CompTIA Linux+ (XKO-004) Post-Assessment Quiz

Ace your homework & exams now with Quizwiz!

Which of the following options can be used with the dpkg command to remove a specified package from a system, including any configuration files used by the package?

-P

Which of the following file extensions might be used as part of a shell script filename?

.sh

When using AppArmor, the restrictions for each program are stored within text files named for the program under the directory _____________.

/etc/apparmor.d

Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify?

/etc/bashrc

Bradley wants to quickly map a hostname to an IP address of an internal server that he wants to access by name but that has no DNS entries. Which of the following files could he modify to enable accessing the server by name from his workstation?

/etc/hosts

Carter is worried about limited disk space on the drive where /var exists. He wants to ensure that every week a new log file is created and that any log files older than 4 weeks are deleted. Where would Carter configure these options?

/etc/logrotate.conf

You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is _________________.

/etc/motd

What is the path and filename where Linux stores the configured network services and their associated ports for a system?

/etc/services

Sawyer needs to ensure that a configuration file for a new application shows up in new user directories as new users are added to the system. He has already copied it into existing user directories. Where should Sawyer place a copy of this file to ensure that it also shows up in the new user directories as well?

/etc/skel

Hanna needs to find any error messages that have been generated by the kernel. Where would she look for that information?

/var/log/kern.log

What is the default nice value of new processes?

0

Which of the following would be a valid entry for the cron daemon to execute a script named myscript in the root user's directory at 5 am on the first day of every month?

0 5 1 * * /root/myscript

Which of the following settings for umask would ensure that the user and group permissions are not affected while the other does not have read, write, or execute?

0007

Fred wants to ensure that only system administrators can create scheduled tasks on the Linux server. Which of the following is the most efficient way for Fred to ensure that this is enforced?

Add all system administrators to /etc/cron.allow and /etc/at.allow

Match the following description of a service to the service acronym:

FTP - This service provides a repository where users can upload or download files. NTP - This protocol provides the ability to synchronize time between network devices and a world cloak. DHCP - This service is used to automatically assign IP addresses to hosts when they join a network. DNS - This service runs on a server to allow clients to resolve names to IP addresses.

Kenneth wants to use Fibre Channel to connect to his Fibre Channel SAN. Which of the following types of controllers would he need to have installed in the Linux Server?

HBA

Henry manages the DevOps team at his company. He hears a lot of terms used to describe the day-to-day job functions of his team. Some of those functions include things like build automation and infrastructure automation. These could be considered part of which terminology?

IaC

Tabitha has been asked to provide a configuration file to her company's cloud service provider that will allow a custom configuration from an ISO installation image for new virtual machines. Which of the following configuration files was she most likely asked to provide?

Kickstart

Which of the following locale environment variables overrides all of the others when it is set?

LC_ALL

Leonard wants to network book a new Linux workstation from an image contained on a TFTP server. Which of the following should Leonard configure in the workstation's BIOS as first in the boot order?

PXE

Kane has just made changes to the /etc/default/grub file on a Linux server running GRUB2. What is the next step that Kane needs to perform?

Run grub2-mkconfig

Jerry manages a number of Linux servers that reside in different branch offices for his company. He needs a secure way to perform maintenance, check on the status of backups, and start and stop services without traveling to those offices. Which of the following is Jerry most likely to use?

SSH

Using the output below, determine which of the following is true: drwxr-xr-x 4 jsmith finance 128 Feb 21 2018 ProjectX

The permissions could have been set using the command - chmod 755 ProjectX.

Which of the following technologies is a platform independent protocol that can be used to graphically connect to a Linux computer?

VNC

Which of the following are valid servers for the graphical component of the Linux operating system? (Choose two.)

X11 Wayland

Which of the following might you expect to see as the first line of a bash shell script?

a. #!/bin/bash

Jan is a DevOps Engineer that is in charge of setting up a new Configuration Management software. The software they've been using required a piece of software to be installed on the virtual machines and containers in their environment, whereas the new Configuration Management software he's in charge of deploying does not. What kind of CM is Jan deploying?

agentless

Which of the following commands can be used to show the list of jobs scheduled with the at daemon?

atq

Which of the following commands will list all users except for the root account?

cat /etc/passwd | grep -v root grep -v root /etc/passwd

Karen wants to see which partitions are currently mounted on a Linux workstation. Which of the following commands could she use to see this information?

cat /proc/mounts

Kaylee is managing a system that uses SysV system initialization. She wants to make sure that iptables starts when the system is booted. Which of the following should Kaylee run?

