Testout Linux Pro Chapter 5-15
In the /etc/shadow file, which character in the password field indicated that a standard user account is locked?
!
Type the full device file name for the first partition on the hard drive with the third lowest ID number.
/dev/sdc1
Which of the following is the associated device file for that terminal?
/dev/tty5
What is the full path and filename of the file that is used to schedule tasks for the anacron daemon?
/etc/anacrontab/
AppArmor has been installed on your computer. Which of the following directories contain your AppArmor profiles?
/etc/apparmor.d/
You want to keep the gshant user from using the at command. What is the full path and filename of the file you should edit?
/etc/at.deny
Which file should you edit if you want to permit specific users to edit their respective crontab file, but deny all other users on the system from editing their crontab file?
/etc/cron.allow
You want to keep the gshant user from editing his respective crontab file in /var/spool/cron, but still allow all other users on the system to edit their respective crontab file. What is the full path and filename you should you edit?
/etc/cron.deny
Which file should you edit to schedule a task to execute every week on Saturday?
/etc/cron.weekly
You need to change the default home directory value, which is used by the useradd utility when creating a user account. What is the full path and filename of the file you should edit?
/etc/default/useradd
What is the full path and filename for the DNF configuration file?
/etc/dnf/dnf.conf
What is the full path and filename of the file that contains the file system table for a Linux system?
/etc/fstab
You have added several new hard disks to your system. After partitioning and formatting, you have modified a configuration file to mount these new file systems automatically. You want to document the change you made. Which of the following configuration files would you document?
/etc/fstab
You need to implement disk quotas on your Linux system. You need the quotas on the / directory. What is the full path and name of the file that must be edited to implement quotas for users and groups?
/etc/fstab
You want to mount a number of filesystems each time the system is brought up. Which configuration file should hold the configuration information for the filesystems to be mounted?
/etc/fstab
A file contains the following entry: sales:x:1001:pclark,mmckay,hsamson which of the following files contains similar entries?
/etc/group
Which of the following configuration files holds the name of the host?
/etc/hostname
Which of the following files contains information that enables a Linux system to resolve IP addresses to FQDN/host names? (Choose ALL that apply.)
/etc/hosts /etc/resolv.conf
You are modifying the tcpd control files of the xinetd super daemon. Of the two tcpd control files, what is the full path and filename of the file that is applied first?
/etc/hosts.allow
What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
/etc/timezone
What is the full path to the directory that allows you to name devices when they are connected to the system?
/etc/udev/rules.d/
Management wants a compilation of specific data to occur every night. The only way to accomplish this task is to copy files throughout all network hosts to one server via TFTP. Which of the following files MUST be edited to enable xinetd to manage TFTP on the Linux server?
/etc/xinetd.d/tftp
What is the full path and file name for the YUM configuration file?
/etc/yum.conf
What is the full path to the directory that contains log files, including secure, messages, [application], and kern.log?
/var/log
Out of concern for security, you convinced your boss to stop allowing Telnet access to the network. Now, remote connections are only made through ssh. Which port must you allow through the firewall for ssh access?
22
Which port does Telnet use?
23
There are two types of hypervisors, Type 1 and Type 2. Which of the following describes those two types? (Choose TWO.)
A type 1 hypervisor runs on bare metal hardware and is referred to as a native hypervisor. A type 2 hypervisor runs on an operating system.
IPv6 uses 128-bit addresses. The address contains two 64-bit components.
What is the first 64-bit component called? The prefix What is the last 64-bit component called? The interface ID
You have just made IP configuration changes in the ifcfg-enp2s1 file. You dont want to restart the Linux system or restart the network service to put these changes into effect. There are two ip commands you can use to put these changes into effect.
What is the first ip command you enter at the command line to put these changes into effect? ip link set enp2s1 down What is the second ip command you enter at the command line to put these changes into effect? ip link set enp2s1 up
You need to see who has permissions to the sales_projection_q2 file. You use ls -l sales_projection_q2 and receive the following information: drwxr-xr-x 22 pclark acct 4096 Jun 19 15:01 sales_projection_q2 Which user owns this file? Which group owns this file?
Which user owns this file? pclark Which group owns this file? acct
You have created a separate partition for the sales team and mounted it to the /sales directory. The team is about to begin a new project, and they want to make sure there is enough disk space to hold upcoming files. Which of the following commands will show you the amount of free space?
df /sales
Which of the following templates, which use the JSON file format, can be copied and used to create multiple containers, that run the same applications?
Container image
A system administrator is configuring a package manager to access packages from a local repository and take advantage of a local repository's transfer speed. Which of the following commands can be used to pull packages from an online repository? (Select THREE).
curl wget rsync
Which of the following are Python scripts classified as intrusion prevention software that provide dynamic rule sets to automate the rules iptables use to filter network traffic? (Choose TWO.)
DenyHosts Fail2ban
You have found a patch for the Samba server on your system. The patch is a .rpm package. Which of the following procedures is the MOST correct for installing the package?
Download the package. Run rpm -Uvh on the package to install the update.
When implementing a network gateway, implementing a firewall, or increasing performance, multiple NICs can be added to a computer. Which of the following can be implemented on VMs to provide this capability?
Dual-homed NICs
Which of the following are popular Linux desktops?
KDE, Cinnamon, Mate, GNOME, & Unity
Which of the following can be used to script Anaconda and provide unattended installations using a single file?
Kickstart
During the process of troubleshooting a resource issue on a server, the technician entered the following command and received the output showing zombie processes. What should the technician do NEXT to resolve the issue with zombie processes?
Kill the parent process.
You attempt to unmount a volume using the umount /dev/sdd3 command, but you receive a device is busy error message. Which of the following strategies will be MOST likely to allow you to unmount the file system? (Select TWO).
Make sure your current directory is not on the file system and try to unmount again. Find and close any open files on the file system, and try to unmount again.
Anna, a system administrator, created a new virtual machine that she would like to provision on additional hypervisors. Which of the following will provide a VM template that is open and can be used by hypervisors from different vendors?
OVF
Which of the following statements best describes the effects of having only the gshant user account listed in the /etc/at.allow file?
Only gshant and root can use the at command.
Which of the following is a free, open-source scriptable screen reader that works with the GNOME desktop?
Orca
Which of the following functions does the -d option perform when using the apt-get command to install a package?
Packages are downloaded to the system, but not installed.
You are attempting to ping the FQDN of a computer on the internet, but are not getting a response. What is the problem?
Pinging the FQDN of a computer does not give you enough information to know what the problem is.
In an effort to secure the internal network, the system administrator has implemented a host-based firewall and set up explicit allow and deny statements for specific ports and services. Some of the employees are complaining they can no longer access the applications they need. The server was on the internal network connected to an internal router, which is connected to the DMZ and an external router to the internet. Which of the following is most likely causing problems?
Restrictive ACLs on the firewall.
Which of the following statements BEST describes the repeat key keyboard accessibility option?
Repeat keys affect how quickly the action associated with the key is repeatedly performed when the key is pressed and held down.
You are the only Linux administrator for a very small company. You are constantly asked to fix one problem or another as they occur. Which of the following is the BEST way to log into the system each morning?
Log in as a regular user and then use su as needed to solve problems.
Which of the following desktops were started by an Arch Linux user in response to the negative reception of GNOME 3 and continue to follow the GNOME 2 code base?
MATE
What is the name of the hash function used to verify the public key for an SSH connection?
MD5
A service account is created by the system or an application and cannot be used to log in to the system. Which of the following methods can be used to verify that a service account cannot login to the system?
View the entry for the service account in /etc/passswd and look for /sbin/nologin.
You are troubleshooting a workstation that is having trouble while browsing the internet. You want to perform some test on name resolution. Which utility would give you the most information?
dig
You used DNF to list the ruby packages that are available to install. You see that there is a package available that is called ruby. What DNF command do you use to install this ruby package?
dnf install ruby
Removing unnecessary software increases the security of your Linux system. If your system uses RPM for package management, what can you enter at the command prompt to look for unnecessary software that might be installed on your system?
dnf list installed
You have users who need to do some programming projects in the Ruby programming language. What DNF command do you use to find out if there is a ruby package available to install on the Linux server?
dnf list ruby
You have installed a package called mathpac with DNF. After a system upgrade, the package is not working correctly. Which of the following commands should you try first to get the package to function?
dnf update mathpac
A script named myscript contains the following command line: echo $1 $2 $3 The following command is typed in an interactive shell. myscript dog cat bird frog Which of the following will be displayed in the interactive shell?
dog cat bird
What dpkg command would you enter at the command prompt to search for packages that have been partially installed on the system?
dpkg -C
A script developer is working on some new feature for the administering Linux servers and wants to add the features without changing the master branch. Which of the following is the BEST command to use?
git branch
A technician wants to obtain the ABRT repository from a git online service. Which of the following commands should be used?
git clone [email protected]:abrt/abrt.git
Cindy, a technician, created a perl script named server-info.pl that used for gathering server information. Cindy wants to add the file to the repository and has executed the command git add server-info.pl Which of the following commands should she execute NEXT?
git commit -m "Adding server-info.pl script"
After installing Git and before the first commit is made, the user.name and user.email properties need to be configured. Which of the following commands are used to configure these properties?
git config
Which of the following is the BEST command for initializing a new Git repository?
git init
Which of the following is the BEST command for showing the commit history of a repository?
git log
Which of the following is the BEST command used to join a branch to a master?
git merge
Alberto, a system administrator, is working with another system administrator, Leroy, to update the bash scripts used on various servers. The bash scripts are stores in a Git repository. Alberto updated a script that may have also been updated by Leroy. Which of the following commands SHOULD Alberto execute before he commits his changes to the repository?
git pull
Lydia, a developer, recently made changes to some files and wants to update the changes on the master branch. Which of the following is the BEST command to use for this purpose?
git push
You need to temporarily change the IP address of the network interface (enp2s0) to 192.168.1.50. The network interface's IP address is currently set to 10.0.1.50. Which of the following commands would achieve the desired result?
