Linux+

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You audit your RHEL server and need to ensure proper logging of successful and failed logins are recorded. which file can you review to confirm logging is enabled A. /var/log/secure B. /var/log/auth.log C. /var/log/syslog D. /var/log/messages

A. /var/log/secure

You want to run a Linux distro that has been prepared on a USB. what setting must you configure in order to load the Linux environment (select all that apply) A. BIOS B. ISO C. UEFI D. GRUB 2

A. BIOS C. UEFI

What file provides the most up-to-date and accurate information about mounted file systems on a Linux system? A. /etc/mtab B. /proc/mounts C. /proc/partitions D. lsblk

B. /proc/mounts

You need to identify services and other units that make your Linux system slow to boot. Which command will print out the information you need to determine what is slowing down your system boot time? A. lsof -u cmason B. nice C. top D. systemd-analyze blame

D. systemd-analyze blame

You experience and error accessing a specific file system on a newly inserted hard drive in your Linux server. what may you check to determine the supported file systems on your server? A. /proc/filesystems B. /proc/devices C. iwconfig D. /etc/sysctl.conf

A. /proc/filesystems

A new Bluetooth device is installed on your lInux workstattion. The Bluetooth does not seem to work even after installing the driver package. you run lsmod to check for currently loaded kernel modules. how would you further troubleshoot the device? (select two) A. /usr/lib/modules/kernel/drivers B. /proc/sys/kernel C. modprobe D. /etc/sysctl.conf

A. /usr/lib/modules/kernel/drivers C. modprobe

You need to provide the IP address configurations automatically to other workstations in the office. You deploy a Linux server. What role or service should you enable on the server? A. DHCP B. SNMP C. Proxy D. DNS

A. DHCP

What is a feature of the Linux kernel that provides redundancy and improved performance for block storage devices? A. DM-Multipath B. Device mapping C. Redundant Array of Independent Disks (RAID) D. Logical Volume Manager (LVM)

A. DM-Multipath

What can cause the owner of a text file to be denied permission to view the contents of the text file? A. Despite being the owner, the user is not explicitly granted read access. B. The user needs both write and execute permission to modify a directory. C. The user must have write permission on the containing directory. D. The immutable flag is set on the file.

A. Despite being the owner, the user is not explicitly granted read access.

What is a distributed version control system primarily used by developers who are collaborating on projects? A. Git B. Cron jobs C. Loop D. Conditional statement

A. Git

What is a model in which access is controlled by comparing an object's security designation and a subject's (users or other entities) security clearance? A. Mandatory Access Control (MAC) B. Security-Enhanced Linux (SELinx) C. Context-based permissions D. AppArmor

A. Mandatory Access Control (MAC)

You wish to boot your Linux workstation from the network using TFTP (Trivial File Transfer Protocol). which boot option will you implement? A. PXE B. Boot from ISO C. Boot from HTTP/FTP D. Boot from NFS

A. PXE

Firewalls often provide logging features and alerts that track security problems and report them to the admin. what are the three main generations of firewalls? (select 3) A. Packet filters B. Uncomplicated Firewall (UFW) C. stateful firewalls D. application-layer firewalls

A. Packet filters C. stateful firewalls D. application-layer firewalls

What causes a user to not have access to a file, despite the owner context having full permissions? A. The user is not the owner of the file B. The directory's owning group is not the same as the user's group. C. The file's owning group is set to the same group that these users are members of. D. By default, files created by a user take on that user's group ID.

A. The user is not the owner of the file

A user is denied permission to enter a directory, despite having the read permission. what is most likely cause for the denial and what is the solution? (select 2) A. Use chmod to add execute permissions to the specific directory. B. The user needs execute permission to have access to the directory C. As root, remove the immutable flag from the directory using the chattr command. D. The executable program is not taking on permissions required to write to the specific directory.

