Study Guide - Practice Test Flashcards

(117 cards)

1
Q

2- Which open source database implements advanced database features but can be slower to use?

  • MongoDB
  • MySQL
  • PostgreSQL
  • NoSQL
  • Oracle
A

PostgreSQL

The PostgreSQL open source database server is well known for utilizing advanced database features commonly found in commercial database servers, but it can be somewhat slower when processing data, making option C correct. The MongoDB, MySQL, and NoSQL open source databases are designed for speed and implement varying levels of advanced database features, but they don’t provide all the advanced features of commercial databases, so options A, B, and D are incorrect. The Oracle database implements advanced database features but is not an open source database, so option E is incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4- Which logging program do systemd systems use?

rsyslogd
ntpd
dhcpd
journald
httpd

A

journald

Systemd systems use the journald program for logging system events, so option D is correct. The rsyslogd program is commonly used by SysVinit systems for logging events, but not systemd systems, so option A is incorrect. The ntpd, dhcpd, and httpd programs provide network services for time, configuration, and web services respectively, but not logging services, so options B, C, and E are all incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

rsyslogd

A

the traditional system logging daemon that collects, processes, and stores log messages in plain text files (typically in /var/log/), using the syslog protocol and configurable through /etc/rsyslog.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

journald

A

systemd’s modern logging service that captures system and service logs in a structured binary format, storing them in the systemd journal with advanced querying capabilities through journalctl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

systemd

A
  • a modern init system and service manager that serves as PID 1, responsible for booting the Linux system, starting/stopping services, and managing system processes throughout the system lifecycle
  • It replaces traditional SysV init scripts with unit files (service, socket, timer, etc.) that define how services should be started, dependencies, and runtime behavior, managed through commands like systemctl and journalctl
  • systemd provides parallel service startup for faster boot times, automatic service restarts, dependency management, and integrated logging through journald, making it the default init system on most major Linux distributions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5- What server role should you implement to speed up web browsing for local clients?

A web proxy
A DHCP server
A web server
A container
An SMTP server

A

A web proxy

A web proxy server has the ability to cache pages retrieved from remote web servers and relay those web pages to local clients when the same web page is requested again, helping to speed up web browsing for local clients, making option A correct. A DHCP server only provides IP and host configuration settings to network devices, not speed up web browsing, so option B is incorrect. A standard web server must retrieve web pages individually for each client, so it doesn’t speed up web browsing for the individual clients, making option C incorrect. A container helps make software development easier by duplicating the development environment into a form that can be transportable between multiple servers, but it doesn’t help speed up web browsing for clients, making option D incorrect. An SMTP server is used to provide email service, not web services, so option E is incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

6- You need to delete files in a directory as well as any empty subdirectories. You want to be asked permission before deleting each file and receive detailed information as the command executes. Which command and option combination should you use?

  • rmdir -v directory
  • rmdir -vp directory
  • rm -ivf directory
  • rm -Id directory
  • rm -ivd directory
A

rm -ivd directory

The rm -ivd directory command will delete the files and any empty subdirectories in the directory. In addition, it will ask permission before deleting each file and provide detailed information. Therefore, option E is the correct answer. The rmdir -v directory command will only attempt to delete the directory, and only if it is empty. Therefore, option A is a wrong answer. The rmdir -vp directory command will only attempt to delete the directory files, but not any subdirectories in it. Thus, option B is also an incorrect answer. The rm -ivf directory command does not delete any empty subdirectories in the directory. Therefore, option C is a wrong choice. The rm -Id directory command does not provide verbose information and will only ask before deleting three files. Thus, option D is also an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

7- Which of the following are ways to identify that a text file is hard‐linked to another file? (Choose all that apply.)

  • The file shares an inode number with another file.
  • The file does not share an inode number with another file.
  • The file has a file indicator code of l in its long listing.
  • The file has a link count greater than 1.
  • The file shares the same data with another file.
A
  • The file shares an inode number with another file.
  • The file has a link count greater than 1.
  • The file shares the same data with another file.

