ITN 170 EXAM 1

Ace your homework & exams now with Quizwiz!

Which file stores the Apache configuration in Fedora 28?

/etc/httpd/conf/httpd.conf

Which directory stores most UNIX SysV rc scripts?

/etc/init.d

Which file should be created to disable logins into a Linux system?

nologin

Which command can be used to connect to a remote Windows share called data on the server called fileserver?

smbclient //fileserver/data

Where does the sudo command check to determine a user's privileges when they attempt to run the sudo command?

/etc/sudoers

Which file contains information regarding the users, computers, and commands used by the sudo command?

/etc/sudoers

Which of the following ports would be used to resolve a domain name to an IP address?

53

If no level of compression is specified, the gzip command assumes what compression level?

6

The sed and awk commands are filter commands commonly used to format data within a pipe. True or False?

True

Which of the following is not a valid Apparmor command?

aa-trust

Which of the following could result in a segmentation fault (fatal signal 11) during a Fedora installation?

all the above

Which of the following are stand-alone daemons? (Choose all that apply.)

apache DNS

What command is equivalent to the man -k keyword command?

apropos keyword

Before a user-defined variable can be used by processes that run in subshells, that variable must be __________.

exported

Which command can you use to synchronize ntpd with an NTP time source?

ntpq

Which of the following port numbers is associated with SSH?

22

Which command should you use to set the expiration date for a user account?

usermod

Which command can you use to lock a user account?

usermod -L username

What metacharacter indicates background command execution?

&

In what directory is Stage 2 of the GRUB2 boot loader stored?

/boot

Which file defines the order in which the name resolution is to be performed?

/etc/nsswitch.conf

Which of the following is a valid APIPA address?

169.254.38.101

When using the vi text editor, which of the following keys, when in command mode, will change to insert mode and place the cursor at the end of the current line?

A

What software type is distributed free of charge, but the source code is not available?

Freeware

When using the vi text editor, which of the following keys, when in command mode, will move to the last line in the document?

G

To which license does Linux adhere?

GNU General Public License

Which of the following types of encryption uses a pair of keys known as a public and private?

asymmetric

Which command will bring a background process in foreground?

fg

Where is the /proc filesystem stored?

in RAM

What is the service name for SSH?

sshd.service

You plug a USB flash memory drive into a system that has two SATA hard disks. How will the partition on this USB flash memory drive be identified by Linux?

/dev/sdc1

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?

/etc/resolv.conf

What is the default priority of a process?

0

What metacharacter can be used to issue two commands to be run in consecutive order, without piping or redirecting output?

;

What FTP command runs a shell on the local computer?

!

Which metacharacter is used to run a process in the background?

&

Which parameter specifies that the command is related to a change of date?

+%D

When creating a rule in Iptables, which parameter allows to define a specific port?

--dport

Which directory stores the mail databases?

/etc/mail

Which of the following is an absolute pathname?

/home/resume

Where is the default document root directory for the Apache Web server?

/var/www/html

Linux servers are typically installed in a rack using rackmount server hardware. Which of the following describes the minimum height of a rackmount server?

1U

Which of the following SQL statements can be used to delete a table from a database?

DROP TABLE table_name;

What was created to define a standard directory structure and common file location for Linux?

FHS

What service provides a method for the efficient transfer of files over the Internet?

FTP

After a partition on a hard disk is formatted with a filesystem, all partitions on that hard disk drive must use the same filesystem. True or False?

False

To kill a process running in the background, you must place a % character before its process ID. True or False?

False

After typing the ls -F command, you notice a filename that ends with an * (asterisk) character. What does this mean?

It is an executable file.

Which of the following is used to display the memory with the free command?

KB

Which of the following Linux distributions is likely to be used by a Cyber Security worker?

Kali

What is the default state of a newly added user if the password has not been set?

Locked

Which of the following would be a term applicable to an e-mail program on a workstation that is used to view email?

MUA

What DNS resource record type is used to provide the IP address for the e-mail server for a zone?

MX

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

Minor number

Who formed the Free Software Foundation to promote open development?

Richard Stallman

Which of the following is not an example of virtualization software that can be used to install Linux within another operating system?

Spiceworks

What is the most commonly used LAN protocol?

TCP/IP

PaaS cloud providers host sandboxed Web apps using containers for scalability. True or False?

True

A user mounts a device to a mount point directory and realizes afterward she needs files previously found within the mount point directory. What should this user do?

Unmount the device from the directory.

Which of the following commands will change the SELinux security context of a file?

chcon

Which of the following commands can be used to start a UNIX SysV daemon called lala in runlevels 1, 2 and 3?

chkconfig --level 123 lala on

Select the command that can be used to change the root filesystem to a different directory, such as when you are in a rescue environment.

chroot

Which command can you use during a system rescue to switch from the root of the live OS to the root of the Linux system installed on the hard disk?

chroot

Which of the following is the log file where Dandified YUM writes its log entries?

dnf.rpm.log

After a shell is no longer needed, what command can be given to exit the shell?

exit

What Systemd target corresponds to runlevel 5?

graphical.target

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up?

ifup eth0

Which of the following commands will display the print jobs in the print queue for printer1 only?

lpstat -o printer1

Which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were not delivered?

mailq

The apropos list command produces the same results as which command below?

man -k list

Which of the following commands will generate a new initramfs?

mkinitrd dracut

Which of the following Systemd commands can be used to stop a daemon called lala?

systemctl stop lala.service

Which Linux command can be utilized to display your current login name?

whoami

You can use the ssh-keygen to generate the keys, which are then stored in ________.

~/.ssd

Which of the following is used to create a background process?

&

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

*

After typing the command umask 731, the permissions on all subsequently created files and directories will be effected. In this case, what will be the permissions on all new files?

---r--rw-

Which of the following is not a valid compression file extension for the Linux operating system?

.vz

Which file should be configured so that quotas are enabled at boot time?

/etc/fstab

In a Linux system, which two files are used for name resolution? [Choose two.]

/etc/hosts /etc/resolv.conf

Which of the following files is always executed immediately after any user logs in to a Linux system and receives a BASH shell?

/etc/profile

In which of the following directories can you place files that will be copied to new user directories when new users are created?

/etc/skel

Which file should you edit to change the default port for SSH?

/etc/ssh/sshd_config

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?

/etc/sysconfig/network-scripts/ifcfg-enp8s0

What directory under / contains the log files and spools for a Linux system?

/var

What is the complete path and filename for the database that is used by the locate and mlocate commands?

/var/lib/mlocate/mlocate.db

Most log files on the system are found in which directory?

/var/log

When sitting at a computer running Linux, what key combination do you press to open the graphical terminal?

Ctrl+Alt+F1

What kind of servers resolve fully qualified domain names to IP addresses for a certain namespace on the Internet?

DNS

Which of the following are updated with the following command? sudo apt-get update [Choose all that apply.]

Databases Respitories

What component of a Linux server is used to connect to a Fibre Channel SAN?

FC HBA

The bzip2 and gzip utilities use similar compression algorithms. True or False?

False

Which choice is considered a legacy boot loader?

GRUB

What type of iptables chain targets traffic that is destined for the local computer?

INPUT

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True

Which of the following is responsible for starting tasks and services during boot, stopping them during shutdown, and supervising them while the system is running?

Upstart

Which of the following can be used to graphically remotely administer a Linux machine?

VNC

Which of the following are common methods for gaining support for Linux?

all the above

Which of the following commands will display the current CPU(s) detected by a Linux system?

cat /proc/cpuinfo

Which command can be used to list containers that are currently running on the operating system only?

docker ps

A runaway process that is faulty and consuming mass amounts of system resources ________.

is a rouge process

Which command should you run to list the background processes?

jobs

What command can you use to view journald log entries on a system that uses Systemd?

journalctl

Which of the following commands can you use to view events within the journald database?

journalctl

You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do remember it will flush a variable from your system. Which command typed at a command prompt displays a list of commands that would likely contain the command you desire?

man -k flush

Which of the following utilities can be used by a system administrator to determine which services are responding to network requests?

nmap

Many types of software are available today. Which type of software does Linux represent?

open source software

The process of sending print jobs from the print queue to the printer is called _____.

printing

Which command should you use to check if createrepo package is already installed?

rpm -qa | grep createrepo

Using the _______ command, you can display CPU activity for today.

sar

Which type of RAID can be entirely configured during the Linux installation process?

software RAID

To display a text file in reverse order, what command should be used?

tac

What command can be used to display the last five lines of a text file?

tail -5

Which of the following commands will count the number of lines in a file named data.csv?

wc -l data.csv

To remove a package and its dependencies, which of the following parameter must be run with the apt-get command?

