linux studyin

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Fred suspects that one of the servers he manages is experiencing a memory leak. Which of the following is the best tool for Fred to use to confirm this issue? a. htop b. lsmem c. lscpu d. free

htop

You wish to obtain a list of quotas for users of the /home filesystem to verify that users are within their soft and hard limits. Which command should you use? a. repquota b. quota c. cat /proc/quotas d. edquota -l

repquota

Bob wants to configure a full backup to run once per week on each UNIX and Linux system on his network. He wishes to use the same tool on each system to perform the backup. What tool is Bob likely to choose to perform backups?

tar

Theo has created a virtual machine with a virtual disk configured to only use a minimal amount of hard disk space. The computer has a one terabyte drive, and even though he has created an 800 GB virtual disk, the host operating system is still showing 600 GB free space. Which of the following technologies is Theo's system using? a. JSON b. YAML c. thin provisioning d. thick provisioning

thin provisioning

Which of the following attributes can be given to a file using the chattr command in order to prevent the file from being modified in any way (even by the root user)? a. append only b. extent c. read-only d. immutable

ummutable

Which of the following file extensions might be used as part of a shell script filename? a. .exe b. .ps c. .so d. .sh

.sh

Sawyer needs to ensure that a configuration file for a new application shows up in new user directories as new users are added to the system. Where should Sawyer place a copy of this file to ensure that it shows up in the new user home directories? a. /etc/profile b. /etc/skel c. /etc/useradd d. /etc/profile.d

/etc/skel

Which of the following settings for umask would ensure that the user and group permissions are not affected while the other does not have read, write, or execute? a. 770 b. 007 c. 777 d. 077

007

Sam has installed Linux Mint onto his laptop along with a new desktop environment based on GNOME 3. What is the most likely desktop environment that he is using? a. XFCE b. Cinnamon c. MATE d. KDE

Cinnamon

Which service is used to automatically assign IP addresses to hosts when they join a network? a. FTP b. DHCP c. DNS d. NTP

DHCP

Which of the following locale environment variables overrides all of the others when it is set? a. LC_OVERRIDE b. LC_LANG c. LC_ALL d. LC_LOCALE

LC_ALL

Jerry manages a number of Linux servers that reside in different branch offices for his company. He needs a secure way to perform maintenance, check on the status of backups, and start and stop services without traveling to those offices. Which of the following is Jerry most likely to use? a. SSH b. Telnet c. HTTPS d. NTP

SSH

Which of the following can be used within a Kubernetes cluster to allow microservices to communicate to each other in a secure way? a. Ingress controller b. Ambassador container c. Service mesh d. Load balancer

Service Mesh

Which of the following technologies is a platform independent protocol that can be used to graphically connect to a Linux computer? a. RDP b. Telnet c. VNC d. SSH

VNC

Which of the following are valid servers for the graphical component of the Linux operating system? (Choose two.) a. Wayland b. X11 c. GNOME d. KDE

Wayland X11

Hanna needs to find any error messages that have been generated by the kernel. Where would she look for that information? a. /var/log/kern.log b. /var/log/secure c. /var/log/messages d. /var/log/lastlog

a. /var/log/kern.log

Tabitha has been asked to install a container within her company's Kubernetes cluster that will provide for monitoring capabilities. What type of container is Tabitha most likely to install? a. Sidecar container b. Ambassador container c. Ingress controller container d. Load balancing container

a. Sidecar container

Using the output below, determine which of the following is true: drwxr-xr-x 4 jsmith finance 128 Feb 21 2023 ProjectX a. The permissions could have been set using the command - chmod 755 ProjectX. b. The listing is for a file named ProjectX. c. The file has the delete flag set and will be deleted when the recycle bin is emptied. d. The command - chown finance:jsmith ProjectX - could have been used to set ownership of this file.

a. The permissions could have been set using the command - chmod 755 ProjectX.

