CIT 412 Adv. Systems. Arch
Which of the following desktops is the default for many Linux distributions, such as Fedora and Ubuntu? GNOME KDE Unity MATE
GNOME
You are editing the /etc/default/grub file. Which option should you use to set the default operating system? GRUB_DEFAULT= GRUB_DISABLE_OS_PROBER= GRUB_TIMEOUT= GRUB_SAVEDEFAULT=
GRUB_DEFAULT=
Which of the following commands configures the shell to retain 300 recently used commands in the ~/.bash_history file for multiple shell sessions? HISTFILESIZE=300 BASH=300 HISTSIZE=300 HISTFILE=300
HISTFILESIZE=300
You have a user who has difficulty using the mouse. Which of the following keyboard accessibility options would BEST aid this user? Sticky keys Mouse keys Sound keys Bounce keys
Mouse keys
Match the vi command on the left with the description of the cursor movement the on the right.
Move the cursor up a line. k Move the cursor one space to the left. h Move the cursor one space to the right. l Move the cursor down a line. j
Which of the following describes network interface bonding? Bonding provides the network interface card with the ability to utilize IPv6 addresses. Multiple network interface cards are aggregated into a single bonded interface. Bonding allows network interface cards inserted into expansion slots to fully replace the onboard network ports. Bonding prefixes a 64-bit address to the network interface card MAC address, allowing the address to aggregate a network interface from a remote server to provide load balancing.
Multiple network interface cards are aggregated into a single bonded interface.
Users are complaining that the clocks for their operating systems do not match the current time for the location in which they live. Which of the following server roles is BEST for correcting this issue? Proxy DHCP SSH NTP
NTP
Which remote desktop technology offers access from most common platforms such as Linux, Windows, Mac, iOS, Android, and Rasberry? SPICE XRDP VNC NX
NX
In which boot process stage is the root partition mounted? BIOS Boot loader systemd OS kernel
OS kernel
Which component is responsible for loading and executing the initial process? BIOS initrd image primary boot loader OS kernel
OS kernel
Which of the following functions does the dpkg --configure command perform? Installs a package if the same version is not already installed Ignores dependency-checking for specified packages Uninstalls the package including the configuration files Reconfigures an unpacked package
Reconfigures an unpacked package
You obtain your applications and updates in RPM format. Which of the following distributions is your system based on? Debian Red Hat Xandros Slackware
Red Hat
What does the lprm command do? Send e-mail about the line printer status. Remove jobs from the line printer print queue. Reschedule jobs for the line printer print queue. Redirect output to the line printer print queue.
Remove jobs from the line printer print queue.
Which of the following systemd unit-specific sections describes how to manage services or applications on the server? Mount Service Socket Automount
Service
Which of the following will prevent a user from booting a computer, booting from removable devices, and changing UEFI/BIOS settings? Disable the systemctl target named graphical.target. Encrypt the /boot partition. Password protect the GRUB bootloader. Set a UEFI/BIOS password.
Set a UEFI/BIOS password.
You have a system with more than one Linux operating system installed. During the system's bootup process, which component loads a splash screen, allowing you to choose which operating system you want to run? The primary boot loader BIOS The initial program The secondary boot loader
The secondary boot loader
Which of the following is a valid metacharacter that can be used in the bash shell to escape or ignore the shell's special meaning for the character that immediately follows? {} * \ ;
\
Which of the following nano editor keyboard shortcuts will display help text which includes a list of all keyboard shortcuts. ^G (Ctrl+G) M-Space (Alt+Space or Esc+Space) M-A (Alt+A or Esc+A) ^O (Ctrl+O)
^G (Ctrl+G)
Which of the following commands removes print job 11 from the hp7 printer? cancel -U hp7 11 lprm 11 cancel -P hp7 11 cancel 11
cancel -P hp7 11
Which of the following commands can be used to combine the content of three files into a single text stream? cat pr cut nl
cat
Which of the following commands will display which boot options were given to the kernel at boot time? cat /proc/modules cat /proc/cmdline cat /proc/mounts cat /proc/version
cat /proc/cmdline
You need to get detailed information about the system memory. Which of the following commands will display that information? cat /proc/meminfo cat /proc/systat systat -m memstat -a
cat /proc/meminfo
Which dpkg option completely removes a package and its configuration files? -P -R -r --configure
-P
Which of the following dpkg options will install a package recursively? -P --configure -R -r
-R
Which of the following repquota options will give quota limits and disk usage for all file systems listed in /etc/mtab? -a -n -u -v
-a
You are inspecting the superblocks and block information on your file system. You need dumpe2fs to display only the blocks that are reserved as bad in the file system. Which of the following options should you use? -x -b -h -f
-b
Your ext3 file system has experienced a significant amount of corruption. To examine the file system, you want to use the debugfs utility. Which of the following debugfs options should you use to examine the file system? -V -w -f -c
-c
You are compressing a file with the tar utility, but you need to ensure you can uncompress the file with the bzip2 utility. Which tar option should you use during the file compression? -v -x -j -z
-j
You suspect your /dev/sda3 partition is in need of repair. Which of the following e2fsck options will repair the errors without any interaction from you? -n -p -f -b
-p
You are installing Linux on an old computer with an old BIOS, and you are planning the partitions for the hard disk drive. Which of the following directories SHOULD exist in the first 1024 cylinders of the hard disk drive? /boot /bin /home /var
/boot
Which directory contains the configuration file for GRUB 2? /boot/grub/ /boot/grub2/ /etc/default/grub2/ /etc/default/grub/
/boot/grub2/
You are preparing to mount a device local to your system. Which directory holds the device files? /devices /local/dev /opt/dev /dev
/dev
All users at your site are using the bash shell. You want to set a variable that will apply to every user and always have the same value. Which of the following shell configuration files should you place this variable in? .bash_profile .bashrc .bash_login /etc/profile
/etc/profile
If you are managing a systemd-based Linux system, which of the following commands cannot be used to bring the enp2s0 interface down? ip link set enp2s0 down ifconfig enp2s0 down /etc/sysconfig/network-scripts/ifcfg-enp2s0 down ifdown enp2s0 /etc/init.d/network stop
/etc/sysconfig/network-scripts/ifcfg-enp2s0 down /etc/init.d/network stop
Which if the following directories typically hold the dynamic libraries on your system? (Select TWO). /lib/ld.so/ /usr/local/lib/ /etc/ld.so.conf/ /usr/lib/
/usr/local/lib/ /usr/lib/
During installation, you must create a root user account for the system. Which of the following user account number does this account use? 0 1 10 100
0
Which of the following hexadecimal codes represents an extended partition? 0x85 0x82 0x88 0x83
0x85
Which of the following is the maximum number of GUID partitions that can be created using the gdisk utility? 32 128 64 8
128
Which of the following describes an IPv6 address? (Select TWO). 128-bit address Eight hexadecimal quartets Four decimal octets 64-bit address 32-bit address
128-bit address Eight hexadecimal quartets
Which of the following are valid IPv6 addresses? Select all that apply. 165.15.78.53.100.1 141:0:0:0:15:0:0:1 343F:1EEE:ACDD:2034:1FF3:5012 A82:5B67:7700:AH0A:446A:779F:FFE3:0091 6384:1319:7700:7631:446A:5511:8940:2552
141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552
Which port number is used by the IMAP protocol? 143 25 110 21
143
Which port number does SNMP use? 25 110 119 143 161
161
You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select THREE). 127.0.0.1 172.18.188.67 192.168.12.253 32.188.99.10 10.0.12.15 240.12.188.1 224.15.166.12
172.18.188.67 192.168.12.253 10.0.12.15
What is the correct order for the boot phases of a Linux computer?
1st BIOS 2nd Boot loader 3rd OS Kernel 4th system or init
Which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) channels are being used by each hardware device on the system? /proc/devices /proc/irqs /proc/dma /proc/interrupts
/proc/interrupts
Which of the following directories is the home directory for the root user account? /root /home/root /home /
/root
For Linux files, the default permission is 666, and the default umask is 022. When a new file is created, it will be assigned 644 (rw-r--r--) permissions. If the umask is set to 027, what permissions will be assigned for newly created files? 660 (rw-rw----) 644 (rw-r--r--) 640 (rw-r-----) 666 (rw-rw-rw-)
640 (rw-r-----)
You are called into the office of a newly hired manager. He has copied a file from his old place of work onto his new workstation, but is now receiving an error message that access is denied each time he tries to access the file. He is not the owner of the file or a member of the group the file is associated with. Which of the following represents the LEAST set of file permissions needed for him to be able to read and write to the file? 111 222 444 666
666
You have a Linux system with 8 GB of RAM installed. You plan to use this system as a server. How much space should you plan to partition for the swap file? 8 GB 12 GB 4 GB 16 GB
8 GB
Which of the following is displayed when the uname -a command is run? The current username The names of files and directories in the current directory All system information The current working directory
All system information
Which of the following commands displays an expanded listing that includes the owner and size of all the files in the /etc directory? ls -ae /etc ld -ae /etc ls -al /etc dir -al /etc
ls -al /etc
A directory intended to be used only by administrators keeps filling with files. Which of the following commands would you use to see only the names of the users saving files in the directory? ls -l | grep -d " " -f5 ls -l | cut -d " " -f5 ls -l | join -d " " -f5 ls -l | find -d " " -f5
ls -l | cut -d " " -f5
A user attempts to view the contents of a directory, but the output of the ls -l command scrolls beyond the limit of one console window. Which of the following commands would allow the users to see the full listing of the directory? ls -l >> less ls -paged ls -p ls -l | less
ls -l | less
Ann, a Linux script developer, is trying to debug a shell script that has the command ls -s in it. She suspects that an error is occurring, and she wants to send the results of the operation and any errors to a file named ~/Friday in order to examine it later. Which of the following commands should she use? ls -s > ~/Friday ls -s &> ~/Friday ls -s >> ~/Friday ls -s < ~/Friday
ls -s &> ~/Friday
You want to archive some configuration files to the floppy drive. You are using the cpio utility. Which line will create the archive on the floppy? ls /etc/*.conf | cpio -ovd > /dev/rfd0 cpio -ov /dev/rfd0 /etc/*.conf cpio -ov /etc/*.conf /dev/rfd0 cpio -cv /etc/*.conf /dev/rfd0
ls /etc/*.conf | cpio -ovd > /dev/rfd0
Which of the following commands will display the attributes of a /boot/grub/grub.conf file? cat /boot/grub/grub.conf lsattr /boot/grub/grub.conf ls -l /boot/grub/grub.conf vi /boot/grub/grub.conf
lsattr /boot/grub/grub.conf
he /sbin/grpck process is not responding and needs to be killed. There are multiple instances that were spawned and need to be terminated. Which of the following commands will terminate all instances of the grpck process? ps aux | grep "grpck" pkill -HUP 2583 ps -A | grep grpck pkill -SIGTERM -f grpck
pkill -SIGTERM -f grpck
You have recently answered calls from a number of users who cannot access the mail server. Which utility would you use to quickly see if the sendmail service is running? ifconfig uptime netstat ps
ps
You want to view all currently-running processes that include getty in the process name. Which command would you use? ps -A | grep getty ps -A | find getty ps -a | find getty ps -a | grep getty
ps -A | grep getty
Which command displays all the processes that are running in the most detail? ps -e ps -a ps -ef ps -A
ps -ef
Which command displays the PPID? ps -A ps ps -f ps -u
ps -f
Which of the following commands initializes a physical volume? pvscan vgcreate lvcreate pvcreate
pvcreate
Which sed flag or option allows you to exchange one string of characters for another string of characters in a file? s d -f g
s
Which of the following utilities will substitute an existing string with a new string within a file? grep egrep sed fgrep
sed
Which of the following sed commands replaces all the occurrences of the string foo with the string bar in myfile.txt? sed -e 'sub/foo/bar/glob' myfile.txt sed -e 's/foo/bar/' myfile.txt sed -e 's/foo/bar/g' myfile.txt sed -e '/foo/bar/g' myfile.txt
sed -e 's/foo/bar/g' myfile.txt
Which of the following command allows you to use an alternative superblock when the primary superblock has been corrupted? fsck /dev/sd1 mkfs -t ext2 /dev/sda1 mke2fs -n /dev/sda1 e2fsck -b 16385 /dev/sda1
e2fsck -b 16385 /dev/sda1
A technician recently added a new disk drive to a system, and the drive is not available. Which of the following commands scans the host bus adapter (HBA) and detects the newly added drive? lvscan echo "- - -" > /sys/class/scsi_host0/scan mdadm pvscan
echo "- - -" > /sys/class/scsi_host0/scan
You recently used the HOST=FS4 command. Which of the following commands should you use to change the HOST variable to a global variable that will be inherited by subsequent child shells and processes? unset HOST set HOST export HOST env HOST
export HOST
Which of the following commands is used to find a specific file on a Linux system? (Select TWO. Each answer represents an independent solution.) whereis type find which locate
find locate
Which of the following commands finds all of the files on the system that have either blue or gold in their names? find .. -name '*blue*' -o '*gold*' find . -name '*blue*' -o -name '*gold*' find .. -print0 '*blue*' -o '*gold*' find / -name '*blue*' -o -name '*gold*'
find / -name '*blue*' -o -name '*gold*'
You are working on a Linux distribution that uses systemd. Which non-symlink file in the /usr/lib/systemd/system/ directory is used to start the services necessary for multiple users, networking, and a graphical display? multi-user.target rc-sysinit.conf default.target graphical.target runlevel5.target
graphical.target
Which if the following commands displays the user groups that dblair is a member of? grep -e dblair /etc/group find /etc/group -name dblair members dblair which group dblair
grep -e dblair /etc/group
Which of the following commands displays all the lines in the blue_and_gold file that do not contain the word 'Karen'? grep -n blue_and_gold Karen grep -v Karen blue_and_gold grep -v blue_and_gold Karen grep -n Karen blue_and_gold
grep -v Karen blue_and_gold
n application named ABCD is generating system errors when it starts. Which of the following commands searches the system message log file for these errors? top /var/log/ABCD.log tail -n25 /var/log/messages grep ABCD /var/log/messages tail -n25 /var/log/ABCD.log
grep ABCD /var/log/messages
Which of the following commands displays all lines within the MTS file that have the word "world" within them? find world MTS grep world MTS grep MTS world find MTS world
grep world MTS
You are the administrator for a small company. You need to create a new group for users in the sales department. You need to name the group sales. Which command will accomplish this task? addgroup -x sales groupadd sales addgroup sales groupadd -r sales
groupadd sales
Which of the following commands will display information about the RAID devices on the computer? lspci hwinfo --listmd lsusb modprobe -r
hwinfo --listmd
You are working with the RPM package acroread-8.1.3-51.6.i586.rpm. Match the naming convention term on the left with the associated file name segment on the right.