Autoremove

How do you indicate a comment line in a shell script?

Begin the line with #

When the core components of the Linux operating system are packaged together with other Open Source Software, it is called a:

Linux distribution

Every process has a process ID and a_______.

Parent Process ID

What is the default state of the cupsd.conf file?

Read-only file

You have modified the /etc/aliases file to include a new email alias. However, when you send email to the alias, it cannot be delivered. What should you do?

Run the newaliases command.

Which protocol is the underlying protocol for OpenSSH?

SSH

Which command searches for and displays any text contents of a binary file?

Strings

Which of the following is a valid Linux initialization process?

Systemd SysV

Chapter 11: Comp, Sys Backup, and Soft Install

Chapter 11: Comp, Sys Backup, and Soft Install

When a printer is rejecting requests,____________.

The print queue does not accept jobs and sends a message to the user noting that the printer is unavailable

What must you do to successfully run the fsck command on a filesystem?

Unmount the filesystem

Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

Ctrl + g

In Linux, the core component of the GUI is known as:

X Windows

Which two implementations of X Windows are commonly used in Linux? (Choose two answers.)

X.org Wayland

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility

Because stderr and stdout represent the results of a command and stdin represents the input required for a command, only stderr and stdout can be redirected to/from a file. True or False?

False

Character devices typically transfer data more quickly than block devices. True or False?

False

DM-MPIO can be configured to provide multiple, redundant connections to data stored on a SAN. True or False?

False

The Debian Package Manager (DPM) is the default package manager used by Fedora 28. True or False?

False

What command is most effective at identifying different types of files?

file

What will the following wildcard regular expression return: file[a-c]?

filea, fileb, filec

To find all SUID and SGID files owned by anyone, which command should be used?

find

Which command will list all active processes that are running on a Linux system?

top

Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules directory? (Choose all that apply.)

udevadm control --reload udevadm control -R

Which command is used to delete a user account?

userdel username

Which of the following is the first field of the /etc/passwd file?

username

On a system using the KVM hypervisor, which of the following modules would you expect to see as part of the output of the lsmod command on a guest Linux virtual machine?

virtio

Which of the following is a special group that provides its members with the ability to run the su and sudo commands?

wheel

Which of the following commands will return one result of where the grep binary executable is located? (Choose two.)

which grep type grep

Which command displays the users who are currently logged in to the Linux system?

who

Which command displays the name of the current logged in user?

whoami

Which command can be used to repair an XFS filesystem?

xfs_repair /dev/sdb1

Which command will list the dependencies of the httpd package?

yum deplist httpd

If you have httpd package installed, which of the following command should you use to get more information about it?

yum info httpd

To verify that the httpd package is installed, which of the following command should you use

yum list httpd

Which of the following states describe a process that is waiting for a parent process to release its PID?

zombie

Which of the following operators reverses the meaning of a test statement?

!

The command chmod 317 file1 would produce which of the following lines in the ls command?

--wx--xrwx 1 user1 root 0 Apr 29 15:40 file1

Nice values are used to affect process priorities using a range between _____________.

-20 and 19

Which of the following options for the iptables command will delete all rules for all chains?

-F

Which option to the dpkg command can be used to list the files that comprise a package?

-L

Which parameter when used with the usermod command will lock a user account?

-L

Which of the following options will change the ownership of files and directories recursively within a directory? (Choose all that apply.)

-R --recursive

Which of the following RPM options will update a software package to the newest version, or install the package if it does not already exist on a system?

-U

Which parameter should be used with the ls command to view the security context of a file?

-Z

Using the vmstat command along with the _____ parameter, you can also display the number of forks since you last booted the system.

-f

Callie wants to make sure that a filesystem is checked every 20 days. Which of the following options, when used with the tune2fs command, would set a full filesystem check to run every 14 days?

-i 14d

Which of the following can be used for comparing values within an if statement? (Choose two.)

-lt -grt

If you make any changes to the /etc/default/grub file, you need to ensure that the _______ file is updated.

/boot/grub/grub.cfg

Which of the following is the full path and file name where the Debian Package Manager repositories can be configured?

/etc/apt/sources.list

A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow these users from creating cron jobs?

/etc/cron.deny

In context of cron, which of the following is not the correct directory name?

/etc/cron.yearly/

Which file contains the Ubuntu boot settings?

/etc/default/grub

Jackson wants to automatically mount a secondary internal hard drive when his Linux workstation boots up. In which of the following files should he configure an entry for the partition on the drive that he wants to mount?

/etc/fstab

In which file can you view the runlevel of a Linux system?

/etc/inittab

On a system running SysV init, which of the following files can you edit to disable the ability to reboot by using the Ctrl+Alt+Delete key combination?

/etc/inittab

Which file should you edit for Sendmail configuration?

/etc/mail/sendmail.mc

If someone tries to log into a system using a daemon account, but the daemon account does not have a valid shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of the following files can you put a message in that will display upon an attempted login?

/etc/nologin.txt

Which file defines the order, files, dns, myhostname?

/etc/nsswitch.conf

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible?

/etc/nsswitch.conf

Match the file with the order in which the BASH shell environment files are read: FIRST SECOND THIRD FOURTH

/etc/profile /etc/profile.d/* /etc/bashrc ~/.bashrc

What is the name of the directory that contains symbolic links to UNIX SysV rc scripts for runlevel 2?

/etc/rc2.d

Which directory stores the symbolic links for the Apache Web server?

/etc/rcX.d/

Which of the following files contain the path and filename where DNS servers should be configured?

/etc/resolv.conf

In which file can you configure rules for logging on a Linux system?

/etc/rsyslog.conf

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

/etc/services

Which of the following files contains the encrypted passwords for users on a modern Linux system by default?

/etc/shadow

The _________ file contains the configuration settings for the OpenSSH Server.

/etc/ssh/sshd_config

Which of the following directories is created by default when an ext2, ext3, or ext4 filesystem is created on a device that is used by the fsck utility?

/lost+found/

What file in the /proc directory contains information about a computer's CPU?

/proc/cpuinfo

To ensure that Linux has detected the correct amount of RAM in the system after installation, you should view the contents of what file in the proc directory?

/proc/meminfo

The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

/root

To which directory will the test ZFS volume from the previous question be mounted by the ZFS system?

/test

Under the root directory in Linux, which directory contains system commands and utilities?

/usr

In addition to /etc/localtime, some Linux distributions also have an /etc/timezone text file that contains a reference to the correct time zone file contained in which directory?

/usr/share/zoneinfo

Where are the files stored that contain information for all of the time zones that could be recognized by a Linux operating system?

/usr/share/zoneinfo

You want to view log files to get information about a problem that occurred during a Linux installation. In which directory will you likely find the log files?

/var/log

Which of the following files stores information about failed logins on a Linux system?

/var/log/btmp

Where are individual user tasks scheduled to run with the cron daemon stored on a Fedora system?

/var/spool/cron/username

Which dump level indicates a full backup?

0

Which runlevel halts the system?

0

Which value will force immediate password expiration for a user account?

0

You have created a full backup and four incremental backups. In which order must you restore these backups?

0, 1, 2, 3, 4

Which of the following umask settings will result in new files receiving the default permissions -rw-------?

0177

To change the mode from Permissive to Enforcing, which value should be used with the setenforce command?

1

Which of the following is the highest value that can be set for the nice value which would result in a greater chance of a lower priority?

19

What is the PID assigned to the yes command in the lab?

2218

Which of the following results from the nmap command would let an administrator know that they have an insecure service running on a Linux server?

23/tcp open telnet

If the physical extent of a volume group is set to 32MB, what is the maximum logical volume size?

2TB

Which value of chmod will make the cupsd.conf file read-only?

444

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of?

48

A Linux system that is configured to work in graphical mode, what is the run level?

5

Which runlevel shuts down the system and then reboots it with the mentioned level as the default runlevel?

6

What is the default port used by the Web Interface?

631

What priority number is assigned to the ps process?

80

At the vi command mode prompt, what key combination will force a quit from the vi editor without saving changes?

:q!

Which of the following will take output from a command and append it to the end of a file?

>>

Which of the following can be used to mount a filesystem? (Choose all that apply.)