Karen wants to see which partitions are currently mounted on a Linux workstation. Which of the following commands could she use to see this information? a. cat /proc/mounts b. cat /proc/filesystems c. cat /etc/fstab d. cat /etc/mounts

a. cat /proc/mounts

Kaylee is managing a system that uses SysV system initialization. She wants to make sure that iptables starts when the system is booted. Which of the following should Kaylee run? a. chkconfig --add iptables b. chkconfig +iptables c. service iptables start d. chkconfig-new -service=iptables -startup=1

a. chkconfig --add iptables

Which of the following commands can be used to see a list of the currently mounted filesystems? (Choose all that apply.) a. df b. du c. mount d. cat /etc/mtab

a. df c. mount d. cat /etc/mtab

Paige is working on a Linux workstation and has just rebooted after configuring GRUB2. However, the system halts with a kernel panic. She reboots the workstation using a live Linux rescue disc. After correcting the GRUB2 configuration options, what command does she need to run to rebuild the grub.cfg file? a. grub2-mkconfig b. grub2 --mkconfig c. mkgrub2 d. grub2-rebuild

a. grub2-mkconfig

Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run? a. iptables -F b. netfilter --reset c. firewall-rule --clear-all d. firewall --reset --reconfigure

a. iptables -F

Which of the following commands can be used to format a disk partition as ext4? (Choose all that apply.) a. mke2fs b. mkfs c. tune2fs d. fsck

a. mke2fs b. mkfs

Kane has just made changes to the /etc/default/grub file on a Linux server running GRUB2. What is the next step that Kane needs to perform? a. run grub2-mkconfig b. run grub2-install c. copy the /etc/default/grub file to the /boot directory d. copy the /etc/default/grub file to /boot/grub/grub.conf

a. run grub2-mkconfig

Which of the following commands can be used to view the ports to which a system is listening? (Choose all that apply.) a. ss b. netstat c. trace d. pstrace

a. ss b. netstat

Natalie wants to use an existing server to deploy a new virtual machine. The new virtual machine will initially only need 20 GB of disk space but is expected to grow at a rate of 5 GB per month. She wants to set the size for the virtual hard drive to 512 GB. However, the server that she intends to use has a 2 TB hard drive with only 100 GB of free disk space. What can Natalie use to accomplish this task? a. thin provisioning b. thick provisioning c. VHD defragmentation d. hard disk degaussing

a. thin provisioning

Ciara has created a shell script that works just fine in the shell where she developed it. However, when she tries to execute it in a subshell some of the environment variables don't seem to be correct. How can she resolve this issue? a. use the export command to make them available to subshells b. log out and log back in again to make them available at a profile level c. use the set command to recreate the environment variables within the subshell d. reboot the Linux workstation that she is using

a. use the export command to make them available to subshells

Which of the following commands can be used to show the list of jobs scheduled with the at daemon? a. atl b. atlist c. at --show d. atq

atq

Which of the following might you expect to see as the first line of a bash shell script? a. # CreatedBy: John Doe b. #!/bin/bash c. !#/var/bash d. #!/etc/bash

b. #!/bin/bash

Which of the following options can be used with the dpkg command to remove a specified package from a system, including any configuration files used by the package? a. -p b. -P c. -r d. -R

b. -P

What option to the ps command will show the SELinux context? a. -X b. -Z c. -b d. -s

b. -Z

When the useradd command is used to add a user to a Linux system, which two files are used that contain configuration information such as default location for email, password expiration information, minimum password length, and so on? a. /etc/useradd.conf b. /etc/login.defs c. /etc/default/useradd d. /etc/default/logins.conf

b. /etc/login.defs c. /etc/default/useradd

Which of the following would be a valid entry for the cron daemon to execute a script named myscript in the root user's directory at 5 am on the first day of every month? a. 5 0 1 * * /root/myscript b. 0 5 1 * * /root/myscript c. * * 1 * 5 /root/myscript d. * * 1 5 * /root/myscript

b. 0 5 1 * * /root/myscript

Which of the following is the output of the fdisk command when no options are specified? a. A list of existing partitions that the Linux system knows about. b. A usage screen showing the options available to be used with the fdisk command. c. A prompt to choose a hard drive to work with. d. An error message, as fdisk is a Windows command. The comparable Linux command is cfdisk

b. A usage screen showing the options available to be used with the fdisk command.