Indicators that a text file is hard‐linked to another file are the file shares an inode number with another file, the text file has a link count greater than 1, and the file shares the same data with another file. Thus, options A, D, and E are all correct answer. Soft (symbolic)‐linked files do not share an inode number with another file and have a file indicator code of l in their long listing. Therefore, both options B and C are incorrect choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

watch

A

The watch command allows you to execute a program periodically and view the command’s output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

9- You need to locate files within the /tmp directory or one of its subdirectories. These files should be empty. Assuming you have super user privileges, what command should you use?

  • find / -name tmp
  • find /tmp -empty
  • find /tmp -empty 0
  • find /tmp/ * -name empty
  • find / -empty
A

find /tmp -empty

The find /tmp -empty command will locate files within the /tmp directory or one of its subdirectories, which are empty. Therefore, option B is the right answer. The find / -name tmp command starts at the root directory instead of the /tmp directory and searches for files/directories whose names are tmp. Thus, option A is a wrong answer. The find /tmp -empty 0 command adds an incorrect additional argument, 0, at the end of the command, so option C is also an incorrect answer. The find /tmp/* -name empty command searches for files/directories whose names are tmp and adds an unnecessary wildcard, *, to the directory name to search. Thus, option D is also a wrong choice. The find / -empty command starts at the root directory instead of the /tmp directory. Therefore, option E is an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

10- Which of the following are filter commands? (Choose all that apply.)

  • egrep
  • sort
  • grep
  • cut
  • pr
A
  • egrep
  • grep
  • cut

In the option list, only the egrep, grep, and cut commands are considered to be filter commands, because they filter out text. Therefore, options A, C, and D are correct. The sort and pr commands are formatting commands, and thus options B and D are incorrect choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

egrep

A
  • egrep is an extended version of grep that supports extended regular expressions (ERE) by default, allowing more complex pattern matching with metacharacters like +, ?, |, and parentheses without needing to escape them
  • It’s equivalent to running grep -E and enables advanced regex features like alternation (pattern1|pattern2), quantifiers (+, ?), and grouping with parentheses for more sophisticated text searches
  • Common usage: egrep “error|warning|fail” /var/log/messages to search for multiple patterns, or egrep “^(root|admin)” /etc/passwd to find lines starting with specific usernames using grouping and alternation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

pr

A

a text formatting command that prepares files for printing by adding headers, page numbers, columns, and line numbering - commonly used with options like -n for line numbers, -h for custom headers, and -l for page length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sort

A

arranges lines of text files in alphabetical, numerical, or custom order, with useful options like -n for numerical sorting, -r for reverse order, -k for sorting by specific fields, and -u for removing duplicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

11- Which of the following symbols could be used to redirect STDOUT? (Choose all that apply.)

  • ˃
  • |
A
  • ˃
  • |

The ≫ symbols will allow you to redirect STDOUT from a command and append the redirected content to a file. Therefore, option B is a correct choice. The ˃ symbol will allow you to redirect STDOUT from a command and place the redirected content to a file, creating it if the file does not previously exist or overwriting its contents if it does already exits. Therefore, option D is a correct choice. The | symbol, called the pipe, will allow you to redirect STDOUT from a command to STDIN of another command. Therefore, option E is also a correct answer. Option A redirects STDERR, represented by the 2 file descriptor, so therefore it is a wrong answer. Option C is an incorrect choice because the ≪ symbols are for STDIN redirection associated with a here document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

12- Within the nano text editor’s help subsystem, you’ll see some metacharacter key combinations denoted by M-k. Which of the following keys may the M represent? (Choose all that apply.)

