Linux+

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What command can you use to list the hosts defined on a domain? A. host B. ss C. netstat D. dig E. ping6

Answer D is correct. The dig command displays information from a DNS server responsible for a specific zone and will list information about the hosts defined in the DNS database.Answer A is incorrect. The host command only displays information for a single host on the network, not all the hosts on a domain.Answers C, E, and B are incorrect. The netstat, ping6, and ss commands display network packet statistics, not information about hosts.

Which of the following sections would you find in a systemd service unit file? Each correct answer represents a complete solution. Choose all that apply. A. [Automount] B.[Unit] C. [Install] D. [Service] E. [Mount]

Answers B, C, and D are correct. You would find three sections in a systemd service unit file, they are [Unit], [Service], and [Install].Answer A is incorrect. The [Automount] section is only in systemd automount unit files.Answer E is incorrect. The [Mount] section is only in systemd mount unit files.

The ______ directory contains the various PAM configuration files. A. /etc/pam.d/ B. /etc/modules/ C. /etc/pam_modules/ D. /etc/pam/ E. /etc/pam_modules.d/

Answer A is correct. The /etc/pam.d/ directory contains the various PAM configuration files.Answers D, C, B, and E are incorrect. These are inappropriate options.

Which tool do you need to use to partition a GPT indexed hard drive? A. gdisk B.gparted C. fsck D. parted E. fdisk

Answer A is correct. The gdisk tool allows you to partition both standard and GPT indexed hard drives.Answers D, E, and B are incorrect. The parted, fdisk, and gparted partition tools don't work on GPT indexed hard drives.Answer C is incorrect. The fsck program fixes corrupt partitions, but can't create or partition a GPT indexed hard drive.

If you do not tack on the -m option with an argument to the git commit command, what will happen? A. The commit will take place, but no tracking will occur. B. You are placed in an editor for the COMMIT_EDITMSG file. C. Your commit will fail, and the file is removed from the index. D. The command will throw an error message and fail.

Answer B is correct. If the -m option with an argument is not tacked onto the git commit command, you are placed into the vim editor to edit the COMMIT_EDITMSG file.Answers D, A, and C are incorrect. These are invalid options.

You attempt to delete a file using super user privileges and receive a permission error. You determine that the file, ST.txt, has the immutable bit set. What command would you issue to remove this bit from the file? A. chattr +i ST.txt B. chattr -i ST.txt C. lsattr -l ST.txt D. lsattr ST.txt E. mv ST.txt SS.txt

Answer B is correct. To remove the immutable bit from the ST.txt file, you need to employ the chattr -i ST.txt command.Answer D is incorrect. The lsattr ST.txt command displays the file's attributes allowing you to see whether or not the immutable bit is set, but it does not allow you to change it.Answer C is incorrect. The lsattr -l ST.txt command displays a file's attributes using long names instead of abbreviations, which is handy, but it does not remove attributes, such as the immutable bit.Answer A is incorrect. The chattr +i ST.txt command would add the immutable bit instead of removing the immutable bit from the ST.txt file's attributes.Answer E is incorrect. The mv ST.txt SS.txt command would fail if the file has the immutable bit set because you cannot rename (move) a file with that attribute. Also, the command does not remove the immutable bit.

In container orchestration, the use of configuration management and policy as code to automatically deploy and/or create multiple containers goes by what name? A. Inventory control B. Agentless C. Build automation D. Infrastructure as code E .Replication automation

Answer C is correct. Build automation is where configuration management and policy as code are used to automatically deploy and/or create multiple containers.Answer E is incorrect. Replication automation is another way of saying automatically creating multiple containers, so it is a subset of build automation. Answer D is incorrect. Infrastructure as code is an umbrella term that covers configuration management as well as policy as code. Answer B is incorrect. Agentless is a type of orchestration monitoring tool (or engine). Answer A is incorrect. In orchestration, inventory control ensures that the needed or desired number of containers is running.

After booting, what command should you use to look for any errors that occurred during the boot process? A. init B. mount C. dmesg D. mkinitrd E. fsck

Answer C is correct. Errors that occur while the Linux system is booting are sent to the kernel ring buffer. The dmesg command allows you to view the entries in the kernel ring buffer.Answer E is incorrect. The fsck command allows you to find and fix errors on a partition but doesn't allow you to view errors as they occur during boot time.Answer A is incorrect. The init command starts processes during boot time but doesn't allow you to view any errors generated.Answer B is incorrect. The mount command allows you to mount a partition into the virtual directory, but not view any errors that occurred during boot time.Answer D is incorrect. The mkinitrd command creates a virtual directory that is loaded into memory during boot time but doesn't allow you to view any errors that are generated.

What operator redirects output to another program? A. > B. << C. >> D. | E. <

Answer D is correct. The pipe symbol (|) redirects the output from one command to another command.Answers A and C are incorrect. The > and >> operators redirect output to a new file or append to an existing file, not a command.Answer E is incorrect. The < operator redirects the input from a file or command to a command, not output.Answer B is incorrect. The << symbol is not a valid shell operator.

You are auditing an old SysVinit system and checking the status of each service that runs on the system. When you decide to check the DHCP service, using the command chkconfig dhcp on the command line, you get no response. What does this mean? A. The DHCP service either is not running or has failed. B. The DHCP service is not running. C. The DHCP service program files are not installed. D. You need to issue an additional command.

Answer D is correct. When you issued the chkconfig command and pass it a service name, the command will check if the service is enabled at the current runlevel. However, it does not display the results to STDOUT. Instead the results, true (0) or false (1), are sent to the ? variable. Therefore, you need to issue an additional command to see the results, which is echo $?.Answers B and A are incorrect. The ckconfig dhcp command does not determine if the DHCP service is running or not, or failed.Answer C is incorrect. The command's primary purpose is to determine whether or not the service is enabled at the current runlevel.

What syslog event severity level is the lowest? A.err B. emerg C. info D. warning E. debug

Answer E is correct. The syslog event severity levels range from a low of 7 to a high of 0, the debug event is assigned a severity of 7, making it the lowest severity level.Answer B is incorrect. The emerg event is at level 0, making it the highest.Answers A, D, and C are incorrect. The err event severity level is 3, the warning severity level is 4, and the info severity level is 6, making them all higher than the debug level.

You need to set a watch on the /var/log/secure file. Using super user privileges, which command should you employ? A. watch -b /var/log/secure B. watch /var/log/secure C. watch -v /var/log/secure D. tail /var/log/secure E. tail -f /var/log/secure

Answer E is correct. The tail -f /var/log/secure command will set a watch on the /var/log/secure file and display a few recent log file entries immediately as well as additional messages as they are added to the log file.Answers B, A, and C are incorrect. The watch command allows you to execute a program periodically and view the command's output.Answer D is incorrect. The tail /var/log/secure command will not set a watch but instead only display the last 10 lines of the log file.

