Practice Test B 100 Question

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are concerned that a particular host is getting or keeping in a cache the incorrect MAC (Media Access Controller) addresses for other hosts. On the suspect hose what command will show you the list of known MAC addresses? arp ifconfig ip lsmap

arp reason: Show a list of known MAC addresses on the suspect host.

What command uses the formatted string shown below? %a %b %d %H :%M:%S %Y ascii-time tzset cal data

ascii-time

In your orchestrated environment, you have set up certain tasks to be performed without any human intervention, such as instigating a procedure based on hosts reaching a particular level of CPU and network activity. This is commonly known as infrastructure _________. mechanization robotification automation management

automation

When using git for version control if you make a copy of a repository and store it on your local system complete with its metadata it can be said you have made a ___ of the project. clone directory copy mirror

clone

When scheduling jobs on a linux system which of the following allows for the most options for scheduling task to run at varying intervals and times? at cron time schedule

cron

When backing up your system you execute the backup utility with a set of options that produces a backup file that contains all the files changed since the last full backup performed. Which of the following best defines this command's results? mirror tower of hanoi differential full

differential reason: Backup makes a copy of all data that has changed since the last full backup and takes less time then a full backup but potentially more time than an incremental backup.

You need to know what the MX servers are for a remote domain. Which of the following commands will allow you to display that information most directly? ping6 dig ss netstat

dig reason: Display individual host records for a domain which you can use to find the MX mail host for the domain

One of your servers reboots unexpectedly and during the boot cycle a number of error messages are shown but you cant's write them all down fast enough. Which command would show you the messages that have been logged in the last boot cycles? systemctl mount dmesg fsck

dmesg

When on a support call with a Linux vendor regarding a system you are asked to provide a text report of the system's current system management BIOS (SMBIOS) from the /sys directory. Which of the following commands most directly would provide an output that can be sent to a file and given to the vendor for troubleshooting? vpddecode aa-decode biosdecode dmidecode

dmidecode reason: Command pulls its information by default from the sysfs filesystem and specifically from tables in the /sys directory and it reads the system DMI (Desktop Management Interface) table to display hardware and BIOS information of the server.

You have used a command to generate a special file that will be used to boot your system from a disk array that requires a driver to access. The file contains an initial root filesystem that is used to boot the system and allow it to access the needed drivers from the disk array. Which of the following commands will create the special file needed to boot this system? dmesg debugfs dracut blkid

dracut

Your system's disk space is getting misused by a number of users and so you have instituted disk quotas. Which of the following commands should you use to set and then edit your user's disk quota allowances? edquota setquota lsquota userquota

edquota reason: Used to edit the quotas for a user or group

When you execute a new script you've written one of the environment variables you created in your current shell for use in that script doesn't appear to be present. Which of the following commands would help you to fix this issue? export chown find script

export reason: By default all user-defined variables are local and they are not exported to new processes

When starting to work on some files for a project you want to see what branches exist both locally and remotely so you would issue the command ___. git checkout git branch -a git diff branches git push -u origin [branch name]

git branch -a reason: branch -a command query and display all local and remote branches of the current project.

Which git command would you use to retrieve file from the remote repository and store them in the working directory for the project? git pull git commit git add git merge

git pull reason: retrieve file from the remote repository and store them in the working directory for the project and used to fetch and download content from a remote repository and immediately update the local repository to match that content.

Which of the following commands allows you to sync the Linux system time with the hardware clock on the system or vice versa? date hwclock time timedatectl

hwclock

While setting up another large website on an older but still serviceable Linux server you encounter errors when trying to copy files to the filesystem. This could be a result of ____. inode exhaustion hidden attribute access control system fatigue

inode exhaustion

Your system seems to be accessing disk a lot but you are not using much swap memory. Which tool will give you accurate information about your storage input and output statistics? storstat mpstat iostat lsstat

iostat reason display l/O wait which is a performance statistic showing the amount of time a processor must wait on disk I/O

On your newly-installed system-based server you want to view log files that pertain to the systems botting and any error messages. Which command would you use on this system to view the desired information? log-viewer systemctl is-enabled journalctl runlevel

journalctl

You are constructing a set of definitions of your cloud-based infrastructure and have placed those definitions in files in github. What is the process of using machine-readable definition files to construct a computing environment such as you are doing commonly known as? IoT Git laC last

lac reason: Infrastructure as code (IoC) process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.

