Pre Assessment
How do you reference the first command-line argument in a shell script?
$1
What operator do you use to start a script in background mode?
&
A coworker at a remote location has a laptop that is running a Linux desktop environment. He needs your help to access a remote desktop session at the server, where he is currently logged into a text-based session. You tell him to employ SSH port forwarding and use its remote mode. Which ssh command switches should you tell him to employ?
-N -f -L
What tar command-line options are commonly used to create a compressed tar ball file?
-zcvf
A kernel module file has what file extension?
.ko
What directory does Linux use to store device files?
/dev
What raw device file would Linux create for the first SCSI drive connected to the system?
/dev/sda
What directory contains configuration information for the X Windows System in Linux?
/etc/X11
Which of the following files contain user account creation directives used by the useradd command?
/etc/login.defs /etc/default/useradd
Kernel modules are stored in what subdirectory?
/lib/modules/
What folder contains the time zone template files in Linux?
/usr/share/zoneinfo
What port should you disable to prevent users from using the Telnet service to access your Linux server?
23
What operator appends the output to an existing file?
>>
Which of the following symbols could be used to redirect STDOUT?
>> > |
What output does the command ps -e produce?
All processes running on the system
Which of the following are potential causes of packet drop?
An improperly connected network cable B An adapter that is failing A saturated network segment
Which of the following are involved in bootstrapping?
Anaconda B Preseed C AutoYaST Kickstart file
Your orchestration tool allows you to enter through its API the desired app container infrastructure documentation. It later uses this documentation for build automation. What is this process of documenting called?
Automated configuration management
What method should you use to develop an application in a test environment then move it into a production environment?
Container
Each correct answer represents a complete solution. Choose all that apply.
Default router IP address Subnet mask
When a container crashes, an orchestration system with the ability to self-heal will deploy production app containers until what directive is reached?
Desired state
What configuration setting should you set in systemd-journald to forward events to a rsyslogd server?
ForwardToSyslog
What are the primary types of cloud services?
Hybrid C Public Private
Which of the following sections would you find in the /etc/X11/xorg.conf file?
Input Device Screen Monitor
What method should you implement to encrypt an entire disk partition?
LUKS
The Cinnamon desktop environment uses which windows manager?
Muffin
You enter the command edquota -u JKirk and see zeros (0) under all the soft columns. What does this mean?
Neither block nor inode soft quotas have been configured for this user.
What are the different types of blobs in Azure Blob Storage?
Page Block Append
Each correct answer represents a complete solution. Choose all that apply.
Persistent Thin provisioning
"A networking method for controlling and managing network communications via software that consists of a controller program as well as two APIs" describes which of the following?
SDN
What protocol does a mail server use to send email messages to remote mail servers?
SMTP
What software package allows a Linux server to share folders and printers with Windows and Mac clients?
Samba
What are the types of user accounts in Linux?
Service B Standard C Root
With orchestration, you can enforce a static container environment. Why is this done?
So that the app's infrastructure does not change
On Linux, the SCSI framework consists of what integral parts?
The SCSI routing layer C The HBA driver layer D The device driver layer
Which of the following are true concerning the MD5- and SHA-based utilities?
The SHA-based utilities produce longer hash values than the MD5-based utility. Both can be used to check a transferred file's integrity.
Which of the following are directly associated with vmm?
The Virtual Machine Manager application B The virt-manager command C The virt-viewer client viewer
During the boot process, what software loads the operating system into memory and starts it?
The bootstrap loader
Which of the following describes firewall persistency?
The firewall configuration survives system reboots as well as the firewall being restarted or reloaded.
Bruce employs the git init command. This sets up which conceptual Git environment elements?
The local repository C The index D The staging area
Which of the following best describes a load average?
The number of times processes are waiting for or using the CPU.
Which of the following describes IPSec tunnel mode?
The payload and routing headers are encrypted.
Which of the following can override the settings in the ~/.ssh/config file?
The ssh utility's command-line options.
You are troubleshooting a systemd system and issue the command systemctl is-system-running. The command displays degraded. Which of the following best describes what is going on?
The system has one or more failed units.
The cat -n File.txt command is entered at the command line. What will be the result?
The text file File.txt will be displayed along with line numbers.
You issue the command id -gn 1138 at the command line. Assume the user exists. Which of the following best describes what will display?
The user's (UID 1138) current group's name.
Which type of hypervisor runs directly on the hardware without a middleman OS?
Type I
Which character set uses 1 byte to store characters?
UTF-8
For the ps command, which type of parameters must you precede with a single dash?