Which of the following should you choose if you need an orchestration system (also called an engine) for your company? Each correct answer represents a complete solution. Choose all that apply. A. AWS B. Swarm C. Splunk D. Kubernetes E. Mesos

Answers B and D are correct.You should choose Kubernetes and Swarm if you need an orchestration system for your company. The orchestration system provides automated configuration, coordination, and management of complex computing networks, systems, and services. Kubernetes is an open-source orchestration system that is considered by many to be the de-facto standard. Docker, the popular app container management utility, created its orchestration system, called Docker Swarm (also called Swarm).Answer E is incorrect. Mesos needs Marathon to implement an orchestration engine.Answer C is incorrect. Splunk can be used as a monitoring tool in an orchestrated environment, but it is not an orchestration system.Answer A is incorrect. Amazon Web Services (AWS) is cloud-based virtualization services on which you can use orchestration tools, but it is not an orchestration engine.

A system administrator needs her virtual systems to have a network that is internal to the host system and cannot reach the external network. Which adapter types should she use? A. Host-only B. Bridged C. NAT D. Multi-homed E. Dual-homed

Answer A is correct. A host-only network adapter configuration will cause the hypervisor to create a network internal to the host system and not allow the VMs to reach the external network.Answers B and C are incorrect. Both the bridged and NAT adapters will allow external network access.Answers D and E are incorrect. Multi-homed and dual-homed are references to the number of NICs per virtual machine.

Annika puts the file line PS1="My Prompt: " into her account's $HOME/.bash_profile file. This setting changes her prompt the next time she logs into the system. However, when she starts a subshell, it is not working properly. What does Annika need to do to fix this issue? A. Add export prior to PS1 on the same line in the file. B. Nothing. A user's prompt cannot be changed in a subshell. C. Add the file line to the $HOME/.profile file instead. D. Change the last field in her password record to /sbin/false.

Answer A is correct. As per the scenario, the problem is directly related to a missing export command prior to the PS1="My Prompt: " in Annika's environment file. When this environment variable is exported and when it is set, it will be set in any started subshells. Therefore, Annika needs to add export prior to PS1 on the same line in the file.Answer C is incorrect. Since Annika's environment file exists, the $HOME/.profile file is not used.Answer B is incorrect. A user prompt can be changed in a subshell.Answer D is incorrect. If Annika changes the last field in her password record to /sbin/false, she will no longer be able to log into the system using her account.

Which of the following is a measurement of the maximum amount of data that can be transferred over a particular network segment? A. Bandwidth B. Throughput C. Saturation D. Latency E. Routing

Answer A is correct. Bandwidth is a measurement of the maximum data amount that can be transferred between two network points over a period of time.Answer B is incorrect. Throughput is a measurement of the actual data amount that is transferred between two network points. Answer C is incorrect. Saturation occurs when network traffic exceeds capacity, but it is not a measurement. Answer D is incorrect. Latency is the time between a source sending a packet and the packet's destination receiving it. Answer E is incorrect. Routing is the process of forwarding IP packets to the appropriate destination.

The command echo "a b c d" | gawk '{print $1}' is issued at the command line. What will be displayed? A. a B. b C. c D. d E. a b c d

Answer A is correct. The gawk utility defines a data field as characters separated by a space with a text line. The $1 data field is the first data field in a text line. Therefore, the command will display a to STDOUT.Answer B is incorrect. For b to display, $1 in the gawk command needs to be changed to $2.Answer C is incorrect. For c to display, $1 in the gawk command needs to be changed to $3.Answer D is incorrect. For d to display, $1 in the gawk command needs to be changed to $4.Answer E is incorrect. For a b c d to display, $1 in the gawk command needs to be changed to $0.

You need to create a user account via the useradd utility. After checking this distribution's account creation configuration files, you discover that the HOME directive points to a different location than desired. Which useradd option will allow you to create the home in an alternative location? A. -d B. -m C. --defaults D. -D E. --create-home

Answer A is correct. The -d switch on the useradd command will allow you to create the home in an alternative location and not the one specified by the HOME directive.Answers B and E are incorrect. Both the -m and the --create-home switches will create a directory if the CREATE_HOME directive is either not set or set to no. However, they do not allow you to specify the location.Answers D and C are incorrect. The -D and --defaults switches allow you to display the directives within the /etc/default/useradd account creation configuration file.

What file should you place into console and terminal file names to prevent users from logging into the Linux system as the root user account from those locations? A. /etc/securetty B. /etc/hosts.deny C. /etc/cron.deny D. /etc/motd E. /etc/login.warn

Answer A is correct. The /etc/securetty file provides a list of locations from which users can't log in using the root user account.Answer C is incorrect. The /etc/cron.deny file prevents users from scheduling jobs, not logging in as the root user account.Answer B is incorrect.The /etc/hosts.deny file blocks access from remote network hosts; it doesn't block root access from local terminals or the console.Answers E and D are incorrect. The /etc/login.warn and /etc/motd files contain messages that are displayed at login time; they don't block users from logging in as the root user account.

The /etc/services file may be used by firewalls for what purpose? A. To map a service name to a port and protocol B. To store their ACL rules C. To designate what remote services to block D. To designate what local services can send out packets E. To determine if the port can be accessed

Answer A is correct. The /etc/services file may be used by a firewall, such as UFW, to map a particular service name to its port and protocol.Answers C and B are incorrect. The file is not used to designate remote services to block or store a firewall's ACL rules.Answers E and D are incorrect. The Linux firewall applications do not use the /etc/services file to determine if a port can be accessed or what local services can send out packets.

Which software package allows developers to deploy applications using the exact same environment in which they were developed? A. Docker B. Kerberos C. Samba D. Apache E. Postfix

Answer A is correct. The Docker package provides a method for developers to capture the entire development environment for an application and deploy it into a production environment as a container.Answer E is incorrect. The Postfix package provides email services for a Linux server; it doesn't deploy applications. Answer D is incorrect. The Apache package provides web server services for a Linux server; it doesn't deploy application environments. Answer C is incorrect. The Samba package allows a Linux server to interact in a Windows network with Windows clients and servers; it does not provide an environment for deploying applications. Answer B is incorrect. The Kerberos package provides authentication services for Linux servers; it doesn't deploy applications.

Which cloud service model provides only hardware to customers? A. IaaS B. SaaS C. PaaS D. Public E. Private

Answer A is correct. The Infrastructure as a Service (IaaS) cloud service model provides hardware for customers to load their operating systems and applications on.Answer B is incorrect. The Software as a Service (SaaS) cloud service model provides complete applications to customers, not just the hardware.Answer C is incorrect. The Platform as a Service (PaaS) cloud service model provides both hardware and software tools necessary for application development, not just the hardware.Answers D and E are incorrect. Public and private are types of cloud services, not cloud service models.