A device path such as /dev/sdb2 A filesystem UUID A filesystem label

Which of the following commands will generate a GPG public/private key pair?

gpg--gen-key

Which command is used to display the hostname and its related information?

hostnamectl

Which of the following is the private key?

id_dsa

If you use RSA instead of DSA, what will be the filename?

id_rsa

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

ifconfig iwconfig nmcli ping

Which command can be used to see processes running in the background?

jobs

Which of the following commands will show a number of environment variables that start with LC_?

locale

Dustin runs a command at the command line trying to find out what kernel version the system is running. However, it doesn't give him the information he needs. He knows there is an option that can be used to display the kernel version. How can he find out which option to use?

man uname

To view the virtual regions being used, you should use the ________ command.

maps

What command is used to manage a software RAID configuration after installation?

mdadm

Which of the following commands can be used to create and activate a swap partition on a Linux system? (Each answer represents part of the whole.)

mkswap /dev/sda6 swapon /dev/sda6

Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following commands can he use to display this information?

modinfo bluetooth

Linux is a ___________ and ___________ operating system.

multiuser, multitasking

Which of the following is the default window manager used by the GNOME version 3 desktop environment?

mutter

Which construct can be used in a shell script to read stdin and place it in a variable?

read

You execute the following command: cat ../id_dsa.pub >> authorized_keys What will be the output?

The contents of the public ID will be added to authorized_keys.

CHAPTER 10: Common Admin Tasks

CHAPTER 10: Common Admin Tasks

CHAPTER 12: NETWORK CONFIGURATION

CHAPTER 12: NETWORK CONFIGURATION

CHAPTER 13: Config Net Services and Cloud Tech

CHAPTER 13: Config Net Services and Cloud Tech

CHAPTER 14: Sec, Troubleshoot, and Perf

CHAPTER 14: Sec, Troubleshoot, and Perf

CHAPTER 1: Intro to Linux

CHAPTER 1: Intro to Linux

CHAPTER 2: Linux Installation and Usage

CHAPTER 2: Linux Installation and Usage

CHAPTER 3: Exploring Linux Filesystems

CHAPTER 3: Exploring Linux Filesystems

CHAPTER 4: Linux Filesystem

CHAPTER 4: Linux Filesystem

CHAPTER 9: Managing Linux Processes

CHAPTER 9: Managing Linux Processes

Which DNS resource record is an alias to other records?

CNAME

Which of the following is the default desktop environment used by Linux Mint?

Cinnamon

Which of the following key combinations would switch from tty1 to tty3?

Ctrl+Alt+F3

hich of the following does the -r option for the gpg command specify?

Encrypt for the user id given

Which mode of SELinux blocks an event if it occurs against the defined policy?

Enforcing

Which of the following actions should you first take to secure your Linux computer against network attacks?

Ensure that only necessary services are running.

Which repository should you install before installing the Nginx Web server?

Epel

Along with a listing of user accounts, the /etc/passwd file contains information on account expiry. True or False?

False

BTRFS filesystems do not need to be checked for errors as they are resilient to data corruption. True or False?

False

Network latency issues are often caused by SELinux or AppArmor restrictions. True or False?

False

Standalone daemons are started on demand using xinetd. True or False?

False

The pam_tally2.so PAM can be used to enforce complex passwords on a Linux system. True or False?

False

There is no real difference between the "S" and "s" special permissions when displayed using the ls -l command. One just means it is on a file, and the other that it is on a directory. True or False?

False

UIDs and GIDs are unique to the system and, once used, can never be reused. True or False?

False

ZFS volumes are mounted at boot time from entries within /etc/fstab by default. True or False?

False

The iptables software on Linux is an example of what kind of software?

Firewall

When you have more than one operating system, you can boot directly to the last operating system in the list. You will need to change the _______ setting.

GRUB_DEFAULT

Which parameter in the /etc/default/grub file makes Ubuntu the default operating system if there is another operating system loaded?

GRUB_DEFAULT

If you want to change the Ubuntu boot timing, which parameter should you edit?

GRUB_TIMEOUT

Which of the following section in the /etc/rsyslog.conf file contains information that apply to the rsyslogd daemon and start with $?

Global Directives

When working with Sendmail, what command can be used to test SMTP support?

HELO

Which of the following is the greatest expense for companies using Linux?

Hiring people to maintain the Linux system

Which of the following types of joins will return a record from two intersecting tables only if there is a match on the joining field from both tables?

INNER JOIN

Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?

INSERT INTO users (firstname, lastname) values ('George', 'Washington');

If you need to assign an IP address using the Settings window, which tab should you use for assigning 192.168.0.2 to a CentOS system?

IPv4

What does the mv command do? (Choose all that apply.)

It moves a directory. It moves a file.

What does &> accomplish when entered on the command line after a command?

It redirects both stderr and stdout to the same location

Which of the following will the split command do on a file when no other options are specified?

It will split a file into new equally sized files that are 1/10th of the original file size

Which of the following packages should be installed in order to integrate certain authentication functions with Microsoft's Active Directory?

Kerberos

Which of the following options is passed to the Linux kernel from the GRUB2 configuration file to set the locale?

LANG

Which of the following technologies can encrypt files stored on a filesystem within a Linux system? (Choose all that apply.)

LUKS GPG

Linux was developed by __________ to resemble the _________ operating system.

Linus Torvalds, MINIX

What two Linux distributions utilize the Debian package manager by default?

Linux Mint & Ubuntu Linux

When viewing the output of the lsmod command, you notice several modules that start with vmw. What does this indicate?

Linux is running as a guest operating system.

What are some good reasons for using Linux in a corporate environment? (Choose all that apply.)

Linux software is unlikely to become abandoned by its developers. Linux is secure and has a lower total cost of ownership than other operating systems. Linux is widely available for many platforms and supports many programming languages

Which of the following information is displayed with the who command? [Choose all that apply.]

List of logged in users Time of the last system boot Current run level of the system

If you need to enable the OpenSSH server to listen on a specific interface, which parameter should you edit in the /etc/ssh//sshd_config file?

ListenAddress

Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet?

NTP

Proxy servers keep track of the information passed to each client by maintaining what type of table?

Network Address Translation (NAT)

If you need to restrict the users to their home directory, which value should you set for AllowTcpForwarding?

No

When editing the sshd_config file for SFTP, which value should you set for X11Forwarding?

No

If you have recently installed a package and run the update command to update the package, what is the likely outcome?

No new updates will be installed

Which of the following permissions should a standard user have on the /etc/shadow file?

None of the above

Which of the following attributes are associated with a process? [Choose all that apply.]

Process ID Parent process ID Current directory PWD File descriptor table

You use the following command to update the local package index: sudo apt update Which of the immediate next step will you need to perform to complete the update?

Provide the password for the user account from which you are installing the package

When adding a firewall rule for HTTP, which zone should be used?

Public

Which Windows program is often used to connect to a Linux server via SSH?

Putty

Which command should you use to update the firewall rules?

Reload

Which parameter should you use to reload an application's configuration files without restarting the system?

Reload

Using the /etc/init.d directory, which of the tasks can be performed on a service? [Choose all that apply.]

Reload Start Force-reload Stop Restart

The root user utilizes the chgrp command to give ownership of a file to another user. What must the root user do to regain ownership of the file?

Run chgrp again listing the root user as the new owner.

Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the new partition information must be manually reloaded. Which of the following should she do next? (Choose two. Either answer is independently correct.)

Run the partprobe command Reboot the system

Which of the following types of cloud platforms would a webmail service offered to the general public be considered?

SaaS

Which of the following can be used on Linux to provide file and print services?

Samba

The at command is used to _______________.

Schedule processes to run at a single instance in the future

In the /etc/rsyslog.conf file, which of the following are examples of Facility? [Choose all that apply.]

Security Kernel

Which option of Applications menu will let you configure an IP address?

Settings

If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH shell's completion feature?

Tab

What will the command sar -W 3 50 do?

Take 50 swap statistics every 3 seconds

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

Tarball

Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

Target ID

If a hard link is created to a file and then the original file is deleted, which of the following is true?

The original file will be removed while the hard link remains usable to access the contents of the file.

When a printer is disabled, ________.

The print queue accepts jobs into the print queue and holds them there until the printer is enabled again

Which package is required for shadow passwords to be enabled?

The shadow-utils package

Which of the following are characteristics of Open Source Software? (Choose all that apply.)

The software is developed collaboratively. Any bugs are fixed quickly

You attempt to perform the git commit -m "Added listdir function" but the command fails. What are possible reasons for the failure? (Choose all that apply.)

