Linux Ch. 24 Troubleshooting Application and Hardware Issues

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

8. A clock-in/out application, which uses an NTP server on the local network, is throwing an error concerning reaching the server. There are currently no network problems. Which of the following are steps in the troubleshooting process for this issue? (Choose all that apply.) A. Check the firewall ACLs on the NTP server. B. Check the firewall ACLs on the application server. C. Use the firewall-cmd --get-default-zone command. D. Check the /etc/services file for NTP ports and transport protocols. E. View firewall log entries.

A, B, D, E. For troubleshooting this issue, the firewall ACLs on both the NTP server and the application server must be checked. Either side could be dropping or rejecting packets, so options A and B are correct answers. If you do not have the NTP ports and transport protocols memorized, the /etc/services file needs checking. That information is critical for reviewing server- and client-side firewall ACLs. Thus, option D is a correct answer too. It is a good idea to view the firewall log entries because they may point to the exact cause of the problem or provide valuable information. Therefore, option E is a right choice

2. Mary adds the first SCSI disk to a Linux system that currently has only IDE drives. The system is not recognizing the new disk. Which of the following commands should she employ to troubleshoot the problem? (Choose all that apply.) A. ls /sys/bus/scsi/drivers B. pvscan /dev/vg00/lvol0 C. lsmod | grep module-name D. hdparm -B 127 device-filename E. smartctl -a

A, C. Since this is this system's first SCSI disk and it is not being recognized, it is possible that the appropriate modules (drivers) are not loaded. Thus, Mary should check to see if the drivers are on the system via the command in option A and check if they are currently loaded into the kernel using the command in option C.

Detail restrictive firewall ACLs

Applications that communicate with data, services, or end users over a network may run into problems, with overly restrictive firewall settings. Gather together the source address (or host), destination address, and network protocols employed as well as the inbound and outbound ports used on both the client and server side. Using this basic information, review the firewall's various ACLs. If the firewall setting is blocking this needed access, review the potential needed changes prior to enacting them.

3. The system administrator, Norman, runs a Python program and receives an IO Error: [Error 13] Permission denied message. What information should he gather (or know) to start troubleshooting this issue? (Choose all that apply.) A. The disk type, where the program resides B. His user account name C. The program action that raised the error D. File name and directory location of the program's I/O files E. The program's name

B, C, D. For Norman to begin the process of troubleshooting this application permission issue, he'll need to either know or determine the information listed in options B, C, and D.

1. Peter's system has a memory-intensive application running on it continually. To help improve performance, he has replaced the old hard drives with solid-state drives instead of increasing RAM. Which of the following is most likely true about this situation? A. The SSD for application data will enter into a degraded mode. B. The SSD for swap will become degraded storage. C. The SSD will need a namespace in its device file name. D. The SSD will end up a missing volume. E. The SSD will experience resource exhaustion.

B. Due to this application that is memory intensive and experiencing performance issues, the system's swap space is most likely receiving high I/O from RAM. SSDs have a finite number of program/erase (PE) cycles, and continually writing and removing data from them, such as occurs in swap, will cause them to become degraded storage faster than normal. Thus, option B is the correct answer.

9. Your system administrator team member Norman tells you the device located at the communications port is not working. What command should you issue to start the troubleshooting process? A. dmesg | grep -i COM B. dmesg | grep -i ttys C. sudo setserial -a /dev/COM1 D. sudo setserial -a /dev/ttyS0 E. cat /proc/interrupts

B. The communications port is a serial port, represented by the /dev/ttyS# device files. To find the right number (#), use the dmesg command to start the troubleshooting process. Thus, option B is the correct answer.

7. Mary confirms via the sealert utility that her application cannot access the file flash.txt. What command should she use next? A. ls -l flash.txt B. ls -Z flash.txt C. ls -l flash.txt-directory D. setroubleshoot E. restorecon

B. The sealert utility is used to check the audit log file for SELinux context violations. Therefore, the issue here revolves around SELinux. The ls -Z command will allow Mary to view the flash.txt file's SELinux context to determine if it needs to have it changed. Thus, option B is the correct answer.

