Pre Assessment

Ace your homework & exams now with Quizwiz!

How do you reference the first command-line argument in a shell script?

$1

What operator do you use to start a script in background mode?

&

A coworker at a remote location has a laptop that is running a Linux desktop environment. He needs your help to access a remote desktop session at the server, where he is currently logged into a text-based session. You tell him to employ SSH port forwarding and use its remote mode. Which ssh command switches should you tell him to employ?

-N -f -L

What tar command-line options are commonly used to create a compressed tar ball file?

-zcvf

A kernel module file has what file extension?

.ko

What directory does Linux use to store device files?

/dev

What raw device file would Linux create for the first SCSI drive connected to the system?

/dev/sda

What directory contains configuration information for the X Windows System in Linux?

/etc/X11

Which of the following files contain user account creation directives used by the useradd command?

/etc/login.defs /etc/default/useradd

Kernel modules are stored in what subdirectory?

/lib/modules/

What folder contains the time zone template files in Linux?

/usr/share/zoneinfo

What port should you disable to prevent users from using the Telnet service to access your Linux server?

23

What operator appends the output to an existing file?

>>

Which of the following symbols could be used to redirect STDOUT?

>> > |

What output does the command ps -e produce?

All processes running on the system

Which of the following are potential causes of packet drop?

An improperly connected network cable B An adapter that is failing A saturated network segment

Which of the following are involved in bootstrapping?

Anaconda B Preseed C AutoYaST Kickstart file

Your orchestration tool allows you to enter through its API the desired app container infrastructure documentation. It later uses this documentation for build automation. What is this process of documenting called?

Automated configuration management

What method should you use to develop an application in a test environment then move it into a production environment?

Container

Each correct answer represents a complete solution. Choose all that apply.

Default router IP address Subnet mask

When a container crashes, an orchestration system with the ability to self-heal will deploy production app containers until what directive is reached?

Desired state

What configuration setting should you set in systemd-journald to forward events to a rsyslogd server?

ForwardToSyslog

What are the primary types of cloud services?

Hybrid C Public Private

Which of the following sections would you find in the /etc/X11/xorg.conf file?

Input Device Screen Monitor

What method should you implement to encrypt an entire disk partition?

LUKS

The Cinnamon desktop environment uses which windows manager?

Muffin

You enter the command edquota -u JKirk and see zeros (0) under all the soft columns. What does this mean?

Neither block nor inode soft quotas have been configured for this user.

What are the different types of blobs in Azure Blob Storage?

Page Block Append

Each correct answer represents a complete solution. Choose all that apply.

Persistent Thin provisioning

"A networking method for controlling and managing network communications via software that consists of a controller program as well as two APIs" describes which of the following?

SDN

What protocol does a mail server use to send email messages to remote mail servers?

SMTP

What software package allows a Linux server to share folders and printers with Windows and Mac clients?

Samba

What are the types of user accounts in Linux?

Service B Standard C Root

With orchestration, you can enforce a static container environment. Why is this done?

So that the app's infrastructure does not change

On Linux, the SCSI framework consists of what integral parts?

The SCSI routing layer C The HBA driver layer D The device driver layer

Which of the following are true concerning the MD5- and SHA-based utilities?

The SHA-based utilities produce longer hash values than the MD5-based utility. Both can be used to check a transferred file's integrity.

Which of the following are directly associated with vmm?

The Virtual Machine Manager application B The virt-manager command C The virt-viewer client viewer

During the boot process, what software loads the operating system into memory and starts it?

The bootstrap loader

Which of the following describes firewall persistency?

The firewall configuration survives system reboots as well as the firewall being restarted or reloaded.

Bruce employs the git init command. This sets up which conceptual Git environment elements?

The local repository C The index D The staging area

Which of the following best describes a load average?

The number of times processes are waiting for or using the CPU.

Which of the following describes IPSec tunnel mode?

The payload and routing headers are encrypted.

Which of the following can override the settings in the ~/.ssh/config file?

The ssh utility's command-line options.

You are troubleshooting a systemd system and issue the command systemctl is-system-running. The command displays degraded. Which of the following best describes what is going on?

The system has one or more failed units.

The cat -n File.txt command is entered at the command line. What will be the result?

The text file File.txt will be displayed along with line numbers.

You issue the command id -gn 1138 at the command line. Assume the user exists. Which of the following best describes what will display?

The user's (UID 1138) current group's name.

Which type of hypervisor runs directly on the hardware without a middleman OS?

Type I

Which character set uses 1 byte to store characters?

UTF-8

For the ps command, which type of parameters must you precede with a single dash?

Unix-style

Which of the following are true concerning PKI?

Via the PKI structure, CA signed certificates are implemented. The PKI framework helps to protect key integrity.