ifconfig enp2s0 192.168.1.50
As you troubleshoot the network connection for your Linux system, you discover that the eno32 interface is down. Which command should you use to start the interface?
ifup eno32
The enp2s0 interface is currently down. What can you enter at the command line to start the enp2s0 interface?
ifup enp2s0
What should you enter at the command prompt to display both listening and non-listening sockets on your Linux system?
netstat -a
What is the name of the primary partition management utility that will both create GUID partitions and create file systems on those partitions?
parted
Marco recently made some partition changes, and the kernel is not recognizing the partitions. Which of the following commands should Marco use to resolve the problem?
partprobe
You suspect that the gshant user account is locked, Which command will show the status of the user account? (enter the command as if at the command prompt)
passwd -S gshant
You have a SCSI tape drive st0. You want to backup the contents of /var/oracle. Which command will perform the backup?
tar -vcf /dev/st0 /var/oracle
You need to restore a file, yearend.xls, from the archive 013004.tar.gz in the backup directory. The file needs to be restored to /home/accounting. Which command will perform the restore?
tar -xzvf /backup/013004.tar.gz /home/accounting/yearend.xls
What should you enter at the command prompt to check the TCP wrapper configuration on your system?
tcpdchk
You are having trouble contacting a host on another network. ping fails, but you would like to get more information about the router in the path where the communication stops. Which of the following utilities would you use?
traceroute
You need to convert the file system of /dev/sdb3 from ext2 to ext3 without affecting the data on the drive. What command and option should you enter at the command prompt?
tune2fs -j /dev/sdb3
You need to create a large number of files, and you would like to ensure that youm the user owner, are the only person that has read and write permissions to the files. The files will be located in a number of different directories that already contain other files you don't want modified. How could you BEST create these files within the correct permissions using the LEAST amount of effort?
type umask 0066 to change your umask.
Which command should you use to change the time zone (TZ) environment variable? (Select TWO).
tzconfig tzselect
What do you enter at the command prompt to prevent the shell from using too much of the system's resources?
ulimit
A user calls the help desk. Each time he creates a new text file, permissions of 640 are applied to the file, and he use chmod to set them to 644. What command should you enter in the user's profile to set the default permission for newly created files to 644?
umask 0022
Partition /dev/sdb2 is mounted to /mnt/temp. You need to unmount /dev/sdb2. Which commands would you use? (Choose two.)
umount /dev/sdb2 umount /mnt/temp
A programmer named Brandon calls with an issue. He is currently using the C shell each time he logs in, but his manager has told him to start using the bash shell. Which command will change brandon's shell to the desired setting?
usermod -s /bin/bash brandon
Which of the following commands creates a volume group named backup and initializes it by adding the third disk in a Linux system to the volume group?
vgcreate backup /dev/sdc
You are using LVM on your Linux system to manage the existing volumes. After adding and initializing the fourth hard drive to the system and creating a physical volume, what command should you use to add it to the backup volume group?
vgextend backup /dev/sdd
Which of the following command line tools are used to control virtualization by using arguments such as list, start, and shutdown?
virsh
What do you enter at the command prompt to edit the /etc/sudoers file?
visudo
Which of the following tools provides a graphical interface for managing virtual machines on a Linux host?
vmm
Mary, a technician, is troubleshooting memory and performance issues on a system. mary executed a command to show information about processes, memory, paging, block IO, traps, disks, and CPU activity. Which of the following commands did Mary use to produce the output below?
vmstat
You need to block all uusers from logging in to the Linux system while you resolve a serious issue. You first need to force all active users to logout. What command should you enter to display a list of all active users?
w
Where does the client store SSH keys that are used to establish an SSH session? (Select TWO).
~/.ssh/known_hosts /etc/ssh/ssh_known_hosts
What does the netstat -a command show?
All listening and non-listening sockets
Which of the following actions does the dpkg -l (lowercase L) command perform?
All packages with names that match a specified pattern are displayed
You would like to use SSH port tunneling to work on a remote system. You also need to ensure that all data that you send to the remote system is encrypted. Which SSH configuration option, in the /etc/ssh/sshd_config file, needs to be set yet to yes?
AllowTCPForwarding
Lynda, a network administrator, has been tasked with connecting the VMs on multiple virtual machine hosts in a way that doesn't expose the VMs to the external network. Which of the following should you implement?
An overlay network
A user calls with a concern about the display he is seeing after running ps -ef. There are a number of processes that display getty, and he is afraid that an unauthorized user is attached to the system. How should you respond?
Assure the user that this is normal
What is the purpose of the find / type f -perm -o=x -ls command?
Audit files in the root directory that have execute permissions for others.
What is the purpose of the find / type -perm -u=s -ls command?
Audit files in the root directory that have the SUID bit set.
For what purpose would you edit the /etc/localtimefile?
Set the current time zone.
When creating a bash script, it is important to document the purpose of the script. Which of the following is a valid comment?
# Comment text
Which of the following shell declarations should be entered on the first line of a script for a system that uses the bash shell?
#!/bin/bash
In the /etc/shadow file, which character in the password field indicates that the password is an encrypted entry?
$
You need to identify which user accounts on the Linux system have encrypted passwords. Which character in the password field of the /etc/shadow file indicates that an encrypted password is set for the user account?
$
Before you install an RPM package, you want to verify the authenticity of the package and check the digital signature to ensure that it has not been altered. Which rpm option should you use?
--checksig
You are using the cupsctl command to configure the /etc/cups/cupsd.conf file. Which cupsctl option will enable sharing of the locally connected printer to other computers on the network?
--share-printers
Which useradd option displays the default values specified in the /etc/default/useradd file.
-D
Which dpkg option completely removes a package and its configurations files?
-P
Which of the following dpkg options will install a package recursively?
-R
Which of the following repquota options will give quota limits and disk usage for all file systems listed in /etc/mtab?
-a
You are inspecting the superblocks and block information on your file system. You need dumpe2fs to display only the blocks that are reserved as bad in the file system. Which of the following options should you use?
-b
Your ext3 file system has experienced a significant amount of corruption. To examine the file system, you want to use the debugfs utility. Which of the following debugfs options should you use to examine the file system?
-c
Your ext3 file system has experienced a significant amount of corruption. To examine the file system, you want to use the debugfs utility. Which debugfs option should you use to examine the file system?
-c
Your system time is over thirty minutes different than the time on the NTP time provider. When you use the ntpd command, the time is not updated. Which ntpd option should you include?
-g
You are compressing a file with the tar utility, but you need to ensure you can uncompress the file with the bzip2 utility. Which tar option should you use during the file compression?
-j
You need to view the files within /home/gshant/expfile.bz2, but you want to leave the compressed file unchanged. What bzip2 option should you use?
-k
Which chage option keeps a user from changing password every two weeks?
-m 33
You suspect your /dev/sda3 partition is in need of repair. Which of the following e2fsck options will repair the errors without any interaction from you?
-p
You have a critical file called yearend.xls. You want to set file permissions so that only the owner of the file can modify it and only group owners can read it. Which permission listed below will accomplish that?
-rw-r----- 1 george acctg 26256 June 1 04:16 yearend.xls
You have an application whose owner is root, but you want all users to execute the application with root user permissions. Which of the following examples shows correct usage of the SUID flag?
-rwsr--r-- 3 root sys 73748 Nov 2 2005 /usr/bin/applicationx
You have an application whose group is sys, but you want all users, whether or not they are members of the sysadmin group, to execute the application with sysadmin group permissions. Which of the following examples shows correct usage of the SGID flag?
-rwxr-sr-- 3 root sysadmin 73748 Nov 2 2005 /usr/bin/applicationx
Which hwclock option sets the system time to the current hardware clock time?
-s
You need to set the system date and time using the date command. Which date option should you use?
-s
You want to use the date command to the system time UTC time. Which date option should you use?
-u
Which lpr option should be used to change the page width of the print job?
-w
Which of the following files can be configured to ignore certain file types from being committed to the local Git repositroy?
.gitignore
You have installed a new Linux system and you want to make a baseline of system performance. Which of the following files contain baseline information? (Select TWO).
/cpuinfo /meminfo
What is the file path and name of the directory that contains device files for hard drives, optical drives, and USB devices?
/dev
You are preparing to mount a device local to your system. Which directory holds the device files?
/dev
You need to configure your Linux system to allow only the root user account to mount the CD-ROM device. Which of the following options should you add to the /etc/fstab file?
/dev/cdrom /media/cdrom -t iso9660 ro,nouser,noauto
Type the full device file name for the second partition on the hard drive with the lowest ID number.
/dev/sda2
What is the full path and file name for the file that contains a colon-, space-, tab-, newline-, or comma-delimited list of directories in which to search for libraries?
/etc/ld.so.conf
Your Linux system uses the Line Printer Daemon (LPD) to manage print jobs. What is the full path to the file you should use to edit the LDP configuration?
/etc/lpd.perms
Which file shows the currently mounted volumes?
/etc/mtab
What is the full path and filename of the file you should create to disable user login on a Linux system?
/etc/nologin
What is the full pat and filename of the file you should edit to determine the order in which name resolution is completed?
/etc/nsswitch.conf
You are managing system time on your Linux computer, and you need to change the settings to point to a local NTP server IP address. What is the full path and filename of the file you should edit?
/etc/ntp.conf
Which configuration file should you edit to enable Pluggable Authentication Modules (PAM) to check for a file named /etc/nologin
/etc/pam.d/login
A number of remote users call to say that they cannot connect via SSH today. When you look at the processes, you see that the daemon is not running. Which command would you use to solve this problem?
/etc/rc.d/init.d/sshd start
The root user attempted to log in to the system using tty and was denied access. The pam_securetty module uses a configuration file to determine which virtual terminals (tty#) that root is allowed to log in from. Which of the following files would the root user check to see which terminals are permitted?
/etc/securetty
What is the full path and filename of the file you should edit to limit the amount of concurrent logins for a specific user?
/etc/security/limits.conf
What is the path and filename of the file in the Linux system that lists all network services, including the port assigned to the service?