A. Use chmod to add execute permissions to the specific directory. B. The user needs execute permission to have access to the directory

Your RHEL server has enabled the SELinux environment. a share directory currently provides access to only sysadmin_u users. what can you do to provide access to all users? A. Use the chcon command to set unconfined_u to the users context of the directory. B. use the chcon command to change the role context of the directory C. Enable AppArmor D. Set the mode to enforcing

A. Use the chcon command to set unconfined_u to the users context of the directory.

You want to set a specific file as immutable to prevent it from being modified even from the root user. what command will set this file as immutable? A. chattr +i {file name} B. setfacl -b {file name} C. chmod u+s {file name} D. lsattr {file name}

A. chattr +i {file name}

You have identifies the URL of a software package you wish to use on your Ubuntu workstation. How would you download the software? (select 2) A. curl -o nmap-7.70.tar.bz2 https://namp.org/dist.namp-7.70.tar.bz2 B. yum install curl C. wget https://website.org/latest.zip D. aapt-get install wget

A. curl -o nmap-7.70.tar.bz2 https://namp.org/dist.namp-7.70.tar.bz2 C. wget https://website.org/latest.zip

Customers contact you saying they are not able to save multiple files to a share directory. They reference an error stating there is not enough space. you log in to the server hosting the share. how would you troubleshoot this issue? A. df -h B. mdadm -F C. iostat -d 2 D. cat /etc/fstab

A. df -h

You install multiple Linux distros on a workstation. after installing a new OS and rebooting the system, the option to select that new OS in not available. how would you resolve this? A. edit the /etc/grub.d/40_custom file B. run the grub2-mkconfig command C. edit the boot loader D. Use the grub2-install command

A. edit the /etc/grub.d/40_custom file

What command can be used in a script to force the shell to terminate with whatever exit code you provide? A. exit B. exec C. source D. time

A. exit

What command parses the /proc/meminfo file for easier analysis of memory usage statistics? A. free B. sar C. uptime D. vmstat

A. free

How do you change the wallpaper of a GNOME Classic GUI (graphical user interface)? (select 2) A. from the desktop menu, select Applications, System Tools, then settings B. Right-click the desktop and select Settings C. From the system menu, click the Settings button, then the Background panel D. Right-click the desktop and select Default Desktop Settings

A. from the desktop menu, select Applications, System Tools, then Settings C. From the system menu, click the Settings button, then the Background panel

You want to edit a file located at /home/cmason/draft using a graphical window with an editor that has a small footprint. What text editor would you use? A. gVim B. Vim C. Emacs D. GNU nano

A. gVim

What method of shell is used to replace a specific wildcard pattern with values that match the pattern? A. globbing B. command substitution C. positional parameter D. shell expansion

A. globbing

To better manage the users on a Linux workstation, you create a group with a specific name and system defaults. which command will create the group, and where can you find information for the newly created group? (select 2) A. groupadd accountants B. groupadd -g 555 accountants C. /etc/group file D. /etc/profile file

A. groupadd accountants C. /etc/group file

Log files on your Linux server are taking a long time to transfer because their file sizes are too large. you are tasked to resolve the log file size issue and output the data to a MySQL service. How would you get the job done? (select 2) A. implement automatic log rotation B. use rsyslogd C. edit the /etc/syslog.conf file D. use the journalctl command

A. implement automatic log rotation B. use rsyslogd

What is it called when any control statement executes code repeatedly based on a certain condition? A. loop B. conditional statement C. control statement D. positional parameter

A. loop

You need to update the security context of a few files in a SELinux environment. what command would you run to review the current security contexts of said file? A. ls -Z B. semanage C. ps -Z D. getenforce

A. ls -Z

What command displays information about all block storage devices that are currently available on the system? A. lsblk B. blkid C. fsck D. resize2fs

A. lsblk

Using the LVM (logical volume manager) you plan to rename a volume. what command would you use to make this change? A. lvrename B. lvcreate C. pvcreate D. dump2fs

A. lvrename

What are special character that the Bash shell will, by default, interpret in a certain way? A. metacharacters B. exit code C. shell expansion D. command substitution

A. metacharacters

You wish to create a new partition and use the command fdisk /dev/sda5. what option would you use next to create a new partition? A. n B. mkpart C. partprobe D. /etc/crypttab

A. n

What command will generate a response request from the sending computer and should receive a reply from the destination computer? A. ping B. traceroute C. tracepath D. netstat

A. ping

What command is used to get the status of Security-Enhanced Linux (SELinux), including its current mode, policy type, and mount point? A. sestatus B. setenforce C. getsebool D. ls -Z

A. sestatus

You want to securely transfer all backed up data to an off-site location while managing those files and directories properly. which tool will you use to accomplish this task? A. sftp B. scp C. rsync D. tar