  • Ctrl
  • Esc
  • Alt
  • Meta
A
  • Esc
  • Alt
  • Meta

For the metacharacter key combinations, the M represents the Esc, Alt, or Meta key, depending on your keyboard’s setup. Thus, options B, C, and E are correct answers. The Ctrl key is typically used in conjunction with other nano text editor key combination functions, such as Ctrl+O to output the text editor’s buffer to a file. Therefore, option A is a wrong answer. The ^ is a symbol used to denote use of the Ctrl key within certain nano text editor key combinations, and thus option D is also an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

13- The command echo “a b c d” | gawk ‘{print $1}’ is issued at the command line. What will be displayed?

  • a
  • b
  • c
  • d
  • a b c d
A

a

The gawk utility defines a data field as characters separated by a space with a text line. The $1 data field is the first data field in a text line. Therefore, the command will display a to STDOUT, and option A is the correct answer. For b to display, the $1 in the gawk command needs to be changed to $2. Thus, option B is the wrong answer. For c to display, the $1 in the gawk command needs to be changed to $3. Therefore, option C is also a wrong choice. For d to display, the $1 in the gawk command needs to be changed to $4. Thus, option D is an incorrect answer. For a b c d to display, the $1 in the gawk command needs to be changed to $0. Therefore, option E is also an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

gawk

A
  • the GNU implementation of the AWK programming language, a powerful text processing tool that scans files line-by-line and performs pattern matching and actions on structured data like CSV files or log files
  • It excels at field-based processing where you can reference columns using variables like $1 (first field), $2 (second field), with automatic field separation by whitespace or custom delimiters using the -F option
  • Common usage examples: gawk ‘{print $1, $3}’ file.txt to print specific columns, or gawk -F: ‘{print $1}’ /etc/passwd to extract usernames from the passwd file using colon as field separator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

15- After booting, what command should you use to look for any errors that occurred during the boot process?

  • fsck
  • init
  • mount
  • dmesg
  • mkinitrd
A

dmesg

Errors that occur while the Linux system is booting are sent to the kernel ring buffer. The dmesg program allows you to view the entries in the kernel ring buffer, making option D correct. The fsck program allows you to find and fix errors on a partition but doesn’t allow you to view errors as they occur during boot time, making option A incorrect. The init process starts processes during boot time but doesn’t allow you to view any errors generated, so option B is incorrect. The mount program allows you to mount a partition into the virtual directory but not view any errors that occurred during boot time, so option C is incorrect. The mkinitrd program creates a virtual directory that’s loaded into memory during boot time, but doesn’t allow you to view any errors that are generated, so option E is incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

19- You are troubleshooting a systemd system and issue the command systemctl is-system-running. The command displays degraded. Which of the following best describes what is going on?

  • The system is fully in working order.
  • The system has one or more failed units.
  • The system is in emergency mode.
  • The system is in recovery mode.
  • The system is starting to shut down.
A

The system has one or more failed units.

When the systemctl is-system-running command displays degraded, this means that the system has one or more failed units, such as a service or a socket. Therefore, option B is the correct answer. If the system was fully in working order, the command would display the running status. Thus, option A is a wrong answer. If the system was in emergency or recovery mode, the command would display the maintenance status. Therefore, both options C and D are wrong choices. If the system was starting to shut down, the command would display the stopping status. Thus, option E is also an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

20- Which of the following sections would you find in a systemd service unit file? (Choose all that apply.)

  • [Unit]
  • [Automount]
  • [Mount]
  • [Service]
  • [Install]
A
  • [Unit]
  • [Service]
  • [Install]

You would find three sections in a systemd service unit file. They are [Unit], [Service], and [Install]. Therefore, options A, D, and E are correct answers. The [Automount] section is only in systemd automount unit files. Thus, option B is a wrong answer. The [Mount] section is only in systemd mount unit files, and therefore, option C is also an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

21- You are troubleshooting a rather serious problem on a systemd server. Using super user privileges, you enter the systemctl isolate emergency command. Once you are logged back into the system, you issue the systemctl is-system-running command. What is displayed?