The user performing the commit has not set their Git user information No files were added to the Git index beforehand The user performing the commit is not running the command from within the Git repo directory

When you run the ps command, how are daemon processes recognized?

There is a question mark in the TTY column.

What would be the result of running the command chown :root file1.txt

This would set the group ownership of file1 to root.

A directory is a type of file. True or False?

True

A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are remaining objects to process. True or False?

True

As daemon processes are not associated with terminals, you must use an option such as -e alongside the ps command to view them. True or False?

True

Both aliases and functions can be used to store commands that can be executed, but functions can also accept positional parameters. True or False?

True

Chronyd is an NTP daemon that offers a faster response time compared to the ntpd daemon. True or False?

True

DHCP clients send a DHCPREQUEST packet when they require a new IP configuration. True or False?

True

The -9 option to the gzip utility results in a higher compression ratio. True or False?

True

The lines within the Apache configuration file that modify the functionality of the Apache are called directives. True or False?

True

The lvextend command can be used to add unused space within a volume group to an existing logical volume. True or False?

True

The operating system software is necessary for a computer to function. True or False?

True

You can clear a log file simply by redirecting nothing into it. True or False?

True

You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

True

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?

UDP

Which of the following statements is true?

UTF-8 is commonly used to provide Unicode character set support

What would be the effect of using the alias command to make an alias for the date command named cat in honor of your favorite pet?

When you use the cat command at the command prompt with the intention of viewing a text file, the date appears instead

What is contained in the DISPLAY variable on a Linux system running the X window system?

Which X server the client is supposed to connect to by default.

Which of the following is a lightweight desktop environment that uses very few system resources that a system administrator might choose to install on a Linux server instead of one of the two main desktop environments?

XFCE

Which of the following is a tool that can be used to search Internet software repositories for RPM packages that map to your system's architecture, and automatically install or upgrade those packages on your system?

YUM

When a new date is set with the date command, what is the default format?

YYYY-MM-DD

How can you bypass the wait function and send a user process to the background?

You can use the Ctrl+z key combination and the bg command.

Which option can be added to the ls or ps command to view the SELinux label?

Z

What is the term for a ZFS managed filesystem that is created from ZFS pools?

ZFS volume

Where is the Crosshairs setting located?

Zoom

Jim wants to rename a directory for a project that he has been working on. Which of the following commands can he use to perform that action?

mv projectx projecty

Which command will help you determine the services that are running on specific ports?

netstat

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

netstat -t ss -t

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)

netstat -u netstat --udp

After modifying the /etc/aliases file, what command must be run in order to rebuild the aliases database?

newaliases

Which command can be used to temporarily alter the primary group associated with a given user?

newgrp

Which command should be used to change the priority of a process?

nice

Which of the following can be used preceding a command to prevent a process from terminating when the parent process terminates?

nohup

Which command would you use to unlock a user account?

passwd -u username

Which command entered without arguments is used to display a list of processes running in the current shell?

ps

Which command will list the processes for a specific user?

ps

Which of the following commands will show the current runlevel along with the previous runlevel?

runlevel

Which of the following refers to the third primary partition on the second SAS hard disk within Linux?

sdb3

The which command _________________.

searches for a file only in directories that are in the PATH variable

Which of the following is not a type of RAID?

serial RAID

Which command could you use to see a list of all environment and user-defined shell variables as well as their current values?

set

After you log in to a terminal, you receive a user interface called a ________.

shell

Which of the following commands will power off a Linux system after a 10 minute delay?

shutdown -P 10

What kernel option can be specified within a boot loader to force the system to boot to Single User Mode?

single

Every computer consists of physical components and non-physical components. The non-physical components of a computer that understand how to work with the physical components are referred to as:

software

Which command is used to gain real-time information about processes running on the system, with the most processor-intensive processes listed at the beginning of the list?

top

Which of the following commands can be used to update the last modified timestamp on a file, or if the file specified does not exist will create the file?

touch file.txt

Which of the following commands can be used to trace an IPv6 route? (Choose two.)

traceroute6 tracepath6

Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface?

tshark

Given the following output from the ls command, how many files are linked with file1? drwxr-xr-x 3 root root 4096 Apr 8 07:12 Desktop -rw-r--r-- 3 root root 282 Apr 29 22:06 file1 -rw-r--r-- 1 root root 282 Apr 29 22:06 file2 -rw-r--r-- 4 root root 282 Apr 29 22:06 file3 -rw-r--r-- 2 root root 282 Apr 29 22:06 file4 -rw-r--r-- 1 root root 282 Apr 29 22:06 file5 -rw-r--r-- 1 user1 sys 282 Apr 29 22:06 file6

two

Which of the following commands will prompt you to answer a series of questions to help determine which time zone file you should use?

tzselect

Which of the following commands can be used to view the quota for a user?

udquota -u jsmith

Which of the following UFW commands can be used to view configured firewall rules?

ufw status

Which command can increase the number of filehandles that programs can open in a shell?

ulimit

Elijah is done working with an external USB hard drive and wants to properly disconnect it. Which of the following commands should he use before unplugging the USB cable?

umount

Which utility has replaced the chkconfig utility in Ubuntu?

update-rc.d

Jean installs a distribution of Linux on a workstation and attempts to run the locate command to find a certain file. Instead of returning the results she expected, an error message is displayed that it cannot find the mlocate.db file in its default location. Which of the following commands should Jean run in an attempt to resolve this problem?

updatedb

To display the uptime of a process, you should use the ______ command.

uptime

To add a user to an existing group, which command should you use?

usermod

Which command should you use to add a user to the plabuser group?

usermod

Which of the following commands can be used to set the number of days until user account jsmith with an expired password is disabled?

usermod -f 15 jsmith

Which of the following commands will allow an administrator to edit the list of permissions assigned to a user wanting to run the sudo command?

visudo

The Linux kernel exists as a file named:

vmlinux

Which of the following utilities will allow you to view information about virtual memory usage on a Linux system?

vmstat

You can use the _______ command to display various information, such as CPU, swap, and memory utilization.

vmstat

You want to update all packages in your system as well as their dependencies. Which command should you use?

yum update

Which package do you need to install to enable automatic updates?

yum-cron

Which file do you need to edit to enable automatic updates?

yum-cron.conf

Which of the following lines can be used to perform command substitution within a shell script? (Choose all that apply.)

`command` $(command)

What is the term used to describe a user providing a user name and password to log in to a system?

authentication

Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux system?

blkid

If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?

brctl

Which utility uses the Burrows-Wheeler algorithm?

bzip2

What keystroke will open a grub> prompt at the Grub boot screen?

c

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

cancel Printer1-17 Printer1-21

Which of the following results would be created by the command sequence: echo 'apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done

carrot dog elephant banana apple

Which of the following will display the contents of the /etc/shadow file? (Choose all that apply.)

cat /etc/shadow getent /etc/shadow

What is the name given to a process not associated with a terminal?

daemon process

Which of the following commands will display the number of seconds that have elapsed since January 1, 1970?

date+%s

Which command can be used to create an image backup of a partition?

dd

Which of the following types of CM software only requires that you specify the attributes that the inventory members must have within a configuration file, not the individual procedures that must be executed on them?

declarative configuration

Before a computer can use a router, what configuration information must it be provided?

default gateway

Emily accidentally created a new user account on the wrong server. Which of the following commands could she use to delete the account she created? (Choose all that apply.)

deluser userdel

Which command should you run after installing a new kernel module to update the module dependency database?

depmod

Which command is used to display the amount of free space that exists on a filesystem?

df

You want to see the filesystems that are in use on the system. What command could you use? (Choose all that apply.)

df -T cat /etc/mtab

Kate wants to compare two text files to identify what might have been changed from one version to another. Which of the following commands can she use to do this?

diff document1.txt document2.txt

Which command provides more information than the host command and provides information on the nameservers?

dig

What does the du -s /var command do?

displays the total size of the /var directory

Which of the following commands will display messages that were displayed during the boot sequence by the kernel?

dmesg

Which of the following commands will list the BIOS information about a device when it cannot otherwise be detected by a Linux system?

dmidecode

Which option to the rpm command can be used to remove a package from the system?

e

Which command is used to format a partition on a hard disk drive with the ext4 filesystem?

e2mkfs -t ext4 device

To configure the httpd service to start automatically when the system boots up, which parameter should be used with the Systemctl command?

enable

Which of the following commands will display detailed information for network hardware?

ethool

If the mkfs command is executed to create a filesystem and only the block device name is specified, which of the following filesystems will be created?

ext2

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?