Where is the /usr/bin/nologin file used, and why would you use it?

When used as the default shell for a user-defined in the /etc/passwd file, it prevents the user account from logging in

What journalctl command-line options should you use to display just the kernel events?

_TRANSPORT=kernel

Within the nano text editor's help subsystem, you'll see some metacharacter key combinations denoted by M-k. Which of the following keys may the M represent?

alt esc meta

What command allows you to restart a paused job or application in background mode?

bg

You've moved your present working directory to a new location in the Linux virtual directory structure and need to go back to the previous directory, where you were just located. Which command should you employ?

cd -

What command do you use to change the basic permissions for a file?

chmod

What command can you use to change the owner assigned to a file?

chown

Which command can you use to display the time and date using a specific format?

date

A user cannot create a file in his directory. You recognize that this is occurring for everyone using that same filesystem and suspect inode exhaustion. What command can you use to see if your suspicion is correct?

df -i

If the Linux system doesn't recognize a hardware device at boot time, what command can you use to check for errors?

dmesg

What tool do you use in Ubuntu to install an application package?

dpkg

What command displays features and parameters for network cards?

ethtool

Which Bash shell script statement allows you to iterate through a series of data until the data is complete?

for

Which tool should you use to fix a corrupt filesystem?

fsck

Which tools are command-line tools for creating and modifying partitions?

gdisk parted fdisk

What command do you use to display the ACL permissions assigned to a file?

getfacl

Natasha has added her username and email address to the global Git configuration. Which of the following commands will she use to view them?

git config --list cat ~/.gitconfig

A developer has created her working files and added them individually to the staging area using the git add command. However, that was a few hours ago, and she is ready to move her project to the local repository. What command can she issue to ensure that no files in her working directory are unregistered with the index?

git status

Which file contains the configuration for the GRUB2 bootloader?

grub.cfg

What command do you use to display entries in the systemd-journald journal?

journalctl

What command allows you to stop a running process, but only if you know the process ID?

kill

What rsyslog utility is commonly used to split log files into separate files based on time or size of the file?

logrotate

What command do you use to display the SELinux security context assigned to a file?

ls -Z

You are troubleshooting a rather serious problem on a systemd server. Using superuser privileges, you enter the systemctl isolate emergency command. Once you are logged back into the system, you issue the systemctl is-system-running command. What is displayed?

maintenance

You recently installed additional RAM on a Linux server to help improve its performance. The primary application uses a great deal of memory and the new RAM has helped. However, at application peak usage times, the free utility shows there is plenty of free memory, but the system slows and sometimes hangs. Which of the following items should you use to troubleshoot this problem?

memtest or memtest86+ lshw --class memory dmidecode -t memory

Which file is shared by both the modprobe and the depmod utility?

modules.dep

Which file does the nohup command place in the script output by default?

nohup.out in the current directory

Which of the following is a PAM module involved with enforcing strong passwords?

pam_pwquality.so D pam_unix.so E pam_pwhistory.so pam_cracklib.so

Which of the following commands sends a file (or files) from the local system and stores it (them) on the remote system?

put

You need to delete files in a directory as well as any empty subdirectories. You want to be asked permission before deleting each file and received detailed information as the command executes. Which command and option combination should you use?

rm -ivd directory

Which tools can you use in Red Hat Linux to install an application package?

rpm yum dnf

You need to move several data files securely to a remote Linux system. What is the best utility group to employ for moving the newly created archive file?

rsync

You want to add the NFS service to the firewalld's public zone. What command will accomplish this?

sudo firewall-cmd --add-service=nfs --zone=public

A new user account, Hansen7o9, was created, but the user cannot log into the system. You suspect a password was not set for this account. What command should you use to investigate this suspicion?

sudo getent shadow Hansen7o9

You need to determine the default target of a systemd system. Which of the following commands should you use?

systemctl get-default

What program listens to kernel notifications about new hardware devices?

udev

You have been informed that an employee is to be terminated today. The company does not want the account deleted but does not want the employee logging into the Linux server either. You check the system using the who command and see that the employee is not currently logged into the system. Which of the following commands should you use to prevent the employee from logging into the system as desired by the company?

usermod -L passwd -l

Which tool will allow you to view disk I/O specific to swapping?

vmstat

You need to move several data files securely to a remote Windows system. What is the best utility group to employ for creating the archive?

zip


Related study sets

ערבית - רשימה בסיסית

View Set

Walter Cristaller Central Place Theory

View Set

chap 19 + 24 bio 2 part 1 final exam

View Set

Ch 12: Network Configuration (Practice)

View Set

Quantitative and Economic CFA Questions

View Set

Sexual Harassment Prevention (810000)

View Set