i586 Architecture type 8.1.3 Version number acroread Package name 51.6 Release number
Which of the following commands should you use to change the location of the default file used to search for libraries? ldconfig -f ldconfig -n ldconfig -r ldconfig -p
ldconfig -f
Which of the following commands displays all of the shared library information for the /bin/bash executable? ldd /bin/bash ldd -v /bin/bash ldconfig -N /bin/bash ldconfig -p /bin/bash
ldd -v /bin/bash
Which of the following DNF options will display whether updates are available for RPM packages? update list install list updates
list updates
Which of the following yum options will display whether updates are available for RPM packages? list install update list updates
list updates
You have a SCSI tape drive st0. You want to back up the contents of /var/oracle. Which command will perform the backup? tar -vcf /var/oracle /dev/st0 cp /var/oracle /dev/st0 backup /var/oracle /dev/st0 tar -vcf /dev/st0 /var/oracle
tar -vcf /dev/st0 /var/oracle
Which command should you use to change the time zone (TZ) environment variable? (Select TWO). netdate tzconfig date tzselect
tzconfig tzselect
A user calls the help desk. Each time he creates a new text file, permissions of 640 are applied to the file, and he must use chmod to set them to 644. What command should you enter in the user's profile to set the default permission for newly created files to 644? umask 640 umask -640 umask 0022 umask 0027
umask 0022
Which of the following is the BEST command to use when creating a disk image? dd pack cpio gzip
dd
Which utility allows you to make an exact copy of a file? tar cpio dd cp
dd
In the /etc/shadow file, which character in the password field indicates that the password is an encrypted entry? ! $ !! *
$
You have a critical file called yearend.xls. You have set the file permissions so that only the owner of the file can modify it and only group owners can read it. Which of the following file listings show that you have set the permissions correctly? -r-xr-x--- 1 george acctg 26256 June 1 04:16 yearend.xls -rw-r----- 1 george acctg 26256 June 1 04:16 yearend.xls -rwxrwxr-- 1 george acctg 26256 June 1 04:16 yearend.xls -r--r--r-- 1 george acctg 26256 June 1 04:16 yearend.xls
-rw-r----- 1 george acctg 26256 June 1 04:16 yearend.xls
You need to set the system date and time using the date command. Which date option should you use? -s -d -u -utc
-s
You want to use the date command to set the system time UTC time. Which date option should you use? -s -g -d -u
-u
Which lpr option should you use to change the page width of the print job? -h -P -w -r
-w
A Linux user has an executable file named ni that can save a snapshot of network information with the date and time in a log file. The executable ni file is in the /root directory, and /root is the current working directory. Which of the following commands would run the executable file? (Select TWO). exec ni ./ni source ni /root/ni ni
./ni /root/ni
A user has requested that each time she presents credentials to log in, a particular entry be written to a log file. This action will only apply to her, and she is using the bash shell. Which of the following configuration files is the BEST to modify to enable this action? .bashrc .sh /etc/profile .profile
.profile
During installation, you need to make sure there is plenty of hard disk space allocated to the partition that is going to hold the entire Linux operating system. Which of the follwoing is the BEST mount point for this partition? /home / /boot /usr
/
Which of the following paths represents the root directory? /boot /home/root / /root
/
Which of the following directories MUST be part of the partition that holds the root (/) directory? (Select THREE). /bin /proc /home /etc /usr /var
/bin /proc /etc
You need to configure your Linux system to allow only the root user account to mount the CD-ROM device. Which of the following options should you add to the /etc/fstab file? /dev/cdrom /media/cdrom -t iso9660 ro /dev/cdrom /media/cdrom -t iso9660 ro,users,noauto /dev/cdrom /media/cdrom -t iso9660 ro,user,noauto /dev/cdrom /media/cdrom -t iso9660 ro,nouser,noauto
/dev/cdrom /media/cdrom -t iso9660 ro,nouser,noauto
Which file should you edit if you want to permit specific users to edit their respective crontab file, but deny all other users on the system from editing their crontab file? /etc/cron.allow /etc/crontab /etc/cron.deny /etc/cron.permit
/etc/cron.allow
Which file should you edit to schedule a task to execute every week on Saturday? /etc/cron.daily /etc/cron.weekly /etc/cron.hourly /etc/cron.monthly
/etc/cron.weekly
You have added several new hard disks to your system. After partitioning and formatting, you have modified a configuration file to mount these new file systems automatically. You want to document the change you made. Which of the following configuration files would you document? /etc/modules.conf /etc/fstab /etc/inittab /etc/crontab
/etc/fstab
You want to mount a number of file systems each time the system is brought up. Which configuration file should hold the configuration information for the file systems to be mounted? /etc/fstab /etc/inittab /etc/mount /etc/profile
/etc/fstab
A file contains the following entry: sales:x:1001:pclark,mmckay,hsamson Which of the following files contains similar enties? /etc/passwd /etc/gshadow /etc/group /etc/shadow
/etc/group
You have GRUB2 installed on your Linux workstation. You need to make changes to the boot menu. Which files and scripts can you edit to modify the menu entries and behavior of the boot menu? (Select TWO.) /etc/lilo.conf /etc/grub.d/40_custom /etc/default/grub /boot/grub.conf /boot/grub2/grub.cfg
/etc/grub.d/40_custom /etc/default/grub
Anna, a system administrator, wants to prevent users from pressing the Ctrl+Alt+Delete key combination to reboot the server. Which configuration file should be modified to change this setting? /etc/securetty /etc/inittab /etc/init.d/rc5 /sbin/shutdown
/etc/inittab
Which file shows the currently mounted volumes? /etc/mtab /etc/fstab /etc/mount /etc/mount.conf
/etc/mtab
If a systemd system is configured to use multi-user.target as the default boot target, which file has a symbolic link (symlink) to the multi-user.target file? /usr/lib/systemd/system/multi-user.target /etc/systemd/system/multi-user.target /etc/systemd/system/default.target /etc/inittab
/etc/systemd/system/default.target
You are in the process of manually creating the partitions during a Linux installation. Knowing that users will often require a lot of space to store their files, which of the following directories (or mount points) SHOULD be configured on its own partition? /home /var /boot /usr
/home
For which of the following directories should you create separate partitions? (Select TWO). /home /bin /lib /var
/home /var
Most Linux distributions propose to create the root (/) and swap partitions by default. To prevent user files and system log files from filling up the / partition, which additional partitions are you MOST strongly advised to create? (Select TWO). /tmp /home /opt /boot /usr /var
/home /var
Which of the following directories MUST remain on the same partition? (Select THREE). /lib /dev /usr /sbin /home
/lib /dev /sbin
Which of the following directories is specified by Filesystem Hierarchy Standard (FHS) as a mount point for removable media, such as USB storage media, DVDs, CD-ROMs, and Zip disks? /media /mnt /mount /
/media
You have installed a new Linux system and you want to make a baseline of system performance. Which of the following files contain baseline information? (Choose TWO). /meminfo /ps.aux /systat /cpuinfo /top
/meminfo /cpuinfo
According to the Filesystem Hierarchy Standard (FHS), which of the following directories contains information about the system state and processes? /bin /tmp /proc /root
/proc
If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the log files are on the same partition as the operating system, this could potentially bring down a Linux computer. Which of the following directories (or mount points) SHOULD be configured on its own partition to prevent this from happening? /etc /sys /var /opt /usr
/var
anacron creates a timestamp file that tells you the last time a regularly scheduled job was run. What is the full path and name of the directory that contains these timestamp files? /var/jobs/anacron/ /etc/anacron.d/ /var/spool/anacron/ /etc/cron.d/anacrontab/
/var/spool/anacron/
During a Fedora distribution installation, you choose to add a regular user account. The only other user that has been added to the system was root. Which of the following user IDs is MOST likely to be associated with the new user? 0 1 2 101 400 1000
1000
Given this entry in the /etc/passwd file: pmallory:x:1001:1050:Paul Mallory:/home/pmallory:/bin/bash Which of the following is the user ID associated with this entry. x pmallory 1050 1001
1001
To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Now you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select TWO). 23 21 20 80 443
20 21
Out of concern for security, you convinced your boss to stop allowing Telnet access to the network. Now, remote connections are only made through ssh. Which port must you allow through the firewall for ssh access? 22 23 24 25
22
Which port does Telnet use? 23 25 80 34
23
Which of the following are not valid IP addresses? (Select THREE). 1.55.254.3 257.0.122.55 132.64.32.8 145.8.260.7 45.22.156.256 116.0.0.116
257.0.122.55 145.8.260.7 45.22.156.256
Which of the following is the maximum number of primary partitions that can be created on a single hard disk drive? 4 2 Unlimited 8
4
Which of the following sets of octal permissions would allow everyone to execute the following file as if they were the root user? -rwxr-xr-x 1 root root 8045 July 24 2018 myscript 4744 1655 4755 0755
4755
You are editing the crontab file and want an entry to run every hour at five minutes past the hour. Which of the following entries will accomplish this task? 5 * * * * /home/emmett/example.sh * 5 * * * /home/emmett/example.sh * *5 * * /home/emmett/example.sh * * * 5 * /home/emmett/example.sh * * * * 5 /home/emmett/example.sh
5 * * * * /home/emmett/example.sh
You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable? 42 53 443 80 21
53
As an administrator, you are tasked with configuring an Apache web server by modifying the /etc/apache2/apache2.conf file. You open the file in vi. As you're looking at the file, you knock your spill-proof drink container onto the keyboard. It rolls over several keys as you try to pick it up. Now there are extra characters everywhere in the text buffer. Which of the following commands can you use to exit vi without saving any changes that were made to the text buffer? :wq :q :q! :x
:q!