/etc/services
What is the full path to the directory that contains a set of configuration file templates that are copied into a new user's home directory when it is created?
/etc/skel
What is the full path and filename of the file you should edit to configure the SSH daemon on the server system?
/etc/ssh/sshd_config
You need to configure which commands are allowed to be used with the sudo command. What is the full path and filename of the file you should edit?
/etc/sudoers
What is the full path and filename of the file you should use to configure the hardware clock to use UTC automatically?
/etc/sysconfig/clock
If you are managing a systemd-based Linux system, which of the following commands cannot be used to bring the enp2s0 interface down?
/etc/sysconfig/network-scripts/ifcfg-enp2s0 down /etc/init.d/network stop
Sam, a system administrator, is implementing measures to harden the Linux systems on the network. Sam wants to modify kernel parameters at runtime to protect the system from syn flood attacks using the sysctl command. Which file would Sam modify to implement the following changes?
/etc/sysctl.conf
When managing DNF, what is the full path to the directory where you should place .repo files?
/etc/yum.repos.d/
When managing YUM, what is the full path to the directory where you should place .repo files?
/etc/yum.repos.d/
The gshant user is attempting to connect to a remote SSH serverl however, you need to override the default SSH configurations for the client system when he establishes an SSH session. Which of the following files should you edit?
/home/gshant/.ssh/config
Which of the following directories is specified by Filesystem Hierarchy Standard (FHS) as a mount point for removable media, such as USB storage media, DVDs, CD-ROMs, and Zip disks?
/media
What is the full path to the directory that contains information about the system state and process
/proc
Which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) channels are being used by each hardware device on the system?
/proc/interrupts
Maria, a system administrator, wants to setup IP forwarding on a server for both IPv4 and IPv6. Which of the following files should be modified to enable IP forwarding? (Choose TWO)/
/proc/sys/net/ipv4/ip_forward /proc/sys/net/ipv6/ip_forward
What is the full path to the directory that contains information about each kernel module installed on the computer?
/sys/module
Which of the following directories typically hold the dynamic libraries on your system? (Select TWO).
/usr/lib/ /usr/local/lib/
As the network administrator, one of your responsibilities is to analyze and troubleshoot SELinux context violations. In which directory are the SELinux violations recorded?
/var/log/audit
anacron creates a timestamp file that tells you the last time a regularly scheduled job was run. What is the full path and name of the directory that contains these timestamp files?
/var/spool/anacron
What is the complete path to the directory that will hold the crontab file for the gshant user account?
/var/spool/cron/
During installation, you must create a root user account for the system. Which of the following user account number does this account use? 0
0
What is the default nice value for a process not executed with the nice command?
0
What is the typical default umask value?
022
Which of the following hexadecimal codes represents an extended partition?
0x85
Match the correct term on the left with the definition on the right. 1 Allows processes to communicate with each other and notify them of new hotplug devices 2 Provides all applications with data about current hardware 3 Dynamically creates device files in a virtual file system as devices are added and removed 4 Exports information about hotplug devices so that other utilities can access the information
1 Allows processes to communicate with each other and notify them of new hotplug devices D-Bus 2 Provides all applications with data about current hardware hald 3 Dynamically creates device files in a virtual file system as devices are added and removed /udev 4 Exports information about hotplug devices so that other utilities can access the information sysfs
Match the correct /proc directory content on the left with the description on the right. 1) Displays the boot options that were given to the kernel at boot time. 2) Displays information about the computer's CPU. 3) Displays information about the current kernel version. 4) Displays all the direct memory access assignments for the computer.
1) Displays the boot options that were given to the kernel at boot time. cmdline 2) Displays information about the computer's CPU. cpuinfo 3) Displays information about the current kernel version. version 4) Displays all the direct memory access assignments for the computer. dma
Match the term on the left with its characteristic on the right. (Each term can be used more than once.) Dynamic Library Static Library
1) Has a .so or .so.version extension. Dynamic Library 2) Increases the size of the application. Static Library 3) Has an .a filename extension. Static Library 4) Is typically stored in /usr/lib/ and /usr/local/lib/. Dynamic Library 5) Can degrade program load time if the library is already in use by another program. Dynamic Library
What would be the outcome of the following command? userdel -r jjones 1) The user account, jjones, would be deleted along with jjones' home directory. 2) The user jjones' home directory would be deleted, but the user account would still exist. 3) The user account, jjones, would be deleted, but jjones' home directory would be left untouched. 4) The user account, jjones, would be deleted along with jjones' home directory and all files owned by jjones.
1) The user account, jjones, would be deleted along with jjones' home directory.
Which of the following utilities would you typically use to lock a user account? (select two) 1) passwd 2) useradd 3) usermod 4) userdel
1) passwd 3) usermod
A user with an account name of larry has just been terminated from the company. There is good reason to believe that the user will attempt to access and damage the files in the system in the very near future. Which command below will disable or remove the user account from the system and remove his home directory? 1) userdel -r larry 2) userdel -home larry 3) userdel larry 4) userdel -h larry
1) userdel -r larry
During a Fedora distribution installation, you choose to add a regular user account. The only other user that has been added to the system was root. Which of the following user IDs is most likely to be associated with the new user?
1000
Given this entry in the /etc/passwd file: pmallory:x:1001:1050:Paul Mallory:/home/pmallory:/bin/bash Which of the following is the user ID associated with this entry.
1001
You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select TWO).
110 25
Which of the following is the maximum number of GUID partitions that can be created using the gdisk utility?
128
Which port number is used by the IMAP protocol?
143
Which of the following are not valid IP addresses? (Select THREE).
145.8.260.7 45.22.156.256 257.0.122.55
What port number does SNMP use?
161
You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select THREE).
172.18.188.67 10.0.12.15 192.168.12.253
You are the administrator for a small network of Linux hosts. Your network does not communicate with the internet and does not use DNS. When you add a new host named ENERGY7 to the network, which entry should be added to the /etc/hosts files?
192.168.0.34 ENERGY7 #Reception Area
To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select TWO).
20 21
An employee named Bob Fulin, with a user name of bfulin, has left the company. You have been instructed by your supervisor to delete his user account along with his home directory. Which of the following commands would produce the required outcome? (choose all that apply)(2) 1) userdel -h bsmith 2) userdel bsmith 3) userdel -r bsmith 4) userdel bsmith;rm -rf /home/bsmith
3) userdel -r bsmith 4) userdel bfulin;rm -rf /home/bfulin
What is the most correct description for 3DES?
3DES is a very secure mode of the DES algorithm encryption method that encrypts data three times using a 168-bit key.
Which of the following is the maximum number of primary partitions that can be created on a single hard disk drive?
4
One of your users Karen Scott, has recently married and is now Karen Jones. She has requested that her username be changed from kscott to kjones, but no other values change. Which of the following commands will accomplish this? 1) usermod -l kscott kjones 2) usermod -u kscott kjones 3) usermod -u kjones kscott 4) usermod -l kjones kscott
4) usermod -l kjones kscott
Which of the following sets of octal permissions would allow everyone to execute the following file as if they were the root user? -rwxr-xr-x 1 root root 8045 July 24 2018 myscript
4755
You are editing the crontab file and want an entry to run every hour at five minutes past the hour. Which of the following entries will accomplish this?
5 * * * * /home/emmett/example.sh
You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
53
Which of the following are valid IPv6 addresses? (Select all that apply.)
6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1
For Linux files, the default permission is 666, and the default umask is 022. When a new file is created, it will be assigned 644 (rw-r--r--) permissions. If the umask is set to 027, what permissions will be assigned for newly created files?
640 (rw-r-----)
You are called into the office of a newly hired manager. He has copied a file from his old place of work onto his new workstation, but is now receiving an error message that access is denied each time he tries to access the file. He is not the owner of the file or a member of the group the file is associated with. Which of the following represents the LEAST set of file permissions needed for him to be able to read and write to the file?
666
Which of the following statements best describes the function of the repquota /home -vu command?
A summary of disk usage and quotas is displayed for the users who have files within /home.
You want to allow any host from westsim.com to have access to your system. Which of the following line items would you add to the /etc/hosts.allow file to accomplish this task?
ALL: .westsim.com
You want to allow any host from westsim.com to have access to your system except a system called testsvr.westsim.com Which of the following line items would you add to the /etc/hosts.allow file to accomplish this task?
ALL: .westsim.com EXCEPT testsvr.westsim.com
Which of the following is a key difference between agent-based orchestration and agentless orchestration? (Choose TWO).
Agent-based requires that proprietary software is installed on each device you wish to monitor. Agentless orchestration does not require a proprietary software agent to be installed on the managed hosts.
Gloria, a Linux administrator, used the gdisk utility to create eight partitions on a new hard drive. Which of the following BEST describes the partitions Gloria has created?
All eight partitions are the same. They are simply partitions. There are no primary, extended, or logical partitions.
Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?
Default gateway
A user sends two print jobs to the Marketing printer (the default printer). She notices the printer is stalled on the first document and uses the lprm - command. What will be the result?
Both of her jobs will be deleted.
You have a user who has difficulty typing. She is constantly pressing keys multiple times by accident. Which keyboard accessibility option should you enable?
Bounce keys
You have an anacrontab file with the following settings: RANDOM_DELAY=35 START_HOURS_RANGE= 17-23 #period in days delay in minutes job-identifier command 1 5 cron.daily nice run-parts /etc/cron.daily 7 20 cron.weekly nice run-parts /etc/cron.weekly @monthly 50 cron.monthly nice run-parts /etc/cron.monthly
Between which hours of the day will tasks scheduled with anacron start to run? Between 5:00 p.m. and 11:00 p.m. If the system was down during the time period a weekly task was scheduled to run, what is the minimum amount of time anacron will wait, after the system is back up, before running the task? 20 minutes If the "delay in minutes" for daily tasks is 5 minutes, how much time will anacron add to the delay of 5 minutes before it runs the scheduled daily task? A randomly chosen number of minutes between 0 and 35
Which of the following types of cloud storage is managed from a dashboard or webpage?