chkconfig --add iptables

Git creates a snapshot of each version of your files. What are these snapshots referred to?

commit

Which of the following commands will create a new file containing a list of users along with their login shell?

cut -d: -f1,7 /etc/passwd > usershells

Which of the following commands can be used to make a block by block copy of one drive to another without regard for filenames?

dd

Which of the following commands can be used to view the hardware detected by the Linux kernel during bootup?

dmesg

If a USB device is physically present but the lsusb command cannot locate the device, which command can be used to display the information from SMBIOS so that you can attempt to locate a driver for it?

dmidecode

Mary has been locked out of her account after failing to correctly enter her password three times. As the system administrator, you need to unlock her account. Which of the following commands would unlock Mary's account assuming that you are using pam_faillock.so module?

faillock --reset --user mary

Which of the following commands can be used to modify the date and time within the system BIOS?

hwclock

Which of the following attributes can be given to a file using the chattr command in order to prevent the file from being modified in any way (even by the root user)?

immutable

Patrice has just set up a new Linux server. She has already configured a full backup to run every Sunday morning. She wants to create an additional backup every day to ensure that less data would be lost in the event of a mid-week failure. She wants to use the least amount of disk space possible for these additional backups. Which of the following should she configure?

incremental

Which of the following commands can be used to reboot a Linux system? (Choose all that apply.)

init 6 telinit 6 reboot

Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run?

iptables -F

Catherine wants to connect her laptop running Linux to a wireless network. Which of the following utilities can she use to make that connection?

iwconfig

Sheila needs to see a list of pending print jobs on a system. Which of the following commands can she use to display those jobs?

lpq

Jack needs to be able to determine which modules are currently loaded on a Linux server. Which of the following commands could he use to gather this information?

lsmod

Which of the following commands can be used to format a disk partition as ext4? (Choose all that apply.)

mke2fs mkfs

Which of the following commands could be used to access data on a CD?

mount -r -t iso9660 /dev/cdrom /media/cdrom

Which of the following tools can you use to query DNS servers to verify the records for an FQDN? (Choose two.)

nslookup dig

Which of the following commands could be used to turn off quotas?

quotaoff

Zachary is analyzing running processes using the top utility. Without exiting the top utility, he wants to change the nice priority level of a process. What key can Zachary use to change the nice level?

r

John needs to remove the subdirectory named temp2 as well as all of the files that it contains. Which of the following commands could John use to accomplish this task in one step?

rm -r temp2

Jake needs to find out which RPM package a file belongs to. Which of the following commands could he use to find his answer?

rpm -qf bluefish

A junior system administrator comes to ask for your assistance. He was given instructions to activate the third partition on the second hard drive to use as virtual memory. It has already been formatted and initialized as swap. Which command could you suggest that the junior system administrator use?

swapon /dev/sdb3

You are investigating a DHCP issue on your company's network and decide to analyze the packets that are being sent and received on a Linux workstation. Which of the following could you use to see the contents of the packets arriving at the workstation? (Choose two.)

tcpdump wireshark

Natalie wants to use an existing server to deploy a new virtual machine. The new virtual machine will initially only need 20 GB of disk space, but is expected to grow at a rate of 5 GB per month. She wants to set the size for the virtual hard drive to 512 GB. However, the server that she intends to use has a 2 TB hard drive with only 100 GB of free disk space. What can Natalie use to accomplish this task?

thin provisioning

Keri is getting frustrated that her workstation wants to do a filesystem check upon boot on a fairly frequent basis. Which of the following could she use to change how frequently the system forces a filesystem check to be run?

tune2fs

Ciara has created a shell script that works just fine in the shell where she developed it. However, when she tries to execute it in a subshell some of the environment variables don't seem to be correct. How can she resolve this issue?

use the export command to make them available to subshells

Carlos manages a Linux system that users are able to SSH into in order to perform certain tasks. However, he has just installed a critical patch and wants to reboot the server to ensure that it has fully taken effect. Which of the following commands should he use to ensure that a reboot will not interrupt any logged in users?

w

Which of the following commands can be used to find out when a domain name expires?

whose

Craig has just run the ssh-keygen command on his workstation. What is the default path and filename for the new private key that was generated?

~/.ssh/id_rsa


Related study sets

Reconstruction History chap 11 kahoot

View Set

collective thoughts on the republic

View Set

Chapter 7 end of chapter questions

View Set

Chapter 2 Small Business Entrepreneurs: Characteristics and Competencies

View Set