files

Which of the following commands can be used to recursively search a directory tree for files that meet a certain criterion without using a database or premade index of files?

find

Which of the following commands can be used to recursively search through the directory tree in search of a file that meets a set of given criteria instead of using an indexed database?

find

Jo has received a text file which contains multiple instances of his name spelled correctly as well as multiple instances spelled as Joe. Which of the following commands would search a text file for any occurrences of either spelling and display them out to the terminal? (Choose three.)

grep -E "Joe?" document1.txt grep "Joe*" document1.txt grep -E "Joe*" document1.txt

Which of the following commands will not interpret regular expressions, which translates into faster results being returned? (Choose all that apply.)

grep -F fgrep

Which of the following commands will not interpret regular expressions, which translates into faster results being returned? (Choose all that apply.)

grep -F fgrep

Which of the following will look at the /etc/passwd file for any lines containing the word root and display them out to the screen while simultaneously writing the results to a file?

grep root /etc/passwd | tee ~/root.txt

Which of the following commands can be used to remove a group from a Linux system? (Choose all that apply.)

groupdel delgroup

Which of the following commands can a user run to display the groups that they are a member of?

groups

What command can you use to safely shut down the Linux system immediately?

halt

Which of the following indicates the second MBR partition on the third hard disk drive to GRUB2?

hd2,msdos2

Which command is used to view the full hostname?

hostname -f

Which command displays the short name of a system?

hostname -s

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead?

hostnamectl set-hostname server1

Which package needs to be installed for the Web server on CentOS?

httpd

What command can be used to view and modify the date and time within the BIOS?

hwclock

Which of the following can be used to compare the hardware clock to the system clock, writing a new result to a new line every 10 seconds?

hwclock -c

Which of the following is a type of software that allows a piece of hardware to host multiple operating systems?

hypervisor

Which of the following describes a computer that is used to access an iSCSI hard disk across the network?

iSCSI initiator

Which of the following commands can be used to convert files between different character encodings?

iconv

Which command should you use to check the ID for the user account named roger?

id

What equivalent to the man command generally provides an easier-to-read description of the queried command and contains links to other related information?

info

In what directory is Stage 2 of the GRUB2 boot loader stored?

init

Which command causes the system to enter Single User Mode?

init 1

Which process has a PID of 1 and a PPID of 0?

init/systemd

Which file contains the default runlevel information?

inittab

What file in the /proc directory contains a list of memory address ranges reserved for device use?

ioports

The _________ command can display the CPU and input/output statistics for devices and partitions.

iostat

Which of the following can you use to configure firewall rules for IPv6 on a Linux system?

ip6tables

Which of the following log files contains information and error messages generated by the Linux kernel?

kern.log

Which of the following will invalid entries in the GRUB2 configuration cause?

kernel panic and halt the system

Which of the following commands will send a process's resources to /dev/null to kill the process for process ID 1357?

kill -9 1357

Which process is used for logging events from the kernel?

klogd

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

known_hosts

To determine the recent logins on your system, which command should you use?

last

Which command should you use to find the last login for each individual on a system?

lastlog

Which command within the command-line FTP utility can be used to change the current directory on the local computer?

lcd

Which of the following commands should be run following the installation of a shared library to update the /etc/ld.so.conf and /etc/ld.so.cache files?

ldconfig

Which of the following commands will list missing libraries as not found if a necessary library is not installed?

ldd

In order to create and manage KVM or Qemu virtual machines, a Linux system must have which of the following installed?

libvert

Which command can be used to modify the default locale on the system?

localectl

What is the name of the utility used to rotate log files?

logrotate

The IP address of 127.0.0.1 is also referred to as the _____.

lookback address

Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

lp -d Printer1 file lp file

Which of the following commands can you use to send a print job to printer1? (Choose all that apply.)

lp -d printer1 mydocument.txt lpr -P printer1 mydocument.txt

Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer?

lpd -d printer1

On which part of the maintenance cycle do Linux administrators spend the most time?

monitoring

Which command mounts all existing filesystems in /etc/fstab?

mount -a

What ftp command uploads the filename from the current directory on the local computer to the current directory on the remote computer and allows the use of wildcard metacharacters to specify the filename?

mput filename

When experiencing a network issue, you want to determine where the source of the problem is. Which of the three following commands can be used to determine whether there is an issue with a router in the normal route that the packets are attempting to take?

mtr traceroute tracepath

Which command blanks the terminal screen, erasing previously displayed output?

clear

Which of the following is used on modern Linux distributions that reads YAML configuration files to add apps, modify existing configuration settings, or perform administrative tasks at boot time?

cloud-init

Which of the following is required as a separate partition in order to use LVM?

/boot

For Ubuntu, what is the name of the Apache Web server package on Ubuntu?

Apache2

When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?

make

Which command is used to generate the /etc/mail/sendmail.cf file?

make

Which of the following commands creates an archive?

tar -zcvf /dev/st0 *

Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line is recognized as a comment rather than try to execute it?

#

Which parameter of the groupmod command allows you to change the group name?

-n

If you need to find the information about a package using the rpm command, which parameter should you use?

-q

To count the number of users logged in to the system, which parameters of the who command should be used? [Choose all that apply.]

-q -H

To display the current runlevel of the system, which parameter of the who command should be used?

-r

Which parameter should be used with the shutdown command to schedule a shutdown?

-r

Which parameter should you use along with the vmstat command to display various statistics in a tabular format?

-s

Which parameter should you use to copy the hardware time to system time?

-s

To view the contents of a tar file without extracting it, which parameter should you use?

-t

To display the list of users logged in to the system, which parameter of the who command should be used?

-u

When using the compress command to archive a set of files into a single file, which of the following options will display the compression ratio of the individual files making up the new compressed file?

-v

Which parameter should you use with the hwclock command to set it as the system clock?

-w

Which parameter should you use to extract files from a tar file?

-x

Which parameter should you use with the yum command so that you do not have to provide confirmation during the installation?

-y

Which of the following file extensions are used by the Debian Package Manager?

.deb

Which of the following files can you add filenames to so that the git add * command will not stage them?

.gitignore

What is the default shell in Linux called?

BASH

When performing a sar -u command, you notice that %idle is consistently 10%. Is this good or bad?

Bad, because the processor is idle 10 percent of the time and perhaps a faster CPU is required

Which of the following settings can be configured under the Slow Keys section in Typing Assist dialog box? [Choose all that apply.]

Beep when a key is accepted Beep when a key is rejected Beep when a key is pressed

Which of the following settings can be configured on the Typing Assist dialog box? [Choose all that apply.]

Bounce Keys Sticky Keys Slow Keys

After typing the ls -F command, you see the following line in the output:- rw-r-xr-- 1 user1 root 0 Apr 29 15:40 file1

User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file.

When looking at the password-auth file on a Fedora system, you notice part of the syntax that says dcredit=3. What is the significance of this part of the configuration?

Users must use at least 3 characters as numbers in their passwords.

When applied to a directory, the SGID special permission____________________.

causes all new files created in the directory to have the same group membership as the directory and not the entity that created them

A user typed in the command pwd and saw the output: /home/jim/sales/pending. How could that user navigate to the /home/jim directory?

cd ../..

In order to move from the /home/joe/test/data to the /home/joe directory, what command should be issued?

cd ../..