Blob
Which of the following cloud storage types is accessed through network drives or as a cloud computing resource?
Block
As a network administrator, you have had several users ask for a way in which they could connect their phones to their Linux computer, without the use of wires. Which of the following device types would BEST meet these user's needs?
Bluetooth
Which of the following describe the difference between the /lib/modules directory and the /usr/lib/modules directory? (Choose TWO).
Both directories contain hard links to the kernel modules. /lib/modules is available to root in single user mode, while /usr/lib/modules is available to all users.
You are asked to help a user who is complaining that file system errors are being reported during boot-up. When you reboot the user's system, you see errors on sda2. Which of the following strategies will check the file system on sda2 and fix the errors?
Change to single user mode and run fsck /dev/sda2.
A user is trying to access a system using SSH, but can't connect. The user has verified the correct hostname and IP address. Which of the following should the user check to troubleshoot the issue? (Choose TWO).
Check whether the SSH daemon is running. Check the firewall to see if the default SSH port 22 is blocked.
Which of the following desktops was derived from GNOME 3, follows traditional desktop metaphor conventions, and is the primary desktop environment for the Mint distribution?
Cinnamon
Which of the following device categories do RAM chips, CPUs, expansion cards (such as PCI cards), and standard hard disk drives belong to?
Coldplug devices
Which of the following is a function of a virtual network switch?
Connects the VMs virtual NIC and the host's physical NIC.
Which of the following describes the effects of the tune2fs -j /dev/sdb1 command?
Converts the /dev/sdb1 device to ext3.
Which of the following steps must be completed after creating a logical volumes so that the logical volume can be used to store files?
Create file systems on the volumes and mount them.
Which of the following would enable the rsync service to be managed by the xinetd super daemon?
Create the rsync file in /etc/xinetd.d
Anaconda is an installation program that's used by Fedora, RHEL, and other distributions. Which of the following does Anaconda perform? (Select THREE.)
Creates a file system. Identifies the computer's hardware. Provides a user interface with guided installation steps.
While editing a script using gedit, you discover that you no longer have access to your current terminal session need to check the values of some variables the script is using. Which of the following commands will send the gedit process to the background so you can regain access to the current terminal?
Ctrl + Z
The graphics driver was recently updated on a system. Now, the graphical user interface (GUI) is not displaying, preventing the user from logging in. You need to access the system locally. Which of the following commands will access the tty2 terminal?
Ctrl+Alt+F2
Which of the following daemons allow processes to communicate with each other and relay information about hotplug devices?
D-bus
Which routing component is used to forward packets to remote networks?
Default gateway
You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?
DHCP
Which network service would you use to get the IP address from the Fully Qualified Domain Name (FQDN) hostname?
DNS
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which of the following protocols should you implement?
DNS
Which of the following provides security for datagram-based applications by allowing them a communication method designed to prevent eavesdropping, tampering, and message forgery?
DTLS
Yesterday you created a new swap area for your system. Today, after rebooting the system, you find the swap area is not mounted. What should you do to ensure the swap area is mounted each time the system boots?
Edit /etc/fstab and add the swap partition.
Which of the following describes an IPv6 address? (Select TWO).
Eight hexadecimal quartets 128-bit address
You manage a Linux server that occasionally needs to provide ftp services at irregular intervals. To save on resources, you want to have the ftp server service running only when it is needed, and stopped the rest of the time. Which of the following solutions would satisfy these requirements and require the LEAST amount of effort?
Enable the ftp service to be managed by the xinetd service.
You want to limit Telnet access to three specific users. Which of the following strategies will BEST accomplish this goal?
Enter the IP address enries for the three users in the /etc/hosts.allowfile.
You are the system administrator of a test lab that uses the Linux operating system. For security reasons, your lab is not connected to the corporate network. Therefore, you are not able to resolve host names via the corporate DNS server. You want to be able to connect to the lab computers using hostnames, but you do not have the resources to bring up your own DNS server. Which of the following solutions would satisfy your requirements?
Enter the IP addresses and hostnames for all of the lab computers in the /ect/hostsfile on each of the machines in the lab.
Your ISP has changed the IP addresses of their DNS servers. What would you need to do on your Linux system to still be able to continue resolving host and fully qualified domain names if you use statically assigned IP address information?
Enter the IP addresses of the new DNS servers into the /etc/resolv.conf file.
You have just installed a new Linux system, which is using the Wayland system. Which of the following is a VALID statement regarding this system?
Events captured from the keyboard are sent to the Wayland compositor and then the Wayland client, where the rendering takes place.
Which of the following is a valid IPv6 address?
FEC0::AB:9007
When configuring the SSH daemon using the /etc/ssh/sshd_config file, which options can be set to either prevent or allow unrestricted access to all GUI features on the client? (Select TWO).
ForwardX11Trusted X11Forwarding
Which of the following desktops is the default for many Linux distributions, such as Fedora and Ubuntu?
GNOME
Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select TWO).
Hexadecimal numbers 32 numbers grouped using colons
Which accessibility option adjusts the background and text colors to improve readability?
High contrast
Carlos, a system administrator, needs to set up a VPN tunnel from a branch office to the main office. Data security is a high priority. Which of the following will allow the IP packets to be encrypted and encapsulated in a new IP header that is sent through the VPN tunnel?
IPSec
You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use?
IaaS
You need the DNF utility to check specific URLs for RPM repositories. Which of the following locations should you add the URLs to?
In .repo files within the /etc/yum.repos.d/ directory
Which of the following represent a typical Linux backup type? (Choose FIVE.)
Incremental Differential Snapshot Full Image
Which of the following situations is most likely to cause a dependency problem?
Installing two different packages that both include /usr/lib/graphlib
Orchestration is the automated configuration, coordination, and management of computer systems and software. Orchestration takes advantage of several tasks that are usually automated to create a more complex workflow. Which of the following workflows needs can be satisfied by orchestration? (Choose FOUR).
Inventory Automated builds and code deployments Server provisioning Configuration management
Which of the following are multifactor authentication supported by Linux? (Select THREE.)
Iris pattern Fingerprint One-time password (OTP)
Which of the following desktops emulates a Windows desktop, especially in the location of the menu options and bottom panel bar?
KDE
A Linux system can determine the time and date in which of the following ways? (Select TWO).
It can use NTP to set time. It can set the system clock to the local time.
Which of the following functions does the rpm -V command perform?
Verifies that an RPM package is free from errors.
Mary, a system administrator, would like to deploy virtual machines, storage, and networking in a cloud environment. Which of the following file formats would allow Mary to modularized these items as a template? (Select TWO).
JSON YAML
Which environment variable specifies additional directories to search for library files not listed in /etc/ld.so.conf?
LD_LIBRARY_PATH
You work for a growing small business where the executives are traveling and working remotely. Which of the following would offer the BEST protection for sensitive data on their laptops?
LUKS disk encryption
What effect does the ulimit -t 600 command have on a Linux system?
Limits CPU time for a process to 10 minutes.
Within the /etc/security/limits.conf file, you notice the following entry: @guests hard maxlogins 3 What effect does this line have on the Linux system?
Limits the number of maximum logins from the guest group to three.
Which of the following describes link-local IPv6 addresses? (Select THREE).
Link-local IPv6 addresses must be assigned to any network interface on a Linux system. Link-local IPv6 addresses are not routable. Link-local IPv6 addresses begin with FE8, FE9, FEA, or FEB
Which of the following lines in the /etc/cups/cupsd.conf file will configure CUPS to listen for print jobs coming in on the server's network interface with the IP address 192.168.0.1 through the IPP port?
Listen 192.168.0.1:631
Which of the following methods should you use to configure dynamic libraries on a Linux system? (Select TWO).
Modify /etc/ld.so.conf to add the path of the libraries. Use the LD_LIBRARY_PATH environment variable to specify additional directories to search for library files.
You have a user who has difficulty using the mouse. Which of the following keyboard accessibility options would BEST aid this user?
Mouse keys
Which of the following describes network interface bonding?
Multiple network interface cards are aggregated into a single bonded interface.
Linux-based hypervisors, such as Xen, KVM, and QEMU, provide a software-based virtual network switch. Which of the following is an additional feature provided by a Linux bridge?
NAT
Which of the following Linux bridge modes is the default?
NAT
Which remote desktop technology offers access from most common platforms such as Linux, Windows, Mac, iOS, Android, and Rasberry?
NX
Which of the following describe an OVA (open virtual appliance or application) file?
Provides a single file that archives all the files that make up an OVF using TAR.
You want to enable public key authentication on the server. Which option in the /etc/ssh/sshd_config file needs to be set?
PubkeyAuthentication yes
Which of the following technologies can be used to set up passwordless SSH logins by distributing a server SSH certificate?
Public key infrastructure (PKI)
Which of the following functions does the dpkg --configure command perform?
Reconfigures an unpacked package
You obtain your applications and updates in RPM format. Which of the following distributions is your system based on?
Red Hat
What does the lprm command do?
Removes jobs from the line printer print queue
You have previously installed the package mplayer and wish to remove it from your computer. Which of the following removal methods should you use?
Run the command rpm -e mplayer.
You are attempting to ping another computer on the internet by its IP address, but you are not getting a response. You do get a response when you ping a host on your own network. Which of the following options would help you better determine were the problem is?
Run traceroute on the IP address of the computer on the internet.
You need to manage a process in the foreground by pressing Ctrl + C on the keyboard. Which signal code is sent to the process?
SIGINT
Which of the following provides a complete open-source solution for remote access to virtual machines?
SPICE
Which of the following network services or protocols uses TCP/IP port 22?
SSH
Which of the following industry-standard management systems can be used by agentless orchestration? (Choose FOUR).
SSH CIM SNMP WMI and WInRM
Which version of SSH supports the Rivest, Shamir Adleman (RSA), and Digital Signature Algorithm (DSA) encryption standards?
SSH2
Which of the following virtual private networks (VPNs) utilizes digital certificates to ensure that only the intended recipients can view and use the data sent?