  • yes
  • true
  • false
  • emergency
  • maintenance
A

maintenance

When you jump to the emergency target, issuing the systemctl is-system-running command will display the maintenance status. Therefore, option E is the correct answer. The other items are not displayed by the systemctl is-system-running command at any time, so therefore, options A, B, C and D are all incorrect choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

22- You are auditing an old SysVinit system and checking the status of each service that runs on the system. When you decide to check the DHCP service, using the command chkconfig dhcp on the command line, you get no response. What does this mean?

  • The DHCP service is not running.
  • The DHCP service either is not running or has failed.
  • You need to issue an additional command.
  • You need to issue a different command.
  • The DHCP service program files are not installed.
A

You need to issue an additional command.

When you issued the chkconfig command and pass it a service name, the command will check if the service is enabled at the current runlevel. However, it does not display the results to STDOUT. Instead the results, true (0) or false (1), are sent to the ? variable. Therefore, you need to issue an additional command to see the results, which is echo $?. Therefore, option C is the correct answer. The ckconfig dhcp command does not determine if the DHCP service is running or not, or failed, so options A and B are wrong answers. You do not need to issue a different command, just an additional command, so option D is a wrong choice. Also, the command’s primary purpose is to determine whether or not the service is enabled at the current runlevel, so option E is an incorrect choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

23- What network settings does the ip command set? (Choose all that apply.)

  • IP address
  • Subnet mask
  • Default router
  • DNS servers
  • NTP servers
A
  • IP address
  • Subnet mask
  • Default router

