Linux 3 Flashcards
(56 cards)
You attempt to install a package on a new Ubuntu installation. However, you are prompted with the following error:
The following packages have unmet dependencies
…
How should you resolve this error? [Choose all that apply]
Update the repo sources
Run the apt-get command with the -f parameter
Which of the following counter types are used for /sys/block/$DEVICE/stat?
Unsigned long integer
Which of the following is likely to have the most restrictive access control lists?
Demilitarized Zone (DMZ) router
You are using the latest version of Ubuntu. You need to remap a set of keys. Which of the following command should you use for this purpose? [Choose all that apply]
- xkb
* xev
You have a Linux system on which Bluetooth is not working. You need to make it work to synchronize files with your mobile. Which of the following method should you use to troubleshoot Bluetooth? [Choose all that apply]
- Use the dmesg | grep Bluetooth command
- Use the sudo systemctl status bluetooth command
- Use the sudo btmon command
- Use the rfkill list command
- Use the lsmod | grep bluetooth command
You execute the following command on the Red Hat Enterprise Linux system:
ps -eZ | grep -E ‘(auditd|sshd)’
The following output is generated:
system_u:system_r:auditd_t:s0 root 3934 ? 00:00:00 /sbin/auditd
system_u:system_r:kernel_t:s0 root 3946 ? 00:00:00 [kauditd]
system_u:system_r:sshd_t:s0-s0:c0.c1023 root 4159 ? 00:00:00 /usr/sbin/sshd
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
What can be interpreted with the following output? [Choose all that apply]
- It is possible to have multiple processes use the same security context
- The first column is the security context for the mentioned process
- Each process has only one security context
Identify the output of the following command:
git push
It will push the local repository changes to the remote repository
You need to use the make command to build all programs forcefully. Which parameter should you use?
-B
Which of the following statement(s) is correct about the self-signed certificate? [Choose all that apply]
- A self-signed certificate requires two parties to interact for trading public keys
- A self-signed certificate can be generated by anyone
- A self-signed certificate is signed by its own private key
In the /etc/cryptab file, which of the following fields are mandatory? [Choose all that apply]
- Path to the block device
* /dev/mapper/name
Which of the following takes place when you restart a service using the restart parameter?
The service reads the configuration files and then reloads the configuration when the service restarts
You execute the following command:
ls -l /etc/passwd plab
At present, the plab file does not exist. What will be the output of this command?
It will list the passwd file and generate an error for the plab file
On a CentOS 7 system, you have configured OpenLDAP. You have also specified various attributes, such as domain component ( dc ), distinguished name (dn), and organization (o). You want to now check for the schema. Which file should you open to do this?
/etc/openldap/schema
You have a virtual Linux server hosted in the cloud environment. You run the getenforce command and find that SELinux is set to Disabled. You make the following changes to the /etc/selinux/config file:
SELINUX=enforcing
SELINUXTYPE=targeted
SETLOCALDEFS=0
You save the config file and reboot the system. After the system reboots, you run the getenforce command and find SELinux is still in the disabled state.
What could be the possible cause? [Choose all that apply]
- The bootloader is disabling the SELinux
* The Linux system’s kernel is not configured with SELinux
You are using a Linux system on which Bluetooth is enabled. You want to ensure that you are able to see the messages when you are pairing with any Bluetooth device. Which of the following command will help you achieve this goal?
Use the sudo btmon command
You need to re-partition a disk that is part of a RAID, which is currently running on a Linux system. You want to ensure that the RAID stays intact and is not broken. What should you do?
You need to stop the RAID array first
You have several udev rules in the /etc/udev/rules.d/ directory. You have made significant changes to one rule from this directory. What should you do next without much administrative effort?
Reload the rules
You have a lot of files that contain the words plab and PLAB in your current directory. You want to perform a search for these words but do not want to perform a case-sensitive search using the grep command. What should you do?
grep -i plab .
Which of the following are components of cron? [Choose all that apply]
- crontab
* crond
You have created a directory on a Linux system. You want all the files that are created within this directory should inherit the parent directory’s permissions only. What should you do? [Choose all that apply.]
- Use the chmod command to set the setgid
* Assign the group ownership to the parent directory
ll your organization’s internal Websites are using HTTP protocol. After an attack on one of the Websites, you decide to implement HTTPS on all the Websites. However, the management does not allocate any additional funds for this job. What would be your best solution to secure the Websites?
Setup an internal CA and issue certificates
If you are using remote direct memory access (RDMA) technology in your Linux system, which of the following are the direct benefits? [Choose all that apply]
- Low CPU utilization
- High throughput
- Low latency
You have a Linux system. You want to query the display monitor from the command line and get the information, such as model, make, and display resolution. What should you do? [Choose all that apply]
- Install and run the read-edid hardware information-gathering tool to find this information
- Search for the information in the /var/log/Xorg.0.log file with the grep command
- Use the xrandr tool from the x11-server-utils package
Identify the output of the following command:
git commit -m “[message]”
Commits the staged changes in a new snapshot