SSL/TLS
Roberto, a help desk technician, received a call from Sally. She was not able to change to a directory that she owns. The following is the output from the commands that Sally entered: ... ... Based on the output, which of the following describes the problem?
Sally does not have the eXecute permission as owner of the directory.
For Linux systems where physical access could be compromised, which of the following best practices should be implemented to prevent a user from booting into single user mode with root access?
Set a bootloader password.
You have just installed a new program that will be used by all users on the computer. After installation, you log in as a regular user, and you try to run the program. The program stops and displays the following error: Error: not running as root What should you do so that all users can run this program?
Set the SUID on the program.
Which of the following describes the function of the export command?
Sets environment variables.
What is the effect of the following command? chage -M 60 -W 10 jsmith
Sets the password for jsmith to expire after 60 days and gives a warning 10 days before it expires.
Setting the SUID flag is a powerful and useful feature. It can have weaknesses associated with its use. Which of the following statements identifies a weakness?
Setting the SUID flag for an application or process owned by the root user is a potential security hole.
A system was installed by an emloyee that is no longer with the company, and that employee used a non-standard root password that was not documented. Which mode must you boot the system into to reset the lost root password?
Single user mode
Given the following bash script: Which of the following would be displayed if the number 12 is entered as the guess?
Sorry, that is not my number!
Which of the following orchestration attributes are typically configured? (Choose TWO).
Start and stop time. User name, title, and employee ID for user orchestration.
IPv6 is configured using several methods. In which method do clients use Neighbor Discovery Protocol to send router solicitation and router advertisement messages to learn the subnet prefix and default gateway as part of an automatic interface ID generation process?
Stateless autoconfiguration
Which of the following special permissions prevents a file's deletion by anyone except the file's owner?
Sticky bit
A user type has the following qualities: Created by default during the Linux installation Used by the system for specific roles Not used to log into the system Which of the following user types has these qualities?
System or service user
You are an application developer. You are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?
TCP
You open the /etc/nsswitch.conf file and observer the following line: hosts: file dns What is the result of this configuration?
The /etc/hosts file takes precedence over information obtained from a DNS server when resolving domain names.
You are asked to troubleshoot a problem on a user's computer. When the user types the name of any website he receives a message stating, "The page cannot be displayed." You determine that nothing has changed on the computer What is MOST LIKELY the problem?
The DNS server is down or not reachable.
What will be the result of the following command? host www.somedom.com
The IP address of the computer www.somedom.com is displayed.
Which of the following BEST describes the role of the Linux desktop?
The Linux desktop adds a series of tools and utilities to make the GUI useful.
You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240... Could not open connection to the host, on port 23. No connection could be made because the target machine actively refused it." What may be the problem?
The Telnet server is not running.
You are viewing the /etc/passwd file, and you notice the following entry: pclark:x:1001:1001:Petunia Clark:/home/pclark:/bin/bash Which statement BEST describes this entry?
The pclark password is stored in the /etc/shadow file.
Mario, a technician, executed pgrep -u sally and received the following result: 1036 Which of the following describes the result?
The process ID of the process that was executed by the user sally.
Which of the following describes Infrastructure as Code (IaC)?
The process of managing and provisioning computer data centers.
Given the command ls > myfiles which of the following describes the results?
The stdout of the ls command is redirected to the myfiles file.
The hard disk in your Linux laptop has almost reached its maximum storage capacity. You would like to add more hard disk storage but there is no room internal to the computer. Which of the following device types is BEST to use if you want to achieve the fastest throughput?
USB
Which of the following devices is a hotplug device?
USB flash drives
While reading about file system permissions in your Linux, you discover that the default permissions assigned to new files when they are created are rw-rw-rw (666 octal), and new directories are rwxrwxrwx (777 octal). However, when you create a new file in a directory called /data, the permissions assigned ar rw-r--r--. Which of the following BEST explains the results you are seeing.
The umask must be set to 0022 and therefore, block the write permission for the group owner and everyone else.
What information about print jobs does the lpq utility display? (Select TWO).
The username of the person who submitted the job. A numerical job ID that can be used to manipulate the job from other utilities.
There are three types of virtualization environments. Match the virtualization type on the left with the description on the right. Virtualization types may be used more than once.
The virtual machine completely simulates a physical computer system. Full virtualization Operating systems do not need modification to run within virtual machines. Full virtualization Only some of the components of a virtual machine are virtualized Partial virtualization Handles some of the virtualization processing the hypervisor would normally perform. Hardware-Assisted Virtualization
Your company is deploying ten new virtual machines. You have planned the disk space for anticipated future growth. However, the hypervisor currently doesn't have enough disk space for all the disks that need to be allocated. You have placed an order for additional storage that will be added to the hypervisor. You must have all ten servers operational before your order will arrive. You determine that overbooking the storage space will work in the short term. Which of the following storage provisioning options should be selected?
Thin provisioning
Given the following script, what is the output if the user enters Kali?
This is an unknown Linux distribution.
What is the purpose of the -N option in the following command? ssh -f -N -L 2345:mail.mydomain.com:110 [email protected]
To ensure that SSH does not execute a remote command.
Which of the following is the main purpose of the xinetd service?
To receive client requests for network services and start and stop them on demand.
Which of the following desktops was the default for Ubuntu until 2017?
Unity
Which of the following is the maximum number of logical partitions allowed on an extended partition?
Unlimited
You have connected a new printer to a systemd-based linux server. You cannot print to the new printer from a user workstation on the network. What tasks should you complete on the server first? (Select TWO.)
Use rpm -qi cups or dnf list cups to make sure the CUPS daemon is installed Use systemctl status cups to make sure the CUPS printing service is running.
Maria, a user, is working remotely from a hotel while traveling for business. Maria needs to access some sales resources on the company's network. Which of the following would allow Maria to securely access the resources she needs?
VPN
After arriving at work in the morning, you turn on your Linux workstation and attempt to visit an internet news site. After a few minutes, your web browser times out telling you that the website is unavailable. Which of the following troubleshooting steps would help you determine the cause of this issue? (Choose TWO).
Use the traceroute command to traceroute the FQDN and IP address of the website you are trying to reach. use the ping command to ping the FQDN and IP address of the website you are trying to reach.
Which of the following users MOST benefit from the sticky keys accessibility option?
Users who have difficulty pressing multiple keys at the same time.
Which file system is a FAT32 file system for Linux?
VFAT
Linux provides technology that allows the user to remotely view a graphical user interface and control mouse and keyboard events. Which of the following technologies establishes a connection with a remote computer using a viewer on one end and a server on the remote end?
VNC
You have been currently using a cable to connect your Linux laptop to the company network. You are now, however, required to attend several meetings a week in other parts of the building and you would like to be able to bring your laptop with you, but still need access to the the network while in that meeting. Which of the following device types would BEST meet your needs?
WiFi
Which component of the X11 Window System controls the placement and appearance of windows on a Linux computer?
Windows Manager
Which of the following is a key difference between VPN tunnel and transport modes?
With transport mode, only the payload of the IP packet is encrypted, and the original IP headers are left intact.
Which of the following are examples of a Linux display server?
X11 & Wayland compositor
Which X11 Window System element is the MAIN system component?
X11 server
Your company has implemented both Linux and Window servers. The system administrators use Windows desktops, so they have access to Windows administration tools. The routinely access the Windows servers using Windows Remote Desktop. Which of the following implementations would allows the system administrators to connect to the Linux systems using Windows Remote Desktop?
XRDP
Your computer is using AppArmor. Which of the following commands is BEST to use for troubleshooting an AppArmor profile?
aa-complain
You have just started protecting your computer while running Firefox using AppArmor. After a short time, employees start to complain that some of the features they use frequently are no longer functioning. After a quick check, you discover that these features should be working and decide not to protect Firefox anymore. Which of the following is the BEST command to quickly stop protecting Firefox?
aa-disable /etc/apparmor.d/usr.bin.firefox
You are running AppArmor on your system. Which of the following commands will show all of the processes from the /proc filesystem with TCP or UDP ports that are not protected by AppArmor profiles?
aa-unconfined --paranoid
When configuring bonding on two network interfaces, the technician wants to configure one interface to take over if the other interface fails. Which of the following bonding modes should be used to provide a hot standby?
active-backup, or mode 1
Tom, a Linux administrator, has installed a new hard disk. He creates two primary partitions, sdb1 and sdb2, and one extended partition, sdb3. He formats sdb1 with ext3 and sdb2 as a swap area. When Tom attempts to format sdb3 as a swap area, he is unable. Which of the following explains why Tom can't format sdb3?
an extended partition can't be formatted.
If a system is down at the time a recurring regularly scheduled task is supposed to run, which task scheduling service will run the task when the system is back up again?
anacron
You are working on a Debian distribution of Linux. You want to retrieve information about the Debian package database on the system. Without using any command options, what command will provide the information you need?
apt-cache
You are working on a Debian distribution of Linux. You need to install a package, but you do not want to manually install all the dependencies for the package. Without using any command options, what command should you use?
apt-get
When using templates to deploy virtual machines, one challenge is that all VMs will have the same settings, such as hostname, security identifiers, and even the same IP address. Which of the following allow a VM to be provisioned with unique settings and configurations?
boostrapping
Which of the following statements correctly describe the differences between the "apt-get remove" and "apt-get purge" commands? (Select TWO).
apt-get purge - removes the package and the configuration files. apt-get remove - removes a specified package, but leaves the configuration files.
