Linux Flashcards

1
Q

Which of the following would be the BEST solution for a systems administrator to access the graphical user environment of a Linux machine remotely?

A. VNC

B. KDE

C. X11

D. RPC

A

A. VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error: No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space. Which of the following BEST describes a possible cause for this error?

A. The /tmp directory is not mounted.

B. The filesystem is formatted with a 4MB block size.

C. the filesystem ran out of inodes.

D. The /tmp directory has been set with an immutable attribute.

A

C. the filesystem ran out of inodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the BEST reason for not storing database files in the /var directory?

A. The /var filesystem is not fast enough for database files.

B. The number of files in /var is limited by the available inodes.

C. Files in /var do not have strict file permissions.

D. If log files fill up /var, it might corrupt the database.

A

D. If log files fill up /var, it might corrupt the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator receives a warning about a filesystem filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the filesystem. Which of the following commands would BEST assists the administrator in identifying the problem?

A. lsof | grep largelogfile

B. pkill /tmp/largelogfile

C. pgrep largelogfile

D. ps –ef | grep largelogfile

A

A. lsof | grep largelogfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?

A. UEFI

B. PXE

C. NFS

D. GRUB

A

A. UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After starting a long-running script, a systems administrator needs to verify the frequency of what is filling up the /var partition and kill it because it is consuming too much space. Which of the following is the correct sequence given only a terminal is available?

A. 1. CTRL-C 2. bg 3. watch df /var 4. CTRL-C 5. fg 6. CTRL-Z

B. 1. CTRL-C 2. fg 3. watch df /var 4. CTRL-Z 5. bg 6. CTRL-Z

C. 1. CTRL-Z 2. bg 3. watch df /var 4. CTRL-C 5. fg 6. CTRL-C

D. 1. CTRL-Z 2. bg 3. watch df /var 4. CTRL-Z 5. fg 6. CTRL-C

A

D. 1. CTRL-Z 2. bg 3. watch df /var 4. CTRL-Z 5. fg 6. CTRL-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Linux server has multiple IPs. A Linux administrator needs to verify if the HTTP server port is bound to the correct IP. Which of the following commands would BEST accomplish this task?

A. route

B. host

C. nslookup

D. netstat

E. ip

A

D. netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A systems administrator needs to append output of ls –lha /opt command to the contents of a test.txt file. Which of the following commands will accomplish this?

A. ls –lha /opt > test.txt

B. ls –lha /opt < test.txt

C. ls –lha /opt >> test.txt

D. ls –lha /opt << test.txt

A

C. ls –lha /opt >> test.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts URL. Which of the following commands would allow the administrator to download the current contents of the URL before updating?

A. curl www.comptia.org/contacts

B. dig www.comptia.org/contacts

C. apt-get www.comptia.org/contacts

D. yum list www.comptia.org/contacts

A

A. curl www.comptia.org/contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following BEST describes containers running on a Linux system?

A. Containers only need the namespaces functionality to run on a Linux system available since kernel 2.6.

B. Containers need a hypervisor to run on a Linux system. Cgroups namespaces are functionalities used for the kernel but not for running containers.

C. Containers only need the cgroups functionality for running on a Linux system. Namespaces is not a Linux kernel functionality needed for creating and managing containers.

D. Containers use the cgroups and namespaces functionalities to isolate processes and assign hardware resources to each of those isolated processes.

A

D. Containers use the cgroups and namespaces functionalities to isolate processes and assign hardware resources to each of those isolated processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Linux administrator is testing connectivity to a remote host on a shared terminal. The administrator wants to allow other users to access the terminal while the command is executing. Which of the following commands should the administrator use?

A. bg ping remotehost

B. fg ping remotehost

C. ping remotehost < results

D. ping remotehost &amp;

A

C. ping remotehost < results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Linux administrator needs to switch from text mode to GUI. Which of the following runlevels will start the GUI by default?

A. Runlevel 3

B. Runlevel 4

C. Runlevel 5

D. Runlevel 6

A

C. Runlevel 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set.

A. nohup service network restart

B. service network restart &amp;

C. echo “service network restart” | at now

D. bg service network restart

A

A. nohup service network restart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator is analyzing a Linux server which was recently hacked. Which of the following will the administrator use to find all unsuccessful login attempts?