Henry manages the DevOps team at his company. He hears a lot of terms used to describe the day-to-day job functions of his team. Some of those functions include things like build automation and infrastructure automation. These could be considered part of which terminology? a. Iaas b. IaC c. PaaS d. XML

b. IaC

Which of the following character sets allow you to implement the Unicode standard? a. ASCII b. UTF-8 c. ISO-8859 d. Latin1

b. UTF-8

Git creates a snapshot of each version of your files. What are these snapshots referred to? a. clones b. commits c. repositories d. branches

b. commits

Jack needs to be able to determine which modules are currently loaded on a Linux server. Which of the following commands could he use to gather this information? a. insmod b. lsmod c. showmod d. show modules

b. lsmod

Leonard wants to obtain a new version of a container image from a container registry. What option to the docker command can he run? a. build b. pull c. images d. get

b. pull

Jake needs to find out which RPM package a file named bluefish belongs to. Which of the following commands could he use to find his answer? a. rpm -qi bluefish b. rpm -qf bluefish c. rpm -qF bluefish d. rpm -if bluefish

b. rpm -qf bluefish

You are investigating a DHCP issue on your company's network and decide to analyze the packets that are being sent and received on a Linux workstation. Which of the following could you use to see the contents of the packets arriving at the workstation? (Choose two.) a. netstat -a b. tcpdump c. Wireshark d. nbtstat

b. tcpdump c. Wireshark

Craig has just run the ssh-keygen command on his workstation. What is the default path and filename for the new private key that was generated? a. ~/.ssh/id_rsa.pvt b. ~/.ssh/id_rsa c. ~/.ssh/id_rsa.pub d. ~/.ssh/id_rsa_private

b. ~/.ssh/id_rsa

Carter is worried about limited disk space on the drive where /var exists. He wants to ensure that every week a new log file is created and that any log files older than 4 weeks are deleted. Where would Carter configure these options? a. /var/logrotate.conf b. /var/log/rotate.conf c. /etc/logrotate.conf d. /etc/log/rotate.conf

c. /etc/logrotate.conf

Linux stores a history of all login sessions in a log file that must be viewed using the who or last command. Which of the following files do these commands use to view this information? a. /var/log/wlogins b. /tmp/wlogins c. /var/log/wtmp d. /var/log/secure

c. /var/log/wtmp

Which of the following commands will list all users except for the root account? (Choose all that apply.) a. grep -v root /etc/passwd b. grep -x root/etc/passwd c. cat /etc/passwd | grep -v root d. cat /etc/passwd | grep -x root

c. cat /etc/passwd | grep -v root a. grep -v root /etc/passwd

Hanna wants to schedule a job to run every Monday morning at 9 am. Which of the following commands can she use to create the schedule? a. cronjob -e b. cron --edit c. crontab -e d. cron -e

c. crontab -e

Which of the following commands can be used to make a block by block copy of one drive to another without regard for filenames? a. cp b. cpio c. dd d. copy

c. dd

Which of the following commands will execute a container image continuously, and map port 8080 on the host to port 333 inside the container? a. docker exec -p 8080:333 image1 b. docker exec -p 333:8080 image1 c. docker run -d -p 8080:333 image1 d. docker run -d -p 333:8080 image1

c. docker run -d -p 8080:333 image1

John needs to remove the subdirectory named temp2 as well as all of the files that it contains. Which of the following commands could John use to accomplish this task in one step? a. rmdir -r temp2 b. rmdir temp2 c. rm -r temp2 d. del temp2