If a user's current directory is /home/mary/project1, which command could she use to move to the etc directory directly under the root?

cd /etc

Which command is used to change the user password expiration information?

chage

Which of the following commands can be used to back up files in case of system failure, supports long filenames, and can also back up device files?

cpio

What command is used to view and modify user jobs scheduled to run with cron?

crontab

Which of the following commands will show the current user cron jobs that have been created for the currently logged in user?

crontab -l

CUPS gets its directives from its configuration file, which is /etc/cups/__________.

cupsd.conf

Which of the following commands can be used to pause a printer named Printer1?

cupsdisable Printer1

Wayne is using the command line and is in his home directory. Which of the following will display a list of all files and their sizes from his home directory?

ls -al ~ ls -al /home/wayne

Nicholas wants to verify whether a file is a hard link to a file within the same directory. Which of the following commands could he use to see information that would be helpful to make this determination?

ls -i

Jamie has created a hard link to another file within the same directory. Which of the following commands can he use to verify that the hard link was created correctly? (Choose all that apply.)

ls -il ls -i

Select the command that can be used to provide a long listing for each file in a directory:

ls -l

Which command should you use to find out if a file has SUID/SGID bit set?

ls -l

Which of the following can be used to show the block devices on a Linux system? (Choose two.)

ls /sys/block lsblk

Which of the following commands can be used to show the block devices, including their major and minor numbers, on a system which are located in the /sys/block directory?

lsblk

Which of the following commands can be used to display general hardware information for the entire system?

lshw

Which of the following commands can quickly determine whether your network hardware was detected properly following a Linux installation?

lshw -class network

Which of the following commands can be used to see files that are currently being used by a specific process ID (PID)?

lsof

What does the /var directory contain?

spools and log files

Which of the following commands can be used to display socket information out to the terminal screen?

ss

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

ssh -X VNC

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

ssh-keygen ssh-copy-id

Which command can be used to start X Windows, the window manager, and the default desktop environment?

startx

Which two commands can be used to change the runlevel? [Choose two.]

telinit init

Which of the following commands will shut down a Linux system? (Choose all that apply.)

telinit 0 shutdown -h now poweroff

Which two remote connectivity programs are replaced by SSH? [Choose two.]

telnet rlogin

Which command can be used to connect to check the /etc/samba/smb.conf file for syntax errors?

testparm

If a system appears to be having issues with performance for read and write operations to a hard disk, which of the following is not a valid scheduling method that you could try to improve performance?

testwr

Which of the following options for the gpg command will specify the key that should be retrieved?

--recv-keys

What was the nice value of the ps process when it displayed using ps -l?

0

Chapter 7: BASH Scripting

Chapter 7: BASH Scripting

When you create a user with the useradd command, what is the immediate state of it?

Locked

A calendar for the current month can be shown on the command line by issuing which command?

cal

The quotas for certain users can be edited by using which command?

edquota

Which prompt does the root user receive when logged in to the system?

$

Which parameter should you use along with the vmstat command to display the slab information?

-m

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?

/27

Which file does the UNIX SysV init daemon reference on startup to determine the default runlevel?

/etc/inittab

Which of the following files is where the default runlevel is set on some Linux systems?

/etc/inittab

Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

/etc/login.defs

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search. Which of the following files could Lynn modify so that the locate command no longer includes those results?

/etc/updatedb.conf

If you need to restrict the users to their home directory, which value should you set for ChrootDirectory?

/home

When issuing the ls -F command, what special character indicates a linked file?

@

You noticed a file in your home directory that has a + symbol appended to the mode. What does this indicate?

Additional entries exist within the ACL of the file that can be viewed using the getfacl command.

Which of the following statements is true?

After modifying /etc/default/grub, you must run the grub2-mkconfig command before the changes are made to GRUB2

The pkill command terminates _________.

All instances of a process with the same name matched by a regular expression

Which of the following are true of the echo command?

All of the other options are true

What is the most common open source Web server available for Linux?

Apache

Which term is used to describe the process of pushing new versions of a Web app to a cloud provider for testing?

CD

CHAPTER 5: Linux Filesystem Admin

CHAPTER 5: Linux Filesystem Admin

CHAPTER 6: Linux Server Development

CHAPTER 6: Linux Server Development

CHAPTER 8: System Initialization, X Windows and Local

CHAPTER 8: System Initialization, X Windows and Local

Which settings, when being configured, bring up the Hover Click dialog box?

Click assist

Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the following should she do?

Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.

In which of the following zones might a system administrator put the web server hosting the company's publicly accessible website?

DMZ

Which two people are accredited with creating the UNIX operating system? (Choose two answers.)

Dennis Ritchie Ken Thompson

What piece of software tells the operating system how to use a specific hardware device?

Device driver

When referring to the /etc/rsyslog.conf file, __________ specifies information from a certain area of the system, whereas ________ is the level of importance of that information.

Facility, Priority

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when viewed using the ls -l command. True or False?

False

Linux commands entered via the command line are not case sensitive. True or False?

False

The less command offers less functionality than the more command. True or False?

False

To install a new program from RPM software repositories on the Internet, you can use the dnf update programname command.

False

When the fsck command cannot repair a non-root ( / ) filesystem, you should immediately restore all data from backup. True or False?

False

Which common GUI environments are available in most Linux distributions? (Choose all that apply.)

GNOME KDE

What are best practices for securing a local Linux server? (Choose all that apply.)

Lock the server in a server closet. Ensure that SELinux or AppArmor is used to protect key services Use encryption for files and network traffic.

To perform administrative tasks using the Web interface, you must use the root account. An alternative is to add the user to the _________ group.

Lpadmin

Which of the following types of DNS records need to be configured to facilitate email delivery?

MX

The mutt software is an example of what type of mail service software on Linux?

Mail User Agent

You want to configure the runlevels that a particular upstart daemon is started in. What should you do?

Modify the daemon configuration file within the /etc/init directory

Which section of the /etc/rsyslog.conf file contains various configuration directives that are loaded when the module is loaded?

Modules

A user runs the fsck command with the -f option on an ext4 filesystem that is showing signs of corruption. How would that user locate any files the system was unable to repair?

Mount the filesystem and check the lost+found directory underneath the mount point.

When logging into a system, you are prompted to type in a code from a small token that you carry around with you. The code on this token constantly changes. What type of technology has been implemented?

OTP

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

Options

Which of the following environment variables can you change the value of to set the default printer on a Linux system? (Choose two.)

PRINTER LPDEST

Which of the following are examples of multifactor authentication?

Password and fingerprint reader

Which mode of SELinux does not block an event but logs it if it occurs against the defined policy?

Permissive

How can you protect a metacharacter (such as the $ character) from shell interpretation?

Precede it with a \

How can you specify a text pattern that must be at the beginning of a line of text using a regular expression?

Precede the string with a ^.

How can a user switch from insert mode to command mode when using the vi editor?

Press the Esc key

Which of the following RAID levels is not fault tolerant?

RAID 0

What type of redundant storage configuration is most common for hosting the operating system and applications on a server?

RAID 1

Which of the following is the default option for the kind of keys to be generated when using the gpg --gen-key command?

RSA and RSA

What Linux distribution is the most commonly used distribution within organizations today?

Red Hat

To remove a package, which of the following parameter must be run with the apt-get command?

Remove

Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Restart the DHCP daemon.

If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

Segmentation fault

After logging into a terminal, a user will receive an interface known as which option?

Shell

After executing the top command, you can also sort the output by CPU usage by pressing the __________ keys.

Shift + P

Which of the following does Click Assist do?

Simulates a right click by holding down the left mouse button

Which of the following must you perform to share a directory using NFS? (Choose all that apply.)

Start or restart the NFS daemons Edit the /etc/exports file Run the exportfs -a command

Which of the following accessibility features simulates simultaneous key presses when two keys are pressed in sequence?

Sticky Keyes

When files or directories are deleted from a Linux system, the _______ process continues to reference them unless the process is reloaded.

Systemctl

Which of the following is a protocol originally developed by Cisco that uses TCP to handle authentication, authorization, and accounting services?

TACACS+

Which of the following does a Linux kernel use to store the value of epoch time?

The number of seconds since January 1, 1970

Hard links need to reside on the same filesystem as the target, whereas symbolic links need not be on the same filesystem as the target. True or False?

True

Most source code is typically available on the Internet in tarball format or as a git repository. True or False?

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

To install Linux within a virtual machine, you can specify the path to an ISO image that contains the Linux installation media within virtualization software without having to first write the ISO image to a DVD or USB flash drive. True or False?

True

To set udev rules on a Linux system, you must add the appropriate line to a file within the /etc/udev/rules.d directory. True or False?

True

Which of the following feature flashes the entire screen?

Visual alerts

Which of the following package managers are used to install RPM packages on the SUSE or openSUSE distributions by default?

Zypper

Using wildcard metacharacters, how can you indicate a character that is not an a or b or c or d?