You need to see the device structure of a disk that you are about to partition. After partitioning you run a command, which displays the following output at the command prompt: NAME MAJ:MIN RM SIZE RO TYPE MOUNTPINT sda 8:0 0 20G 0 disk |-sda1 8:1 0 8M 0 part |-sda2 8:2 0 12.6G 0 part /usr/local |-sda3 8:3 0 5.4G 0 part sr0 11:0 1 6.7G 0 rom Which of the following commands will you run to get the above output? lsblk fdisk blkid mkpart

lsblk reason:

You run a command and below output is the result. What is the most likely command to produce the output? Class type subclass description logical_volume vgtype vgsubclass Volume group lvm lvdd lvm LVM Device Driver lsblk lsdev lsusb lscpu

lsdev reason: Display information about the hardware devices installed on the linux system

A remote sysadmin reports a secure system is not functioning properly, including it's networking capability. Unable to remotely login, you ask the sysadmin to run a report on the system that includes details about the system configuration, including Memory, Motherboard, CPU, Cache, Bus, and other details. What command will the remote sysadmin run to get these required details and send them to you? lshw vpcreaport sysemdls vpc

lshw reason: list hardware (lshw) used to generate the detailed information of the system's hardware configuration from various file in the /proc directory.

When finished with further development of two branches of the original code base you wish to bring both code segments into a coherent single branch again. Which command should you use to do this? splice connect merge clone

merge reason: It takes the branches of a project and merges them back into a single whole branch.

Your server boots from a specialized disk array and the instructions require you to use the ______ command to create a RAM disk that contains a driver. mkinitrd mkdir sudo ping

mkinitrd

Which utility when run with a search term will return back only the Process ID (PID) of the process so you can use it as the standard input to a command such as kill? lgreap kgrep pgrep mgrep

pgrep

When writing an orchestration plan you gather together all the steos needed to accomplish the result and this is commonly called a ___. enactment plan project procedure

procedure

You have been using ssh and other related utilities to remotely connect to a server for administration purposes and are tired of typing in a password. Which of the following utilities will allow you to generate files that would make it possible to sign in to this system without entering a password each time you connect? Choose the best answer ssh-known-hosts ssh-agent-passwd ssh-keygen ss-add

ssh-keygen

Which command will show you a frequently-update listing of the processes on your system that can be sorted to find given process and allow you to adjust the priority of that process as well as kill it if needed all in the same interface? pstree lsof grep top

top

You want to keep an eye on your system's most active processes but don't want to continue to run the pas command over and over. Which of the following will best accomplish this? free chown top pstree

top reason: Can view a real-time display of applications theirs system state and the resources they consume.

Which of the following commands could you use to change the individual characters of a stream to other characters? Choose the most direct and simpler option. tar tr sed wc

tr reason: used to change the individual characters of a stream to other characters

A user on a secure system is reporting that an application they have run has given an indication that the number of files open has exceeded the number allowed. What command should you have the user to determine the number of allowed open files? ulimit openfiles reportmax umask

ulimit

You have a comprehensive and active sudo environment on your system but are suffering from having multiple active editors of the etc/sudoers file with some sysadmins overwriting other's changes accidentally. Which of the following when used by a editors of the file would ensure the file is edited properly? sudoedit visudo nano-su pico

visudo reason: The approved method to allow multiple user to edit the /etc/sudoers file safely.