A user, ljenkins, contacts the help desk about an error received while removing a file from their home directory. The user received the following error when trying to use the rm command to remove the file: [ljenkins@fileserver]$ rm report.txtrm: remove write-protected regular empty file 'myfile2.txt'? yrm: cannot remove 'myfile2.txt': Operation not permitted While troubleshooting the issue, you list files in directory to see if you can discover the issue: [ljenkins@fileserver]$ ls -altotal 4drwxr-xr-x. 2 ljenkins ljenkins 24 Feb 25 12:04 .drwx 15 ljenkins ljenkins 4096 Feb 25 11:04 ..-rw-rw-r--. 1 ljenkins ljenkins 346 Feb 25 11:32 report.txt When prompted to remove the write-protected file, ljenkins entered yes and received an "Operation not permitted" error message. As the help desk technician, you attempt to remove the file with root privilages and recive the same error message. You decide to view the file attributes and receive the following output: [helpdesk@fileserver]$ lsattr ----I----------- ./report.txt Which of the following commands would resolve the problem and allow the file to be deleted? sudo lsattr report.txt | rm report.txt sudo rm -vR report.txt :sudo chattr -i report.txt && rm report.txt sudo rm --force report.txt
:sudo chattr -i report.txt && rm report.txt
Which of the following vi key combinations should you press while in Insert Mode to save the file you are working on and quit? Correct Answer: <Esc>s <Esc>:wq <Esc>:q <Esc>S
<Esc>:wq
What information about print jobs does the lpq utility display? (Select TWO). The printer serial number. The amount of ink or toner left in the printer. The name of the application that submitted the job. A numerical job ID that can be used to manipulate the job from other utilities. The username of the person who submitted the job.
A numerical job ID that can be used to manipulate the job from other utilities. The username of the person who submitted the job.
Which of the following statements best describes the function of the repquota /home -vu command? A summary of disk usage and quotas is displayed for the users who have files within /home. The current user's quota limits and usage for /home are displayed. The aquota.user and aquota.group files in /home are created. The /home quota file is opened in vi for editing.
A summary of disk usage and quotas is displayed for the users who have files within /home.
Which of the following actions can be used to define a persistent alias? Add the command defining the alias to the appropriate shell configuration file. Use the alias command at the shell prompt with the -P option. Add the command defining the alias to the $ALIAS environment variable. Add the command defining the alias to the /etc/default/alias.conf file.
Add the command defining the alias to the appropriate shell configuration file.
Gloria, a Linux administrator, used the gdisk utility to create eight partitions on a new hard drive. Which of the following BEST describes the partitions Gloria has created? The first seven partitions are primary partitions. The eighth partition is an extended partition that can be used to contain logical partitions. The first three partitions are primary partitions. The fourth is an extended partition that holds five logical partitions, making eight partitions in total. All eight partitions are the same. They are simply partitions. There are no primary, extended, or logical partitions. All eight partitions are logical partitions. There are no primary or extended partitions.
All eight partitions are the same. They are simply partitions. There are no primary, extended, or logical partitions.
Which of the following actions does the dpkg -l (lowercase L) command perform? A package is installed. Information about packages that are not installed is listed. All packages with names that match a specified pattern are displayed. The installed files for a package are shown.
All packages with names that match a specified pattern are displayed.
Which system component verifies the hardware and passes control of the computer to the boot loader? CMOS BIOS OS kernel Init
BIOS
Tom, a Linux administrator, has installed a new hard disk. He creates two primary partitions, sdb1 and sdb2, and one extended partition, sdb3. He formats sdb1 with ext3 and sdb2 as a swap area. When Tom attempts to format sdb3 as a swap area, he is unable. Which of the following explains why Tom can't format sdb3? An extended partition can't be formatted. Only a primary partition can be formatted as a swap area. A single drive can only have one swap area. A swap area can only reside on the second primary partition.
An extended partition can't be formatted.
Tim, a system administrator, wants to simplify the provisioning and disabling of user accounts. Which of the following server roles should Tim install and configure? Proxy Containers Authentication Server Load Balancer
Authentication Server
As a network administrator, you have had several users ask for a way in which they could connect their phones to their Linux computer, without the use of wires. Which of the following device types would BEST meet these user's needs? HBA USB GPIO PCI Bluetooth
Bluetooth
Which of the following describes the difference between the /lib/modules directory and the /usr/lib/modules directory? (Choose TWO). /lib/modules contains only older versions of the kernel modules, while /usr/lib/modules contains the latest kernel modules. Both directories contain different kernel modules. Both directories contain hard links to the kernel modules. /lib/modules is available to root in single user mode, while /usr/lib/modules is available to all users.
Both directories contain hard links to the kernel modules. /lib/modules is available to root in single user mode, while /usr/lib/modules is available to all users.
A user sends two print jobs to the Marketing printer (the default printer). She notices the printer is stalled on the first document and uses the lprm - command. What will be the result? Nothing. She must identify the print queue in the command. Nothing. She must identify the job number in the command. The first job will be deleted. Both of her jobs will be deleted. All jobs in the queue, including those for other users, will be deleted.
Both of her jobs will be deleted.
You have a user who has difficulty typing. She is constantly pressing keys multiple times by accident. Which keyboard accessibility option should you enable? Bounce keys Mouse keys Repeat keys Sticky keys
Bounce keys
Which of the following is the standard shell for MOST Linux computers? Bourne-again shell (bash) C-shell Bourne shell Korn tcsh
Bourne-again shell (bash)
Your company recently setup a VPN and wants to use a digital certificate for authentication instead of a pre-shared key. Which of the following server roles would allow the company to provide this functionality internally instead of using an external provider? Name Server Certificate Authority SNMP SSH
Certificate Authority
You are asked to help a user who is complaining that file system errors are being reported during boot-up. When you reboot the user's system, you see errors on sda2. Which of the following strategies will check the file system on sda2 and fix the errors? Run chkdsk /dev/sda2. Run fsck /dev/sda2. Change to single user mode and run fdisk /dev/sda2. Change to single user mode and run scandsk /dev/sda2. Change to single user mode and run fsck /dev/sda2.
Change to single user mode and run fsck /dev/sda2.
Which of the following desktops was derived from GNOME 3, follows traditional desktop metaphor conventions, and is the primary desktop environment for the Mint distribution? MATE KDE Unity Cinnamon
Cinnamon
Which of the following are popular Linux desktops? (Choose FIVE). SPICE Grub KNOPPIX Cinnamon KDE Mate GNOME Unity NX
Cinnamon KDE Mate GNOME Unity
Your company is running a critical business application. The executive team wants to ensure the server is available at all times, even in the event of a server failure. Which of the following server roles would be used to provide a failover server in the event of a system failure? Proxy SNMP Clustering Load Balancer
Clustering
Which of the following device categories do RAM chips, CPUs, expansion cards (such as PCI cards), and standard hard disk drives belong to? Hotplug devices Coldplug devices Hardware abstraction devices Desktop bus devices
Coldplug devices
Your company develops applications to run on Linux systems. You currently have four teams working on a different aspect of the same application. Which of the following server roles would give you the BEST method for testing all team members' code without effecting your part of the project or your operating system and personal files? Monitoring Containers Clustering Database Load Balancer
Containers
Which of the following describes the effects of the tune2fs -j /dev/sdb1 command? Displays the superblock on the /dev/sdb1 device. Remounts the /dev/sdb1 device as read-only. Converts the /dev/sdb1 device to ext3. Changes how many times the /dev/sdb1 device is mounted before running fsck.
Converts the /dev/sdb1 device to ext3.
Which of the following steps must be completed after creating a logical volumes so that the logical volume can be used to store files? Create file systems on the volumes and mount them. Give the volume a descriptive name and allocate space to it. Add the volume to a volume group and mount the group in the file system. Scan for logical volumes and extend them.
Create file systems on the volumes and mount them.
he graphics driver was recently updated on a system. Now, the graphical user interface (GUI) is not displaying, preventing the user from logging in. You need to access the system locally to login. Which of the following commands will access the virtual terminal tty2? tty ssh localhost tty echo tty2 Ctrl+Alt+F2
Ctrl+Alt+F2
While editing a script using gedit, you discover that you no longer have access to your current terminal session and need to check the values of some variables the script is using. Which of the following commands will send the gedit process to the background so you can regain access to the current terminal? bg Ctrl+Z Ctrl+C Ctrl+Alt+F2
Ctrl+Z
Which of the following daemons allow processes to communicate with each other and relay information about hotplug devices? D-Bus udev sysfs hald
D-Bus
Users are complaining that they are unable to connect to any servers or the internet. Based on the symptoms they describe, you suspect that the users are not being assigned the correct IP addresses. Which of the following server roles would be the BEST role to work with to correct this issue? Proxy SNMP DHCP VPN
DHCP
Alex, a webmaster, is implementing an order processing system on the company's website. Which of the following server roles should Alex implement with the order processing application? Monitoring Database Clustering VPN
Database
Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks? IP address Host name Default gateway Subnet mask
Default gateway
Which of the following man page sections shows a list of options available for a Linux command and explains what the options do? Description Title Synopsis Name
Description
Which of the following is a characteristic of a symbolic link? Indistinguishable from the original linked file. Distinct (non-duplicate) inode. Valid pointer to the linked file's data even if the original linked file is deleted. Dash (-) as the first character in the permission string.
Distinct (non-duplicate) inode.
Which of the following are true about the ASCII character set? (Choose TWO.) Does not include international symbols. Support international characters. Uses a variable-length encoding standard. Is not compatible with UTF-8. Uses a seven-bit encoding technique.
Does not include international symbols. Uses a seven-bit encoding technique.
You have found a patch for the Samba server on your system. The patch is a .rpm package. Which of the following procedures is the MOST correct for installing the package? Download the package. Run rpm -ivh on the package to install the update. Download the package. Run rpm -Uvh on the package to install the update. Download the package. Run inspak -uvhf on the package to install the update. Download the package. Run tar -uvf on the package to install the update. Delete the rpm file after the install is complete.
Download the package. Run rpm -Uvh on the package to install the update.
Yesterday, you created a new swap area for your system. Today, after rebooting the system, you find that the swap area is not mounted. What should you do to ensure that the swap area is mounted each time the system boots? Edit /etc/fstab and add the swap partition. Remount the swap area. Then run export mount to make the change persistent. Edit /etc/inittab and add the swap area. Run the mount --auto command and identify the swap area partition. Edit /etc/mtab and add the swap partition.
Edit /etc/fstab and add the swap partition.
You have a dual-boot system with a Linux and Windows operating systems. You need to configure the GRUB 2 bootloader to display the menu for 12 seconds before it automatically boots the default operating system. Which of the following is the BEST first step to configure the bootloader? Edit the timeout parameter in the /boot/grub2/grub.cfg file to say TIMEOUT=12. Edit the timeout parameter in the /boot/grub2/grub.cfg file to say GRUB_TIMEOUT=12. Edit the timeout parameter in the /etc/default/grub file to say GRUB_TIMEOUT=12. Insert a timeout parameter in the /etc/default/grub file that says TIMEOUT=12. Edit the timeout parameter in the /etc/grub.d/40_custom script to say GRUB_TIMEOUT=12.