Which of the following allows both clients and servers to share a common naming directory? A. NIS B. NFS C. LDAP D. Kerberos

Answer A is correct. The Network Information System (NIS) is a directory service that allows both clients and servers to share a common naming directory. The NIS naming directory is often used as a common repository for user accounts, hostnames, and even email information on local networks.Answer B is incorrect. The Network File System (NFS) protocol is used to share folders in a network environment. With NFS, a Linux system can share a portion of its virtual directory on the network to allow access by clients as well as other servers.Answer C is incorrect. The Lightweight Directory Access Protocol (LDAP) protocol provides simple network authentication services to multiple applications and devices on a local network.Answer D is incorrect. Kerberos was developed at MIT as a secure authentication protocol. It uses symmetric-key cryptography to securely authenticate users with a centralized server database.

On an Ubuntu system, how do you run an application with root privileges? A. sudo B. wheel C. adm D. visudo

Answer A is correct. The Ubuntu Linux system prevents users from using the su command to become the root user account, so you must use the sudo command to run individual applications with root privileges.Answers B and C are incorrect. Wheel and adm are names of groups commonly used to assign administrator privileges to users in Linux, they're not commands to run applications with root privileges.Answer D is incorrect. The visudo command only allows you to edit a text file with root privileges, it doesn't allow you to run another application.

You need to locate files within the /tmp directory or one of its subdirectories. These files should be empty. Assuming you have superuser privileges, what command should you use? A. find /tmp -empty B. find /tmp -empty 0 C. find /tmp/* -name empty D. find / -empty E.find / -name tmp

Answer A is correct. The find /tmp -empty command will locate files within the /tmp directory or one of its subdirectories, which are empty.Answer E is incorrect. The find / -name tmp command starts at the root directory instead of the /tmp directory and searches for files/directories whose names are tmp.Answer B is incorrect. The find /tmp -empty 0 command adds an incorrect additional argument, 0, at the end of the command.Answer C is incorrect. The find /tmp/* -name empty command searches for files/directories whose names are tmp and adds an unnecessary wildcard, *, to the directory name to search.Answer D is incorrect. The find / -empty command starts at the root directory instead of the /tmp directory.

Which of the following are filter commands? Each correct answer represents a complete solution. Choose all that apply. A. grep B. sort C. egrep D. pr E. cut

Answers A, C, and E are correct. In the options list, only the egrep, grep, and cut commands are considered to be filter commands because they filter out text.Answers B and D are incorrect. The sort and pr commands are formatting commands.

A user goes to merge PDF files using the /usr/bin/pdfunite utility and it does not work. You recently updated the system and suspect the application had a library get updated. Before searching the package management log files for the updated library names, you must find the libraries used by this utility. What command should you issue? A. ldd /usr/bin/pdfunite B. grep pdfunite /etc/yum.repos.d/*.* C. grep pdfunite /etc/zypp/repos.d/*.* D. grep pdfunite /var/log/apt/history.log E. rpm -q pdfunite --last

Answer A is correct. The ldd /usr/bin/pdfunite command will show you all the libraries used by the pdfunite program.Answers E and D are incorrect. The rpm -q pdfunite --last command and grep pdfunite /var/log/apt/history.log command attempt to find package installation information. However, they do not show an application's employed libraries (and the package for pdfunite is poppler-utils).Answers C and B are incorrect. The /etc/zypp/repos.d/*.* and /etc/yum.repos.d/*.* are repository databases and they do not contain information on which libraries an application uses.

Which command displays current information about all the devices on the Linux system? A. lsdev B. lsblk C. dmesg D. lsusb E. lspci

Answer A is correct. The lsdev command displays information on all of the devices currently installed on the Linux system.Answer C is incorrect. The dmesg command displays information from the kernel ring buffer, which may contain information about devices found at boot time, but not the current information on the device.Answers D, E, and B are incorrect. The lsusb command only displays information about USB devices, the lspci command only displays information about PCI devices, and the lsblk command only displays information about block devices.

What command-line command allows you to view the applications currently running on the Linux system? A. ps B. w C. nice D. lsof E.kill

Answer A is correct. The ps command with the proper options displays the active applications running on the Linux system.Answer D is incorrect. The lsof command displays the files currently open by applications but not all of the running applications.Answer E is incorrect. The kill command stops a running application based on its process ID; it doesn't display all of the running applications.Answer B is incorrect. The w command displays all of the current users on the system but not all of the running applications.Answer C is incorrect. The nice command allows you to start a new application with a specified priority level, but it doesn't allow you to display the currently running applications.

What tool do you use to install a .rpm package file? A.rpm B. gcc C. tar D. dpkg E .gzip

Answer A is correct. The rpm program is used for installing and removing Red Hat-based packages that use the .rpm file format.Answer D is incorrect. The dpkg program is used for installing and removing Debian-based packages that use the .deb file format.Answer C is incorrect. The tar program is used for creating and extracting tape archive formatted files that use the .tar file extension.Answer B is incorrect. The gcc program is used for compiling source code into executable programs.Answer E is incorrect. The gzip program compresses files and adds the .gz file extension.

Which of the following commands displays socket statistics for all network connections on the Linux system? A. ss B. dig C. ifconfig D. ip E. host

Answer A is correct. The ss command displays socket statistics for all network connections on the Linux system.Answers D and C are incorrect. The ip and ifconfig commands display IP network information about the network cards but don't display socket statistics for all network connections.Answers E and B are incorrect. The host and dig commands allow you to retrieve DNS information about specific hosts or domains but not socket statistics for all network connections.

What special bit should you set to prevent users from deleting shared files created by someone else? A. Sticky bit B. Read C. Write D. SUID E. SGID

Answer A is correct. The sticky bit assigned to a directory restricts all of the files in that directory so that only the file owner can delete the file, even if a user account is in the group that has write permissions.Answer D is incorrect. The SUID bit allows a standard user to run an application with the file owner permissions but doesn't block users from deleting shared files.Answer E is incorrect. The SGID bit is used on a directory to ensure that all files created in the directory have the same group as the directory, but it doesn't prevent users in that group from deleting files.Answers B and C are incorrect. The read and write standard permission bits control access to read to a file or write to a file, but they don't block users from deleting a file.

What tools should you use to package an application source code so that it can be extracted in any Linux distribution? A. tar B. apt-get C. yum D. rpm E. dpkg

Answer A is correct. The tape archive utility, tar is available on all Linux distributions and is commonly used to bundle application source code file for all distributions.Answers E and B are incorrect. The dpkg and apt-get utilities only work on Debian-based Linux systems.Answers D and C are incorrect. The rpm and yum utilities only work on Red Hat-based Linux systems.

What command displays the CPU and memory utilization in real-time on the system? A. top B. pkill C. ps D. lsof E. kill

Answer A is correct. The top command displays a table that's updated in real-time, showing the current CPU and memory utilization on the system.Answer C is incorrect. The ps command can show the CPU and memory utilization, but just as a snapshot and not in real-time.Answer D is incorrect. The lsof command displays open files, not CPU and memory utilization.Answers E and B are incorrect. The kill and pkill commands are used to stop processes, not display the CPU and memory utilization.