10. Harry's newly installed USB printer is not working. The system employs CUPS. Which of the following are steps that may be included in the troubleshooting process? (Choose all that apply.) A. Issue the less /etc/printcap command. B. Use the lpinfo -m command to view available USB ports. C. Put a watch on the appropriate log file and plug in the USB cable. D. Use the dmesg and grep utilities to find printer information. E. Use the lsusb -v command to see if the device is on the USB bus.

C, D, E. The activities in options C, D, and E are all steps that may be included in troubleshooting this USB printer issue. A CUPS system uses the /etc/cups/printers.conf file instead of the /etc/printcap file, so option A is a wrong answer. The lpinfo -m command allows you to view available printer drivers, not USB ports, so option B is an incorrect choice as well.

6. Peter writes a new C++ application to use for managing his older Linux server. The new app contains no programming or logic errors. However, when he tries to compile it, it does not work. Which of the following is most likely the issue? A. An incorrect application permission B. An incorrect file permission C. A missing or outdated GCC D. A missing or outdated device E. A repository problem

C. If Peter cannot compile a flawlessly written C++ application, then the problem must lie with the compiler, GCC. Thus, option C is the correct answer.

Describe storage problems.

Common storage issues involve degraded storage, missing devices and/or volumes, absent mount points, and performance issues. They also may include storage integrity problems and/or resource exhaustion. The dmesg utility is essential for its use in uncovering the root cause of problems with SATA and SCSI drives as well as the HBA. Uncovering and fixing RAID issues also requires the use of the Multiple Device (md) utility and /proc/mdstat file.

4. Harry has modified an application to create a file in a directory and then write data to it. The program creates the file with no problems but cannot write data to it and receives a permission error. Which of the following is most likely the issue? A. Directory ownership B. File ownership C. File group membership D. Permission inheritance E. Executable privileges

D. Because the application can create the file in a particular directory with no problem but cannot write to the file, it is most likely a permission inheritance issue via default directory ACLs. Therefore, option D is the correct answer.

5. Ben updates his Ubuntu system's packages using the sudo apt-get upgrade command, and now the Apache Web service is not working properly. What command should he run? A. sudo apt-get clean B. sudo zypper clean -a C. sudo ldd /usr/sbin/apache2 D. sudo rpm -aV E. sudo apt-get check

E. The upgrade may have broken the Apache package via breaking a dependency. The sudo apt-get check command will check for such a thing. Thus, option E is the correct answer.

Summarize uncommon hardware issues.

RAM, printers, video apparatus, serial ports, USB devices, and keyboards can provide interesting problems to troubleshoot. Employing the dmidecode and lshw tools as well as the dmesg, lspci, lsusb, and lsdev commands provide assistance in uncovering the root cause. Missing or outdated modules (drivers), faulty cables, corrupt device files, and incorrect key maps, are some of the problem sources. You can save yourself some time and avoid issues in the first place if you ensure that your hardware and software are compatible prior to installing them.

Explain application dependencies.

Using the appropriate utility and checking an application's version as well as available package versions will allow you to uncover whether or not a poorly performing application's software has an upgrade available for it. Updating software packages. However, it is not without problems. A software update may not properly update a package's dependencies or libraries, resulting in a broken application. If the new update needs to be compiled, issues with the GCC can cause complications. The system's package repository can have uncovered troubles, which prevent a software update from occurring.

Summarize application permission issues.

When an application throws an error relating to either I/O or an attempt to launch another executable, it can be due to an incorrect file or directory permission. Determine what user account that application is running under as well as any files it is attempting to access and theory residing directories. With that information in hand, gather file ownership and group membership. Looking at the various permissions associated with each of the three permission classifications (owner, group, other) will begin to uncover the core problem. Include directory permissions and default ACLs as well in the investigation.


Set pelajaran terkait

Adenoma-Carcinoma sequence in Colorectal cancer.

View Set

mother baby chapter 3 practice questions

View Set

McGraw Hill Advertising Chapter 10 Smartbook

View Set

A&P Chapter 6: Bone Tissue and the Skeletal System

View Set