Your system seems to be using swap a lot, so you want to get near-realtime statistics on its memory, processes, paging, block i/o, and interrupts being requested. Which of the following will accomplish this most directly? netstat ss vmstat iostat

vmstat

Which of the following was deigned to be a more streamlined and easier to use replacement for the X Window System? GNOME LXDE XDM Wayland

wayland

A junior system administrator is attempting to install a somewhat large application on a system and is getting messages from the rpm command requiring additional software. Upon checking you recommend to use a particular option with the rpm command to instruct the system to ignore the requirement. Which of the following options might you have recommended? --nomanifest --notriggers --nodeps --ignore

--nodeps reason: disregard any listed dependencies and insta;; the package anyway and command to skip the test of dependencies

Your have run the jobs command in the shell and received the below output. What will be the result if you were to issue the fg command in the shell? $ jobs [1]- Running command1 [2] Running command2 [3]+ Running command3 -Job ID 1 will be brought to the foreground -Job ID 2 will be brought to the foreground -Job ID 3 will be brought to the foreground -The fg command will not execute properly

-Job ID 3 will be brought to the foreground reason: without any additional parameters will act on the entry marked with the + symbol and allow you to change a currently running or stopped job to run in foreground mode on the current console session

What option to the useradd command causes the user's home directory to be created during the user creation process? -G -m -h -k

-m

The venerable and inspirational Slackware distribution uses which of the following package formats? .tgz .tar .tz2 .tar.gz

.tgz

Your system's kernel and other startup files are located in which directory? /tmp /home /sys /boot

/boot

Which specification is used for both SCSI devices and USB storage devices? /etc/X11 /proc/interrupts /dev/ssh* /dev/sd*

/dev/sd*

AppAmor profiles are stored and read from which of the following directories? /sys/security/apparmor /etc/profile/apparmor /etc/apparmor.d /etc/apparmor/profiles

/etc/apparmor.d

Your system attempts to resolve the remote computer named "snowblower", but times out with no resolution possible. Which of the following files should you check first for an incorrect resolution of the name? /etc/hosts /etc/resolv.confd /etc/nsswitch.conf /etc/sys/configd

/etc/hosts

On a SystemV-based server what do the link in S## and K## scripts in the runlevel directories point to? /etc/service.d /etc/init.d /etc/systemd.d /etc/config.d

/etc/init.d

When configuring the modprobe command's behavior, which individual file can be used? /etc/modprobe.conf /etc/modprobe.mod/cong /etc/modprobe.txt/confgd /etc/modprobe.d

/etc/modprobe.conf

After setting up a local name resolution server and removing all static name resolution entries from the server which file should you alter to properly configure the name resolution order? /etc/nameres /etc/hosts /etc/nsswitch.conf /etc/resolved

/etc/nsswitch.conf

Which configuration file/directory holds the system mapping of daemons to access ports? /dev /dev/mapper /etc /etc/services

/etc/services

When a new user account is created, which of the following directories is copied and named accordingly to form the new user's home directory? /etc/example /etc/skel /etc/useradata /etc/homedir

/etc/skel reason: Are copied to user account home directory only when the account is created.

You have a secure that you want to ensure users must sign in with their own login first, before accessing privilege elevation options. What files and configuration option will you use to implement this security measure from all user? /etc/sshd_config, PermitRootLogin no /etc/ssh_allow_users, EnableRoot=no /etc/ssh_dent_users, RootUser=off /etc/ssh_security, RootLogin off

/etc/sshd_config, PermitRootLogin no reason: PermitRootLogin option when configured properly will force ssh users to sign in as their regular account and only then can they become the root user

What is the major source of information that is displayed by the ps, top, and pstree commands when executed? /etc /proc /run /var

/proc

Modules for the kernel are kept in what directory structure? /usr/lib/depends /usr/lib/kernmod /usr/lib/modules /usr/lib/vmlinuz

/usr/lib/modules

Timezone information in traditional Linux systems is kept in the file /etc/localtime. On modern Linux systems, this file is kept in which of the following folder? /usr/share/timezone /usr/share/localtime /usr/share/zoneinfo

/usr/share/zoneinfo

While using a custom-compiled kernel, which of the following is the most likely log file to watch for any troubleshooting messages? /var/log/kern.log /var/log/kernal.panic /var/log/faillog /var/log/messages

/var/log/kern.log reason: /var/log/kern.log files is the most likely log file to watch for any troubleshoot messages and most common place to send custom kernel troubleshooting-type messages

On older Linux system or those still using System V init services what is the main log file typically named? /var/log/dmesg /var/log/messages /var/log/yum.log /var/log/cron

/var/log/messages

You are looking for a record of the users who have successfully signed in, those who have had unsuccessful logins and indications of any authentication issues. Which of the following log files is most likely to contain two or more of these types of information? /var/log/messages /var/log/faillog /var/log/lastlog /var/log/secure

/var/log/secure reason: /var/log/secure contain information related to authentication and authorization privileges.