You have installed a package called mathpac with apt-get. After a system upgrade, the package is not working correctly. Which of the following commands is the MOST correct method to get the package to work?
apt-get upgrade mathpac
Which of the following Debian package management utilities provides the front end for APT?
aptitude
Which of the following commands removes a job from the at queue? (Select TWO. Each answer is an independent solution.)
atrm at -d
What should you enter at the command prompt to remove tasks 2 and 3 in the at queue?
atrm 2 3
Login blocking is enabled using the Pluggable Authentication Modules (PAM) module. What line needs to be in the /etc/pam.d/login file to configure PAM to check and see if a file named /etc/nologin exists?
auth requisite pam_nologin.so
You have a gedit process with a job ID of 6. Which command would you enter at the command prompt to send the process to the background?
bg 6
Which of the following commands removes print job 11 from the hp7 printer?
cancel -P hp7 11
Which of the following commands will display which boot options were given to the kernel at boot time?
cat /proc/cmdline
You need to get detailed information about the system memory. Which of the following commands will display that information?
cat /proc/meminfo
You are writing a bash script that lists the contents of a file. You would like to have any stderr messages sent to a file. Which of the following commands will write the error message to a file?
cat projects 2> projects.err
What chage command should you enter at the command prompt to set the password for jsmith to expire after 60 days and give a warning 10 days before it expires?
chage -M 60 -W 10 jsmith
What would you enter at the command prompt to change the group ownership for the devstyle.txt file to rand in the present working directory?
chgrp rand devstyle.txt
You are the team lead for a marketing project. Only the members of the team3 group should have read/write permissions to a document called project_data.doc, however, you want to ensure that no one on the team will delete the document by accident. Your user name is bsmith. A long listing of the file is as follows: -rwxr-xr-x 1 bsmith team3 7260 June 22 2004 project_data.doc Which of the following commands would accomplish this?
chmod 1664 project_data.doc
You need to set the SUID permission on a file named rider. Which of the following commands will accomplish this?
chmod 4777 rider
You must change ownership of a script called myscript so that only the user owner has read/write access to it and only the user owner and group owner have execute permissions. Which of the following commands would accomplish this?
chmod 750 myscript
Troy, a system administrator, created a script to automate some daily administrative tasks. Which of the following commands would make Troy's script, /scripts/dailytasks, executable by everyone, but writable only by its owner?
chmod u=rwx,go=rx /scripts/dailytasks
There is a directory called projects owned by the user cmarcela and the group rd. cmarcela has left the company. You need to give ownership of the projects directory, its files, and its subdirectories to the user ebates, who is a member of the mgmt group. Which of the following commands should you use to change the user ownership?
chown -R ebates projects
Which of the following commands make sales the group owner of the /sales/report file? (Select TWO. Each answer is an independent solution.)
chown .sales /sales/report chown :sales /sales/report
You need to see who has permissions to the sales_projection_q2 file. You use ls -l sales_projection_q2 and receive the following information: drwxr-xr-x 22 pclark acct 4096 Jun 19 15:01 sales_projection_q2 Which of the following commands will change the user owner to jyoung and the group owner to sales?
chown jyoung:sales /home/sales/sales_projection_q2
You would like to make it harder for malicious users to gain access to sensitive information. Which of the following techniques can be used to remap the root directory to include only certain directories and files?
chroot jail SSH
A file named acctg needs to have the SGID permission set on it while keeping all other permissions at their present value. Which of the following commands will accomplish this?
cjmod g+s acctg
The /etc/cloud.cfg file controls the cloud-init modules that are run. The modules represent configuration stages. Which of the following are the three configuration stages used by Cloud-init? (Select THREE.)
config stage init stage final stage
Given the following bash script: #!/bin/bash declare -i count=5 until [ $count-lt 3 ] do echo count $count count=count-1 done Which of the following shows the output from this script?
count 5 count 4 count 3
You want to restore files with the extension .cfg from an archive called configs.cpio. Which command will perform the restore?
cpio -ivd **.cfg" < /mnt/hdd2/configs.cpio
After logging in as root, you need to manage the crontab files for your Linux system. Which command should you use to edit the crontab file for the gshant user account?
crontab -ue gshant
Which command could you use to verify whether a crontab file exists for the thobbs user?
ctrontab -l u thobbs
You are configuring the /etc/cups/cupsd.conf file. Which command should you use to prevent remote printers from being displayed on the local system?
cupsctl --no-remote-printers
Which of the following is the BEST command to use when creating a disk image?
dd
Which utility allows you to make an exact copy of a file?
dd
Which of the following are valid ways to assign a variable a value in a bash script? (Choose TWO.)
declare -i num1=4 variable1=Hello
While writing a shell script, you want to perform some arithmetic operations. Which of the following commands is used to create an integer variable?
declare -i variablename
You are requested to help a user who reports that he has no more local storage space. You go to his system and log in as the root user. Which of the following commands will display the available disk space on all partitions? (Select TWO).
df df -h
You are requested to help a user who reports that he has no more local storage space. You got to his system and log in as the root user. Which of the following commands will display the available disk space on all partitions? (Select TWO).
df -h df
When creating an ext2 or ext3 file system, a fixed number of inodes is assigned. Which of the following commands shows the number of inodes, number of free inodes, and number of used inodes?
df -i
You have created a separate partition for the sales team and mounted it to the /sales directory. The team is about to begin a new project, and they want to make sure there is enough disk space to hold upcoming files.
df /sales
What dpkg command would you enter at the command prompt to list information about a currently installed Debian package?
dpkg -p
Which of the following commands will reconfigure an already installed package?
dpkg-reconfigure
What command would you enter at the command prompt to list all files and directories in the badams home directory along with a file size and a total amount of space taken up by the directory?
du -ac /home/badams
What command would you enter at the command prompt to list all files and directories in the badams home directory along with a file size and total amount of space taken up by the directory?
du -ac/home/badams
Which of the following commands allow you to use an alternative superblock when the primary superblock has been corrupted?
e2fsck -b 16385 /dev/sda1
Which of the following commands allows you to use an alternative superblock when the primary superblock has been corrupted?
e2fsck -b 16385 /dev/sda1
A technician recently added a new disk drive to a system, and the drive is not available. Which of the following commands scans the host bus adapter (HBA) and detects the newly added drive?
echo "- - -: > /sys/class/scsi_host0/scan
Anna, a technician, executed a command to display the contents of a file and received the output. Which of the following commands would Anna enter to find out the exit code that was returned by this command?
echo $?
Which of the following commands will open the quota file for a specific user?
edquota -u
Which command should you enter at the command prompt to change the quota settings for the gshant user?
edquota -u gshant
You have used su to switch to the root user account to do system administration tasks. Now you want to revert back to your regular user account. Which command should you use?
exit
The system requirements for a new Linux computer show that the system will primarily be used to store documents of small size. Which of the following file systems would be the MOST efficient at storing these documents on a Linux system?
ext4
Which of the following Linux systems support journaling?
ext4
Which of the following is the MOST common Linux file system?
ext4
Which of the following commands/command sequences can be used to view the partition information on the first hard disk? (Select TWO.)
fdisk -l fdisk /dev/sda, then press p
Which of the following commands partitions the second hard disk on a Linux system?
fdisk /dev/sdb
You have several processes running in the background, as showing by the jobs command below: [1]+ Running gedit & [2]+ Stopped crontab e Which command will bring the gedit program to the foreground?
fg 1
Which of the following popular Linux firewalls are based on Netfilter? (choose THREE).
firewalld IPTables Uncomplicated Firewall(UFW)
Which partition management utility can be used to define and change various different GUID partition configurations without committing the configuration to the disk until the w command is used?
gdisk
You have installed a new blank hard drive on your Linux system. This is the second drive on the system so it is represented in the file system by the /dev/sdb file. You need to create GUID partitions on this drive. What command do you use to start up the GUID disk management utility to create partitions on the /dev/sdb drive?
gdisk /dev/sdb
What command would you enter at the command prompt to start the gedit program in the background? (FILL IN BLANK)
gedit &
What is the result of the nohup gedit & command?
gedit will start in the background and persist in the background after logging out of the shell.
You are the administrator for a small company. You need to create a new group for users in the sales department. You need to name the group sales. Which command will accomplish this task?
groupadd sales
You have a group named temp_sales on your system. The group is no longer needed, and you should remove the group. Which of the following is the BEST command for accomplishing this task?
groupdel temp_sales
Due to a merger with another company, standardization is now being imposed throughout the company. As a result of this, the sales group must be renamed marketing. Which of the following is the BEST command to use to rename the group?
groupmod -n marketing sales
What would you enter at the command prompt to display the primary and secondary group memberships for the gshant user account?
groups gshant
Which of the following commands should you use to change the location of the default file used to search for libraries?
ldconfig -f
When a Git repository is created using git init, Git creates a directory named .git. This directory contains all the information necessary for that repository to work correctly. Which of the following directories contain the scripts that are run during each Git phase?
hooks
Which of the following commands can be used to retrieve the IP address and/or the FQDN or hostname information from a DNS server? (Choose ALL that apply.)
host nslookup dig
What would you enter at the command prompt to find the IP addresses fro the xyzcomp.com domain?
host xyzcomp.com
Your site is dependent upon the use of the rlogin utility for remote access. For security reasons, you want to prevent the hosts in the marketing department from accessing the payroll server, but allow all others to do so. Which of the following files should you use to create this restriction?
hosts.deny
You want to configure CUPS from a web browser. Which URL address and port should you enter within the web browser's address field?
http://localhost:631
You need to set the hardware clock to the same value as the system clock. Which command should you use?
hwclock -w
Which of the following commands will display information about the RAID devices on the computer?
hwinfo --listmd
You are working with the RPM package acroread-8.1.3-51.6.i586.rpm. Match the naming convention term on the left with the associated file name segment on the right.
i586 ; Architecture type 8.1.3 ; Version number acroread ; Package name 51.6 ; Release number
Which keys are generated when you execute the ssh-keygen command with no options? (Select TWO.)
id_rsa id_rsa.pub
The enp2s0 network interface has already been assigned the IP configuration 172.16.1.123/16. Which command would you use to temporarily configure a second IP address of 192.168.0.123/24 for this network interface?
ip addr add 192.168.0.1223/24 dev enp2s0
You need to set an IP address for enp2s0 to 192.168.15.2 with a subnet mask of 255.255.255.0. Which commands are correct? (Select TWO).
ip addr add 192.168.15.2/24 dev enp2s0 ifconfig enp2s0 192.168.15.2 netmask 255.255.255.0
Which commands display the IP address and subnet mask values configured on a workstation? (Select TWO).