Edit the timeout parameter in the /boot/grub2/grub.cfg file to say GRUB_TIMEOUT=12.
You have just installed a new Linux system, which is using the Wayland system. Which of the following is a VALID statement regarding this system? Events captured from the keyboard are sent to the Wayland compositor and then sent to the window manager for rendering. Events captured from the keyboard are sent to the Wayland compositor, which renders the changes required and then sends them to the screen. Events captured from the keyboard are sent to the Wayland compositor and then the Wayland client, where the rendering takes place. Events captured from the keyboard are sent to Wayland compositor and then the Wayland client. After rendering, the client sends the information to the screen.
Events captured from the keyboard are sent to the Wayland compositor and then the Wayland client, where the rendering takes place.
Which of the following is a valid IPv6 address? FEC0::AB:9007 FEC0:AB98::A7::9845:4567 199.12.254.11 FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A FEC0:AB04:899A
FEC0::AB:9007
Your company uses both Linux desktops and Windows desktops. Which of the following server roles should be used to provide a central location for users of both operating systems to share files? Authentication server File servers Database Proxy
File servers
Match the term on the left with its characteristic on the right. (Each term can be used more than once.) Has a .so or .so.version extension. Dynamic Library Increases the size of the application. Static Library Has a .a filename extension. Static Library Is typically stored in /usr/lib/ and /usr/local/lib/. Dynamic Library Can degrade program load time if the library is already in use by another program. Dynamic Library
Has a .so or .so.version extension. Dynamic Library Increases the size of the application. Static Library Has a .a filename extension. Static Library Is typically stored in /usr/lib/ and /usr/local/lib/. Dynamic Library Can degrade program load time if the library is already in use by another program. Dynamic Library
Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select TWO). Hexadecimal numbers Binary numbers Decimal numbers 32 numbers grouped using colons 128 numbers grouped using colons
Hexadecimal numbers 32 numbers grouped using colons
You need the DNF utility to check specific URLs for RPM repositories. Which of the following locations should you add the URLs to? In .repo files within the /etc/yum.conf file. In .repo files within the /var/usr/yum.log file. In .repo files within the /var/lib/rpm directory. In .repo files within the /etc/yum.repos.d/ directory.
In .repo files within the /etc/yum.repos.d/ directory.
Which of the following situations is most likely to cause a dependency problem? Upgrading the kernel from 2.4.6 to 2.4.12. Several applications using the /usr/lib/biglib library. Upgrading the library /usr/lib/biglib from version 1.4 to version 1.6. Installing two different packages that both include /usr/lib/graphlib.
Installing two different packages that both include /usr/lib/graphlib.
A Linux system can determine the time and date in which of the following ways? (Select TWO). It can use NNTP to set the time. It can set the system clock to the local time. It can use SMTP to set the time. It can use NTP to set time.
It can set the system clock to the local time. It can use NTP to set time.
Which of the following statements BEST describes the PATH environment variable? It specifies the filename where past commands are stored. It specifies the characters the shell uses to indicate normal user ($), root user (#), and similar items. It contains the directory prefixes used to search for programs and files. It contains the path of the current working directory.
It contains the directory prefixes used to search for programs and files.
Which of the following desktops emulates a Windows desktop, especially in the location of the menu options and bottom panel bar? MATE Unity GNOME KDE
KDE
Which of the following nano text editor features makes it easier for beginners to learn than the vi text editor? There are multiple operational modes. Keyboard shortcuts are displayed at the bottom of the editor. It is included in most Linux distributions. The software falls under the GNU General Public License.
Keyboard shortcuts are displayed at the bottom of the editor.
During the process of troubleshooting a resource issue on a server, the technician entered the following command and received the output showing zombie processes. [user@centos7]#ps aux |grep Z USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMANDljenkins 2346 0.0 0.0 0 0 ? Z 08:44 0:02 [kdmflush]ljenkins 3365 0.0 0.0 0 0 ? Z 08:64 0:14 [bioset]ljenkins 3812 0.0 0.0 0 0 ? Z 09:31 0:05 [bioset]ljenkins 4957 0.1 0.0 0 0 ? Z 10:16 0:35 [email-client]ljenkins 5276 0.1 0.0 0 0 ? Z 12:04 0:45 [email-client] What should the technician do NEXT to resolve the issue with zombie processes? Kill each of the PIDs listed in the command output. Nothing. The systemctl process will clean up the processes automatically each week. Kill any child processes. Kill the parent process.
Kill the parent process.
You are trying to pipe data from the cat command to another program, but the data output does not make sense. You believe that the system's locale is corrupting the output. To test your hypothesis, you decide to change a locale environment variable. Which of the following changed variable would MOST likely produce correct data? LC_COLLATE=C LC_NAME=C LC_NUMERIC=C LANG=C
LANG=C
Which of the following lines in the /etc/cups/cupsd.conf file will configure CUPS to listen for print jobs coming in on the server's network interface with the IP address 192.168.0.1 through the IPP port? Listen localhost:631 Listen *:631 Listen 192.168.0.0:631 Listen 192.168.0.1:631
Listen 192.168.0.1:631
Which of the following desktops were started by an Arch Linux user in response to the negative reception of GNOME 3 and continue to follow the GNOME 2 code base? Cinnamon MATE KDE Unity
MATE
You attempt to unmount a volume using the umount /dev/sdd3 command, but you receive a device is busy error message. Which of the following strategies will be MOST likely to allow you to unmount the file system? (Select TWO). Make sure your current working directory is not on the file system and try to unmount again. Use the fscls command to close any open files on the filesystem. Try to unmount again. Edit /etc/fstab and remove the mount. Try unmount again. Perform a backup of the sdd3 device and try to unmount again. Find and close any open files on the file system, and try to unmount again.
Make sure your current working directory is not on the file system and try to unmount again. Find and close any open files on the file system, and try to unmount again.
Your company has been expanding the number of servers in the company's data center, and there is an increased need to gather metrics, watch process states, work with logs, watch services states and file system usage. Which of the following sever roles should be installed to provide this functionality? Monitoring Containers Database Logging
Monitoring
Which of the following statements best describes the effects of having only the gshant user account listed in the /etc/at.allow file? Only root can use the at command. Only gshant and root can use the at command. All users but gshant can use the at command. Only gshant can use the at command.
Only gshant and root can use the at command.
Which of the following is a free, open-source scriptable screen reader that works with the GNOME desktop? GOK Gedit Emacspeak Orca
Orca
You want the directory /sbin/special to be include in the PATH environment variable. You also want to keep all the current directory entries currently in the PATH variable. Which of the following commands would you use? PATH=/sbin/special PATH=PATH&/sbin/special PATH=$PATH:$/sbin/special PATH=$PATH:/sbin/special
PATH=$PATH:/sbin/special
Which of the following functions does the -d option perform when using the apt-get command to install a package? Package installation is simulated without an actual installation. All installed packages are upgraded to the latest versions in with the information in /etc/apt/sources.list. The package database is checked for consistency and errors. Packages are downloaded to the system, but not installed.
Packages are downloaded to the system, but not installed.
Which of the following server roles would you implement to provide services offered by CUPS and IPP? Monitoring SSH Proxy Print Server
Print Server
Which of the following statements BEST describes the repeat key keyboard accessibility option? Repeat keys requires a key to be pressed for a specified time period before the key is accepted. Repeat keys cause a keyboard modifier (such as, Ctrl, Alt, or Shift) to stick when pressed. Repeat keys affect how quickly the action associated with the key is repeatedly performed when the key is pressed and held down. Repeat keys ignore fast key presses of the same key, compensating for when a user accidentally presses a single key multiple times.
Repeat keys affect how quickly the action associated with the key is repeatedly performed when the key is pressed and held down.
You have previously installed the package mplayer and wish to remove it from your computer. Which of the following removal methods should you use? Run the command rpm -e mplayer. Run the command tar -e mplayer. Run the command erase -r mplayer. Locate the files for mplayer and delete them.
Run the command rpm -e mplayer.
You need to manage a process in the foreground by pressing Ctrl+C on the keyboard. Which signal code is sent to the process? SIGHUP SIGTERM SIGKILL SIGINT
SIGINT
Which of the following provides a complete open-source solution for remote access to virtual machines? NX VNC SPICE xrdp
SPICE
Which of the following network services or protocols uses TCP/IP port 22? IMAP4 SSH TFTP NNTP
SSH
If an attacker boots into single user mode, they are logged in automatically as the root user without being required to enter the root password. Which of the following is the BEST measure should you take to prevent this event from happening? Change the file and directory permission of /boot to only allow root access. Encrypt the /boot partition. Encrypt the root user's password with md5crypt. Set a bootloader password.
Set a bootloader password.
You have just installed a new program that will be used by all users on the computer. After installation, you log in as a regular user, and you try to run the program. The program stops and displays the following error: Error: not running as root What should you do so that all users can run this program? Set the SUID on the program. Have users run the program using the su -c command. Add users to the sudoers file. Tell them to run the program using the sudo command. Make all users members of the root group.
Set the SUID on the program.
For what purpose would you edit the /etc/localtime file? Change the value of the time zone (TZ) environment variable. Set the hardware clock time. Set the system date and time. Set the current time zone.
Set the current time zone.
Setting the SUID flag is a powerful and useful feature. It can have weaknesses associated with its use. Which of the following statements identifies a weakness? There are no weaknesses to using the SUID flag. Setting the SUID flag for an application or process owned by the root user is a potential security hole. Setting the SUID flag is a one-time event that reverts after execution, forcing the root user to reset the flag every time. Only twelve applications or processes may be run at the same time by setting the SUID flag for root user permissions.
Setting the SUID flag for an application or process owned by the root user is a potential security hole.
Which of the following represent a typical Linux backup type? (Choose FIVE.) Snapshot Full Incremental Tarball Archival Asynchronous Image Differential
Snapshot Full Incremental Image Differential
Match the locale environmental variable name on the left with the description on the right.
Specifies personal name format. LC_NAME Specifically used an override for LC_MESSAGES. LANGUAGE A special variable for overriding every other evironment setting. It sets all locales to the same setting. LC_ALL Defines every locale setting at once while allowing further individual customization via the LC_* settings. LANG
IPv6 is configured using several methods. In which method do clients use Neighbor Discovery Protocol to send router solicitation and router advertisement messagesto learn the subnet prefix and default gateway as part of an automatic interface ID generation process? Static full assignment Static partial assignment DHCPv6 Stateless autoconfiguration
Stateless autoconfiguration
Your system is currently running the multi-user.target. You want to enable bluetooth.service to run when graphical.target is loaded. There are two commands you must enter from a command prompt to accomplish this task. Drag the commands on the left to the appropriate step number on the right. Not all of the commands on the left will be used.
Step One systemctl isolate graphical.target Step Two systemctl enable bluetooth.service
Which of the following special permissions prevents a file's deletion by anyone except the file's owner? Sticky bit SGID SUID Umask
Sticky bit
Which of the following is the primary role of a mail transfer agent (MTA)? Provide redundant online storage for the mail sever. Control the bandwidth used by mail user agent (MUA). Transfer mail to a print server queue. Store messages so they can be downloaded or send email to a destination MTA.
Store messages so they can be downloaded or send email to a destination MTA.
Drag the permission string on the left to the category on the right. Some permission strings will not be used.