You want to peruse UFW profiles. Where are they stored? A. /etc/ufw/applications.d/ B. /etc/default/ufw C. /etc/ufw/user6.rules D. /etc/ufw/user.rules E. /etc/services

Answer A is correct. Uncomplicated Firewall (UFW) profiles are stored in the /etc/ufw/applications.d/ directory.Answer B is incorrect. The UFW configuration file is the /etc/default/ufw file.Answer E is incorrect. The /etc/services file is used by UFW to determine the appropriate port and protocol information for service names used in its command syntax.Answers D and C are incorrect. Any user-added rules are stored in the /etc/ufw/ directory, with IPv4 rules in the user.rules file and IPv6 rules in the user6.rules file.

What server role should you implement to speed up web browsing for local clients? A. A DHCP server B. A web proxy C. An SMTP server D. A container E. A web server

Answer B is correct. A web proxy server has the ability to cache pages retrieved from remote web servers and relay those web pages to local clients when the same web page is requested again, helping to speed up web browsing for local clients.Answer A is incorrect. A DHCP server only provides IP and host configuration settings to network devices not speed up web browsing.Answer E is incorrect. A standard web server must retrieve web pages individually for each client, so it doesn't speed up web browsing for the individual clients.Answer D is incorrect. A container helps make software development easier by duplicating the development environment into a form that can be transportable between multiple servers but doesn't help speed up web browsing for clients.Answer C is incorrect. An SMTP server is used to provide email service, not web services.

You desire to see which Git branch is currently employed. You issue the git branch command to see all the project branches. How do you tell which one is current? A. The branch with the word current by it is current. B. The branch with an asterisk by it is current. C. The last branch listed is current. D. The first branch listed is current.

Answer B is correct. As per the scenario, you can tell which branch is current by the git branch command's output, by looking for an asterisk. This indicates that the branch is current.Answers D, C, and A are incorrect. These are invalid options.

You need to display the various quotas on all your filesystems employing quota limits. Which of the following commands should you use? A. quotacheck -cg B. repquota -a C. edquota -t D. quotaon -a E. quotacheck -cu

Answer B is correct. As per the scenario, you should use the repquota -a command, which will display the various quotas on all your filesystems employing quota limits.Answer C is incorrect. The edquota -t command will edit quota grace periods for the system.Answer D is incorrect. The quotaon -a command will automatically turn on quotas for all mounted non-NFS filesystems in the /etc/fstab file, but it does not display filesystems' quotas.Answers E and A are incorrect. The quotacheck command creates either the aquota.group file, if the -cg options are used, or the aquota.user file, if the -cu switches are used, or both files if -cug is employed. However, it does nothing for displaying filesystems' quotas.

Which command in GRUB2 defines the location of the /boot folder to the first partition on the first hard drive on the system? A. set root=hd(1,0) B. set root=hd(0,1) C. set root=first D. set root=hd(0,0) E. set root=hd(1,1)

Answer B is correct. GRUB2 identifies the hard drives starting at 0, but the partitions start at 1, so the first partition on the first hard drive would be (0,1). Hence, the set root=hd(0,1) command in GRUB2 defines the location of the /boot folder to the first partition on the first hard drive on the systemAnswer A is incorrect. The set root=hd(1,0) command defines the second hard drive and an incorrect partition number.Answer E is incorrect. The set root=hd(1,1) command defines the first partition but the second hard drive.Answer D is incorrect. The set root=hd(0,0) command defines the first hard drive but an incorrect partition.Answer C is incorrect. The set root=first command uses the keyword first, which is not recognized by GRUB2.

Which logging program does systemd systems use? A. httpd B. journald C. dhcpd D. ntpd E. rsyslogd

Answer B is correct. Systemd systems use the journald program for logging system events.Answer E is incorrect. The rsyslogd program is commonly used by SysV init systems for logging events, but not systemd systems.Answers D, C, and A are incorrect. The ntpd, dhcpd, and httpd programs provide network services for time, configuration, and web services respectively, but not logging services.

What command can you use to display new entries in a log file in real-time as they occur? A. head -f B.tail -f C.tail D. head E. vi

Answer B is correct. The -f option of the tail command displays new additions to a file in real-time.Answers D and C are incorrect. The head and tail commands by themselves just list the existing entries in a file.Answer A is incorrect. The head command doesn't support the -f option.Answer E is incorrect. The vi editor also only displays existing data in a file and not newly added data.

Which of the following packages will provide you with the utilities to set up Git VCS on a system? A. GitHub B. Git C. Bitbucket D. Gitlab

Answer B is correct. The Git package provides utilities to set up Git VCS on a system.Answers A, D, and C are incorrect. The GitHub, Gitlab, and Bitbucket packages are made up options, but they have similar names as cloud-based remote repositories used with Git (GitHub, GitLab, BitBucket).

Which open-source database provides advanced database features, but can be slower to use? A. MySQL B. PostgreSQL C. NoSQL D. Oracle E. MongoDB

Answer B is correct. The PostgreSQL open-source database server is well known for utilizing advanced database features commonly found in commercial database servers but can be somewhat slower when processing data.Answers E, A, and C are incorrect. The MongoDB, MySQL, and NoSQL open-source databases are designed for speed, and implement varying levels of advanced database features but don't provide all of the advanced features of commercial databases.Answer D is incorrect. The Oracle database implements advanced database features but is not an open-source database.

What command should you use to repair a partition that won't mount? A.mkinitrd B. fsck C. mount D. umount E. dmesg

Answer B is correct. The fsck command is a script that calls other programs required to fix errors on different types of partitions.Answers C and D are incorrect. The mount and umount commands are used to add or remove a partition from the virtual directory, not repair partitions.Answer E is incorrect. The dmesg command allows us to view messages in the kernel ring buffer, not repair partitions.Answer A is incorrect. The mkinitrd command creates a virtual directory that's loaded into memory during boot time, not repair partitions.

What command would you use to display the available wireless networks in your area? A. arp B. iwlist C. iwconfig D. ifconfig E. ip

Answer B is correct. The iwlist command lists all of the wireless networks detected by the wireless network card installed on the system.Answer C is incorrect. The iwconfig command allows you to set and display the configuration settings for a wireless network card but doesn't list all of the available wireless networks the card detects.Answers D and E are incorrect. The ifconfig and ip commands allow you to set the IP network settings for a wireless network card but do not allow you to view the available wireless networks.Answer A is incorrect. The arp command displays network device addresses that communicate with the system but doesn't display wireless networks.

What tool creates a logical volume from multiple physical partitions? A. pvcreate B. lvcreate C. fdisk D. vgcreate E. mkfs

Answer B is correct. The lvcreate program creates a logical volume from multiple partitions that you can use as a single logical device to build a file system and mount it to the virtual directory.Answer E is incorrect. The mkfs program creates a filesystem on a partition but doesn't create a logical volume.Answer A is incorrect. The pvcreate program identifies a physical volume from a partition but doesn't create the logical volume.Answer C is incorrect. The fdisk program creates and modifies physical partitions, not logical volumes.Answer D is incorrect. The vgcreate program creates a volume group for grouping physical partitions but doesn't create the logical volume.