Explanation

The ip command allows you to set the IP address, subnet mask, and default router for a network interface, making options A, B, and C correct. It doesn’t allow you to set the DNS or NTP servers for a connection, making options D and E incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
24- What command displays features and parameters for network cards * ethtool * iwconfig * iwlist * netstat * route
**ethtool** The ethtool program displays hardware information about network interface cards, making option A correct. The iwconfig and iwlist programs display information about wireless networks, not the network cards, making options B and C incorrect. The netstat and route programs display information about the network statistics, not the network cards, so options D and E are both incorrect.
26
ethtool
a command-line utility for displaying and configuring Ethernet network interface settings like speed, duplex mode, auto-negotiation, and hardware statistics - used for wired network troubleshooting with commands like ethtool eth0
27
iwconfig
the wireless equivalent of ifconfig, used to configure and display wireless network interface parameters like SSID, frequency, encryption keys, and signal strength for WiFi adapters
28
iwlist
scans and displays detailed information about available wireless networks, access points, and their capabilities - commonly used as iwlist scan to show nearby WiFi networks with their SSIDs, signal strength, and security settings
29
ss
**socket statistics** is the modern replacement for netstat, providing faster and more detailed information about network connections, listening ports, and socket statistics with better filtering capabilities
30
ping6
the IPv6 version of the ping command, used to test network connectivity and measure round-trip time to IPv6 addresses or hostnames - essential for troubleshooting IPv6 network issues with syntax like ping6 ::1 or ping6 ipv6.google.com
31
28- Which of the following is true about the GNOME desktop environment? (Choose all that apply.) * GNOME is an open source project. * GNOME uses SDDM as its windows manager. * GNOME uses Files as its default file manager. * GNOME is a fork of MATE. * GNOME uses the Dash as its favorites bar.
* GNOME is an open source project. * GNOME uses Files as its default file manager. * GNOME uses the Dash as its favorites bar. GNOME is an open source project supported by the GNOME Foundation. Therefore option A is a correct choice. Files is the default file manager for the GNOME desktop, so option C is correct. The Dash is the default favorites bar for the GNOME desktop, making option E also correct. GNOME uses the GNOME Display Manager (GDM) for its display manager, not SDDM, so option B is incorrect. MATE is a fork from GNOME version 2, and GNOME is not a fork of MATE, so option E is also an incorrect choice.
32
29- Which of the following sections would you find in the /etc/X11/xorg.conf file? (Choose all that apply.) * Service * Input Device * Desktop * Monitor * Screen
* **Input Device** * **Monitor** * **Screen** The Input Device, Monitor, and Screen sections are all sections you would find in the /etc/X11/xorg.conf file. Therefore, options B, D, and E are correct choices. You would also find the Modes, Device, Module, Files, Server Flags, and Server Layout sections. The Service and Desktop sections are made up, and therefore options A and C are incorrect choices.
33
30- You are troubleshooting a problem with a user’s graphical user interface, which is being served by X11. You notice that the X Display Manager Control Protocol is being used as the display manager. What does this implicate? * The control protocol is being used by X11 to provide a basic desktop environment. * A Wayland display server is being used and needs to be replaced by an X11 server. * The /etc/X11/xdm-config file should be reviewed. * This protocol is used in place of the Weston compositor. * The XDMCP is used for the user authentication interface.
**The XDMCP is used for the user authentication interface.** The X Display Manager Control Protocol (XDMCP) can be employed as a very basic display manager. A display manager controls the login screen provided to the user for authentication. Therefore, option E is the correct answer. XDMCP is not used by X11 to provide a basic desktop environment, so option A is a wrong answer. XDMCP’s use does not indicate the Wayland display server is being used, and therefore, option B is also an incorrect answer. If you were having problems with the display manager, then the correct file to review would be the /etc/X11/xdm/xdm-config file, and not the /etc/X11/xdm-config file. Thus option C is a wrong choice. XDMCP is not a compositor, so option D is also an incorrect answer.
34
31- A coworker at a remote location has a laptop that is running a Linux desktop environment. They need your help to access a remote desktop session at the server, where they are currently logged into a text‐based session. You tell them to employ SSH port forwarding and use its remote mode. Which ssh command switches should you tell them to use? (Choose all that apply.) * -N * -Y * -f * -R * -L