c. rm -r temp2

A junior system administrator comes to ask for your assistance. He was given instructions to activate the third partition on the second hard drive to use as virtual memory. It has already been formatted and initialized as swap. Which command could you suggest that the junior system administrator use? a. mkswap /dev/sdb3 b. mkswap /dev/sdc2 c. swapon /dev/sdb3 d. swapon /dev/sdc2

c. swapon /dev/sdb3

Keri is getting frustrated that her workstation wants to do a filesystem check upon boot on a frequent basis. Which of the following could she use to change how frequently the system forces a filesystem check to be run? a. e2fsck b. fsck c. tune2fs d. tunefs

c. tune2fs

When using AppArmor, the restrictions for each program are stored within text files named for the program under which directory? a. /etc/sysctl/ b. /etc/security.d/ c. /etc/security/ d. /etc/apparmor.d/

d. /etc/apparmor.d/

Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify? a. /root/.profile b. /root/.bashrc c. /etc/profile d. /etc/bashrc

d. /etc/bashrc

Bradley wants to quickly map a hostname to an IP address of an internal server that he wants to access by name but that has no DNS entries. Which of the following files could he modify to enable accessing the server by name from his workstation? a. /etc/sysconfig/network b. /etc/resolv.conf c. /etc/nsswitch.conf d. /etc/hosts

d. /etc/hosts

What is the path and filename where Linux stores the configured network services and their associated ports for a system? a. /var/services.conf b. /etc/rc.d/services.conf c. /etc/ports d. /etc/services

d. /etc/services

Jan is a DevOps Engineer that is in charge of setting up a new Configuration Management software. The software they've been using required a piece of software to be installed on the virtual machines and containers in their environment, whereas the new Configuration Management software he's in charge of deploying does not. What kind of CM is Jan deploying? a. Kickstart b. log shipping c. agent based d. agentless

d. agentless

Which of the following commands will create a new file containing a list of users along with their login shell? a. cat /etc/passwd | columnize -c:1,7 > usershells b. chop -d: -f1,7 /etc/passwd > usershells c. cat /etc/passwd | grep users,shells > usershells d. cut -d: -f1,7 /etc/passwd > usershells

d. cut -d: -f1,7 /etc/passwd > usershells

David is running a newer version of Fedora Linux but found an article on a security website about a recently discovered vulnerability in the version of Z shell that is running on his machine. He wants to update to the newer version of Z shell from an online repository while removing any older versions during the process. Which of the following commands would he run to perform this action? (Choose all that apply.)

d. dnf upgrade zsh

Mary has been locked out of her account after failing to correctly enter her password three times. As the system administrator, you need to unlock her account. Which of the following commands would unlock Mary's account assuming that you are using pam_faillock.so module? a. faillock --unlock --user mary b. pam_faillock --unlock --user mary c. pam_faillock --reset --user mary d. faillock --reset --user mary

d. faillock --reset --user mary

Which of the following commands could be used to access data on a CD? a. umount /media/cdrom /dev/cdrom -t iso9660 b. mount /media/cdrom /dev/cdrom -t iso9660 c. umount -r -t iso9660 /dev/cdrom /media/cdrom d. mount -r -t iso9660 /dev/cdrom /media/cdrom

d. mount -r -t iso9660 /dev/cdrom /media/cdrom

Which of the following commands could be used to turn off quotas? a. edquota --off b. quotas --disable c. edquota --disable d. quotaoff

d. quotaoff

Joe is having issues connecting to a particular server by FQDN but can successfully ping the server's IP address. Which of the following tools should he use next to troubleshoot the issue? a. mtr b. getent c. dig d. traceroute

dig

Which of the following commands can be used to view the hardware detected by the Linux kernel during bootup? a. lsdev b. lshw c. dmesg d. lspci