A. sftp

You are unable to run the apt-get command because you do not have root priveleges. what command can you run to be able to update the APT (Advanced Package Tool) database of available packages? A. sudo apt-get update B. su -root C. visudo D. Sudoedit

A. sudo apt-get update

You wish to verify the version of a linux kernel currently running on your system and the time the kernel was compiled. How would you find this information (select 2) A. uname -r B. cat /proc/version C. dmesg D. cat /proc/modules

A. uname -r B. cat /proc/version

Going through the process of creating a new user, which commands will make this task successful? (select 2) A. useradd B. passwd C. /etc/passwd D. /etc/logins.def

A. useradd B. passwd

You are tasked to setup a firewall server to accept or deny network communication based on ports. you need to examine several servers in the internal network to determine which ports they require to provide network services to company users. which file can list services and their associated port numbers? A. /etc/default/ufw B. /etc/services C. /etc/sysctl.conf D. /etc/rsyslog.conf

B. /etc/services

You regularly use a USD (universal serial bus) device to load file and executable to a Linux server. You want to use the same name to reference the USB every time it is plugged in. How would you accomplish this? A. run the udevadm control command at a terminal B. Define a rule to create a symbolic link to the specific USB device and add it to the /etc/udev/rules.d/ directory. C. Run the lp -r command at a terminal D. Run the udevadm info -a {usb name} command at a terminal

B. Define a rule to create a symbolic link to the specific USB device and add it to the /etc/udev/rules.d/ directory.

There are many types of storage devices that are supported by the Linux operating system. which storage device is an electromechanical device that uses magnetic storage technology to store data, usually in large amounts? A. Sold-state drive (SSD) B. Hard disk drive (HDD) C. USB thumb drive D. External storage drive

B. Hard disk drive (HDD)

A user has exceeded the allocated storage space and can no longer save data to the home directory. How can you allow this user to save more files to the home directory? A. Activate user and/or group quotas on the file system. B. Increase the user's storage quota soft limit and hard limit C. Update the storage devices I/O scheduler to noop. D. Create quota reports.

B. Increase the user's storage quota soft limit and hard limit

Which of the following describes the principal of confidentiality in the CIA triad? A. it is typically controlled through hashing, digital signatures, certificates, and change control B. Keeping information and communication private and protected from unauthorized access C. Ensuring computer systems operate continuously and that authorized persons can access the data that they need D. It is a scheme that verifies a user's identity based on their physical characteristic's.

B. Keeping information and communication private and protected from unauthorized access

Environment variables can be used to configure localization options, typically by editing the /etc/local.conf file and assigning the appropriate locale to the variable. what environment variable specifies the locale to use for all LC_* variables that aren't explicitly defined? A. LC_*={locale} B. LANG={locale} C. LC_ALL={locale} D. TZ={time zone}

B. LANG={locale}

How would you typically manage DHCP (dynamic host configuration protocol) client configurations on a Linux workstation? A. /etc/dhcp/dhclient.conf B. NetworkManager C. /etc/nsswitch.conf D. nmcli con down eth0

B. NetworkManager

You immediately run a script to gather information from multiple servers and output a report to a central share directory. You do not want to wait for the job to finish. What can you do to initiate the job without staying around in the office? A. Use the renice command to alter the priority of the running process B. Place the nohup command in front of the normal command C. Place the & (ampersand) command in front of the normal command D. Run the ps command to print information on all running processes

B. Place the nohup command in front of the normal command

What is a collection of values that enables you to store multiple values in a single variable? A. function B. array C. escape character D. string literal

B. array

What can you protect with a password to prevent unauthorized booting of a system? A. BIOS B. bootloader C. /etc/fstab D. /etc/inittab

B. bootloader

To improve the boot up time of your Linux workstation, you decide to disable certain services during startup. Which command will help you achieve this? A. telinit B. chkconfig C. runlevel D. lsof

B. chkconfig

There are many different types of operators that apply to most languages. what is the operator that includes checking if operands are equal, if one operand is less than or greater than another operand, and more? A. arithmetic operators B. comparison operators C. logical operators D. string operators

B. comparison operators

As an admin, you regularly run reporting scripts from a bash shell. Each script shares common variables such as the location of a temp folder: TESTFOLDER=/temporary/scripts/test. Make the testfolder directory an environment variable so it may be available for all scripts that run from your bash shell A. export TESTFOLDER B. export TESTFOLDER=/temporary/scripts/test C. env TESTFOLDER=/temporary/scripts/test D. echo 'TESTFOLDER=/temporary/scripts/test'