Unix-style
Which of the following are true concerning PKI?
Via the PKI structure, CA signed certificates are implemented. The PKI framework helps to protect key integrity.
Where is the /usr/bin/nologin file used, and why would you use it?
When used as the default shell for a user-defined in the /etc/passwd file, it prevents the user account from logging in
What journalctl command-line options should you use to display just the kernel events?
_TRANSPORT=kernel
Within the nano text editor's help subsystem, you'll see some metacharacter key combinations denoted by M-k. Which of the following keys may the M represent?
alt esc meta
What command allows you to restart a paused job or application in background mode?
bg
You've moved your present working directory to a new location in the Linux virtual directory structure and need to go back to the previous directory, where you were just located. Which command should you employ?
cd -
What command do you use to change the basic permissions for a file?
chmod
What command can you use to change the owner assigned to a file?
chown
Which command can you use to display the time and date using a specific format?
date
A user cannot create a file in his directory. You recognize that this is occurring for everyone using that same filesystem and suspect inode exhaustion. What command can you use to see if your suspicion is correct?
df -i
If the Linux system doesn't recognize a hardware device at boot time, what command can you use to check for errors?
dmesg
What tool do you use in Ubuntu to install an application package?
dpkg
What command displays features and parameters for network cards?
ethtool
Which Bash shell script statement allows you to iterate through a series of data until the data is complete?
for
Which tool should you use to fix a corrupt filesystem?
fsck
Which tools are command-line tools for creating and modifying partitions?
gdisk parted fdisk
What command do you use to display the ACL permissions assigned to a file?
getfacl
Natasha has added her username and email address to the global Git configuration. Which of the following commands will she use to view them?
git config --list cat ~/.gitconfig
A developer has created her working files and added them individually to the staging area using the git add command. However, that was a few hours ago, and she is ready to move her project to the local repository. What command can she issue to ensure that no files in her working directory are unregistered with the index?
git status
Which file contains the configuration for the GRUB2 bootloader?
grub.cfg
What command do you use to display entries in the systemd-journald journal?
journalctl
What command allows you to stop a running process, but only if you know the process ID?
kill
What rsyslog utility is commonly used to split log files into separate files based on time or size of the file?
logrotate
What command do you use to display the SELinux security context assigned to a file?
ls -Z
You are troubleshooting a rather serious problem on a systemd server. Using superuser privileges, you enter the systemctl isolate emergency command. Once you are logged back into the system, you issue the systemctl is-system-running command. What is displayed?
maintenance
You recently installed additional RAM on a Linux server to help improve its performance. The primary application uses a great deal of memory and the new RAM has helped. However, at application peak usage times, the free utility shows there is plenty of free memory, but the system slows and sometimes hangs. Which of the following items should you use to troubleshoot this problem?
memtest or memtest86+ lshw --class memory dmidecode -t memory
Which file is shared by both the modprobe and the depmod utility?
modules.dep
Which file does the nohup command place in the script output by default?
nohup.out in the current directory
Which of the following is a PAM module involved with enforcing strong passwords?
pam_pwquality.so D pam_unix.so E pam_pwhistory.so pam_cracklib.so
Which of the following commands sends a file (or files) from the local system and stores it (them) on the remote system?
put
You need to delete files in a directory as well as any empty subdirectories. You want to be asked permission before deleting each file and received detailed information as the command executes. Which command and option combination should you use?
rm -ivd directory
Which tools can you use in Red Hat Linux to install an application package?
rpm yum dnf
You need to move several data files securely to a remote Linux system. What is the best utility group to employ for moving the newly created archive file?
rsync
You want to add the NFS service to the firewalld's public zone. What command will accomplish this?
sudo firewall-cmd --add-service=nfs --zone=public
A new user account, Hansen7o9, was created, but the user cannot log into the system. You suspect a password was not set for this account. What command should you use to investigate this suspicion?
sudo getent shadow Hansen7o9
You need to determine the default target of a systemd system. Which of the following commands should you use?
systemctl get-default
What program listens to kernel notifications about new hardware devices?
udev
You have been informed that an employee is to be terminated today. The company does not want the account deleted but does not want the employee logging into the Linux server either. You check the system using the who command and see that the employee is not currently logged into the system. Which of the following commands should you use to prevent the employee from logging into the system as desired by the company?
usermod -L passwd -l
Which tool will allow you to view disk I/O specific to swapping?
vmstat
You need to move several data files securely to a remote Windows system. What is the best utility group to employ for creating the archive?
zip