Which web server can also perform as a load balancer? A. Apache B. nginX C. Lighthttpd D. PostgreSQL E. MySQL

Answer B is correct. The nginX web server also has the ability to perform as a load balancer with multiple systems.Answers A and C are incorrect. The Apache and Lighthttpd web servers aren't capable of performing load balancing functions.Answers D and E are incorrect. The PostgreSQL and MySQL servers are database servers, not web servers.

When using an SSH agent for authentication, what command is used to add a key to the agent session? A. ssh-copy-id B. ssh-add C. scp D. ssh-keygen E. ssh-agent

Answer B is correct. The ssh-add command allows you to add your identity key to the agent session to use for authentication.Answer D is incorrect. The ssh-keygen command is used for generating keys.Answer E is incorrect. The ssh-agent command starts an agent session but does not add keys to the session.Answer A is incorrect. The ssh-copy-id command allows you to copy an identity key to a remote system and adds it to the ~/.ssh/authorized_keys file for password-less authentication.Answer C is incorrect. The scp command allows you to copy files over a network via an SSH tunnel but not adds files to an SSH agent session.

What systemd command should you use to retrieve the time from the workstation or server hardware? A. date B. timedatectl C. localectl D. locale E. time

Answer B is correct. The timedatectl command is available to retrieve the time from the workstation or server hardware.Answer C is incorrect. The localectl command is a systemd command but used to set localization, not retrieve time.Answers A, E, and D are incorrect. The date, time, and locale commands are part of the legacy Linux system and not used on systemd systems.

The user Hansen7o9 ran a script, Borg.sh, which tried to run another program but got a privilege error. What should you check first? A. Check if Hansen7o9 has the privileges to run the other program by viewing its directory's execute permissions. B. Check if Hansen7o9 has the privileges to run the other program by viewing its permissions. C. Check if Hansen7o9 has the privileges to run the Borg.sh script by viewing the script's directory execute permissions. D. Check if Hansen7o9 has the privileges to run the Borg.sh script by viewing the script's permissions. E. Check if Hansen7o9 has the privileges to run the other program by viewing its directory tree's execute permissions.

Answer B is correct. You should check if Hansen7o9 has the privileges to run the other program by viewing its permissions via the ls -l command.Answers D and C are incorrect. The user Hansen7o9 can already run the script, Borg.sh.Answers A and E are incorrect. Directory execute permissions are not needed to run a script or program. Instead, they allow a user to change their present working directory to that location, but the permission must be set throughout the directory tree.

The init program is started on a Linux system and has a process ID number. What typically is that process's ID number? A. 2 B. 1 C. 0 D. 10

Answer B is correct.The init program is typically started immediately after the Linux system has traversed the boot process, and it has a process ID (PID) number of 1.

A system admin created an archive file using the tar utility and employed an option to apply compression automatically to the file. The system admin used an archive file extension of .txz. Which compression utility did the system admin claim the tar utility used? A. bzip2 B. gzip C. xz D. zlib E. zip

Answer C is correct. As per the scenario, when a .txz file extension is used on a tarball, it implies that xz compression was used.Answers B and A are incorrect. The gzip, and bzip2 utilities can be employed by the tar utility. However, the file extensions that imply their use are different than the one used by the system admin.Answers E and D are incorrect. The zip utility and zlib library are not used with the tar utility.

A user, who is not the owner or a group member of a particular directory, attempts to use the ls command on the directory and gets a permission error. What does this mean? A. The directory does not have execute (x) set for other permissions. B. The directory does not have a display (d) set for other permissions. C. The directory does not have a read (r) set for other permissions. D. The directory does not have a write (w) set for other permissions.

Answer C is correct. In order for a user to list files in a directory, the directory needs to have read (r) set for other permissions if the user is not the directory's owner or does not belong to the directory's set group.Answer B is incorrect. There is no display (d) permission setting.Answer A is incorrect. The execute (x) permission allows a user to change their present working directory to that directory as long as all the parent directories also have that permission set.Answer D is incorrect. The write (w) permission allows a user to create files within that directory.

Which of the following describes the difference between the ACL rule settings of reject and drop? A. Reject and drop both send a denial message, but only reject blocks the packet. B. Drop sends a denial message, and reject does not, but both block the packet. C. Reject sends a denial message, and drop does not, but both block the packet. D. Reject and drop both send a denial message, but only drop blocks the packet.

Answer C is correct. The ACL rule settings of reject and drop both block an identified packet. However, only reject sends back a denial message. Answers B, D, and A are incorrect. These are inappropriate options.

Which is the most popular bootloader used on Linux systems? A. GRUB Legacy B. LILO C. GRUB2 D. SYSLINUX E. ISOLINUX

Answer C is correct.The GRUB2 bootloader program is commonly used by most Linux systems.Answer A is incorrect. The GRUB2 bootloader replaced the original GRUB Legacy bootloader.Answer B is incorrect. The LILO bootloader was the original Linux bootloader program, replaced by GRUB.Answers D and E are incorrect. The SYSLINUX and ISOLINUX bootloaders are specialty bootloaders used for special situations and are not commonly used by most Linux distributions.

What Linux program logs user file and directory access? A. chroot B. LUKS C. auditd D. klist E. kinit

Answer C is correct.The auditd program monitors system activity, including user file and directory access, and logs events based on rules you create.Answer A is incorrect. The chroot utility restricts applications to a specific location in the virtual filesystem but doesn't log user file and directory access.Answer B is incorrect. The LUKS (Linux Unified Key Setup) system encrypts disk partitions but doesn't log user file and directory access.Answers D and E are incorrect. The klist and kinit programs are used for Kerberos user authentication, not logging user file and directory access.

How would you fix a "mount point does not exist" problem? A. Employ the fsck utility to fix the bad disk sector. B. Employ the badblocks utility to fix the bad disk sector. C. Use super user privileges, if needed, and create the directory via the vgchange command. D. Use super user privileges, if needed, and create the directory via the mkdir command. E. Use super user privileges, if needed, and create the directory via the mountpoint command.

Answer D is correct. A "mount point does not exist" problem concerns a missing directory. Therefore, to fix it, use super user privileges, if needed, and create the directory via the mkdir command.Answers A and B are incorrect. The problem does not concern a bad disk sector (and you cannot fix bad disk sectors with the badblocks utility).Answer C is incorrect. You would employ the vgchange command for a missing volume in a logical volume but not a missing directory.Answer E is incorrect. While the mountpoint command does allow you to see if a particular directory is a mount point, it does not allow you to create a missing directory.