When running a script, you want it to always run in a particular shell, regardless of what shell the user is currently executing the script from. Which of the following lines would set your script to always be run by the bash shell? @!/bin/bash ? /bin/bash # /bin/bash #!/bin/bash

#!/bin/bash reason: It signals to the operating system which shell to use to run the shell script

When running the which command what is the primary in-memory source of information consulted for the output? $USER $PATH $UID $HOME

$PATH

As you are about to execute a command that will take a while to finish you are asked to look for a file on the filesystem. What can you add to your command-line to allow you to have almost immediate access to the shell prompt after you hit enter? & bg fg $_

&

When specifying what elements in a directory will be affected by a shell script construct what is the most appropriate character to use to indicate all elements should be acted on? $$ # & *

* reason: character serves as a wild card for filename expansion in globbing.

Your cloud servers are configured to use a particular data type for large media files that are uploaded by your users. Which of the following describes this data type? number nchar character blob

blob

Your network configuration needs to be configured to allow two disparate networks to be connected together allowing a free flow of traffic through you server from network to network. Which of the following commands would be used to accomplish this? netconfig sysconfig mdadm brctl

brctl reason: Allow you to control how the bridging behaves

When connecting to a VNC server which of the following ports should be used through the web browser client method? 22 444 5800 443

5800 reason: Determines which TCP port are involved in VNC network access and 5800 uses the TCP.

Because of regulations and rules about 3rd party software running on your organization's infrastructure you cannot use local helper applications to extract needed monitoring information, only installed and normally running services. What would using ssh connections and localized commands to export information from these systems be referred to as? Agent-based monitoring Security monitoring Agentless monitoring Public monitoring

Agentless monitoring

When setting up a policy for how users can access your systems, it is important to realize that good security occurs where? All of these At the system level At the organization level At the Kerberos realm level

All of these

While signed in as a user in a GUI environment, you desire to go from the GUI session to a text console, /dev/tty2. Which keystrokes would you use? Choose the best answer. Ctrl+Alt+F2 Alt+F2 Ctrl+F2 F2

Ctrl+Alt+F2

You need to use a server application to store data in records and to allow for sorting, ordering, and retrieval of those records. Which of the following best describes this server application? Transactional data Database Redis Spreadsheet

Database

As a busy Apache application services manager you need to automate the detection of entries in your access logs that indicate user that are likely bots tying to sign in inappropriately or attempting to exploit your system. What utility would you likely use on your Apache error logs to accomplish this most efficiently? logger apachescan Fail2ban logcheck

Fail2ban reason: Designed to go through access logs for various service including Apache and then to help the user update firewall rule to block the offending IP addresses among many other options

Your environment contains several functions, which depend on the presence of a particular type of variable to run. This variable type is available to all the functions in your shell environment. What best describes the type of the variable being referred to? Global Local Basic Universal

Global

Your infrastructure automation mechanism keeps track of all instances that are managed as a part of you infrastructure in a database. The entries or pieces of information being tracked are commonly known as what? Row Inventory Itemization Content

Inventory

Users report that they cannot use cd into a subdirectory to access some information. What might be true about the directory that contains the subdirectory? -It does not have modify permissions set -It does not have read permissions set -It does not have write permissions set -It does not have execute permissions set

It does not have execute permissions set reason By default the Linux system doesn't give anyone execute permissions to run the file.