* -N * -f * -R You need to indicate to the OpenSSH server that no terminal is required, because you are only establishing a tunnel. Therefore, the -N switch is needed and option A is a correct answer. The -f switch will send the OpenSSH tunnel into the background, freeing up his command‐line interface so the user can type in remote desktop commands. Thus, option C is a correct answer as well. The -R switch is used for remote mode SSH port forwarding and will allow them to specify the local system as well as the local and remote ports to be used. Therefore, option D is also a correct choice. The -Y switch is not used in SSH port forwarding, so option B is a wrong answer. The -L switch is used for local mode of the ssh command. Therefore, option E is also an incorrect answer.
35
32- Which character set uses 1 byte to store characters? * ASCII * UTF‐8 * UTF‐16 * Unicode * UTF‐32
**UTF‐8** The UTF‐8 character set uses all 8 bits, or 1 byte, to store characters; thus, option B is correct. The ASCII character set uses only 7 bits, so option A is incorrect. The UTF‐16 character set uses 2 bytes, Unicode uses 3 bytes, and UTF‐32 uses 4 bytes, so options C, D, and E are all incorrect.
36
how many bites to store characters in these character sets: * ASCII * UTF‐8 * UTF‐16 * Unicode * UTF‐32
* ASCII: 7 bits * UTF‐8: 8 bits, 1 byte * UTF‐16: 16 bits, 2 bytes * Unicode: 24 bits, 3 bytes * UTF‐32: 32 bits, 4 bytes
37
34- What command should you use on a systemd system to set the localization? * timedatectl * time * localectl * date * locale
**localectl** The localectl command is available on systemd systems to set the character sets, making option C correct. The timedatectl command sets the time and date on systemd systems, but not the localization, so option A is incorrect. The time, date, and locale commands are legacy Linux commands and not used on systemd systems, so options B, D, and E are all incorrect.
38
35- What systemd command should you use to retrieve the time from the workstation or server hardware? * timedatectl * date * time * locale * localectl
**timedatectl** On Linux systems that utilize the systemd system, the timedatectl command is available to retrieve the time from the workstation or server hardware, so option A is correct. The localectl command is a systemd command, but it’s used to set localization, not retrieve time, so option E is incorrect. The date, time, and locale commands are part of the legacy Linux system and not used on systemd systems, so options B, C, and D are all incorrect.
39
36- Which command can you use to display the time and date using a specific format? * time * timedatectl * hwclock * localectl * date
**date** The date command allows you to specify a template to define the format of the time and date as output, so option E is correct. The time command only displays the time and not the date, so option A is incorrect. The timedatectl command displays the time and date but doesn’t allow you to format the output, so option B is incorrect. The hwclock command displays the current time as set on the workstation or server hardware and doesn’t allow you to format the output, so option C is incorrect. The localectl command displays localization settings on systemd systems, not the time and date, so option D is incorrect.
40
37- You have been informed that an employee is to be terminated today. The company does not want the account deleted but does not want the employee logging into the Linux server either. You check the system using the who command and see that the employee is not currently logged into the system. Which of the following commands could you use to prevent the employee from logging into the system as desired by the company? (Choose all that apply.) * The usermod -L command * The usermod -U command * The passwd -l command * The passwd -L command * The userdel -r command
* The usermod -L command * The passwd -l command The usermod -L and passwd -l commands will both work to lock the employee out of the system without deleting the user account. Therefore, options A and C are the correct answers. The usermod -U command unlocks a locked account, so option B is a wrong answer. The passwd -L command is a made‐up command, so option D is also an incorrect answer. The userdel -r command would delete the user account and all its $HOME directory files. This is not what the company wants, and therefore, option E is also an incorrect choice.
41
38- You need to create a user account via the useradd utility. After checking this distribution’s account creation configuration files, you discover that the HOME directive points to a different location than desired. Which useradd option will allow you to create the home in an alternative location? * -m * -d * --create-home * -D * --defaults
**-d** The -d switch on the useradd command will allow you to create the home in an alternative location and not the one specified by the HOME directive. Therefore, option B is the correct answer. Both the -m and the --create-home switches will create a directory if the CREATE_HOME directive is either not set or set to no. However, they do not allow you to specify the location. Therefore, options A and C are wrong answers. The switches in options D and E only allow you to display the directives within the /etc/default/useradd account creation configuration file. Thus, options D and E are incorrect choices.
42
39- You issue the command id -gn 1138 at the command line. Assume the user exists. Which of the following best describes what will display? * The user’s (UID 1138) current group’s GID * The user’s (UID 1138) group membership GIDs * The user’s (UID 1138) username * The user’s (UID 1138) current group’s name * The user’s (UID 1138) group membership names