A. nsswitch

B. faillock

C. pam_tally2

D. passwd

A

C. pam_tally2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A junior administrator needs to unload an older video kernel module. Which of the following commands would BEST accomplish this task?

A. modprobe

B. insmod

C. rmmod

D. chmod

E. depmod

A

A. modprobe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator is attempting to block SSH connections to 192.168.10.24 using the Linux firewall. After implementing a rule, a connection refused error is displayed when attempting to SSH to 192.168.10.24. Which of the following rules was MOST likely implemented?

A. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j REJECT

B. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j DROP

C. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j FORWARD

D. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j REFUSE

A

A. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j REJECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file. Which of the following is the BEST reason to do this?

A. To document the infrastructure so it can be included in the system security plan

B. To ensure the administrator follows the planning phase of the systems development life cycle

C. To define the infrastructure so it can be provisioned consistently with minimal manual tasks

D. To validate user requirements have been met within each regional datacenter for compliance

A

B. To ensure the administrator follows the planning phase of the systems development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A Linux administrator needs to set permissions on an application with the following parameters: The owner of the application should be able to read, write, and execute the application. Members of the group should be able to read and execute the application. Everyone else should not have access to the application. Which of the following commands would BEST accomplish these tasks?

A. chmod 710

B. chmod 730

C. chmod 750

D. chmod 760

A

C. chmod 750

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A junior Linux administrator is trying to verify connectivity to the remote host host1 and display round-trip statistics for ten ICMP requests. Which of the following commands should the administrator execute?

A. ping –c 10 host1

B. traceroute –c 10 host1

C. netstat host1

D. pathping –c 10 host1

A

A. ping –c 10 host1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A junior Linux administrator is updating local name resolution to support IPv6. The administrator issues the command cat /etc/hosts and receives the following output: 127.0.0.1 localhost Which of the following actions should the administrator perform to accomplish this task?

A. Modify the /etc/hosts file, and add the ipv6 localhost entry to the file.

B. Modify the /etc/hosts file, and add the ::1 localhost entry to the file.

C. Modify the /etc/hosts file, and add the ipv4 localhost entry to the file.

D. Modify the /etc/hosts file, and add the 0.0.0.0 localhost entry to the file.

A

B. Modify the /etc/hosts file, and add the ::1 localhost entry to the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A Linux systems administrator needs to copy the contents of a directory named “working” on the local working system to a folder /var/www/html on a server named “corporate-web”. Which of the following commands will allow the administrator to copy all the contents to the web server?

A. scp –r working/* webuser@corporate-web:/var/www/html

B. tar working/* webuser@corporate-web:/var/www/html

C. cp –r working/* webuser@corporate-web:/var/www/html

D. mv working webuser@corporate-web:/var/www/html

A

A. scp –r working/* webuser@corporate-web:/var/www/html

22
Q

A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?

A. mtr www.comptia.org

B. tracert www.comptia.org

C. ping www.comptia.org

D. netstat www.comptia.org

A

B. tracert www.comptia.org

23
Q

A Linux administrator has configured a Linux system to be used as a router. The administrator confirms that two network adapters are properly installed and functioning correctly. In addition, the output of the iptables –L command appears to contain a complete firewall configuration. Which of the following commands does the administrator need to issue for the router to be fully functional?

A. echo “1” > /proc/sys/net/ipv4/ip_forward

B. echo “0” > /proc/sys/net/ipv4/tcp_abort_on_overflow

C. echo “0” > /proc/sys/net/ipv4/max_connections

D. echo “1” > /proc/sys/net/ipv4/ip_default_ttl

A

A. echo “1” > /proc/sys/net/ipv4/ip_forward

24
Q

A systems administration team has decided to treat their systems as immutable instances. They keep the desired state of each of their systems in version control and apply automation whenever they provision a new instance. If there is an issue with one of their servers, instead of troubleshooting the issue they terminate the instance and rebuild it using automation. Which of the following is this an example of?

A. Inventory

B. Orchestration

C. Infrastructure as code

D. Agentless deployment

A

C. Infrastructure as code

25
Q

A systems administrator wants to deploy several applications to the same server quickly. Each application should be abstracted from the host with its own dependencies and libraries and utilize a minimal footprint. Which of the following would be BEST in this scenario?