To copy a directory with the cp command, which option do you need to use? A. -f B. -u C. -v D. -R E. -i

Answer D is correct. The -R option used with the cp command allows you to copy a directory's contents. You can also employ the -r or --recursive option to achieve the same results.Answer E is incorrect. The -i option will ask before overwriting a pre-existing directory but not copy recursively.Answer C is incorrect. The -v option will provide verbose information for the copy, which is helpful but does not allow a recursive copy to occur.Answer B is incorrect. The -u option is handy in that it will only allow the cp command to overwrite pre-existing files with the same name if the files being copied are newer. However, it is not used to recursively copy.Answer A is incorrect. The -f option forces a copy to occur and overwrites any pre-existing files with the same name but does not force a recursive copy.

At a virtualization conference, you overhear someone talking about using blobs on their cloud-based virtualization service. Which virtualization service are they using? A. Digital Ocean B. KVM C. Amazon Web Services D. Microsoft Azure E. GitHub

Answer D is correct. The Microsoft Azure cloud-based virtualization service provides blobs, which are large unstructured data storage that offer over the Internet and can manipulate with .NET code.Answers C and A are incorrect. Amazon Web Services (AWS) and Digital Ocean are both cloud-based virtualization services, but they do not employ storage called blob.Answer B is incorrect. Kernel-based Virtual Machine (KVM) is a hypervisor, not a cloud-based virtualization service.Answer E is incorrect. GitHub is a cloud-based remote repository used in version control.

Which character set is often used when you need to work with international languages? A. UTF-8 B. ASCII C. LC_ALL D. Unicode E. UTF-16

Answer D is correct. The Unicode character set uses 3 bytes to store character information, providing space for all international characters, making it ideal for use with any language.Answers B and A incorrect. The ASCII character set uses 7 bits, and the UTF-8 character set uses 1 byte, neither of which is large enough to support international characters.Answer E is incorrect. The UTF-16 character set uses 2 bytes to store characters, which provides for more characters, but still not enough to cover all languages.Answer C is incorrect. LC_ALL is an environment variable used to indicate the character set to use, it's not a character set itself.

You are troubleshooting a problem with a user's graphical user interface, which is being served by X11. You notice that the XDMCP is being used as the display manager. What does this implicate? A. The control protocol is being used by X11 to provide a basic desktop environment. B. A Wayland display server is being used and needs to be replaced by an X11 server. C. The /etc/X11/xdm-config file should be reviewed. D. The XDMCP is used for the user authentication interface.

Answer D is correct. The X Display Manager Control Protocol (XDMCP) can be employed as a very basic display manager. A display manager controls the login screen provided to the user for authentication.Answer A is incorrect. XDMCP is not used by X11 to provide a basic desktop environment.Answer B is incorrect. XDMCP's use does not indicate the Wayland display server is being used.Answer C is incorrect. If you were having problems with the display manager, then the correct file to review would be the /etc/X11/xdm/xdm-config file, and not the /etc/X11/xdm-config file.

When will the cron table entry 0 0 1 * * myscript run the specified command? A. At 1 p.m. every day B. At midnight every day C. At 1 a.m. every day D. At midnight on the first day of every month E. At midnight on the first day of every week

Answer D is correct. The cron table format specifies the times to run the script by the minute, hour, day of the month, month, and day of the week. Thus, the format 0 0 1 * * will run the command at 00:00 (midnight) on the first day of every month.

You want to view detailed information about your system's memory. Which command should you use? A. free B. sar C. vmstat D. ipcs -m E. cat /proc/meminfo

Answer E is correct. For detailed information concerning a system's RAM, you should use the cat /proc/meminfo command to view it.Answer D is incorrect. The ipcs -m command allows you to see shared memory segments instead of detailed RAM information.Answer A is incorrect. The free command shows memory items such as free memory, used memory, and buffer/cache usage.Answer B is incorrect. The sar utility can provide memory performance information, but that is not what is needed here.Answer C is incorrect. The vmstat utility provides a lot of memory statistics, including disk I/O specific to swapping as well as total blocks in and blocks out to the device. However, it does not provide detailed information about your system's memory.

What drive and partition do the raw device file /dev/sdb1 reference? A. The second partition on the second SATA storage device B. The second partition on the first PATA storage device C. The first partition on the second PATA storage device D. The second partition on the first SCSI storage device E. The first partition on the second SCSI storage device

Answer E is correct. Linux uses the /dev/sdxx format for SCSI and SATA raw devices. The device is represented by a letter, starting with a, and the partition is represented by a number, starting at 1. So /dev/sdb1 references the first partition on the second SCSI or SATA device.Answer D is incorrect. The /dev/sda2 file references the second partition on the first SCSI storage device.Answer C is incorrect. The /dev/hdb1 file references the first partition on the second PATA storage device.Answer B is incorrect. The /dev/hda2 file references the second partition on the first PATA storage device.Answer A is incorrect. The /dev/sdb2 file references the second partition on the second SATA storage device.

Which environment variable allows you to retrieve the numeric user ID value for the user account running a shell script? A. $BASH B. $HOME C. $1 D. $USER E. $UID

Answer E is correct. The $UID environment variable contains the numeric user ID value of the user account running the shell script.Answer D is incorrect. The $USER environment variable contains the text user name of the user account running the shell script, not the numerical user ID value.Answer A is incorrect. The $BASH environment variable contains the path to the executable Bash shell.Answer B is incorrect. The $HOME environment variable contains the location of the home directory of the user account running the shell.Answer C is incorrect. The $1 positional variable contains the first parameter listed on the command-line command when the shell script was run.

Your X11 session has become hung. What keystrokes do you use to restart the session? A. Ctrl+C B. Ctrl+Z C. Ctrl+Q D. Ctrl+Alt+Delete E. Ctrl+Alt+Backspace

Answer E is correct. The Ctrl+Alt+Backspace will kill your X11 session and then restart it, putting you at the login screen (display manager.)Answer A is incorrect. The Ctrl+C combination sends an interrupt signal but does not restart an X11 session.Answer B is incorrect. The Ctrl+Z keystroke combination sends a stop signal, but it will not restart the X11 session.Answer C is incorrect. The Ctrl+Q combination will release a terminal that has been paused by Ctrl+S. However, it does not restart an X11 session.Answer D is incorrect. The Ctrl+Alt+Delete keystroke combination can be set to do a number of tasks, depending upon your desktop environment. In some cases, it brings up a shutdown, logout, or reboot menu. However, it does not restart the X11 session.

What type of cloud service provides the full application environment so that everyone on the Internet can run it? A. Public B. Private C. PaaS D. Hybrid E. SaaS

Answer E is correct. The Software as a Service (SaaS) cloud service type provides full applications, allowing anyone to connect to your application.Answer C is incorrect. The Platform as a Service (PaaS) cloud service type doesn't include an application; you must provide it yourself.Answers B, A, and D are incorrect. Private, public, and hybrid are all methods of implementing cloud services, not cloud service types.

What does placing an ampersand sign (&) after a command on the command-line do? A. Schedules the command to run later B. Disconnects the command from the console session C. Redirects the output to a file D. Redirects the output to another command E. Runs the command in background mode

Answer E is correct. The ampersand sign (&) tells the shell to run the specified command in background mode in the console session.Answer B is incorrect. The nohup command is used to disconnect the command from the console session.Answer A is incorrect. The at command is used to schedule a command to run later.Answer D is incorrect. The pipe symbol (|) redirects the output from the command to another command.Answer C is incorrect. The greater-than symbol (>) redirects the output from the command to a file.