B. export TESTFOLDER=/temporary/scripts/test

You deploy a new RHEL server and begin configuring the server as a firewall using the iptables tool. after rebooting the server, the rules set are gone. what can you do to keep the rules from being removed after a reboot? A. activate a security firewall table B. install the iptables-services package C. install the iptables-persistent package D. use the UFW tool

B. install the iptables-services package

What orchestration tool is an open source solution that provides container deployment and application orchestration for cloud and on-premises container environments? A. ansible B. kubernetes C. Puppet D. OpenStack

B. kubernetes

You want to check the permissions of several directories and remove the ability to write to them, if necessary. Which commands will help you accomplish this? (select 2) A. ls -l B. ls -ld C. chmod u-w, g-w, o-w {file or directory name} D. chmod u+r, g+r, o+r {file or directory name}

B. ls -ld C. chmod u-w, g-w, o-w {file or directory name}

When mounting a new file system in Linux, what is the next step after assuming superuser privileges? A. cat /etc/fstab B. mkdir /temporary C. cat /proc/mounts D. mdadm

B. mkdir /temporary

Your Linux server has gone offline. You reboot the server and it seems it is not connecting to the network. How would you troubleshoot the system to re-establish network connectivity? (select 2) A. iwconfig B. nmcli device status C. ip link set eth0 up D. nslookup

B. nmcli device status C. ip link set eth0 up

A new user called amoon was created on a Linux workstation for a new admin named Alex Moon. The administrator is unable to use it. How will you resolve this? A. vi /etc/passwd B. passwd amoon C. usermod -c "Alex Moon" amoon D. passwd -l amoon

B. passwd amoon

What command is used to verify that all components of a package are installed? A. rpm -qR {package name} B. rpm -V {package name} C. apt-cache depends {package name} D. ldd [options] {package name}

B. rpm -V {package name}

What is the mechanism by which Bash, or any other shell, maintains settings and other behavioral details about the shell? A. shell spawning B. shell environment C. script D. variables

B. shell environment

Configure the system time to 4:00 PM, eastern standard time (select 2) A. hwclock -u B. timedatectl set-timezone America/New_York C. timedatectl set-time 2019-01-25 16:00:00 D. timedatectl set-time 2019-25-01 16:00:00

B. timedatectl set-timezone America/New_York C. timedatectl set-time 2019-01-25 16:00:00

What refers to entities whose values change from time to time? A. script B. variable C. shell environment D. shell spawning

B. variable

You are unsure which user account you have used to login to your current session on a linux server. which command can you run to display your current user name? A. who B. whoami C. who -i D. w

B. whoami

You need to check the files belonging to user01 on the Linux workstation. From the root, which folder should you navigate to? A. /media B. /usr C. /home D. /usr/lib

C. /home

Your organization deploys linux instances to client desktops using the Preboot Execution Environment (PXE). you are asked to research other ways to deploy your Linux images. what options would you try? (select 2) A. boot from ISO B. Use TFTP C. Boot from HTTP/FTP D. Boot from NFS

C. Boot from HTTP/FTP D. Boot from NFS

You run a CentOS OS on your workstation. you plan to install software by using the least amount of resources, and would like all dependencies to be automatically installed. which package manager do you use? A. RPM B. YUM C. DNF D. APT

C. DNF

Administrators can face a variety of issues with local storage devices. What do you call the state of a system, when a storage drive in a RAID (Redundant Array of Independent Disks) fails? A. Resource Exhaustion B. Performance issues C. Degraded storage D. Storage integrity / bad blocks

C. Degraded storage

What public key infrastrtcure (PKI) component is a message digest that has been encrypted with a user's private key? A. Digital certificate B. Certificate Authority (CA) C. Digital signature D. Certificate Signing Request (CSR)

C. Digital signature

You enable AppArmor on your Debian-based Linux distro. You want to log security violations but not prevent any actions. What would you configure to set the environment appropriately? A. place the profile in enforce mode B. run the setenforce 1 command C. Place the profile in complain mode D. run the restorecon {directory name} command

C. Place the profile in complain mode

The swap file and boot partition of a linux distribution are normally created in what type of partition? A. Extended B. NTFS C. Primary D. Logical

