Capstone ungraded
Which variable can you place in a crontab file to use an alternative time zone?
$CRON_TZ
Fill in the missing option to install the package: dpkg _____ gcc-4.7-base_4.7.2-5_amd64.deb
--install -i
A nice value is used to indicate to the CPU which process has a higher priority for access to the CPU. The values range from _____ (highest priority) to _____ (lowest priority).
-20, 19
Which option is used with the iptables command to remove all the rules for a chain?
-F
Which options to the ls command display the file type?
-I -F
Using the _____ option to the tar command creates an archive that is compressed with the xz utility.
-J
Which option(s) to the nmap command is designed to determine the operating system of the system that is being scanned?
-O
Which of the following options can be used to immediately expire a user account when used with the passwd command?
-e
Which of the following are integer operations for the test statement?
-eq -ne
The _____ option to the rsyslogd command enables the daemon to accept logs from other systems.
-r
When viewing the contents of a file using the less command, which character allows you to start performing a search?
/
The name of a RAID device begins with _____ and has a numeric value between 0 and 31.
/dev/md
Which files are used to enable local hostname resolution?
/etc/hosts /etc/nsswitch.conf
The _____ file is used to specify which kernel settings to enable at boot.
/etc/sysctl.conf
Which of the following is a typical location for a shared library to be stored?
/lib64
The RPM database is located in the _____ directory.
/var/lib/rpm
The _____ file only contains messages from the kernel.
/var/log/kern.log
In which of the following directories are systemd files not typically found?
/var/systemd/system
Based on the following entry from the /etc/passwd file, what is the UID of the bob user account?
1001
Disks on systems that use the GUID Partition Table (GPT) can have up to ____ primary partitions per disk.
128
To what year is the system date set when the following command is executed?
2018
What will happen as a result of running the command: umask 027?
All new files in the current shell have rw-r----- permissions. All new directories in the current shell have rwxr-x--- permissions.
Based on the permissions of the following file, which user(s) can run the file as if it were a program? [student@localhost ~]$ ls -l test -rwxr--r-x. 1 bob team1 62 May 9 2018 test
Any user except users who are member of the team1 group
What setting in the /etc/sysconfig/network-scripts/ifcfg-eth0 file would be used to indicate that the IP address is statically assigned?
BOOTPROTO
_____ refers to any process that self-starts without the need for any external assistance.
Bootstrapping
Which kernel parameter is used to change the scheduler to have a separate queue for each process, with the queues served in a continuous loop?
CFQ
A(n) _____ server provides hostname resolution.
DNS
Which are firmware components that start the bootloader?
EFI UEFI
What is uucp,news in the following output?
Facility
From which shared network locations can an installation be performed?
HTTP FTP
If the $name variable is not set, what is the output of the following command?
Hello, $name
Which of the following is a programable pin on a chip?
IRQ
_____ is the heart of the orchestration process and makes use of software tools (orchestration products) to perform configuration or provisioning tasks.
IaC
_____ is a disk encryption method commonly used on Linux systems.
LUKS
Which command provides the following output? core file size (blocks, -c) 0 data seg size (kbytes, -d) unlimited scheduling priority (-e) 0 file size (blocks, -f) unlimited
None of these
_____ is a template standard developed by the Distributed Management Task Force (DMTF).
OVF
A _____ is a unique number assigned to a process on a system.
PID
When set on executable files, _____ allows a program to access files using the permissions of the user owner of the executable file.
SUID
A(n) _____ server uses the same protocol as Microsoft to share files across a network.
Samba
_____ refers to throughput often (or constantly) reaching the value of the bandwidth.
Saturation
Which of the following is considered a best practice regarding shared UIDs?
Shared UIDs should never be used.
In the following crontab entry, what does the value 12 represent?
The month field
What is wrong with the following command? if ps -ef | grep -q [n]agios echo Nagios is running fi
There is a missing then statement.
Which of the following is a difference between the gzip, xz, and bzip2 commands?
They use different compression algorithms.
Which of the following is not a valid character encoding?