A. Virtual machines

B. Type 2 hypervisor

C. Chroot jails

D. Containers

A

D. Containers

26
Q

An operator finds a user is having issues with opening certain files. Which of the following commands would allow the security administrator to list and check the SELinux context?

A. ls –D

B. ls –a

C. ls –Z

D. ls -1

A

C.

ls –Z

27
Q

A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication. To which of the following files should the RSA token be added to allow this access?

A. authorized_keys

B. ~/.ssh/ssh_config

C. id_rsa.pub

D. known_hosts

A

C. id_rsa.pub

28
Q

A Linux server needs to be accessed, but the root password is not available. Which of the following would BEST allow an administrator to regain access and set a new known password at the same time?

A. Boot into single-user mode and reset the password via the passwd command.

B. Boot into single-user mode and reset the password by editing the /etc/passwd file.

C. Boot into single-user mode and reset the password by editing the /etc/shadow file.

D. Boot into single-user mode and reset the password via the chage command.

A

A. Boot into single-user mode and reset the password via the passwd command.

29
Q

A Linux administrator wants to fetch a Git repository from a remote Git server. Which of the following is the BEST command to perform this task?

A. git checkout

B. git clone

C. git merge

D. git config

A

B. git clone

30
Q

An administrator needs to create a shared directory in which all users are able to read, write, and execute its content but none of the regular users are able to delete any content. Which of the following permissions should be applied to this shared directory? A. rwxrwxrwt

B. rwxrwxrws

C. rwxrwxrwx

D. rwxrwxrw*

A

A. rwxrwxrwt

31
Q

A systems administrator has finished building a new feature for the monitoring software in a separate Git branch. Which of the following is the BEST method for adding the new feature to the software’s master branch?

A. Merge the changes from the feature branch to the master branch.

B. Save the changes to the master branch automatically with each Git commit.

C. Clone the feature branch into the master branch.

D. Pull the changes from the feature branch into the master branch.

A

A. Merge the changes from the feature branch to the master branch.

32
Q

Which of the following will provide a list of all flash, external, internal, and SSD drives?

A. lspci

B. lsmod

C. lsblk

D. lsusb

A

C. lsblk

33
Q

Which of the following configuration management tools is considered agentless?

A. Puppet

B. Salt

C. Ansible

D. Chef

A

C. Ansible

34
Q

Which of the following is a difference between YAML and JSON?

A. Users can comment in YAML but not in JSON

B. JSON only uses curly brackets, while YAML only uses square brackets

C. JSON is used in web development, while YAML is used solely in back-end systems.

D. YAML has been deprecated for JSON.

A

A. Users can comment in YAML but not in JSON

35
Q

A junior administrator of a physical server receives log messages indicating the out-of-memory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file. Which of the following should the administrator use to reduce the output of memory messages?

A. free : swapoff / swapfile ; swapon -a

B. mkswap /swapfile; swapon –a

C. fallocate –l 2G /swapfile &amp;&amp; swapon –a

D. echo “1” > /proc/meninfo ; swapon / swapfile

A

B. mkswap /swapfile; swapon –a

36
Q

A systems administrator has deployed a Linux server based on an Anaconda process with all packages and custom configurations necessary to install a web server role. Which of the following could be used to install more Linux servers with the same characteristics?

A. /etc/sysconfig/anaconda.cfg

B. /root/anaconda.auto

C. /root/anaconda-ks.cfg

D. /etc/sysconfig/installation.cfg

A

C. /root/anaconda-ks.cfg

37
Q

A Linux administrator needs the “tech” account to have the option to run elevated commands as root. Which of the following commands would BEST meet this goal?

A. $ su – tech –c “/bin/bash”

B. # usermod –aG wheel tech

C. # sudo –i tech

D. # groupadd –u tech –g root

A

B. # usermod –aG wheel tech

38
Q

Which of the following is the purpose of the vmlinux file on a Linux system?