Symbolic link lrwxrwxrwx Hard link -rwxr-xr-x
A user type has the following qualities: Created by default during the Linux installation Used by the system for specific roles Not used to log into the system Which of the following user types has these qualities? Root user Standard user Guest user System or service user
System or service user
You are an application developer. You are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability? IP TFTP UDP TCP RIP
TCP
Which of the following statements BEST describes the effects of the split -50 -d -a 3 AllNames FiftyNames- command if there are 103 lines and 240 bytes in the file? The AllNames file is split into three files containing 50 lines or less. The output is FiftyNames-1, FiftyNames-2, and FiftyNames-3. The AllNames file is split into five files containing 50 bytes or less. The output is FiftyNames-001, FiftyNames-002, FiftyNames-003, FiftyNames-004, and FiftyNames-005. The AllNames file is split into three files containing 50 lines or less. The output is FiftyNames-001, FiftyNames-002, and FiftyNames-003. The FiftyNames file is split into five files containing 50 bytes or less. The output is AllNames-001, AllNames-002, AllNames-003, AllNames-004, and AllNames-005.
The AllNames file is split into three files containing 50 lines or less. The output is FiftyNames-001, FiftyNames-002, and FiftyNames-003.
Which of the following statements BEST describe the purpose of the Filesystem Hierarchy Standard (FHS)? (Select TWO). The FHS allows users to create a custom hierarchy of directories. The FHS allows users to predict where to find system configuration files. As users create files, the FHS forces users to place the files in specific directories. The FHS allows software installation routines to predict where to place configuration files. The FHS allows software installation routines to determine the permissions of specific directories.
The FHS allows users to predict where to find system configuration files. The FHS allows software installation routines to predict where to place configuration files.
Drag the GRUB 2 file or directory on the left to the correct description on the right.
The GRUB2 configuration file (non-editable). /boot/grub2/grub.cfg The GRUB2 directory for script files. /etc/grub.d/ The GRUB2 configuration file (editable). /etc/default/grub The script that identifies kernels on the root device and creates menu entries. 10_linux The script file that allows menu entries to be modified. 40_custom
Which of the following BEST describes the role of the Linux desktop? The Linux desktop manages input devices such as the mouse and keyboard and controls output to monitors and printers. The Linux desktop adds a series of tools and utilities to make the GUI useful. The Linux desktop takes the information from the display server and renders it so that it can be displayed on the screen. The Linux desktop controls the placement and appearance of windows on a Linux computer.
The Linux desktop adds a series of tools and utilities to make the GUI useful.
Mario, a technician, executed pgrep -u sally and received the following result: 1036 Which of the following describes the result? The permission ID for the user Sally. The UID for the user sally located by searching the entire file system for active processes. The process ID of the process that was executed by the user sally. The PID for the process named sally.
The PID for the process named sally.
You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open connection to the host, on port 23. No connection could be made because the target machine actively refused it." What may be the problem? The Telnet server is not running. The DNS server is down. The Telnet client is not installed.
The Telnet server is not running.
Which of the following has a process ID (PID) of 1? The BIOS The boot loader The initial process The OS kernel
The initial process
Match the vi mode on the left to the correct definition on the right.
The initial vi mode used when vim is started. It has commands that cut and replace text, and it is the mode vi uses to enter the other modes. -Command Mode The vi mode that works with the file system. Use it to save files after editing them. -Command Line Mode The vi mode that vim uses to write and edit text in the file. -Edit Mode
The ls command in the current working directory gives the following listing: lrwxrwxrwx 1 root root 4 2010-11-05 mydata -> shantsgems-rwxr-xr-x 1 root root 382 2010-10-05 shantsgems Which of the following is true of the files in this listing? The shantsgems file is a backup of the mydata file. The shantsgems file is a link to the mydata file. The mydata file is a hard link to the shantsgems file. The mydata file is a symbolic link to the shantsgems file.
The mydata file is a symbolic link to the shantsgems file.
Leroy tries to copy some files to an ext3 volume and received the following error: "No space left on device." Leroy executes the df command and determines that there is sufficient space to copy the files. He also verifies that he has permission to copy the files. Which of the following BEST describes Leroy's problem? The destination directory is set to read-only. The File Allocation Table is full. The number of inodes has been exhausted. The files have the immutable attribute set, so they cannot be copied to the destination.
The number of inodes has been exhausted.
You are viewing the /etc/passwd file, and you notice the following entry: pclark:x:1001:1001:Petunia Clark:/home/pclark:/bin/bash What statement BEST describes this entry? The pclark user account is locked. The pclark user account has not set a password. The pclark password is stored in the /etc/shadow file. The pclark password is the letter x.
The pclark password is stored in the /etc/shadow file.
Ted, a Linux user, creates symbolic links in his home directory to a set of files in their /data directory using the ln -s command. Later, a system administrator deletes the files in the /data directory. What happens to the symbolic links that Ted created? The files would not be deleted because duplicate files were created when Ted created the links. The symbolic links still exist in Ted's home directory, but they are useless because the link has been broken. The links in Ted's home directory are automatically removed when the administrator deletes the files. Ted can still access the files until the system is rebooted even though they are deleted because the links point to a cached copy of the files in memory.
The symbolic links still exist in Ted's home directory, but they are useless because the link has been broken.
While reading about file system permissions in Linux, you discover that the default permissions assigned to new files when they are created are rw-rw-rw- (666 octal), and new directories are rwxrwxrwx (777 octal). However, when you create a new file in a directory called /data, the permissions assigned are rw-r--r--. Which of the following BEST explains the results you are seeing? Because you are logged in as a normal user and not the root user, all files that you create will be created with a more restrictive set of permissions. There are more restrictive permissions assigned to the /data directory, and any new files created inside that directory will inherit the more restrictive permissions. You are logged in as the root user, and all files created by the root user are assigned these permissions. Only normal users get rwxrwxrwx (777 octal) permissions on newly created files. The umask must be set to 0022 and, therefore, block the write permission for the group owner and everyone else.
The umask must be set to 0022 and, therefore, block the write permission for the group owner and everyone else.
What would be the outcome of the following command? userdel -r jjones The user account, jjones, would be deleted along with jjones's home directory. The user account, jjones, would be deleted, but jjones's home directory would be left untouched. The user account, jjones, would be deleted along with jjones's home directory and all files owned by jjones. The user jjones's home directory would be deleted, but the user account would still exist.
The user account, jjones, would be deleted along with jjones's home directory.
The following line is a sample entry in the /etc/shadow file: lclark:$ab7Y56gu9bs:12567:0:99999:7::: What does the second field represent? The users unencrypted password. The users GUID number. The users UID number. The users encrypted password.
The users encrypted password.
Using the vi editor in Insert Mode, you made a few changes to the /boot/grub/grub.conf file. You now need to switch to command mode, save the changes, and quit. Which of the following keystrokes and commands should you use? (Select TWO.) (Each answer is a required part of the solution.) Type :w! Type :q! Type :wq Press the Ctrl key Press the Esc key
Type :wq Press the Esc key
You need to create a large number of files, and you would like to ensure that you, the user owner, are the only person that has read and write permissions to the files. The files will be located in a number of different directories that already contain other files you don't want modified. How could you BEST create these files with the correct permissions using the LEAST amount of effort? Run chmod -R 600 on all of the directories in which you created the new files. Make a list of all the files you created and run umask 0066 on each of them to change their permissions. Type umask 6600 to change your umask. Type umask 0066 to change your umask.
Type umask 0066 to change your umask.
The hard disk in your Linux laptop has almost reached its maximum storage capacity. You would like to add more hard disk storage but there is no room internal to the computer. Which of the following device types is BEST to use if you want to achieve the fastest throughput? USB GPIO Bluetooth PCI
USB
Which of the following devices is a hotplug device? CPU (Central Processing Unit) USB flash drives RAM (Random Access Memory) chips PCI Express cards
USB flash drives
Which of the following character sets is a variable length encoding standard of Unicode that uses one to four 8-bit bytes to support many languages and most commonly used on Linux? UTF-8 LC_ALL ASCII LANG
UTF-8
Which of the following desktops was the default for Ubuntu until 2017? Unity GNOME KDE Cinnamon
Unity
Which of the following is the maximum number logical partitions allowed on an extended partition? 2 1 Unlimited 4
Unlimited
Which of the following methods should you use to configure dynamic libraries on a Linux system? (Select TWO). Edit all files with the .a filename extension. Use the LD_LIBRARY_PATH environment variable to specify additional directories to search for library files. Modify /etc/ld.so.conf to add the path of the libraries. Modify /etc/ld.so.cache to add the path of the libraries
Use the LD_LIBRARY_PATH environment variable to specify additional directories to search for library files. Modify /etc/ld.so.conf to add the path of the libraries.
Which of the following users MOST benefit from the sticky keys accessibility option? Users who press and hold down keys by accident. Users who press single keys multiple times by accident. Users who have difficulty pressing multiple keys at the same time. Users who need a tactile representation of the keys.
Users who have difficulty pressing multiple keys at the same time.
Which of the following statement describes file globbing? Indexing files for the locate command. Using wildcards to match specific files. Determining the category of the file or command. Displaying which commands use specific files.
Using wildcards to match specific files.
Linux provides technology that allows the user to remotely view a graphical user interface and control mouse and keyboard events.Which of the following technologies establishes a connection with a remote computer using a viewer on one end and a server on the remote end? SPICE VNC XRDP
VNC
Which of the following is a characteristic of a hard link? Lowercase L (l) as the first character in the permission string. Distinct (non-duplicate) inode. Valid inode for the file data even if the original file is deleted. Works across volumes and file systems.
Valid inode for the file data even if the original file is deleted.
Which of the following functions does the rpm -V command perform? Verifies that an RPM package is free from errors. Updates an installed RPM package to the newest version. Tests an RPM package for uninstalled dependencies without actually installing it. Checks the authenticity of the RPM package.
Verifies that an RPM package is free from errors.
A service account is created by the system or an application and cannot be used to log in to the system. Which of the following methods can be used to verify that a service account cannot login to the system? View the ACLs for /bin/login to ensure that the service account is not listed. View the entry for the service account in /etc/shadow and look for /sbin/nologin. Verify that file and directory permissions have been removed for the service account to the /boot partition. View the entry for the service account in /etc/passwd and look for /sbin/nologin.
View the entry for the service account in /etc/passwd and look for /sbin/nologin.
You have been currently using a cable to connect your Linux laptop to the company network. You are now, however, required to attend several meeting a week in other parts of the building and you would like to be able to bring your laptop with you, but still need access to the network while in the meeting. Which of the following device types would BEST meet your needs? SATA HBA SCSI WiFi
WiFi
Which of the following are examples of a Linux display server? (Select TWO). Wayland compositor KWin KDE X11 Unity
X11 Wayland compositor
Which X11 Window System element is the MAIN system component? Window manager X11 system X11 server Desktop environment
X11 server
Your company has implemented both Linux and Window servers. The system administrators use Windows desktops, so they have access to Windows administration tools. They routinely access the Windows servers using Windows Remote Desktop. Which of the following implementations would allow the system administrators to connect to the Linux systems using Windows Remote Desktop? XRDP NX SPICE VNC
XRDP
When configuring bonding on two network interfaces, the technician wants to configure one interface to take over if the other interface fails. Which of the following bonding modes should be used to provide a hot standby? balance-rr, or mode 0 802.3ad, or mode 4 balance-xor, or mode 2 active-backup, or mode 1
active-backup, or mode 1
Which of the following commands creates a shortcut that can be used to run the tail -f /var/log/messages command? export alias="tail -f /var/log/messages" env alias="tail -f /var/log/messages" alias sysmesg="tail -f /var/log/messages" export sysmesg="tail -f /var/log/messages"
alias sysmesg="tail -f /var/log/messages"
Which of the following commands stores the output of the ls -a command in a shell variable named allfiles? allfiles="exec ls -a" allfiles=$((ls -a)) allfiles=$(ls -a) allfiles=${ls -a} allfiles="ls -a"
allfiles=$(ls -a)
If a system is down at the time a recurring regularly scheduled task is supposed to run, which task scheduling service will run the task when the system is back up again? anacron cron at recron
anacron
Which of the following statements correctly describe the differences between the apt-get remove and apt-get purge commands? (Select TWO). apt-get purge removes a specified package, but leaves the configuration files. apt-get purge removes the package and the configuration files. apt-get remove removes a specified package, but leaves the configuration files. apt-get remove leaves the package installed, but removes the configuration files.
apt-get purge removes the package and the configuration files. apt-get remove removes a specified package, but leaves the configuration files.
