Quiz 13-14
When performing a sar �u command, you notice that %idle is consistently 10%. Is this good or bad?
Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required
Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing?
CD
Which DNS resource record is an alias to other records?
CNAME
Which of the following steps is not a common troubleshooting procedure?
Delegate Responsibility
Which of the following technologies can encrypt files stored on a filesystem within a Linux system?
GPG
Which of the following is NOT required to share a directory using NFS? (Choose all that apply.)
Mount the directory to the /etc/exports directory using the mount command.
Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?
Restart the DHCP daemon.
You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?
Run the newaliases command.
Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?
TRUE
Which command within the command-line FTP utility can be used to change the current directory on the local computer?
lcd
Which file stores the Apache configuration in Fedora 28?
/etc/httpd/conf/httpd.conf
Which file contains information regarding the users, computers, and commands used by the sudo command?
/etc/sudoers
What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?
/srv/ftp
Which of the following actions should you first take to secure your Linux computer against network attacks?
Ensure that only necessary services are running.
The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?
FALSE
When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?
FALSE
You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?
FALSE
DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?
TRUE
PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?
TRUE
The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?
TRUE
To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?
TRUE
What will the command sar �W 3 50 do?
Take 50 swap statistics every 3 seconds.
Which command can be used to list containers that are currently running on the operating system only?
docker ps
Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?
firewall-cmd --add-service ssh --permanent
Which of the following commands can NOT be used to display memory statistics?
iostat
On which part of the maintenance cycle do Linux administrators spend the most time?
monitoring
Which command can you use to synchronize ntpd with an NTP time source?
ntpq
Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?
testparm
Which of the following can be used to create a database within PostgreSQL?
the CREATE DATABASE statement within the PostgreSQL utility.
What type of iptables chain targets traffic that is destined for the local computer?
INPUT
Which command can be used to connect to a remote Windows share called data on the server called fileserver?
smbclient //fileserver/data
Which item below is NOT a best practice for securing a local Linux server?
Ensure that you are logged in as the root user to the server at all times.
Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?
FALSE
Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?
FALSE
Which of the following commands can be used to scan the available ports on computers within your organization?
nmap
Which of the following UFW commands can be used to view configured firewall rules?
ufw status
Which command can increase the number of filehandles that programs can open in a shell?
ulimit
Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?
sa19