What tool should you use to install a .deb package file? A. tar B. gcc C. rpm D. gzip E. dpkg

Answer E is correct. The dpkg program is used for installing and removing Debian-based packages that use the .deb file format.Answer A is incorrect. The tar program is used for creating and extracting tape archive formatted files that use the .tar file extension.Answer B is incorrect. The gcc program is used for compiling source code into executable programs.Answer C is incorrect. The rpm program is used for installing and removing Red Hat-based packages that use the .rpm file format.Answer D is incorrect. The gzip program compresses files and adds the .gz file extension.

If you see read or write errors appear in the system log, what tool should you use to correct any bad sections of the hard drive? A. umount B. mount C. mkinitrd D. dmesg E. fsck

Answer E is correct. The fsck program can perform a filesystem check and repair multiple types of filesystems on partitions.Answer B is incorrect. The mount program is used to append a partition to a virtual directory; it can't correct a partition that contains errors.Answer A is incorrect. The umount command removes a partition from the virtual directory.Answers D and C are incorrect. The dmesg command displays boot messages, and the mkinitrd command creates an initrd RAM disk.

What command should you use on a systemd system to set the localization? A. date B. locale C. timedatectl D. time E. localectl

Answer E is correct. The localectl command is available on systemd systems to set the localization.Answer C is incorrect. The timedatectl command sets the time and date on systemd systems, but not the localization.Answers D, A, and B are incorrect. The time, date, and locale commands are legacy Linux commands and not used on systemd systems.

Which utility should be used to remove a module along with any dependent modules? A. rmmod B. modinfo C. cut D. depmod E. modprobe

Answer E is correct. The modprobe utility along with its -r switch is the utility to employ for removing (unloading) a kernel module along with any of its dependencies.Answer A is incorrect. The rmmod utility will remove a kernel module but not any of its dependencies.Answer B is incorrect. The modinfo command does not unload kernel modules but instead displays detailed information concerning a specified module.Answer C is incorrect. The cut utility is used to filter text files and display the filtered text to STDOUT. It is not involved in kernel module removal.Answer D is incorrect. The depmod utility is used to create a list of modules and their dependencies. But it is not used to remove modules.

What systemd command allows you to view and change the time, date, and time zone? A. localectl B. date C. time D. locale E. timedatectl

Answer E is correct. The timedatectl command is part of the systemd package and allows you to both view and change the current time, date, and time zone for the Linux system.Answer A is incorrect. The localectl command is also part of the systemd package, but it handles localization information and not time and date information.Answer B is incorrect. The date command allows you to view and change the time and date but not the time zone setting.Answer C is incorrect. The time command displays the elapsed CPU time used by an application, not the current time, date, and time zone.Answer D is incorrect. The locale command allows you to view the localization settings for the Linux system, not the time, date, or time zone.

What type of hypervisor is the Oracle VirtualBox application? A. SaaS B. PaaS C. Private D. Type I E. Type II

Answer E is correct. Type II hypervisors are commonly called hosted hypervisors because they run on top of an existing operating system install. The Oracle VirtualBox hypervisor installs on top of a host operating system, making it a Type II hypervisor.Answers B and A are incorrect. PaaS and SaaS are types of cloud services, not hypervisors.Answer D is incorrect. Type I hypervisors are commonly called bare-metal hypervisors. The hypervisor system runs directly on the server hardware, with no middleman. Kernel-based Virtual Machine (KVM) and the XEN Project are Type I hypervisors.Answer C is incorrect. A private cloud service is a method for implementing cloud services in an internal network, not a type of hypervisor.

What can you do to limit an SFTP server program from allowing users to access system files? A. Run it from the tcpwrappers program B. Run it in background mode C. Run it as a separate process D. Run it without root privileges E.Run it in a chroot jail

Answer E is correct. When running an application using chroot you can restrict the application to a specific directory in the virtual directory.Answer C is incorrect. Running an application as a separate process doesn't change the assigned file or directory permissions assigned. Answer B is incorrect. Running the process in background mode doesn't alter the permissions. Answer A is incorrect. The tcpwrappers program can limit what network devices can connect to the application, but not what directories the application has access to.Answer D is incorrect. Running the application without root privileges would help prevent overwriting system files, but wouldn't necessarily prevent reading system files.

The lsmod utility provides the same information as what other utility or file? A. /etc/modules.conf B. insmod C. /run/modprobe.d/*.conf D. modinfo E. /proc/modules

Answer E is correct. the /proc/modules file has the same information that is displayed by the lsmod utility (though the lsmod utility formats it much nicer).Answer D is incorrect. The modinfo utility provides detailed module data, while lsmod only shows brief information.Answer A is incorrect. The /etc/modules.conf file is a kernel module configuration file, and it does not provide the same information as the lsmod utility.Answer B is incorrect. The insmod command is used to dynamically load kernel modules, and thus it is a wrong answer.Answer C is incorrect. The /run/modprobe.d/*.conf files are kernel module configuration files, and they do not provide the same information as the lsmod utility.

In Linux, what key combination pauses an application running in the foreground? A. Ctrl+D B. Ctrl+L C. Ctrl+A D. Ctrl+C E. Ctrl+Z

Answer E is correct.The Ctrl+Z key combination pauses an application running in the foreground and places it in sleep mode.Answer D is incorrect. The Ctrl+C key combination stops a running process, instead of pausing it.Answer A is incorrect. The Ctrl+D key combination logs out from the terminal session.Answer B is incorrect. The Ctrl+L key combination clears the terminal window.Answer C is incorrect. The Ctrl+A key combination moves the cursor to the beginning of the command line.

The user Hansen7o9 has tried multiple times to access her account but was using the wrong password. She thinks the system has now locked her out. Assuming your system employs PAM for authentication, which of the following utilities can you use to see if her account was locked out due to failed login attempts? Each correct answer represents a complete solution. Choose all that apply. A. faillock B. sealert C. pam_tally2 D. ausearch E. id -Z

Answers A and C are correct. As per the scenario, depending upon your system's employment of Pluggable Authentication Modules (PAMs), either the pam_tally2 or faillock utility will allow you to see if the user was locked out of the system due to failed login attempts.Answer D is incorrect. The ausearch command is used with AppArmor and not PAM.Answers B and E are incorrect. The sealert and id -Z commands are used with SELinux, and not PAM.

Which directories contain dynamic files that display kernel and system information? Each correct answer represents a complete solution. Choose all that apply. A. /proc B. /etc C. /sys D. /dev/mapper E. /dev

Answers A and C are correct. The Linux kernel uses the /proc and /sys directories to produce dynamic files that contain information about the kernel and system.Answer E is incorrect. The /dev folder contains files for communicating with devices, not the kernel and system information.Answer B is incorrect. The /etc directory contains application configuration files, not files created by the kernel for displaying kernel and system information.Answer D is incorrect. The /dev/mapper directory is used for virtual files mapped to physical device files for Logical Volume Management (LVM) and Linux Unified Key Setup (LUKS), not kernel information.