You have installed a package called mathpac with apt-get. After a system upgrade, the package is not working correctly. Which of the following commands is the MOST correct method to get the package to work? apt-get upgrade mathpac apt-get update mathpac rpm -U mathpac apt-get dist-upgrade mathpac
apt-get upgrade mathpac
Which of the following Debian package management utilities provides the front end for APT? dpkg aptitude apt-get apt-cache
aptitude
Which of the following commands removes a job from the at queue? (Select TWO. Each answer is an independent solution.) at -l at -f atrm at -d atq
atrm at -d
Which awk/sort command combination displays a sorted list of usernames in the /etc/passwd file? awk -F: '{print $2}' /etc/passwd | sort awk -F: '{print $1}' /etc/passwd | sort awk '{print $1}' /etc/passwd | sort awk '{print $A}' /etc/passwd | sort
awk -F: '{print $1}' /etc/passwd | sort
Which of the following commands sorts the contents of the wordlist1 and wordlist2 files and sends the result to standard output? cat /usr/wordlist1 >> /usr/wordlist2 | tee cat /usr/wordlist1 /usr/wordlist2 | sort cat /usr/wordlist1 > /usr/wordlist2 | sort cat /usr/wordlist1 | /usr/wordlist2 | sort
cat /usr/wordlist1 /usr/wordlist2 | sort
Which of the following commands sorts the combined contents of the wordlist1 and wordlist2 files and sends the results to both the screen and a file named sortedwordlist? cat /usr/wordlist1 /usr/wordlist2 | sort | tee sortedwordlist cat /usr/wordlist1 /usr/wordlist2 | tee sortedwordlist cat /usr/wordlist1 >> /usr/wordlist2 | sort sortedwordlist cat /usr/wordlist1 /usr/wordlist2 | sort sortedwordlist
cat /usr/wordlist1 /usr/wordlist2 | sort | tee sortedwordlist
Which of the following commands gives the same results as cat < turbo? cat 2> turbo cat turbo cat 1> turbo cat &> turbo
cat turbo
You are the team lead for a marketing project. Only the members of the team3 group should have read/write permissions to a document called project_data.doc. You want to ensure that no one on the team will delete the document by accident. Your user name is bsmith.A long listing of the file is as follows: -rwxr-xr-x 1 bsmith team3 7260 June 22 2004 project_data.doc Which of the following commands will accomplish this task? chgrp bsmith project_data.doc chmod 1664 project_data.doc chown :bsmith project_data.doc chmod 744 project_data.doc
chmod 1664 project_data.doc
You need to set the SUID permission on a file named rider. Which of the following commands will accomplish this task? chmod rider 1777 chmod 2777 rider chmod 4777 rider chmod 1777 rider
chmod 4777 rider
You must change ownership of a script called myscript so that only the user owner has read/write access to it and only the user owner and group owner have execute permissions. Which of the following commands will accomplish this task? chmod 750 myscript chmod 771 myscript chmod 611 myscript chmod 755 myscript
chmod 750 myscript
A file named acctg needs to have the SGID permission set on it while keeping all other permissions at their present value. Which of the following commands will accomplish this task? chmod 1777 acctg chmod g+s acctg chmod s+g acctg chmod +g acctg
chmod g+s acctg
There is a directory called projects owned by the user cmarcela and the group rd. cmarcela has left the company. You need to give ownership of the projects directory, its files, and its subdirectories to the user ebates, who is a member of the mgmt group. Which of the following commands should you use to change the user ownership? chown -R ebates projects chown .ebates projects chown ebates projects chown -R ebates.mgmt projects chgrp -R mgmt projects
chown -R ebates projects
Which of the following commands would be used to make nstevens the owner of all of the files and directories in the /docs directory? chown -v nstevens /docs chown -f nstevens /docs chown nstevens /docs chown -R nstevens /docs
chown -R nstevens /docs
Which of the following commands make sales the group owner of the /sales/report file? (Select TWO. Each answer is an independent solution.) chown :sales /sales/report chmod .sales /sales/report chown .sales /sales/report chgroup sales /sales/report
chown :sales /sales/report chown .sales /sales/report
You use ls -l /home/sales/sales_projection_q2 and get this information: drwxr-xr-x 22 pclark acct 4096 Jun 19 15:01 sales_projection_q2 Which of the following commands will change the user owner to jyoung and the group owner to sales? chown jyoung sales /home/sales/sales_projection_q2 chown jyoung,sales /home/sales/sales_projection_q2 chmod jyoung:sales /home/sales/sales_projection_q2 chown jyoung:sales /home/sales/sales_projection_q2 chgrp jyoung:sales /home/sales/sales_projection_q2
chown jyoung:sales /home/sales/sales_projection_q2
Which of the following command copies the entire /temp directory with all of its files, sub-directories, and files in the sub-directories to the /home/gshant directory. (Select TWO. Each answer represents an independent solution.) cp -q /temp /home/gshant cp -s /temp /home/gshant cp -r /temp /home/gshant cp -R /temp /home/gshant cp /temp /home/gshant
cp -r /temp /home/gshant cp -R /temp /home/gshant
A Linux administrator is logged in as root and needs to copy a file named letter.doc from the USB flash drive mounted under /media/usb. Which of the following commands will copy the file from the USB flash drive to the root user's home directory? cp /dev/usb/letter.doc /root cp /media/usb/letter.doc home: cp /mnt/usb:letter.doc /root cp /media/usb/letter.doc /root
cp /media/usb/letter.doc /root
Tom, a shell script developer, knows that the date +%A command gives the current local weekday name (Sunday, Monday, Tuesday, ...). Which of the following commands will copy the authentication log file, /var/log/auth.log, to a new file that with a filename that includes the current local weekday name? cp /var/log/auth.log ~/auth${date +%A}.log xargs /var/log/auth.log ~/auth$(date +%A).log cp /var/log/auth.log ~/auth$(date +%A).log tee /var/log/auth.log > date +%A -log
cp /var/log/auth.log ~/auth$(date +%A).log
You want to restore files with the extension .cfg from an archive called configs.cpio. Which command will perform the restore? cpio -ivd ".cfg" < /mnt/hdd2/configs.cpio cpio -ivd "*.cfg" < /mnt/hdd2/configs.cpio cpio -ivd /mnt/hdd2/configs.cpio < "*.cfg" cpio -ivd "cfg" < /mnt/hdd2/configs.cpio
cpio -ivd "*.cfg" < /mnt/hdd2/configs.cpio
Which command could you use to verify whether a crontab file exists for the thobbs user? crontab -r -u thobbs crontab -a -u thobbs crontab -l -u thobbs crontab -e -u thobbs
crontab -l -u thobbs
After logging in as root, you need to manage the crontab files for your Linux system. Which command should you use to edit the crontab file for the gshant user account? vi /etc/crontab crontab -ue gshant crontab -ur gshant crontab -ul gshant
crontab -ue gshant
You are configuring the /etc/cups/cupsd.conf file. Which command should you use to prevent remote printers from being displayed on the local system? cupsctl --remote-printers cupsctl --no-share-printers cupsctl --no-remote-admin cupsctl --no-remote-printers
cupsctl --no-remote-printers
Which of following commands displays information found in the second column of the tab delimited ~/smarts file? cut -f2 ~/smarts expand -f2 ~/smarts fmt - t2 ~/smarts join -t2 ~/smarts
cut -f2 ~/smarts
You are requested to help a user who reports that he has no more local storage space. You go to his system and log in as the root user. Which of the following commands will display the available disk space on all partitions? (Select TWO). du -a du -h df -h fdisk -free dskuse -free df
df -h df
When creating an ext2 or ext3 file system, a fixed number of inodes is assigned. Which of the following commands shows the number of inodes, number of free inodes, and number of used inodes? ls -i mke2fs -i df -i du --inodes
df -i
You have created a separate partition for the sales team and mounted it to the /sales directory. The team is about to begin a new project, and they want to make sure there is enough disk space to hold upcoming files. Which of the following commands will show you the amount of free space? part /sales diff /sales df /sales free /sales
df /sales
You have installed a package called mathpac with DNF. After a system upgrade, the package is not working correctly. Which of the following commands should you try first to get the package to function? rpm -U mathpac dnf update mathpac dnf upgrade mathpac dnf remove mathpac and then dnf install mathpac
dnf update mathpac
Which of the following commands will reconfigure an already installed package? apt-get -clean dpkg-reconfigure dpkg --configure apt-get -f
dpkg-reconfigure
You want to view the number of commands your bash shell is set to save by examining the current HISTSIZE environment variable. You don't want to have to scroll through all the environment variables. Which of the following commands is the BEST way to determine the current value of the HISTSIZE variable? cat $HISTSIZE echo $HISTSIZE cat /etc/profile | grep "HISTSIZE" HISTSIZE=
echo $HISTSIZE
Which of the following commands shows the value of the LANG environmental variable currently set for the language the operating system uses? echo %LANG echo LANG echo $LANG echo %LANG%
echo $LANG
Which of the following commands would display this output? Frank said, "Linux is fun!" echo "Frank said," "Linux is fun!" echo Frank said, \"Linux is fun\!\" echo Frank said, "Linux is fun\!" echo Frank said, "Linux is fun!"
echo Frank said, \"Linux is fun\!\"
Which of the following commands will open the quota file for a specific user? quotaon -u repquota -u quota -u edquota -u
edquota -u
Two users should have identical settings, yet one is having problems with the display on his screen, and you suspect there is a difference in their environment variables. Which of the following commands displays all of the environment variables? echo display env print
env
You need to set the COMP variable to the value 1745. Which of the following commands sets the variable so it is inherited by subsequent child shells? set COMP=1745 COMP=1745 export COMP=1745 set COMP to 1745
export COMP=1745
Tim, a technician, created a local variable named val and set it to 5000 at the bash prompt. Tim wants to use the variable in a script. But when the script is executed, the value of val is not set to 5000. Which of the following commands would allow Tim to set a global variable that would be available to the script? echo $val=5000 exec val export val=5000 declare val
export val=5000
The system requirements for a new Linux computer show that the system will primarily be used to store documents of small size. Which of the following file systems would be the MOST efficient at storing these documents on a Linux system? ext3 HPFS ext4 ext2
ext4
Which of the following Linux file systems support journaling? swap VFAT ext4 ext2
ext4
Which of the following is the MOST common Linux file system? ReiserFS XFS ext4 JFS
ext4
Which of the following commands/command sequences can be used to view the partition information on the first hard disk? (Select TWO.) cat /etc/part fdisk /dev/sd1, then press p fdisk /dev/sda, then press p cat /proc/part fdisk -l
fdisk /dev/sda, then press p fdisk -l
Which of the following commands partitions the second hard disk on a Linux system? format /dev/sdb1 fdisk /dev/sdb fdisk /dev/sdc fdisk /sd0-1
fdisk /dev/sdb
You have several processes running in the background, as shown by the jobs command below: [1]+ Running gedit &[2]+ Stopped crontab e Which command will bring the gedit program to the foreground? fg [1] bg 1 fg 1 fg edit
fg 1
Which of the following commands finds files with the .txt extension in the /home/gshant directory? find /home/gshant -name '*txt*' find /home/gshant -type d -name '*text*' find /home/gshant -type f -name '*text*' find /home/gshant -name '*.txt'
find /home/gshant -name '*.txt'
You are accessing the /home/shants/depsmark text file through a terminal connection. The file has long lines of text, yet your terminal only shows 75 characters per line. Which of the following commands will limit the lines in the file to the limits on the terminal? cut -w 75 /home/shants/depsmark pr -w 75 /home/shants/depsmark fmt -w 75 /home/shants/depsmark nl -w 75 /home/shants/depsmark
fmt -w 75 /home/shants/depsmark
Which partition management utility can be used to define and change various different GUID partition configurations without committing the configuration to the disk until the w command is used? gdisk lsblk parted fdisk
gdisk
What is the result of the nohup gedit & command? gedit will start in the background and terminate after logging out of the shell. gedit will start after logging out of the shell. gedit will start in the background and persist in the background after logging out of the shell. gedit will start in the foreground and terminate after logging out of the shell.
gedit will start in the background and persist in the background after logging out of the shell.