Red Hat-based systems have been setup in an automated fashion by using which of the following tool? YaST Kickstart Salt cPanel

Kickstart reason: System administrator can create a single file containing the answers to all the questions that would normally be ask during a typical installation

When setting up a number of host to serve the exact same set of content via http servers what can you configure as a method of ensuring that requests are spread evenly across the available web servers? Traffic spreader Aggregation Load balancer Colloquy host

Load balancer

When configuring a system that will have a number of console-based users, what would be an efficient method of warning the user that security measures are in effect and other helpful messages? MOTD ttys0 SSH wall

MOTD reason: Message of the Day MOTD file immediately after the user logs in the console or terminal session

When running the command sudo zypper ref, you get a message about something bot being available to be refreshed. What is being refreshed when you issue this command? Metadata Unit files Targets Dependencies

Metadata reason: Information the describes and provides additional details about data

Due to security concerns about password aging users are writing down login information. Your company has determined that a hardware solution is the best route. Which of these best names this solution as know in the industry? UTF Multi-factor authentication tokens USB key logins Fob authentication

Multi-factor authentication tokens

You need a host that will accept names and perform a lookup on the IP address. This host would be identified as which of the following servers? internet translation Name Resolution

Name

When a user or system queries a local or remote server for the match between a host or domain name and an IP address, what is that process commonly known as? Name Resolution Name Resolving Name Matching Name Queries

Name Resolution

If you want to hide the configuration file from the usual ls and other user-level commands what precaution can you take? Set an extended ACL Preceed it with the character dot Set the file to immutable Hide the file in a directory

Preceed it with the character dot

Modern package management schemes depend on sets of software in local or remotely-accessible locations that are used to provide the packages, updates, and security fixes that affect a given set of packages. Which of the following describe these sets of software? Sources Caches Repositories Spreadsheets

Repositories reason: Contain software packages that have been test and known to install and work correctly in the distribution environment.

When writing a script, you want to allow sections of code to be run by invoking a keyword that identifies those sections of code at the script's execution point. Which of the following best describes the function you'd most likely use? The if statement The case statement The echo statement The switch statement

The case statement reason: Used for keyword that would be typed after a command or shell script and point to sections of code, such as start, stop, restart and allows you to check multiple values of a single variable in a list-oriented format.

You have run the command file `which ls` and get the desired output. What best describes the use of the (`) characters to surround the command? UTF Substitution unicode Enumeration

Substitution reason: Use of the (') backtick characters to surround the command where the use of surrounding backticks will run the command inside the backticks and replace it with the output of the command so it can be used by the file command.

When a server boots, an error shows briefly on the screen that indicates that a device was unable to be mounted. A review of the /etc/fstab shows the device was supposed to be mounted at boot. The device is present in the lsblk output. What is the most likely cause of the error? -The device has no free space -The device mount point is missing -The system disk has no free inodes -The systemd mount.service is disbaled

The device mount point is missing

Sometime during the night your server become unresponsive and you have gone to troubleshoot the issue. You find the system has a number of pieces of information on its console, including a Call Trace, some hexadecimal codes and what appears to be some stack output as a number of 8 character strings. What has most likely happened to your server? The kernel has panicked A scheduled package update has stalled A drive has failed A black screen of death has occurred

The kernel has panicked reason: Often are a result of a software change such as installing a new kernel without the appropriate module or library changes or starting (or Stopping) a program at a new runlevel.

While running a command that is procession slowly and will take some time to finish you press the keystrokes Ctrl-z. What is the result of this action? -The console input will be terminated -The running command will be terminated -The running command will be prompted to enter a character -The running command will be suspended

The running command will be suspended

When attempting to access a shared directory owned by another user a user report they can see the directory but cannot enter the directory. Which of the following would prevent the user from entering the directory properly? -The user does not have SUID for the directory -The user does not have execute for the directory -The user does not have read for the directory -none of these

The user does not have execute for the directory reason: Without execute permission on a directory the filesystem object inside the directory are not accessible

When connecting from a Window client system to a properly configured Linux server which of the following protocols will provide a GUI session both via a client app or through a Browser? XDM VNC RDP Citrix

VNC

Your cloud admin has given you a file that can be used to initiate the setup of a cloud server; all you have to do is refer to it during the instantiation. Which of the following is the most likely format for this file? YAML EBCDIC ASCII anaconda-ks.cfg

YAML reason: YAML Aint Markup Language is a data oriented language structure used as the input format for diverse software application

When a process has terminated but still has an entry in the process table. what is that process commonly known as? Dead Lingering Killed Zombie

Zombie reason: Process whose execution is terminated but it still has entry in the process table.

