?

usermod -L username

Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?

yum search oobla

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?

/27

Which of the following is a valid APIPA address?

169.254.38.101

Which DNS resource record is an alias to other records?

CNAME

Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)

LUKS GPG

The daemons associated with network services listen for network traffic associated with a particular _____.

Port

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds.

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.)

curl wget

Which command can be used to create an image backup of a partition?

dd

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead?

hostnamectl set-hostname server1

Which of the following log files contains information and error messages generated by the Linux kernel?

kern.log

Which command within the command-line FTP utility can be used to change the current directory on the local computer?

lcd

What is the name of the utility used to rotate log files?

logrotate

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?

make

On a system running NetworkManager, which of the following commands can be used to view or modify connection information?

nmcli

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

ssh -X VNC

Which of the following commands creates an archive?

tar -zcvf /dev/st0 *

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)

the createdb command. the CREATE DATABASE statement within the PostgreSQL utility.

When a printer is disabled, ________.

the print queue accepts jobs into the print queue and holds them there until the printer is enabled again

When a printer is rejecting requests,____________.

the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

Which of the following commands can be used to trace an IPv6 route? (Choose two.)

traceroute6 tracepath6

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same functionality. What is the name of the command they use?

zypper

What FTP command runs a shell on the local computer?

!

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running.

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system?

YUM

Chapter 11 After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem?

make install

Which command can be used to temporarily alter the primary group associated with a given user?

newgrp

Chapter 12 You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?

UDP

Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?

ldconfig

Which of the following commands will list missing libraries as not found if a necessary library is not installed?

ldd

Which of the following commands can you use to send a print job to printer1?

lp -d printer1 mydocument.txt lpr -P printer1 mydocument.txt

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

lp file lp -d Printer1 file

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

Which option can be added to the ls or ps command to view the SELinux label?

-Z

Which of the following is the full path and file name where the Debian Package Manager repositories can be configured?

/etc/apt/sources.list

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

/etc/hosts DNS

Which file stores the Apache configuration in Fedora 28?

/etc/httpd/conf/httpd.conf

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?

/etc/sysconfig/network-scripts/ifcfg-enp8s0

Most log files on the system are found in which directory?

/var/log

Chapter 14 Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

False

Standalone daemons are started on demand using xinetd. True or False?

False

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or False?

False

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

False

The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command. True or False?

False

UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?

False

When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

False

Which of the following must you perform to share a directory using NFS? (Choose all that apply.)

Run the exportfs -a command. Start or restart the NFS daemons. Edit the /etc/exports file.

The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

True

You can clear a log file simply by redirecting nothing into it. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

Which command can be used at a BASH command prompt to obtain a Web page?

curl

Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.)

deluser userdel

Which of the following is the log file where Dandified YUM writes its log entries?

dnf.rpm.log

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)

domain comptia.org nameserver 10.1.1.4

Which of the following commands can be used to modify configuration options for DPM packages after they have been installed?

dpkg-reconfigure

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed?

dpkg.log

Which option to the rpm command can be used to remove a package from the system?

e

The IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

Which of the following commands will install an RPM package while ignoring any other packages that it may be dependent upon for proper operation?

rpm -ivh --nodeps package.rpm

Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation?

rpm -ivh packagename.rpm

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?

sa19

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data


संबंधित स्टडी सेट्स

Chapter 12: Southeast Asians and Pacific Islanders

View Set

RN Mental Health Online Practice 2023A

View Set

Survey of Entrepreneurship: Test 2

View Set

Med/Surg Prep U ch. 39, 40, 41, 42

View Set

Criminal Justice Today: Chapter 12

View Set

WWU MKTG 380 Midterm 1 Questions

View Set