You have a group named temp_sales on your system. The group is no longer needed, and you want remove the group. Which of the following is the BEST command for accomplishing this task? groupmod -n temp_sales groupdel temp_sales newgroup -R temp_sales groupmod -R temp_sales
groupdel temp_sales
Due to a merger with another company, standardization is now being imposed throughout the company. As a result of this, the sales group must be renamed marketing. Which of the following is the BEST command to use to rename the group? grpconv marketing sales groupmod -n marketing sales grpchange marketing sales groupadd -c marketing sales
groupmod -n marketing sales
Which of the following commands will help you to determine which version of GRUB is installed on your Linux system? grub1.98-install -V grub-install -v update-grub grub2-install --version
grub-install -v grub2-install --version
Which of the following describes the effects of the ls -l /usr/bin >> /tmp/list.txt command? The contents of the /usr/bin directory are written to a file named /tmp/list.txt. Previous file contents are be overwritten. The contents of the /usr/bin directory are written to both the screen and to a file named /tmp/list.txt. Previous file contents are overwritten. The contents of the /usr/bin directory are written to a file named /tmp/list.txt. Previous file contents are kept, and the new information is added at the beginning of the file. The contents of the /usr/bin directory are written to a file named /tmp/list.txt. Previous file contents are kept, and the new information is added at the end of the file.
he contents of the /usr/bin directory are written to a file named /tmp/list.txt. Previous file contents are kept, and the new information is added at the end of the file.
Which of the following commands should a Linux user enter to see a list of all the commands the user recently ran at the command prompt? chsh history uname clear
history
You need to set the hardware clock to the same value as the system clock. Which command should you use? hwclock -w hwclock -r hwclock -a hwclock -s
hwclock -w
You need to temporarily change the IP address of the network interface (enp2s0) to 192.168.1.50. The network interface's IP address is currently set to 10.0.1.50. Which of the following commands would achieve the desired result? echo "IPADDR=192.168.1.50" >> /etc/sysconfig/network-scripts/ifcfg-enp2s0 ifconfig enp2s0:1 192.168.1.50 ifconfig enp2s0 192.168.1.50 /etc/init.d/network enp2s0 182.168.1.50
ifconfig enp2s0 192.168.1.50
ou are experiencing a problem with a SysV init network server. You want to bring the system down and try reseating the cards within it before restarting it. Which command completely shuts down the system in an orderly manner? init 0 init 1 init 5 init 6
init 0
The enp2s0 network interface has already been assigned the IP configuration 172.16.1.123/16. Which command would you use to temporarily configure a second IP address of 192.168.0.123/24 for this network interface? ip addr add 192.168.0.123/24 dev enp2s0 ipconfig enp2s1 192.168.0.123/24 ipconfig enp2s0 192.168.0.123/24 ifconfig enp2s0 192.168.0.123/24
ip addr add 192.168.0.123/24 dev enp2s0
You need to set an IP address for enp2s0 to 192.168.15.2 with a subnet mask of 255.255.255.0. Which commands are correct? (Select TWO). ipconfig enp2s0 192.168.15.2 255.255.255.0 ipconfig enp2s0 192.168.15.2 netmask 255.255.255.0 ip addr add 192.168.15.2/24 dev enp2s0 ifconfig enp2s0:1 192.168.15.2 netmask 255.255.255.0 ifconfig enp2s0 192.168.15.2 255.255.255.0 ifconfig enp2s0 192.168.15.2 netmask 255.255.255.0
ip addr add 192.168.15.2/24 dev enp2s0 ifconfig enp2s0 192.168.15.2 netmask 255.255.255.0
Which commands display the IP address and subnet mask values configured on a workstation? (Select TWO). route ip addr show netstat arp ifconfig
ip addr show ifconfig
Linux systems that use SysVinit (init) use the syslogd daemon to manage logging. Which of the following daemons is used on newer system-based distributions to provide a local system log file? rsyslog journald syslog systemctl
journald
A developer calls you with a problem. She was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. It has now entered runaway mode. The PID number is 2345. She attempted to stop the process with the standard kill command, but it had no effect. Which command would you use to assure that the process will terminate? kill 2345 -9 kill 2345 -NOW kill -9 2345 kill -NOW 2345
kill -9 2345
A service specialist from your company calls you from a customer's site. He is attempting to install an upgrade to the software, but it will not install; instead, it he receives messages stating that he cannot install the program until all non-core services are stopped. You cannot remotely access the machine, but the representative tells you that there are only four processes running, and their PID numbers are 1, 10, 100, and 1000. With no further information available, which command would you recommend the representative run? kill 1 kill 10 kill 100 kill 1000
kill 1000
After a severe lightning strike nearby, a number of processes seem to be running on the server in runaway mode. Which utility terminates these processes by name, and not just by process ID number? closeproc endall killall down
killall
You have been asked to temporarily fill in for an administrator who has just been fired. This administrator was known to have lax security standards, and you suspect that passwords are still kept in the /etc/passwd file. Which of the following entry within the passwd file would indicate that the passwords are stored there? adam:x:341:52:Adam Fox:/users/adam:/bin/bash kolton:34uyx:431:0:Back Door:/root:/bin/bash eddie:x:100:100:://users/eddie: clifford:x:687:301:non secure user:/root:
kolton:34uyx:431:0:Back Door:/root:/bin/bash
Which of the following commands shows failed login attempts on the system? lastlog tail sar lastb
lastb
Which of the following commands reloads the libraries for the /bin/bash executable, but does not update the cache? ldconfig -N /bin/bash ldd -v /bin/bash ldconfig -X /bin/bash ldd /bin/bash
ldconfig -N /bin/bash
A technician is configuring a server with four network interface cards to use a round robin scheduling algorithm. This algorithm transmits packets on the first available network interface. Which of the following is provided by this configuration? load balancing hot swap updelay downdelay
load balancing
Your Linux system was installed for you while you were living in the United States of America. You have since been transferred to a satellite office located in Wood Walton, England, and have taken your computer with you. Since England uses the larger A4 paper size, you would like to change the LC_PAPER locale environment variable. Which of the following is the BEST shell command to use for this purpose? localectl echo iconv export locale
localectl
Which of the following utilities would you use to search a path for files that match a given name? locate cat tail type
locate
Which of the following commands manages, compresses, renames, and deletes log files based on a specific criteria such as size or date? lastlog logrotate logger dmesg
logrotate
Which of the following commands removes all files from the print queue? lpc remove lpc status lpc clear lpc clean
lpc clean
You want to send the yearend.txt file to the acctg printer. Which command should you use? lpr -P acctg yearend.txt lpq yearend.txt lpq -P acctg yearend.txt lpout -P acctg yearend.txt
lpr -P acctg yearend.txt
Anna is attempting to unmount the mount point /mnt/data. The umount command failed and displayed error message stating that the device is busy. Anna suspects there my be an open file causing the issue. Which of the following commands will show Anna a list of open files? uname awk lsof stat
lsof
Which of the following commands will display information about the PCI devices installed on the system? hwinfo lspci lsmod lsusb
lspci
Which of the following commands creates a logical volume named video from the home volume group and configures it with 2 TB of disk space? lvcreate -L 2T -n home video vgcreate -L 2T -n video home lvcreate -L 2T -n video home vgcreate -L 2T -n home video
lvcreate -L 2T -n video home
Which of the following commands searches man pages for a specific keyword? (Select THREE.) export man -k apropos whatis find slocate help
man -k apropos whatis
Which of the following utilities is used to manage and monitor software RAID devices? /dev/mapper lvscan pvscan mdadm
mdadm
Fred, a Linux administrator, needs to create the directory /var/oracle/database/9i. Only the directory /var currently exists. The current working directory is the root of the filesystem. Which of the following commands will create the directory path? mkdir -p /var/oracle/database/9i mkdir /var/oracle/database/9i md -path /var/oracle/database/9i mkd /var/oracle/database/9i
mkdir -p /var/oracle/database/9i
Which of the following commands formats the second partition on the fourth disk drive with the ext3 file system? mke2fs -e3 /dev/sdd2 mke2fs -j /dev/sdd2 format -e3 sdb2 fdisk -e3 /dev/sdb2
mke2fs -j /dev/sdd2
One of the Linux servers for the accounting department needs additional memory to fix recent performance issues. You have ordered the memory, but it is backordered, so you decide to add a swap partition to the server to help the performance issues immediately. Which of the following commands will add a swap partition to the first partition on the third hard drive? swapon /dev/sdc1 vmstat fdisk mkswap /dev/sdc1
mkswap /dev/sdc1
Which of the following commands will check for dependencies before removing the debug module from the kernel? rmmod -r debug rmmod debug modprobe -rd debug modprobe -r debug
modprobe -r debug
You just got a new input device named GamePad that you want to use on your computer. You don't think that the GamePad driver (the kernel module) was compiled into the kernel of your Linux distribution. Which of the following commands will install the driver (gamepad.ko) into the kernel? (Select TWO). depmod gamepad insmod gamepad modprobe gamepad insmod gamepad.ko
modprobe gamepad insmod gamepad.ko
Which of the following commands will check for dependencies before loading the gameport module in the kernel? depmod gameport modprobe gameport modprobe -d gameport insmod gameport
modprobe gameport
A user is trying to access a file system mounted at /mnt/sdb1, but receives an error that states No such file or directory. Which commands can you use to see the current mount points? (Select TWO). fsck mntchk mount df mntfs mounts
mount df
A number of new file systems have been added to the server and you want them to be active now. You also do not want to bring the server down. Which command makes the changes active? mount -t init q mount -r mount -a
mount -a
You have partitioned and formatted a new hard drive, sdc. You want to mount the first partition on sdc to directory /mnt/newdisk. Which command will perform the mount correctly? mount /dev/sdc1 /mnt/newdisk mount /mnt/newdisk /dev/sdc1 mount /dev/sdc /mnt/newdisk mount /sdc1 /mnt/newdisk mount /dsk/sdc_first /mnt/newdisk
mount /dev/sdc1 /mnt/newdisk
You are working on a Linux distribution that uses systemd. Which file in the /usr/lib/systemd/system/ directory is text-based and used to start the services that support multiple users and support networking? init.d default.target rc-sysinit.conf multi-user.target graphical.target
multi-user.target
Which of the following commands will move a file from one location to another? mv move copy -r cp -d
mv
Which of the following commands will change the /home/pmallory/reports file's name to reports.bak? rm /home/pmallory/reports /home/pmallory/reports.bak mv /home/pmallory/reports /home/pmallory/reports.bak touch -n /home/pmallory/reports /home/pmallory/reports.bak cp -n /home/pmallory/reports /home/pmallory/reports.bak
mv /home/pmallory/reports /home/pmallory/reports.bak
Joe, a bash script developer, is trying to debug a shell script named myscript. Which of the following commands would record the output of the script in a text file? echo myscript >> testfile.txt myscript | testfile.txt myscript | echo | testfile.txt myscript >> testfile.txt
myscript >> testfile.txt
Which of the following commands utilize command substitution? (Choose TWO.) echo -e "sort -r names.txt" myvar=`sort -r names.txt` myvar=$(sort -r names.txt) myvar="echo 'sort -r names.txt'"
myvar=`sort -r names.txt` myvar=$(sort -r names.txt)
Which of the following commands starts the gedit program with a priority one above the default nice priority? nice -n -19 gedit nice -n 1 gedit nice -n -20 gedit nice -n -1 gedit
nice -n -1 gedit
Which of the following statements BEST describes the nl -s ": " myfile command? nl adds the number, a colon, and a space to the front of each line in the file. nl adds the link, a colon, and a space to the front of each line in the file. nl adds a colon and a space to the front of each line in the file. nl adds the octal format, a colon, and a space to the front of each line in the file.
nl adds the number, a colon, and a space to the front of each line in the file.