**The user’s (UID 1138) current group’s name** If you issue the command id -gn 1138 at the command line and the user exists, you will see the user’s current group’s name displayed. Therefore, option D is the correct answer. To see the user’s (UID 1138) current group’s GID, the command is id -g 1138. Thus, option A is a wrong answer. To see the user (UID 1138) group membership GIDs, the command is id -G 1138. Thus, option B is also an incorrect answer. To view the user (UID 1138) username, the command is id -un 1138. Therefore, option C is a wrong choice. To see the user (UID 1138) group membership names, the command is id -Gn 1138. Thus, option E is also an incorrect choice.
43
40- You enter the command edquota -u JKirk and see zeros (0) under all the soft columns. What does this mean? * Neither block nor inode soft quotas have been configured for this user. * Neither block nor inode hard quotas have been configured for this user. * The user is currently experiencing a grace period. * The user is currently not experiencing a grace period. * The user is not currently logged into the system.
**Neither block nor inode soft quotas have been configured for this user.** The edquota -u JKirk command would display zeros (0) under all the soft columns if neither block nor inode soft quotas have been configured for this user. Therefore, option A is the correct answer. If neither block nor inode hard quotas have been configured for this user, you would see zeros displayed under the hard columns. Thus, option B is a wrong answer. If the user is currently experiencing a grace period, you would see numbers in the grace column of the quota -u JKirk command. Therefore, option C is an incorrect answer. If the user is currently not experiencing a grace period, you would see nothing in the grace column of the quota -u JKirk command. Thus, option D is also a wrong choice. Whether or not the user is logged into the system does not affect information displayed by the edquota -u JKirk command. Therefore, option E is an incorrect choice.
44
42- Which tools are command‐line tools for creating and modifying partitions? (Choose all that apply.) * gdisk * gparted * fdisk * parted * fsck
* **gdisk** * **fdisk** * **parted** The common command‐line tools for partitioning hard drives in Linux are gdisk, fdisk, and parted, making options A, C, and D all correct. The gparted tool is a graphical tool for partitioning hard drives, not a command‐line tool, so option B is incorrect. The fsck command‐line tool allows you to repair partitions but not create them, so option E is incorrect.
45
44- Which tool(s) do you need to use to partition a GPT indexed hard drive? (Choose all that apply). * parted * fdisk * gdisk * gparted * fsck
* **gdisk** * **gparted** The gdisk and gparted tools allow you to partition both standard and GPT indexed hard drives, so option C is correct. The parted and fdisk partition tools don’t work on GPT indexed hard drives, so options A and B are both incorrect. The fsck program fixes corrupted partitions, but it can’t create or partition a GPT indexed hard drive, so option E is incorrect.
46
45- You need to move several data files securely to a remote Windows system. What is the best utility group to employ for creating the archive? * The tar utility * The zip utility * The rsync utility * The dd utility * The gzip utility
**The zip utility** The Windows operating system can use the zip archive file format. Therefore, the zip utility is the best one to use and option B is the correct answer. The tar, rsync, and dd utilities are not good choices due to incompatibility issues. Therefore, options A, C, and D are wrong choices. The gzip utility does not create archives, so option E is an incorrect answer.
47
46- A system admin created an archive file using the tar utility and employed an option to apply compression automatically to the file. The system admin used an archive file extension of .txz. Which compression utility did the system admin claim the tar utility used? The xz utility The gzip utility The bzip2 utility The zip utility The zlib library
**The xz utility** When a .txz file extension is used on a tarball, it implies that xz compression was used. Therefore, option A is the correct answer. The gzip and bzip2 utilities can be employed by the tar utility. However, the file extensions that imply their use are different than the one used by the system admin. Therefore, options B and C are wrong choices. The zip utility and zlib library are not used with the tar utility, so options D and E are incorrect choices.
48
48- Which of the following is true concerning the MD5‐ and SHA‐based utilities? (Choose all that apply.) * Both can be used in cryptographic functions. * Both can be used to check a transferred file’s integrity. * The tar utility can use them via options. * The SHA‐based utilities produce longer hash values than the MD5‐based utility. * The MD5‐based utility produces longer hash values than the SHA‐based utilities.
* **Both can be used to check a transferred file’s integrity.** * **The SHA‐based utilities produce longer hash values than the MD5‐based utility.** Both the MD5‐ and SHA‐based utilities can be used to check a transferred file’s integrity. Also, the SHA‐based utilities produce longer hash values than the MD5‐based utility. Therefore, options B and D are correct answers. The MD5‐based utility, md5sum, is no longer considered safe to use in cryptographic functions. Therefore, option A is a wrong answer. The tar command does not have the ability to employ these utilities via command‐line switches, so option C is also an incorrect answer. Option E is also an incorrect choice because the opposite is true.