ip addr show ifconfig
After the acquisition of another company, you are in a position where you must add another network to the existing routing tables. Which of the following commands would you use to accomplish this task? (Select TWO. Each option is a complete solution.)
ip route add 11.12.13.14/24 via 201.12.3.4 route add -net 11.12.13.14/24 gw 201.12.3.4
Which of the following utilities would you use to view the routing table? (Select TWO. Each option is a complete solution.)
ip route show route
Given the following bash script, #!/bin/bash for i in $(ls) do echo item: $i done Which of the following shows possible output if the script is executed from Bill's home directory?
item: Desktop item: Documents item: Downloads
Linux systems that use SysVinit (init) use the syslogd daemon to manage logging. Which of the following daemons is used on newer system-based distributions to provide a local system log file?
journald
A developer calls you with a problem. She was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. It has now entered runaway mode. The PID number is 2345. She attempted to stop the process with the standard kill command, but it had no effect. Which command would you use to assure that the process will terminate?
kill -9 2345
A service specialist from your company calls you from a customer's site. He is attempting to install an upgrade to the software, but it will not install; instead, it he receives messages stating that he cannot install the program until all non-core services are stopped. You cannot remotely access the machine, but the representative tells you that there are only four processes running, and their PID numbers are 1, 10, 100, and 1000. With no further information available, which command would you recommend the representative run?
kill 1000
After a severe lighting strike nearby, a number of processes seem to be running on the server in runaway mode. Which utility terminates these processes by name, and not just by process ID number?
killall
You have been asked to temporarily fill in for an administrator who has just been fired. This administrator was known to have lax security standards, and you suspect that passwords are still kept in the /etc/passwd file. Which of the following entry within the passwd file would indicate that the passwords are stored there?
kolton:34uyx:431:0:Back Door:/root:/bin/bash
Which of the following commands shows failed login attempts on the system?
lastb
What would you enter at the command prompt without options to reload the library cache every time libraries are added or removed and update the symbolic links?
ldconfig
Which of the following commands reloads the libraries for the /bin/bash executable, but does not update the cache?
ldconfig -N /bin/bash
What would you enter at the command prompt to display the shared library information for executables?
ldd
Which of the following commands displays all of the shared library information for the /bin/bashexecutable?
ldd -v /bin/bash
Which of the following is an open-source application programming interface (API) that's used for creating, monitoring, migrating, starting, and stopping virtual machines?
libvirt
Which of the following are three popular toolsets Linux-based hypervisors use to manage virtual machines? (Select THREE).
libvirt virsh vmm
Which of the following DNF options will display whether updates are available for RPM packages?
list updates
Which of the following yum options will display whether updates are available for RPM packages?
list updates
You need to create a symbolic link to the /usr/share/zoneinfo/EST time zone file that permanently alters the time zone for the system. What should you enter at the command prompt to accomplish this task?
ln -s/usr/share/zoneinfo/EST /etc/localtime
A technician is configuring a server with four network interface cards to use a round robin scheduling alogrithm. This algorithm transmits packets on the first available network interface. Which of the following is provided by this configuration?
load balancing
Which of the following commands manages, compresses, renames, and deletes log files based on a specific criteria such as size or date?
logrotate
Which of the following commands removes all files from the print queue?
lpc clean
Which command will show the contents of ALL the print queues on your Linux system?
lpq -a
You want to send the yearend.txt file to the acctg printer. Which command would you use?
lpr -P acctg yearend.txt
What should you enter at the command prompt to print 23 copies of the comparables file on the homeprint printer?
lpr -P homeprint -#23 comparables
You want to archive some configuration files to the floppy drive. You are using the cpio utility. Which line will create the archive on the floppy?
ls /etc/*.conf | cpio -ovd > /dev/rfd0
Which command displays information about all loaded modules on the system?
lsmod
Anna is attempting to unmount the mount point /mnt/daata. The umount command failed and displayed error message stating that the device is busy. Anna suspects there may be an open file causing the issue. Which of the following commands will show Anna a list of open files?
lsof
Anna is attempting to unmount the mount point /mnt/data. The umount command failed and displayed error message stating that the device is busy. Anna suspects there may be an open file causing the issue. Which of the following commands will show Anna a list of open files?
lsof
Which of the following commands will display information about the PCI devices installed on the system?
lspci
Which command displays information on all USB devices connected to the computer?
lsusb
Which of the following commands creates a logical volume named video from the home volume group and configures it with 2 TB of disk space?
lvcreate -L 2T -n video home
You are using LVM on your Linux system to manage the existing volumes. What command do you enter to scan for logical volumes on the system?
lvscan
Which of the following utilities is used to manage and monitor software RAID devices?
mdadm
Which of the following commands formats the second partition on the fourth disk drive with the ext3 file system?
mke2fs -j /dev/sdd2
You need to create an ext4 file system on the first partition on the second hard disk drive. What command should you enter at the command prompt?
mkfs.ext4 /dev/sdb1
One of the Linux servers for the accounting departments needs additional memory to fix recent performance issues. You have ordered the memory, but it is back ordered, so you decide to add a swap partition to the server to help the performance issues immediately. Which of the following commands will add a swap partition to the first partition on the third hard drive?
mkswap /dev/sdc1
Which utility runs at startup to load modules into the kernel?
modprobe
Which of the following commands will check for dependencies before removing the debug module from the kernel?
modprobe -r debug
You would like to see how many different computers are currently connected to your local workstation. Which of the following commands would allow you to do this?
netstat
You just got a new input device named GamePad that you want to use on your computer. You don't think that the GamePad driver (i.e., kernel module) was compiled into the kernel of your Linux distribution. Which of the following commands will install the driver {gamepad.ko) into the kernel? (Select two.)
modprobe gamepad insmod gamepad.ko
Which of the following commands will check for dependencies before loading the gameport module in the kernel?
modprobe gameport
A user is trying to access a file system mounted at /mnt/sdb1, but receives an error that states No such file or directory. Which commands can you use to see the current mount points? (Select TWO).
mount df
A number of new file systems have been added to the server and you want them to be active now. You also do not want to bring the server down. Which command makes the changes active?
mount -a
You need to mount the CD-ROM device to the /media/cdrom directory. What command should you use?
mount /dev/cdrom /media/cdrom
You have partitioned and formatted a new hard disk, sdc. You want to mount the first partition on sdc to directory /mnt/newdisk. Which command will perform the mount correctly?
mount /dev/sdc1 /mnt/newdisk
Which of the following statements is true about the command myscript < mydata.txt?
myscript receives input (stdin) from mydata.txt
As the IT System Administrator, you recently setup a new DHCP server, DHCP_03. YOu want to test connectivity on port 53 from other servers on the network. Which of the following commands will accomplish that task?
nc -zv DHCP_03 53
Which utility would you use to view current connections and active sessions and ports on a computer?
netstat
You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but you are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
netstat -r
Which of the following commands could you use to view your local system's default gateway? (Choose ALL that apply.)
netstat -r ip route list route
Which of the following commands start the gedit program with a priority one above the default nice priority? (-20 through 19, higher the number the lower the priority)
nice -n -1 gedit
what would you enter at the command prompt to start the gedit process with the highest priority possible? (FILL IN BLANK)
nice -n -20 gedit
You need to increase the security of your Linux system by finding and closing open ports. Which of the following commands should you use to locate open ports?
nmap
What should you enter at the command prompt to scan for open TCP ports on your Linux system?
nmap -sT
Which of the following commands manages the NTP daemon from the command line?
ntpd
Which of the following NTP configuration utilities is deprecated and should be avoided when possible?
ntpdate
Given the following command sequence: echo 'blue orange green brown' | while read a b c d; do echo output: $b $c $a $d; done Which of the following is the correct output?
output: orange green blue brown
Which of the following commands would allow you to see whether a remote computer is reachable?
ping
The /sbin/grpck process is not responding and needs to be killed. There are multiple instances that were spawned and need to be terminated Which of the following commands will terminate all instances of the grpck process?
pkill -SIGTERM -f grpck
(15.6 Question 8) You want to change the port that SSH listens on. You are going to edit the /etc/ssh/sshd_configfile. Which line, when added to the file,will change the listening port to 1066?
port 1066
You have recently answered calls from a number of users who cannot access the mail server. Which utility would you use to quickly see if the sendmail service is running?
ps
You want to view all currently-running processes that include getty in the process name. Which command would you use?
ps -A | grep getty
Which command displays all the processes that are running in the most detail?
ps -ef
Which command displays the PPID (parent process ID)?
ps -f
Which of the following is a pair of virtual character devices that provide a bidirectional communication channel? (One end of the channel is called the master; the other end is called the slave.)
pseudo-terminal (pty)
Which of the following commands initializes a physical volume?
pvcreate
You have added a third hard disk to your Linux system. What command would you use to initialize a physical volume on this disk for later use by the Logical Volume Manager?
pvcreate /dev/sdc
You are using LVM on your Linux system to manage hard disk partitions. What command do you enter to scan for physical volumes on the system?
pvscan
You are an IT consultant for a small company. The company wants to increase the security of their small network. You want to move their passwords from the /etc/passwd file to the /etc/shadow file. Which of the following utilities will BEST accomplish this task?
pwconv
What is the name of the package that must be installed if you want to use disk quotas on your Linux system?
quota
Which command should you enter at the command prompt to display the current user's quota limits and disk usage?
quota
Which of the following commands displays the disk usage and quota limits for the development group?
quota -g development
After creating the aquota.user and aquota.group files in the /home directory, what command should you enter to enable quotas for the /home directory?
quotaon /home
Which of the following sets of permissions represent the minimal permissions required to allow a user to list the contents of a directory?
r-x
A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. To ensure that the CPU gives preference to other processes, you need to lower the daemon's priority. The PID number is 2345. Which command would you use to decrease the daemon's priority?
renice -n 10 2345
As a system administrator, you need to add a static route so that you can reach host 195.156.76.122, 255.255.255.0 and the device eno32 to find the target network. Which commands will accomplish this task? (Select TWO. Each option is a complete solution.)