[!a-d]

Which type of CM software can connect to inventory members via SSH to perform configuration management activities?

agentless

Which command should you use to switch to the Sendmail MTA?

alternatives --config mta

Which of the following commands can be used to remove the test DPM package, including any test configuration files?

apt purge test

Which of the following commands can be used to install the latest versions of all packages currently installed on the system from the sources configured in sources.list?

apt upgrade

Which command is used to schedule jobs?

at

Which command is equivalent to the atrm command?

at -d

Which command is equivalent to the atq command?

at -l

Chase is trying to extract records for employees 423 through 428 out of a comma separated values file and store them in another one. Which of the following commands would accomplish this? (Choose all that apply.)

cat employees.csv | grep "42[3-8]" > employees-newhires.csv grep "42[3-8]" employees.csv > employees-newhires.csv grep "42[3-8]" < employees.csv > employees-newhires.csv

Which of the following will display the message welcome home if the cd /home/user1 command is successfully executed?

cd /home/user1 && echo "welcome home"

The main configuration file for GRUB2 is /boot/grub/grub_______. This file is automatically built via entries within the /etc/default/grub file.

cfg

The United States Air Force was able to install Linux on a popular gaming console and then connect over 1,700 of these systems together to work as one big supercomputer. Which of the following types of technologies did they implement?

clustering

The vi editor can function in which two of the following modes? (Choose both that apply.)

command insert

Which of the following commands extracts an archive?

cpio -vicdu -I /dev/fd0

Which command can be used at a BASH command prompt to obtain a Web page?

curl

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)

domain comptia.org nameserver 10.1.1.4

Which of the following is the log file where the Debian Package Manager writes entries for actions taken and packages installed?

dpkg.log

Which of the following commands when run from the /, or root, directory will return a very long list of many pages of results?

du

The current value for the HOME variable is displayed by which of the following commands? (Choose all that apply.)

echo ~ echo $HOME

What are the three standard Linux permissions?

execute, read, write

Which of the following commands can you use to list users who have been locked out by pam_faillock.so?

faillock

Every if construct begins with if and must be terminated with? _________

fi

Which of the following commands can be used to display memory statistics? (Choose all that apply.)

free sar vmstat

Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do not charge for the software but also do not distribute the source code along with it?

freeware

Which of the following commands can be used on a modern Linux system to view hardware information that was captured at the beginning of the boot process?

journalctl -k

In Fedora 20, what journaling database system has replaced the logging system used to record the messages normally stored within the boot.log, messages, and syslog files?

journald

A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?

lsusb

Which of the following commands can be used to create and manage a software RAID configuration after installation?

mdadm

On a system running NetworkManager, which of the following commands can be used to view or modify connection information?

nmcli

Which of the following is the correct command to display the hostname?

nmcli general hostname

What command can be issued to confirm which directory you are in at a command line prompt?

pwd

Which of the following files is likely to be found in the /var/log/sa directory on a Fedora system over time?

sa19

Which command should you use to get the SELinux configuration status?

setstatus

Which of the following commands will allow the root user to switch to another user account without having to enter that user account's password?

su

Which of the following options for the tar command will create an archive that is also gzipped while displaying all of the work in progress to the terminal screen?

tar -czvf

Which filename extension indicates a tarball?

tar.gz

Which of the following can be used to create a database within PostgreSQL? (Choose all that apply.)

the CREATE DATABASE statement within the PostgreSQL utility the createdb command.

A user types the command head /poems/mary. What will be displayed on the terminal screen?

the first 10 lines of the file mary

Which of the following server roles does Apache perform?

web server

Which of the following can be used at the command line to download a file using the HTTP protocol? (Choose two.)

wget curl

The core component of the Linux operating system is the Linux kernel. If you were a Linux systems administrator for a company, when would you need to upgrade your Linux kernel? (Choose all that apply.)

when you need support in Linux for new hardware when you need to increase the stability of Linux

Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will compact or otherwise improve the layout of the contiguous blocks of file data for an XFS filesystem?

xfs_fsr

Files that have been compressed using the xz utility typically have the ______ extension.

xz

Which of the following variables could access the value "/etc" within the sample shell script, if the sample shell script was executed using the bash sample /var /etc /bin command?

$2

Which of the following entries could be added to the rsyslog.conf configuration file to have all syslog messages displayed to console 10?

*.* /dev/tty10

Which parameter specifies that the command is related to a change of time?

+%T

Which parameter can you use with the ps command to display the active processes? [Choose all that apply.]

- A - e

Which of the following statements is true? (Choose all that apply.)

- If /etc/at.allow exists, only users listed in it can use the at command. - If /etc/cron.allow exists, only users listed in it can use the cron command. - If /etc/cron.deny exists and /etc/cron.allow does not exist, any user not listed in /etc/cron.deny can use the cron command.

Which parameter should be used with the yum command to check if there are versions of a package available?

--showduplicates

Which of the following options for the gpg command will attempt to use the gpg agent and if it cannot will ask for a passphrase?

--use-agent

You can display active and inactive memory using the vmstat command with the _________ parameter.

-a

Which of the following options can be used with the usermod command to change the description of the user account that is stored in the GECOS field?

-c

Which parameter should be used with the shutdown command to cancel a scheduled shutdown?

-c

To decompress a file using the gzip command, which parameter do you need to use?

-d

Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her Windows workstation. Which of the following file formats is Sandra likely to find available for download from Fedora's website in order to allow her to use the file as the source for booting and installing Linux as a VM?

.iso

Which two partitions do you typically create at minimum during a Fedora Linux installation? (Choose two answers.)

/ swap

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1/dev/dvd /media/dvd iso9660 noauto,ro 0 0

/, /proc, and swap

When compiling source code into a binary program, which command performs a system check and creates the Makefile?

/configure

Which of the following would be the correct device for the primary master PATA hard disk?

/dev/hda

Which of the following would be the device file for the third partition on the second SATA drive on a Linux system?

/dev/sdb3

In which directory is the aliases file stored?

/etc

In which directory is the shadow file stored?

/etc

Which directory stores the cron configuration file?

/etc/

Which file is used for defining the hostname?

/etc/hostname

Which of the following files does the hostnamectl command modify to set the hostname on a machine?

/etc/hostname

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

/etc/hosts DNS

Which of the following files does a TCP wrapper check before starting a network daemon?

/etc/hosts.allow and /etc/hosts.deny

Which of the following files is a binary file that contains the rules for calculating the time based on your time zone relative to epoch time?

/etc/localtime

What is the name of the file that contains a listing of all users on the system and their home directories?

/etc/passwd

What is the path to where the journald.conf file is located?

/etc/systemd/journald.conf

The ________ file system is a virtual file system that is available in CentOS.

/proc

What directory are you placed in when you log in as the anonymous user to an Ubuntu Server 18 FTP server?

/srv/ftp

The login data is retrieved from the latest ________ file.

/var/log/wtmp

What zone configuration file contains a PTR record used to identify the loopback adapter?

/var/named/named.local

Which of the following kernels are developmental kernels? (Choose all that apply.)

2.3.4 4.1-rc5

Which of the following ports should you disable so that they no longer respond to network requests on a Linux system due to a lack of encryption? (Choose all that apply.)

21 23

What is the default runlevel in most Linux distributions?

5

Jan needs to set permissions on a file so that the owner has read, write, and execute permissions. The group should have read permissions only, and everyone else should have no access. Which of the following parameters, when used with the chmod command, would set the permissions described?

740

What kill level signal cannot be trapped?

9

Which value when used with gzip provides the highest compression but is slowest?

9

Jim has just installed two new SAS SSDs in his system. He properly installs the hardware in his machine. Before he can use them for data storage and retrieval, what must he do? (Choose all that apply.)

Create one or more partitions on each of the SSDs Mount any partitions created on the two SSDs such that they are accessible by the operating system Format any partitions created on the SSDs with a valid filesystem recognized by Linux

What must you do to transform your computer into a DNS server? (Choose all that apply.)

Create zone files. Create NIS maps. Run the name daemon (named)

Only the root user can modify a file that has the immutable attribute set. True or False?

False

Stratum 1 NTP servers do not obtain time information from other NTP servers. True or False?

False

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

False

You can purchase object storage from a cloud provider to provide persistent filesystem-based storage. True or False?

False

Which of the following is an on-screen keyboard used with Linux?

GOK

Which of the following statements should be used at the end of a SQL statement where an aggregate function such as SUM or COUNT is used?

GROUP BY

Which assistive technology will make a desktop environment more accessible to a person with low vision?

High Contrast

After typing the ls -a command, you notice a file whose filename begins with a dot ( . ). What does this mean?

It is a hidden file.

What must a user do to run cp or mv interactively and be asked whether to overwrite an existing file?

Just type cp or mv as they run in interactive mode by default.

Which of the following statements are true? (Choose all that apply.)

Quotas can limit both user space and the number of files a user can own Hard limits can never be exceeded Soft limits allow a user to exceed them for a certain period of time

Which of the following can you use to start network daemons in order to limit which computers are allowed to connect to the network service?

TCP Wrapper

Which of the following system variables can you modify to override the default system timezone within your current shell?

TZ

Consider the following shell script: What would be displayed if a user executes this shell script and answers Blue when prompted?