What command-line commands allow you to send process signals to running applications? Each correct answer represents a complete solution. Choose all that apply. A. pkill B. nice C. kill D. pgrep E. renice

Answers A and C are correct. The pkill and kill commands allow you to send Linux process signals to running applications.Answer E is incorrect. The renice command allows you to change the priority level of a running application but not send process signals to it.Answer B is incorrect. The nice command allows you to start an application with a specified priority level but not send process signals to applications that are already running.Answer D is incorrect. The pgrep command allows you to display running applications, but it doesn't send process signals to them.

Which of the following are true about netfilter? Each correct answer represents a complete solution. Choose all that apply. A. It provides code hooks into the Linux kernel for firewall technologies to use. B. It is used by UFW. C. It is used by firewalld D. It provides firewall services without the need for other applications. E. It is used by iptables.

Answers A, B, C, and E are correct. Used by firewalld, Uncomplicated Firewall (UFW), and iptables, netfilter provides code hooks into the Linux kernel for firewall technologies to use in order to implement fully functional firewall capabilities.Answer D is incorrect. Netfilter cannot provide firewall services on its own.

Peter is trying to complete his network application, Spider, but is running into a problem with accessing a remote server's files and there are no network problems occurring at this time. He thinks it has something to do with the remote server's ACLs being too restrictive. You need to investigate this issue. Which of the following commands will you use for troubleshooting this problem? Each correct answer represents a complete solution. Choose all that apply. A. iptables B. getacl C. setacl D. firewall-cmd E. ufw

Answers A, D, and E are correct. As per the scenario, since the problem involves a remote server, you need to investigate the firewall access control lists (ACLs) on both the local and remote systems. Therefore, depending upon their firewall employed, you may use the firewall-cmd, ufw, or iptables command in the troubleshooting process.Answers B and C are incorrect. The getacl and setacl commands deal with file inheritance issues.

Which of the following are stream editors? Each correct answer represents a complete solution. Choose all that apply. A. gawk B. nano C. vim D. sed E. awk

Answers A, D, and E are correct. The sed, awk, and gawk utilities are all stream editors. The sed utility edits a stream of text data based on a set of commands you supply ahead of time. The awk utility is a scripting language used for manipulating data and generating reports. The gawk utility is also a stream editor, but it provides a more powerful editing process via its programming language.Answer C is incorrect. The vim utility is a configurable text editor for efficiently creating and changing any kind of text.Answer B is incorrect. The nano utility is a text editor for Unix-like computing systems or operating environments using a command-line interface.

Which of the following commands should you employ for disk space problems? Each correct answer represents a complete solution. Choose all that apply. A. ioping B. df C. iotop D. du E. iostat

Answers B and D are correct. The du and df commands are the ones to use for situations where disk space is an issue.Answer E is incorrect. The iostat command displays items such as I/O wait, but nothing on disk space.Answer A is incorrect. The ioping command is more for testing new disks on performance items.Answer C is incorrect. The iotop command is helpful in locating an application or process causing high I/O, but not disk space problems.

Which of the following are true about the Unity desktop environment? Each correct answer represents a complete solution. Choose all that apply. A. Unity is a fork of GNOME 2. B. Unity uses LightDM as its display manager. C. Unity uses Mutter as its windows manager. D. Unity uses Nautilus as its default file manager.

Answers B and D are correct. The following are true about the Unity desktop environment: Nautilus is the default file manager for Unity. Unity uses LightDM as its display manager. Answer C is incorrect. Unity uses Metacity as its windows manager instead of Mutter.Answer A is incorrect. Unity is not a fork of any other desktop environment.

Which of the following utilities can be used to unload a kernel module? A. insmod B. modprobe C. modinfo D. rm E. rmmod

Answers B and E are correct. Both the rmmod and modprobe utilities can be used to unload (remove) kernel modules. You do have to use the -r switch with the modprobe utility to remove a kernel module.Answer D is incorrect. The rm utility is used for removing files and not kernel modules.Answer A is incorrect. The insmod utility is used to load a kernel module.Answer C is incorrect. The modinfo utility provides detailed information concerning a particular kernel module.

Which of the following are used in container orchestration? Each correct answer represents a complete solution. Choose all that apply. A. DevOps B. Self-healing C. Automated configuration management D. Build automation E. Agentless monitoring

Answers B, C, D, and E are correct. The following concepts are used in container orchestration:Automated configuration managementSelf-healingAgentless monitoringBuild automationAnswer A is incorrect. DevOps benefits from container orchestration and often employs it, but it is not used within container orchestration.

Which of the following can be used as backup utilities? Each correct answer represents a complete solution. Choose all that apply. A. gzip B. zip C. tar D. rsync E. dd

Answers B, C, D, and E are correct. The zip, tar, rsync, and dd utilities can be used to create data backups.Answer A is incorrect. The gzip utility can be used after a backup is created or employed through tar options to compress a backup.

A system administrator has created a backup archive and transferred the file to another system across the network. Which utilities can be used to check the archive file's integrity? Each correct answer represents a complete solution. Choose all that apply. A. sftp B. scp C .sha512sum D. rsync E. md5sum

Answers C and E are correct. As per the scenario, both the md5sum and sha512sum utilities produce hashes on files, which can be compared to determine if file corruption occurred, such as when transferring a file over the network.Answers D, A, and B are incorrect. The rsync, sftp, scp utilities will allow you to securely transfer files but not check a file's integrity.

Which of the following are ways to identify that a text file is hard-linked to another file? Each correct answer represents a complete solution. Choose all that apply. A. The file does not share an inode number with another file. B. The file has a file indicator code of l in its long listing. C. The file has a link count greater than 1. D. The file shares the same data with another file. E. The file shares an inode number with another file.

Answers C, D, and E are correct. Indicators that a text file is hard-linked to another file are the file shares an inode number with another file, the text file has a link count greater than 1, and the file shares the same data with another file.Answers A and B are incorrect. Soft (symbolic) linked files do not share an inode number with another file and have a file indicator code of l in their long listing.


Set pelajaran terkait

Chapter 14- Political Parties Quiz Review

View Set

Media and Culture an introduction to mass communication

View Set

Lesson 27: Principles of Delegation and Prioritization of Care

View Set

Marketing 101 - Chapter 1 (Pearson - Principles of Marketing)

View Set

bio review chapter 6 immune system

View Set

Unit 4 Mobility - Spinal Cord Injury

View Set

Vocabulario de acción de gracias

View Set

Ch. 22 Thyroid and Parathyroid Glands

View Set

Intermediate Accounting (Test 2) (computational)

View Set

ISSA Unit 14 TRAINING PRINCIPLES (Paul Taylor's)

View Set