route add -net 195.156.76.0 netmask 255.255.255.0 dev eno32 ip route add 195.156.76.0/24 dev eno32
As a system administrator, you are going to add a static route for host 195.157.66.221, 255.255.255.0. Your default gateway is 192.168.5.1, but you want this route to use gateway 192.168.7.1. Which commands will accomplish this task? (Select TWO. Each option is a complete solution.)
route add -net 195.157.66.0 netmask 255.255.255.0 gw 192.168.7.1 ip route add 195.157.66.0/24 via 192.168.7.1
As a system administrator, you want to block (reject) any packets from 170.122.0.0, 255.255.0.0. Which command will block those packets?
route add 170.122.0.0 netmask 255.255.0.0 reject
You have replace the default gateway on your network. The gateway has used the IP address of 201.12.3.4, and you must remove it from the routing table. Which command would you use to accomplish this task?
route del default gw 201.12.3.4
You are attempting to install an RPM package on your Linux system, but the system tells you that a newer package is already installed. Which of the following commands will install the RPM package over the existing installed package?
rpm --force
You are attempting to install an RPM package on your Linux system, but the system tells you the package has dependencies that are not installed. What would you enter at the command prompt to force RPM to override the need to install the dependencies?
rpm --nodeps
Without installing an RPM package, you want to check for all of the package's uninstalled dependencies. Which of the following commands should you use?
rpm --test
What command will upgrade an RPM package only if an earlier version is already installed on the system?
rpm -F
You have an RPM package called mathpac that is not working correctly. You have downloaded the latest package. Which of the following commands should you use to install the latest mathpac package?
rpm -U mathpac
You need to install the package apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm Which of the following commands will perform the installation? (Select TWO).
rpm -ih apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm & rpm -Uh apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm
Which of the following commands queries the system for all installed RPM packages?
rpm -qa
You need to determine which files are associated with the metacity RPM package. Which of the following commands should you use?
rpm -ql metacity
Which of the following utilities should you use if you need to extract a file from an RPM package file?
rpm2cpio
You are limiting the total amount of memory a user can take up when they use the X Windows System. Which of the following limit keywords should you use?
rss
A technician executed a command that collets various OS usage statistics, provides report capability, and saves system activity information. Which of the following commands produced the following output
sar
Which of the following is the BEST command for viewing SELinux errors?
sealert
You want to configure the NTP daemon to receive time from pool.ntp.org. What entry should you place in the /etc/ntp.conf file?
server pool.ntp.org
You are working with a bash script, and there are multiple variables being used. Which of the following commands can be used to determine which commands are environment variables and which are shell variables? (Choose TWO).
set printenv
You are a network administrator for your company. A user calls to complain that his Firefox browser is not working as it did the day before. Knowing that you recently updated the SELinux profile for Firefox, you suspect the change you made is causing the issue. You want to troubleshoot the issue by switching the profile to permissive mode. Which of the following is the BEST command to use in this situation?
setenforce
You were recently asked to manage the SELinux implementation at your company. Since you are still coming up to speed on this technology, you have not yet mastered the process of creeating or making major changes to SELinux policies. However, an employee has just called you complaining that they don't seem to be able to accomplish a task with a particular application. After scanning through the SELinux policy for that appliction, you notice that there is a method that can be used to enable the desired function. Which of the following is the BEST comand for enabling that feature without editing the policy?
setsebool
From the bash command prompt, which of the following commands directly executes /usr/bin/scripts/cleanup.sh?
source /usr/bin/scripts/cleanup.sh
Which daemon, or service, provides port tunneling to encrypt non-secure protocols such as email and X server traffic?
ssh
Which ssh option should you enter at the command prompt to set up an SSH tunnel for X server traffic?
ssh -X
You need to connect to a remote system whose host name is abc.def.com and execute a shell script called daily-backup.sh that backs up some files. The username that has permissions to execute that script is bubba. Which command should you run to make the connection?
ssh -l bubba abc.def.com
As you configure your client for public key authentication, you decide to generate the DSA key pair. You would like to configure the client to automatically provide the private key passphrase when needed so that you do not need to type the passphrase for every new SSH connection to a server. Which command should you use in conjunction with the ssh-agent bash command? (Enter the command and options as if you are at the command prompt.)
ssh-add ~/.ssh/id_dsa
You are configuring public key authentication on your client system. Which command enables the passphrase agent?
ssh-agent bash
When using DSA to establish an SSH ession, what is the name of the key that the SSH server will send to the client? (Enter the name of the key only.)
ssh_host_dsa_key.pub
Which of the following public keys is sent from the SSH server to the SSH client when they are in the process of establishing a session with the SSH1 protocol?
ssh_host_key.pub
You are currently logged in using the badams account. You want to view the contents of the /etc/inittab file, but you are not allowed to with the badams account. Which command could you use to view the file?
su -c "cat /etc/inittab" -l
You have logged in as a regular user when a frantic phone call comes in. The ABCD process must be started on the server now, but can only be run by root. Which command would you use to start this process?
sudo ABCD
You have a Linux system with two activated swap partitions, sda3 and sdb2. Which of the following commands can you use to deactivate only the sda3 swap partition?
swapoff /dev/sda3
You created a swap area on sda3, but it is not activated. What command will activate this swap partition?
swapon /dev/sda3
Unnecessary network services might provide attackers with an entry point for an attack. To view a list of services, or units, installed on a systemd-based system, what could you enter at the command prompt?
systemctl list-units
Alex, a webmaster, recently deployed a new web server. After checking external access to the new web server, he was unable to communicate on port 80. Alex verified that the host-based firewall's configuration had been changed and that the httpd service is running. Which of the following commands will most likely resolve the communication issue?
systemctl restart firewalld
You need to back up Jane's files in her /home/user/jane directory. Which command will create an archive of these files in the /root directory? (Select TWO).
tar -czvf /root/jane.tgz /home/user/jane tar -cvf /root/jane.tar /home/user/jane
You have a tape archive mounted in /dev/rmt12. You need to get a list of the file contents. Which command will list the contents?
tar -tf /dev/rmt12
(IMAGE) A user is experiencing some slowness and wants to view an interactive listing of running processes to see if there is a process that is causing the problem. Which of the following commands displays an interactive listing of running processes? (See exhibit.)
top
Which command would you use to look for a potential resource hog on a workstation?
top
You need to determine the priority of several processes. Which command should you enter to identify the process ID and nice value for each process?
top
You need to see a listing of running processes and system status such as memory and CPU usage. Which command will produce the listing?
top
PAM is configured on your system to look for the presence of the nologin file in the /etc directory. If the nologin file exists, user login is disabled, and only the root user can log in. If your current working directory is root's home directory, which command would you enter to quickly create an empty nologin file in the /etc directory?
touch /etc/nologin
Which utility is similar to traceroute, but does not require elevated privileges?
tracepath
Which command could you use to see the path that a packet traveled across a network to a remote host?
traceroute
Which of the following apt-cache options will show the missing dependencies in the package cache?
unment
Which of the following commands deletes a variable?
unset
Which of the following apt-get options will upgrade all installed packages to the latest versions using the information in /etc/apt/sources.list ?
upgrade
Which of the following commands produced this output? 06:14:11 up 139 days, 24 min, 5 users, load average: 0.12, 0.33, 0.48
uptime
You need to create a user account with the following parameters: Login name: pmorrill Comment: Paul Morrill Home directory: /home/pmorrill_temp UID: 683 Which of the following commands should you use?
useradd -c "Paul Morrill" -d /home/pmorrill_temp -u 683 pmorrill
The user emcmann has been transferred from the accounts payable department. She was assigned to several secondary groups that gave her rights to sensitive files and systems. You need to remove her from all her current secondary groups right away. Enter the command that will remove emcmann from all her secondary groups.
usermod -G "" emcmann
You have just created the lsmith user account and need to assign this new user to the secondary groups admin and acct. Enter the command you would use to add lsmith to the admin and acct secondary groups.
usermod -G acct,admin lsmith
You have performed an audit and have found active accounts for employees who no longer work for the company. You want to disable those accounts. Which command example will disable a user account?
usermod -L joer
You need to modify the group membership for the user cjensen user to add the staff group to his list of secondary group memberships. He needs to keep his existing secondary group memberships. Which command option will add cjensen to the staff group without removing him from the other groups?
usermod -aG staff cjensen
You have an xfs file system in your linux computer. You need to display the XFS file system parameters, such as the block size and inode data structures. Which of the following commands should you use? (Select TWO). (Each answer is an independent solution.)
xfs_growfs -n xfs_info
You have an xfs file system in your Linux computer. You need to display the XFS file system parameters, such as the block size and inode data structures. Which of the following commands should you use?
xfs_info xfs_growfs -n
You have an XFS file system in your Linux system represented by /deb/sdb1. You need to copy all the filenames on the drive to the /reviewxfs file. You must able to read the filenames in the /reviexfs file. Which of the following commands should you use?
xfs_metadump -o /dev/sdb1 /reviewxfs
You have an xfs file system in your Linux system represented by /dev/sdb1. You need to copy all the filenames on the drive to the /reviewxfs file. You must be able to read the filenames in the /reviewxfs file. Which of the following commands should you use?
xfs_metadump -o /dev/sdb1 /reviewxfs
Which of the following is the super daemon that is most commonly found in modern Linux distributions?
xinetd
Which of the following is an advantage of xinetd over inted?
xinetd uses separate configuration files for each managed service.
You used YUM to list the python packages that are available to install. You see that there is a package available that is called python. What YUM command do you use to install this python package?
yum install python
You have users who need to do some programming projects in the Python programming language. What yum command should you use to find out if there is a Python package available to install on the Linux server?
yum list python
You have installed a package called mathpac with yum. After a system upgrade, the package is not working correctly. Which of the following commands should you FIRST try to get the package to function?
yum update mathpac
What YUM command would you enter at the command prompt to determine which package contains the /usr/lib/libstlport_gcc.so file?
yum whatprovides /usr/lib/libstlport_gcc.so
What YUM command would you enter at the command prompt to download an RPM package without installing it to the system?
yumdownloader