C. Primary

Your team plans to deploy a VM on a Linux virtual host and are considering some network configuration options. this VM will be used and managed by the in-house web developers. what network configuration should you set up for this VM? A. IaaS B. Internal C. Public D. Hybrid

C. Public

Knowing a process's state can help you determine what to do with that process or help you diagnose problems concerning that process. What is the process called that is currently executing in user space or kernel space? A. Uninterruptible sleep B. Interruptible sleep C. Running D. Zombie

C. Running

Schedule a task to run at 4 pm today, Wednesday. Which command will you use to accomplish this? A. atrm 4 B at now + 4 hours C. at teatime D. * 16 * * 2 /usr/local/bin/task.sh

C. at teatime

What is a variable that is inherited from parent shell processes and is subsequently passed on to any child processes? A. variable B. shell variable C. environment variable D. script

C. environment variable

You need to find information on your server that is referenced in a local database. which search command will help you to find what you need? A. find B. updatedb C. locate D. which

C. locate

Kenerl module management commands enable you to view, load, unload, or modify kernel modules. what command is used to display the currently loaded kernel modules, their sizes, usage details, and their dependent modules? A. modinfo B. insmod C. lsmod D. rmmod

C. lsmod

You are assisting another admin at a remote branch office. an application loaded onto a USB needs to be installed on the remote server. You connect to the server remotely via SSH and need to verify if USB has been inserted. Which command will help you confirm the USB is available to access? A. lspci B. lpq C. lsusb D. lsblk

C. lsusb

When going through the process of compiling and installing an application, how do you install the compiled binaries onto the system? A. ./configure B. tar C. make D. make install

C. make

Your Linux workstation is experiencing network issues. what network utilities will you use to troubleshoot the problem? (choose 2) A. MAC address B. NTP C. ping D. traceroute

C. ping D. traceroute

Which subcommand that you can use with the git command, is used to acquire and merge changes made to other repositories and branches into the local working copy? A. config B. push C. pull D. branch

C. pull

You have a large organization with branches in multiple cities across North America. Branches with the slowest connection keep a local software repository for their RHEL servers and CentOS clients for quicker retrieval. How would you manage version control across the whole organization? A. createrepo B. apt update C. reposync D. baseurl=http://repo.company.com

C. reposync

Which command would you use to update files that have already been archived? A. cpio B. mirrorvg C. tar D. rsync

C. tar

You want to install software on RHEL without worrying about the dependencies for that software. Which command will install the software? A. rpm -I {package name} B. rpm -U {package name} C. yum install {package name} D. apt install {package name}

C. yum install {package name}

Your linux server shows a failed disk in a RAID 6 array configuration. what type of symptom will your server experience A. Missing mount points B. Missing volumes C. Resource exhaustion D. Degraded storage

D. Degraded storage

Your organization has several remote access servers, and would like to configure them for authentication, authorization, and accounting services. which authentication method will provide such a service that is scalable and the most secure? A. RADIUS B. LDAP C. Kerberos D. TACAS+

D. TACAS+

Which file can you configure to customize your own use of aliases? A. /etc/bashrc B. .bash_profile C. /etc/profile D. .bashrc

D. bashrc

An employee in the accounting department who managed a specific directory on a linux file server has left the company. another user called amoon or Alice Moon must take over the directory. which command will effectively change the directory's ownership? A. chgrp accountants {directory name} B. ls -ld {directory name} C. chmod g+s {directory name} D. chown amoon {directory name}

D. chown amoon {directory name}

Which of the following commands is an often unreliable way of querying the system for attached hardware components? A. lshw B. vmstat C. free D. dmidecode

D. dmidecode

What enables the automation of multiple related tasks also known as workflows? A. infrastructure automation B. build automation C. infrastructure as code D. orchestration

D. orchestration

You create a temporary lockout policy for users who have multiple failed login attempts. a user bas been locked out after attempting to login 3 times over a screen saver. the user remembers the password. what can you do to allow the user to try and login again? A. add the line 'account required pam_tally2.so' to the account section of the /etc/pam.d/password-auth configuration file. B. remove the 'unlock time' parameter from the /etc/pam.d/password-auth configuration file. C. run the pam_tally2 --user {username} --reset command D. run the faillock --{username} --reset command

D. run the faillock --{username} --reset command


Set pelajaran terkait

Motivation and Emotion Final Review

View Set

Growth and Development: OB & PEDS

View Set