Which of the following commands manages the NTP daemon from the command line? ntpd ntpdate ntpq insserve ntp
ntpd
Which of the following NTP configuration utilities is deprecated and should be avoided when possible? ntpq ntpd ntptrace ntpdate
ntpdate
While in vi Command Mode, you copy a whole line of text to the general buffer. You then navigate to a different location in the file. Which of the following commands will paste the copied text? u dw p cc
p
Marco recently made some partition changes, and the kernel is not recognizing the partitions. Which of the following commands should Marco use to resolve the problem? partprobe cat /etc/partitions df fdisk -l
partprobe
Which of the following utilities would you typically use to lock a user account?(Select TWO. Each answer represents an independent solution.) userdel passwd usermod useradd
passwd usermod
Which of the following commands merges two files on a line-by-line basis and separate each line with a tab? od join paste pr
paste
Which of the following commands will merge two files based on identical fields of text? od join paste pr
paste
You are an IT consultant for a small company. The company wants to increase the security of their small network. You want to move their passwords from the /etc/passwd file to the /etc/shadow file. Which of the following utilities will BEST accomplish this task? pwck shadow cp pwconv sync
pwconv
Which of the following commands displays the disk usage and quota limits for the development group? repquota development edquota -g development quotacheck -g development quota -g development
quota -g development
Which of the following sets of permissions represent the minimal permissions required to allow a user to list the contents of a directory? r-- r-x rw- rwx
r-x
A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine instead of on a lab machine. To ensure that the CPU gives preference to other processes, you need to lower the daemon's priority. The PID number is 2345. Which command would you use to decrease the daemon's priority? renice -n 10 2345 nice -n 0 2345 renice -n -10 2345 renice -n 0 2345
renice -n 10 2345
Within the /var directory is a subdirectory named backup. Ken, a Linux administrator, needs to delete the directory backup and any files that it contains. He changes directory focus to /var. Which of the following commands deletes the directory named backup and any file it contains? rm -r backup rm backup rm backup/* rm -r backup/*
rm -r backup
You are attempting to install an RPM package on your Linux system, but the system tells you that a newer package is already installed. Which of the following commands will install the RPM package over the existing installed package? rpm --rebuilddb rpm --force rpm -e rpm -ihv
rpm --force
Without installing an RPM package, you want to check for all of the package's uninstalled dependencies. Which of the following commands should you use? rpm -U rpm --test rpm -ihv rpm --checksig
rpm --test
You have an RPM package called mathpac that is not working correctly. You have downloaded the latest package. Which of the following commands should you use to install the latest mathpac package? rpm -U mathpac rpm -F mathpac Run: rpm -e mathpac Followed by: rpm -i mathpac rpm -i mathpac
rpm -U mathpac
Which of the following commands queries the system for all installed RPM packages? rpm -ihv rpm -qa rpm -U rpm -nodeps
rpm -qa
You need to determine which files are associated with the metacity RPM package. Which of the following commands should you use? rpm --test metacity rpm -ql metacity rpm -V metacity rpm -i metacity
rpm -ql metacity
Which of the following utilities should you use if you need to extract a file from an RPM package file? rpm -e createrepo rpm -i rpm2cpio
rpm2cpio
You have just finished installing an updated kernel on your email server that has been patched to solve a security vulnerability and wish to reboot as soon as possible. This is a busy time of day, and you do not want the server down any longer than necessary. Which option prevents fsck from running after the reboot and allows the system to boot faster? shutdown -k shutdown -F shutdown -h shutdown -f
shutdown -f
You have informed users that you need to bring the machine down at the end of the day to perform routine maintenance. However, prior to shutting the system down, you want to send a message to users to give them fifteen minutes to save data and exit the system. Which of the following is the BEST command to use? shutdown -r +15 It is time for a shutdown! halt It is time for a shutdown! shutdown -h +15 It is time for a shutdown! init 0 It is time for a shutdown!
shutdown -h +15 It is time for a shutdown!
You need to shut down the system immediately and send a message to logged in users to allow running processes to close gracefully. Which of the following is the BEST to use? shutdown -m now shutdown -h now shutdown -hk now shutdown -s shutdown -r
shutdown -h now
Which of the following commands will display each line in a text file in alphabetic order? sort uniq tr split
sort
Which of the following partitions functions as virtual memory for a Linux system? /srv swap /var /
swap
You have a Linux system with two activated swap partitions, sda3 and sdb2. Which of the following commands can you use to deactivate only the sda3 swap partition? pvcreate /dev/sda3 swapoff /dev/sda3 swapoff -a fdisk d /dev/sda3
swapoff /dev/sda3
You are working on a systemd-based Linux distribution. Which command can you use to manage the services and targets? systemctl insserv telinit initctl
systemctl
You are experiencing a problem with one particular server. Each time it boots, it goes into single-user mode even though no warnings or errors are reported. You want to verify that it is configured to boot to the multi-user.target unit, just as all your other servers are. This system is running systemd. Which command would you use to see which boot target is set as the default? systemctl get-default boot.target systemctl isolate multi-user.target systemctl get-default systemctl set-default multi-user.target
systemctl get-default
You need to perform some system maintenance on a systemd system, and you want to prevent users from logging on while you do so. Which command should you run? init 1 runlevel0 systemctl isolate rescue.target systemctl isolate maint.target
systemctl isolate rescue.target
Which of the following is responsible for bringing up other units and services when boot targets are changed? systemd systemctl init service
systemd
You have a tape archive mounted in /dev/rmt12. You need to get a list of the file contents. Which command will list the contents? ls -lc /dev/rmt12 tar -tc /dev/rmt12 tar -tf /dev/rmt12 ls -la /dev/rmt12
tar -tf /dev/rmt12
You need to restore a file, yearend.xls, from the archive 013004.tar.gz in the backup directory. The file needs to be restored to /home/accounting. Which command will perform the restore? tar -xvf /backup/013004.tar.gz /home/accounting/yearend.xls unzip -xzvf /backup/013004.tar.gz /home/accounting/yearend.xls tar -xzvf /backup/013004.tar.gz /home/accounting/yearend.xls extract -xzvf /backup/013004.tar.gz /home/accounting/yearend.xls
tar -xzvf /backup/013004.tar.gz /home/accounting/yearend.xls
Which command would you use to look for a potential resource hog on a workstation? renice top uptime free
top
You need to determine the priority of several processes. Which command should you enter to identify the process ID and nice value for each process? jobs top renice nice
top
You need to see a listing of running processes and system status such as memory and CPU usage. Which command will produce the listing? top ps -A cpustat -a systat -al
top
Which of the following commands will change the /home/gshants/smile file's modification and last accessed times to the current time? ls /home/gshants/smile rm /home/gshants/smile touch /home/gshants/smile cat /home/gshants/smile
touch /home/gshants/smile
Which of the following commands transposes characters in a text steam? tr nl sort pr
tr
Partition /dev/sdb2 is mounted to /mnt/temp. You need to unmount /dev/sdb2. Which commands would you use? (Select TWO). (Each option is a complete solution.) umount /dev/sdb2 dismount /dev/sdb2 dismount /mnt/temp unmount /dev/sdb2 umount /mnt/temp
umount /dev/sdb2 umount /mnt/temp
Which of the following apt-cache options will show the missing dependencies in the package cache? depends unmet stats showpkg pkgnames
unmet
Which of the following commands produced this output? 06:14:11 up 139 days, 24 min, 5 users, load average: 0.12, 0.33, 0.48 ps w uptime top
uptime
A user with an account name larry has just been terminated from the company. There is good reason to believe that the user will attempt to access and damage files in your system in the very near future. Which command below will disable or remove the user account from the system and remove his home directory? userdel larry userdel -home larry userdel -r larry userdel -h larry
userdel -r larry
You have performed an audit and have found active accounts for employees who no longer work for the company. You want to disable those accounts. Which command example will disable a user account? usermod -L joer usermod -u joer usermod -d joer usermod -l joer
usermod -L joer
You need to modify the group membership for the cjensen user to add the staff group to his list of secondary group memberships. He needs to keep his existing secondary group memberships. Which command option will add cjensen to the staff group without removing him from the other groups? usermod -ag staff cjensen usermod -G staff cjensen usermod -a staff cjensen usermod -aG staff cjensen
usermod -aG staff cjensen
One of your users, Karen Scott, has recently married, and is now Karen Jones. She has requested that her username be changed from kscott to kjones. Which of the following commands will accomplish this task without changing other values? usermod -l kjones kscott usermod -u kjones kscott usermod -l kscott kjones usermod -u kscott kjones
usermod -l kjones kscott
A programmer named Brandon calls with an issue. He is currently using the C shell each time he logs in, but his manager has told him to start using the Bash shell. Which command will change brandon's shell to the desired setting? usermod brandon /bin/bash useradd brandon /bin/bash usermod -s /bin/bash brandon userchange -a brandon /bin/bash
usermod -s /bin/bash brandon
Which of the following commands creates a volume group named backup and initializes it by adding the third disk in a Linux system to the volume group? vgcreate backup /dev/sdc lvcreate backup /dev/sdc vgextend /dev/sdc backup pvcreate /dev/sdc backup vgcreate /dev/sdc backup
vgcreate backup /dev/sdc
A system administrator is configuring a package manager to access packages from a local repository and take advantage of a local repository's transfer speed. Which of the following commands can be used to pull packages from an online repository? (Select THREE). RDP mv wget curl export cp rsync
wget curl rsync
You have an xfs file system in your Linux computer. You need to display the XFS file system parameters, such as the block size and inode data structures. Which of the following commands should you use? (Select TWO). (Each answer is an independent solution.) xfs_info xfs_growfs -n mkfs.xfs xfs_metadump
xfs_info xfs_growfs -n
You have an XFS file system in your Linux system represented by /dev/sdb1. You need to copy all the filenames on the drive to the /reviewxfs file. You must be able to read the filenames in the /reviewxfs file. Which of the following commands should you use? xfs_metadump -e /dev/sdb1 /reviewxfs xfs_growfs -n /dev/sdb1 /reviewxfs xfs_info /dev/sdb1 /reviewxfs xfs_metadump -o /dev/sdb1 /reviewxfs
xfs_metadump -o /dev/sdb1 /reviewxfs
A technician has been given a work order to install the Apache webserver on a system configured with a YUM repository. Which of the following commands will install the webserver? dnf install httpd yum install apache2 yum install httpd rpm -ivh apache2
yum install httpd
You have installed a package called mathpac with yum. After a system upgrade, the package is not working correctly. Which of the following commands should you FIRST try to get the package to funciton? rpm -U mathpac yum upgrade mathpac yum update mathpac yum remove mathpac and then yum install mathpac
yum update mathpac
After a user starts a bash session and the script in /etc/profile is applied, if all of the following files exist, which will be run next? ~/.profile ~/.bash_logout ~/.bash_login ~/.bash_profile
~./bash_profile
Anna, a system administrator, wants to set a global variable that can be used each time she logs in. Currently, she has to set the variable each time a terminal is opened. Which of the following files would need to be modified to make a global variable persistent? (Choose TWO.) ~./bash_history ~./bash_profile ~./bash_logout /etc/profile
~./bash_profile /etc/profile
Which of the following files would you use to create aliases that are applied when a specific user starts a bash session? (Select TWO. Each answer is an independent solution.) ~/.bash_logout /etc/bashrc ~/.bashrc ~/.profile /etc/profile
~/.bashrc ~./profile