A. To prevent a Linux kernel panic

B. To start a Linux virtual machine

C. To provide the executable kernel for the system

D. To enable resource access to the network

A

C. To provide the executable kernel for the system

39
Q

A junior system administrator had trouble installing and running an Apache web server on a Linux server. You have been tasked with installing the Apache web server on the Linux server and
resolving the issue that prevented the junior administrator from running Apache.

INSTRUCTIONS

Install Apache and start the service. Verify that the Apache service is running with the defaults.

Typing “help” in the terminal will show a list of relevant commands.

If at any time you would like to bring back the initial state of the simulation, please click the Reset
All button.

CentOS Command Prompt

A
40
Q

The lead Linux admin has added a disk, /dev/sdd, to a VM that is running out of disk space. Place the following steps in the correct order from first (1) to last (4) to add the disk to the existing LVM.

A
41
Q

A Linux administrator must identify a user with high disk usage. The administrator runs the # du –s
/home/* command and gets the following output:

Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space.

Which of the following commands will accomplish this task?

A.
df –k /home/User3/files.txt

B.
du –a /home/User3/*

C.
du –sh /home/User/

D.
find . –name /home/User3 -print

A

Answer: C

42
Q

A networked has been crashing intermittently. A Linux administrator would like to write a shell
script that will attempt to ping the server and email an alert if the server fails to respond. The script
will later be scheduled via cron job.

Which of the following scripts would BEST accomplish this task?

A

Answer: D

43
Q

A Linux administrator is testing a new web application on a local laptop and consistently shows the following 403 errors in the laptop’s logs:

The web server starts properly, but an error is generated in the audit log. Which of the following settings should be enabled to prevent this audit message?

A.
httpd_can_network_connect = 1

B.
httpd_enable_scripting = 1

C.
httpd_enable_homedirs = 1

D.
httpd_enable_cgi = 1

A

A.
httpd_can_network_connect = 1

44
Q

Ann, a junior systems administrator, is required to add a line to the /etc/yum.conf file. However,she receives the following error message when she tries to add the line:

Ann performs some diagnostics to attempt to find the root cause:

Which of the following commands should Ann execute to write content to /etc/yum?

A.
chmod 755 /etc/yum.conf

B.
setfacl –m m:rw /etc/yum.conf

C.
chattr –i /etc/yum.conf

D. setenforce 0

A

A.
chmod 755 /etc/yum.conf

45
Q

A Linux administrator needs to take stock of USB devices attached to the system.

Which of the following commands would be BEST to complete this task?

A.
lspci

B.
lsusb

C.
cat /proc/USB

D.
modprobe -–usb

A

B.
lsusb

46
Q

Given the output below:

Which of the following commands can be used to remove MyPhoto.jpg from the current directory?

A.
unlink ./MyPhoto.jpg

B.
del Pictures/photo.jpg

C.
rm –rf ./Pictures

D.
rm –f MyPhoto.jpg

E.
ln –rm ./Pictures/photo.jpg

A

E.
ln –rm ./Pictures/photo.jpg

47
Q

Which of the following server roles would assign a host IP address?

A.
DHCP

B.
NTP

C.
DNS

D. SSH

A

A.
DHCP

48
Q

Which of the following commands would show the default printer on a Linux system?

A.
lpr

B.
lpq

C.
lpstat

D.
lspci

A

B.
lpq

49
Q

A systems administrator has set up third-party log aggregation agents across several cloud
instances. The systems administrator wants to create a dashboard of failed SSH attempts and the
usernames used.

Which of the following files should be watched by the agents?

A.
/var/log/audit/audit.log

B.
/var/log/kern.log

C.
/var/log/monitor

D.
/etc/rsyslog.conf

A

A.
/var/log/audit/audit.log

50
Q

A systems administrator must clean up all application files in the directory /var/log/app. However,
the company’s security policy requires the files to be kept on the backup server for one year. The
Linux server has only the tar and bzip2 packages installed.

Which of the following commands will package and compress the files?

A.
tar –zcvf applicationfiles.tar.bz2 /var/log/app/*

B.
tar –jcvf applicationfiles.tar.bz2 /var/log/app/*

C.
tar –cvf applicationfiles.tar.bz2 /var/log/app/*

D.
tar –xvf applicationfiles.tar.bz2 /var/log/app/*

A

B.
tar –jcvf applicationfiles.tar.bz2 /var/log/app/*