UUENCODE
Which vim command saves a file and exits the vim editor?
ZZ
Which nano command saves a file?
^O
An AppArmor profile can be disabled by using the _____ command.
aa-disable
The git _____command places a file in the staging area.
add
Which of the following commands results in an error?
at tomorrow noon
In orchestration, a(n) _____is used to define parameters that are used to customize the automation procedure.
attribute
On which of the following lines would you add the values deny=3 and unlock_time=1200 to lock out a user as a result of unsuccessful login attempts?
auth required pam_tally2.so
Which command is being used in the following command line?
awk
You execute the following command: [root@localhost ~]# vmstat procs -----------memory---------- ---swap-- -----io---- -system-- ------cpu----- r b swpd free buff cache si so bi bo in cs us sy id wa st 2 0 0 776828 1704 2329456 0 0 49 89 115 120 6 1 93 0 0
bi
Which of the following commands can be used to remove a print job from the print queue?
cancel lprm
The filtering point and the table are combined into a single set of rules called a _____.
chain
You have been asked to set the rw-r----- permissions on the data.txt file. Which of the following commands can you use to complete this task?
chmod 640 data.txt
To see the space used by a set of files or a file tree, you use the _____ command.
du
Which of the following commands can be used to display filesystem labels?
e2label blkid
Which of the following filesystems supports journaling?
ext3
On Red Hat-based distributions, it is common to use a utility called _____ to configure iptables rules.
firewalld
The /boot/grub2/grub.cfg file is created by the _____ command.
grub2-mkconfig
A _____ is an operating system on which a hypervisor is installed.
host system
Which of the following commands can be used to load kernel modules into memory?
insmod modprobe
Complete the following command to determine if the CUPS service is currently enabled: systemctl _____ cups
is-enabled
Which command sends the standard output of the item1 command into the item2 command as the standard input?
item1 | item2
The _____ command displays failed login attempts.
lastb
The _____ program reads the headers of all the libraries in the /lib and /usr/lib directories and any directories noted in the /etc/ld.so.conf file.
ldconfig
You can see the changes that are made on different branches, along with the comments provided for each change, by using the git _____ command.
log
Fill in the blank with the correct command to create a RAID device:
mdadm
Which command can be used to display the parameters (parms) for the e1000 kernel module?
modinfo e1000
What tool would you use to display network settings in order to identify misconfigured interfaces?
nmcli
Say that you need to have a program continue to run, even if you are disconnected from the system. Which command will help you with this situation?
nohup
What is missing from the following command? git push -u _____ master
origin
Which of the following commands can be used to change the warn value of a user's password?
passwd chage
When in _____ mode, SELinux performs checks but never blocks access to a file or directory.
permissive
Which of the following commands initializes the /dev/sdd1 partition as a physical volume?
pvcreate /dev/sdd1
Use the _____ command to change the nice value of an existing job.
renice
In a PAM configuration file, what control value is described by the following? Returns successful: If the current PAM module returns successful, the next rule is checked in the list. If this is the final rule, the stack returns with a value of successful (except when a previous requisite rule is unsuccessful). Returns unsuccessful: If the current PAM module returns unsuccessful, no additional modules are executed. The stack returns with a value of unsuccessful. In other words, the modules run with the required value must return success for the stack to return success.
required
You see a package named abc.rpm in the local directory. Which command can you use to display information about this package?
rpm -qip abc.rpm
Which commands can you use to determine the current SELinux mode?
sestatus getenforce
To display all shell variables, including both environment variables and local variables, use the _____ command.
set
Which of the following commands produce message digests?
sha224sum md5sum
The _____ command is used to display socket information.
ss
The _____ command can be used to generate authentication keys.
ssh-keygen
If you want STDOUT to be sent both to the terminal and to a file, send the output to the _____ command.
tee
The _____ command is used to determine how long it takes to run a command.
time
Which command can be used to display and set both the system time and the time zone?
timedatectl
_____ is the Linux kernel's device manager.
udev
A(n) _____ is used to define a systemd service.
unit file