dmesg

Which of the following commands will display a list of the exported variables in the shell? a. env b. echo $LIST c. set d. print $LIST

env

Which of the following loops processes a list of values? a. while b. for c. case d. until

for

Gary is using git for a software development project. He wants to download the updated copy of the main branch from the original repo. Which of the following commands can be used to do this? a. git pull origin main b. git download origin main c. git-update origin main d. git origin main

git pull origin main

Patrice has just set up a new Linux server. She has already configured a full backup to run every Sunday morning. She wants to create an additional backup every day to ensure that less data would be lost in the event of a mid-week failure. She wants to use the least amount of disk space possible for these additional backups. Which of the following should she configure? a. incremental b. differential c. snapshot d. full

incremental

Catherine wants to connect her laptop running Linux to a wireless network. Which of the following utilities can she use to make that connection? a. ifconfig b. iwconfig c. wifi-connect d. ifcfg

iwconfig

Ezra wants to see if there have been any failed logins recently on one of the Linux web servers by someone attempting to gain unauthorized access. Which of the following commands can he use to see this information? a. last b. lastb c. last --failed d. failuser

lastb

Sheila needs to see a list of pending print jobs on a system. Which of the following commands can she use to display those jobs? a. lpq b. lpc c. lpr d. lprm

lpq

Which of the following utilities can be used to create and manage a software RAID configuration after installation? a. mdconf b. raidconf c. mdadm d. raidadm

mdadm

Which command can be used to view detailed information about a specific kernel module? a. modprobe b. insmod c. lsmod d. modinfo

modinfo

Spencer needs to run a manual backup process that may take a few hours to run just before she leaves for the day. Which of the following commands can she preface the backup process command with to ensure the process continues running after she logs out? a. bg b. nohup c. continue d. run

nohup

Simon is writing a shell script and wants to display the status of the script as commands execute. Which of the following commands would display messages out to the screen? (Choose two.) a. export b. echo c. lprint d. printf

printf echo

Zachary is analyzing running processes using the top utility. Without exiting the top utility, he wants to change the nice priority level of a process. What key can Zachary use to change the nice level? a. c b. n c. p d. r

r

Which of the following commands can be used to reboot a Linux system? (Choose all that apply.) a. reboot b. init 0 c. telinit 6 d. init 6 e. telinit 0

reboot telinit 6 init 6

Check My Work Which of the following processes could cause a Linux system to have a high load average over the last 15 minutes? a. zombie b. memory leak c. runaway d. OOM

runaway

Which of the following commands displays the previous and current runlevels on a Linux system? a. runlevel b. runlevels c. init d. telinit

runlevel

What command could be used to give a user permissions on a file that they do not own without also giving access to everyone else in any of the groups that the user is part of? a. chmod b. setfacl c. acl-set d. permit

setfacl

Kenneth wants to install a network service as a sandboxed application. Which of the following commands can he use? a. yum b. snap c. flatimage d. dpkg

snap

Carlos manages a Linux system that users can SSH into in order to perform certain tasks. However, he has just installed a critical patch and wants to reboot the server to ensure that it has fully taken effect. Which of the following commands should he use to ensure that a reboot will not interrupt any logged in users? a. whoami b. wall c. id d. uname -a

wall

Emily wants to download a file from a web server but doesn't have a GUI installed. Which of the following tools could she use to download a file using the command line from the web server? (Choose two.) a. httpget b. curl c. gcc d. wget

wget curl

COME BACK HERE

COME BAAAAACK


Set pelajaran terkait

HLTH405-S5A-202120 Nutrition for Fitness & Sports ~ Module 1-4

View Set

APUSH CHAP 9 + 10 AP CLASSROOM ANSWERS

View Set

Adult Health 1 NCLEX Respiratory

View Set

PAAE Quiz, PsyAAE: Quiz 2, PsyAA Quiz 1

View Set

American Civics and Government - Workbooks

View Set

Breeds, Markings, and History of Horse

View Set