After declaring and population a variable you write a script that uses that variable in its operation. Upon executing the script, you find the variable is not found. What command will help you make the variable and its contents available to the scripts? chown export script find

export reason: Variable or function to the environment of all the child processes running in the current shell

Which of the popular firewall options includes the use of zones to separate traffic and can be configured temporarily to test, and then commit that working configuration to permanent status? iptables netfilter tcp wrappers firewalld

firewalld

You are interviewing security managers and ask them some questions, including what firewall they recommend that allows a separation of the runtime and permanent configuration, no need to restart the daemon when changes are made and were most recently introduced through various distributions. Choose the answer that meets all of the question's criteria. iptables firewalld firewall wrappers tcp wrappers

firewalld

Users report that the system is sluggish and upon investigation you find that the backup process you started earlier is consuming a lot of resources. Which of the following will allow the adjustment of this process's priority while still keeping it running? lsof fuser ps remice

renice reason: allow you to change the priority level of an application that's already running

You wish to query the listing of files that will be installed by a package that is on disk, and not installed. Which of the following commands will do this? rpm -qpx package1.rpm rpm -qpi package1.rpm rpm -qpf package1.rpm rpm -qpl package1.rpm

rpm -qpl package1.rpm reason: rpm -qpl command the listing of files

When migrating an application from one server to another you need to run a utility that ca compare the local data with a remote location and do it securely over the network via the ssh protocol. Which of the following would you most likely use to perform this task? diff cpio rsync scp

rsync reason: Designed to operate either on a local system comparing and updating directory trees or across two system via the ssh and allow you perform fast local copies so for a big file it is the best utility to use

You want to run a given command with options and get an overall report of your systems CPU, memory activity, interrupt requests, swap utilization, and network traffic. Which of the following can do all of this? cacti ss netstat sar

sar reason: overall report of your systems CPU, memory activity, interrupt requests, swap utilization, and network traffic

Which of the following commands will restart or reload a systemd service named tuned without interrupting existing user connections to the service? systemctl daemon-reload tuned systemctl reformed tuned systemctl daemon restart or reload tuned systmctl restarted tuned

systemctl daemon-reload tuned reason: daemon-reload action allows for the re-reading of a service's configuration file and continued uninterrupted operation

A systemd-based computer that you are managing is taking an inordinately long time to boot without any obvious errors or explanations. Which of the following options to the systemd-analyze command should you use to determine what is causing the system to take so long to boot? systemd-analyze log-level systemd-analyze verify systemd-analyze blame systemd-analyze dump

systemd-analyze blame reason: Determine what is causing the system to take so long to boot and display starts with those unit that took the longest to initialize

You are typing to archive and compress a set of files so they can be sent to another system. Which of the following commands will allow you to both archives and compress this set of files? bzip2 gunzip tar gzip

tar

You have a user who has a security requirement that all files they create should by default have a set of more restrictive permissions for a government-funded project. What command on the system should you use to restrict their default permissions on objects they create? setperm umask chattr setfacl

umask reason: It is the one that restricts the permissions that are effective for a user when they create a file or directory among others.

If you are on a terminal that doesn't recognize your arrow keys and have to use hjkl for cursor navigation, what editor will you likely use for compatibility? nano emacs vim vscode

vim reason: using the hjkl keys ( which move left, down,up, right respectively) to navigate the file in command mode.

Your virtualization environment is running on KVM and you find out that there is a handy command-line interface tool that allows you to create run, stop, manage, and delete virtual machines. What is the name of this command? chkconfig service head vsh virsh

virsh


Set pelajaran terkait

CSIS 311- server-side scripting midterm review

View Set

Chapter 37 Patients w/ HIV & AIDs

View Set

Chpt 38 Into to Animal organization and physiology

View Set

Ch. 24 Asepsis and Infection Control

View Set

Chapter 41: Disorders of Endocrine Control of Growth and Metabolism

View Set

Variable, Indexed, and Market-Value Adjusted Annuities

View Set

Vocab from classical roots boob b lesson 4

View Set

Soci 100 - Homework - Chapter 6. Social Control and Deviance

View Set