The answer is not red nor blue

If you boot your computer from Linux live media, you will be able to use a fully-functional Linux system prior to installing Linux on permanent storage. True or False?

True

Linux has only one root directory per directory tree. True or False?

True

Which of the following statements regarding LVM structure is correct?

VGs are comprised of one or more PVs

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN?

VPN

You have redirected stderr to a file called Errors. You view the contents of this file afterward and notice that there are six error messages. After repeating the procedure, you notice that there are only two error messages in this file. Why?

You did not append the stderr to the Error file, and, as a result, it was overwritten when the command was run a second time

Which of the following will show account aging information for a user such as the date of the last password change, when the password expires, and the number of days of warning before the password expires?

chage -l jsmith

In order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename?

chmod 7777 filename

Which of these commands will set the following permissions on file1.txt? User = Read, Write, Execute Group = Read, Execute Others = Read

chmod u=rwx, g=rx, u=r file1.txt chmod 754 file1.txt

A file has the following permissions r----x-w-. The command chmod 143 would have the same effect as the command _________.

chmod u=x,g=r,o=wx file1

Which of the following commands will change the user ownership and group ownership of file1 to user1 and root, respectively?

chown user1:root file1

The tac command _________.

displays the contents of a file in reverse order last line first and first line last.

Which of the following are valid permissions for a directory where the command chmod 1777 has been used to set the permissions on it?

drwxrwxrwt

Which of the following commands will display all files and directories within the /var/log directory or its subdirectories which are owned by the root user? (Choose two.)

find /var/log -user root

Which of the following is not a piece of information that the Fedora installation program prompts you for?

firewall settings

Which of the following firewalld commands can be used to allow incoming SSH connections the next time the system is booted?

firewall-cmd --add-service ssh --permanent

A process spawning or initiating another process is referred to as _____.

forking

If you suspect that you have bad blocks on a filesystem, which of the following commands can be used to try and repair the filesystem?

fsck

What command can be used to check different kinds of filesystems on Linux for errors?

fsck

What argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

g+r-w

Which of the following commands can only be used to create partitions on a GPT hard disk?

gdisk

Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all existing MBR partitions on a disk?

gdisk

Which command should you use to query databases for information on various components including password, group, hosts, services, and protocols?

getent

Which of the following will display entries from the Name Service Switch libraries?

getent

Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out to the terminal. Which of the following commands could Garrett use to perform this search?

grep -E "(John|Bob)" salesemployees.csv

A device file _______________________. (Choose all that apply.)

has no data section displays a major and minor number in place of a file size

You have recently modified the system time using the date command. What command can you run to ensure that the same time is updated within the system BIOS?

hwclock -w

You want to determine whether your Linux workstation was able to get assigned an IP address from the DHCP server once you connected it to the network. Which of the following legacy commands might help you determine this?

ifconfig eth0

You want to kill all process IDs of a specific process with a single command. Which command should you use?

killall

Which of the following processes are part of the syslog service? [Choose all that apply.]

klogd rsyslogd

Which of the following commands will create a symbolic link named foo.txt to an original file named bar.txt

ln -s bar.txt foo.txt

Which of the following commands can be used to display the current locale of a system? (Choose two.)

locale localectl

Which of the following commands can be used to set the default printer for all users on a Linux system where printer1 is the name of the printer?

lpoptions -d printer1

Which of the following permissions would show for a symbolic link when displayed with the ls -l command?

lrwxrwxrwx

Select the utility below that will start and perform a thorough check of RAM for hardware errors when run.

memtest86

Which of the following files holds the configuration information for GRUB Legacy on Ubuntu Linux systems?

menu.lst

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist

mkdir -p ~/2019projects/project/projectplans

Which of the following commands cannot be used to create an exFAT filesystem on a USB thumb drive that is recognized as /dev/sdb?

mkfs exfat /dev/sdb1

What file under the proc directory contains information regarding what modules are currently loaded into the Linux kernel?

modules

Which command should you use to display the CPU information?

mpstat

Which command do you use to rename files and directories?

mv

Which of the following commands can be used to scan the available ports on computers within your organization?

nmap

Which of the following virsh commands will display the total amount of memory as well as the amount of free memory for a node?

nodememstats

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

nslookup hostname dig hostname host hostname

Which of the following are factors that determine which Linux distribution a user will use? (Choose all that apply.)

package manager support hardware platform kernel features

What PostgreSQL command-line utility backs up PostgreSQL database settings?

pg_dump

Which of the following commands can be used to determine the round trip time that a packet takes to traverse a network connection?

ping

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?

ping -c 4 server1

The daemons associated with network services listen for network traffic associated with a particular _____.

port

Clint has run the command parted /dev/sdb and wants to display a list of the existing partitions that exist on that drive. Which of the following commands can he use to display the existing partitions?

print

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?

proxy server

To display the processes for the current shell, you should use the ____ command.

ps

The _________ command displays the lineage of a process by tracing its PPID back to the init daemon.

pstree

Mike has changed directory into one subdirectory after the next and has lost track of where he's at in the directory tree. Which of the following commands can he use to tell him the full path to the current subdirectory he is in?

pwd

Which command would a user type on the command line to find out the current directory in the directory tree?

pwd

What will typing q! at the : prompt in command mode do when using the vi editor?

quit without saving any changes

Which of the following commands can be used to scan a filesystem for disk usage, create, check, and repair quota files?

quotacheck

Which of the following characters, when pressed while the top program is running, will allow you to change the niceness of a process?

r

Which of the following tasks can be performed by the apt-get command? [Choose all that apply.]

remove install upgrade

Which command is used to change the priority of an active process?

renice

Which of the following commands will most likely increase the chance of a process receiving more time slices?

renice -12

Which of the following commands will display a summarization of quotas for a filesystem?

repquota

A special device file is used to ___________.

represent hardware devices such as hard disk drives and ports

If "resume" is the name of a file in the home directory off the root of the filesystem and your present working directory is home, what is the relative name for the file named resume?

resume

Which of the following commands will delete a directory and all of the files contained within it?

rm -rf olddir

Which of the following commands will delete a directory and all of the files contained within it? (Choose all that apply.)

rm -rf olddir

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

Which of the following commands will install a package using the Red Hat Package Manager, showing all information, while printing pound signs to show the progress of installation?

rpm -ivh packagename.rpm

Which of the following commands can be used to list the files contained within an installed RPM package?

rpm -ql packagename

The default permissions given by the system prior to analyzing the umask are ___________for directories and __________ for files.

rwxrwxrwx and rw-rw-rw-

Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?

sudo

Which of the following is a virtual filesystem that is made up of virtual files that a Linux operating system is able to export information to about kernel sub-systems, hardware devices, and device drivers to make it easy for users to access the information?

sysfs

Which of the following commands will set the default runlevel of a Linux system?

systemctl set-default runlevel5.target

Which command will provide the current status of the Apache Web server?

systemctl status httpd

Which of the following commands will display a list of Systemd units sorted by the time they took to load?

systemd-analyze blame

Which of the following two commands can be used to add custom log file entries to the journald database? (Choose two.)

systemd-cat logger

When you change the data in a file that is hard-linked to three others, __________.

the data in the file you modified as well as the data in all hard-linked files are modified because they share the same data and all have the same inode and file size

Which culture embraced the term "GNU" (GNU's Not UNIX) and laid the free software groundwork for Linux?

the hacker culture

When configuring a virtual hard disk file, which term refers to the feature that allows the virtual hard disk file to expand dynamically as space is requested by the guest operating system?

thin provisioning

Which of the following commands will list the time zones available on a Linux system?

timedatectl list-timezones

Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image?

timeout

John has been using the cdrom on his computer that is running the Linux operating system. He pushes the eject button on the front of the drive, but it doesn't eject the disk. Which of the following commands should he run? (Choose all that apply.)

umount /media/cdrom eject /media/cdrom

Which of the following commands can be used to search for packages that contain the word oobla on RPM software repositories?

yum search oobla

What command can be used to display the contents of a file that was compressed with the compress utility?

zcat

What command can be used to create a ZFS volume called test from the space on /dev/sdb and /dev/sdc that functions like RAID level 1?

zpool create test mirror /dev/sdb /dev/sdc

If incompatible X Windows settings are configured, where will the errors that are generated be written to?

~/.xsession-errors


Related study sets

HHS330 Ch. 6 Transtheoretical Model - Stages of Change

View Set

Ch 21: Urinary Elimination/Genitourinary Disorder

View Set

Chapter Macro 16 Questions: Fiscal vs Monetary Policy

View Set