49
50- What tar command‐line options are commonly used to create a compressed tarball file? * -Uvh * -zcvf * -zxvf * -xvf * -cvf
**-zcvf** To create a compressed tarball, you need to use the -z option to compress it, the -c option to create it, the -v option for verbose mode, and the -f option to specify the output file, so option B is correct. The -Uvh options aren’t tar command options but are for the rpm package file, so option A is incorrect. The -zxvf combination of options extracts a compressed tarball file but does not create one, so option C is incorrect. The -xvf combination of options extracts an uncompressed tarball file but doesn’t create a compressed tarball, so option D is incorrect. The -cvf combination of options creates a new tarball file but doesn’t compress it, so option E is incorrect.
50
52- Which tools can you use in Red Hat Linux to install an application package? (Choose all that apply.) * dpkg * rpm * yum * dnf * tar
* **rpm** * **yum** * **dnf** The rpm, yum, and dnf package tools all work with Red Hat–based distribution packages, so options B, C, and D are all correct. The dpkg tool only works with Debian‐based packages, so option A is incorrect. The tar command is used to create and extract tarball files, not Red Hat packages, so option E is incorrect.
51
53- A kernel module file has what file extension? * .dep * .conf * .sh * .ko * .lib
**.ko** Kernel module files have a .ko file extension. Therefore, option D is the correct answer. The .dep file extension is used for the module’s dependency file. Thus, option A is a wrong answer. The .conf file extension is often used by configuration files, and therefore, option B is an incorrect answer. The .sh file extension is used by shell scripts. Thus, option C is a wrong choice. The .lib file extension is often used by library files. Therefore, option E is also an incorrect choice.
52
54- Kernel modules are stored in what directory? * A /lib/modules/ subdirectory * A /etc/modprobe.d/ subdirectory * A /run/modprobe.d/ subdirectory * A /lib/modprobe.d/ subdirectory * A /usr/lib/modprobe.d/ subdirectory
**A /lib/modules/ subdirectory** Kernel modules are stored in a /lib/modules/ subdirectory. Thus, option A is the correct answer. Options B, C, D, and E are all potential locations of kernel module configuration files and not kernel modules. Thus, those options are incorrect choices.
53
55- Which file is shared by both the modprobe and the depmod utility? * The /etc/modules.conf file * The /proc/modules file * The /etc/group file * The /etc/modprobe.d file * The modules.dep file
**The modules.dep file** The modules.dep file, which resides in the /lib/modules/Kernel-Version/ directory, is used by the modprobe utility to determine module dependencies and updated by the depmod utility. Therefore, option E is the correct answer. The /etc/modules.conf file is a module configuration file used on older Linux distributions, thus option A is a wrong answer. The /proc/modules file has the same information that the lsmod utility displays, but it is not used by the depmod utility, so option B is a wrong choice. The /etc/group file is used for user groups but not kernel modules. Therefore, option C is an incorrect choice. The /etc/modprobe.d file is actually a directory, which stores some of the module configuration files. Thus, option D is an incorrect choice.
54
56- Which of the following utilities can be used to unload a kernel module? (Choose all that apply.) * rm * rmmod * insmod * modprobe * modinfo
* **rmmod** * **modprobe** Both the rmmod and the modprobe utilities can be used to unload (remove) kernel modules. You do have to use the -r switch with the modprobe command to remove a kernel module. Therefore, options B and D are correct answers. The rm command is used for removing files and not kernel modules, so option A is a wrong answer. The insmod utility is used to load a kernel module. Thus, option C is an incorrect answer. The modinfo command provides detailed information concerning a particular kernel module. Therefore, option E is also an incorrect choice.
55
rmmod
removes (unloads) kernel modules from memory, but only if they're not currently in use - syntax is rmmod module_name and it doesn't handle dependencies automatically
56
insmod
loads kernel modules into memory from a specific file path, requiring you to specify the full .ko file path and manually handle any dependencies - basic syntax: insmod /path/to/module.ko
57
modprobe
is the intelligent module management tool that automatically handles dependencies when loading/unloading modules, can load by module name (searches standard locations), and uses -r to remove - preferred over insmod/rmmod for most tasks
58
modinfo
displays detailed information about kernel modules including description, parameters, dependencies, and version without loading the module - useful for examining modules with modinfo module_name
59
59- What command do you use to display the SELinux security context assigned to a file? * ls -Z * getfacl * ls -l * chmod * setfacl
**ls -Z** The SELinux advanced security system uses the standard ls command with the -Z option to display SELinux security context assigned to files, so option A is correct. The getfacl and setfacl commands are related to the ACL permissions, not SELinux permissions, so options B and E are both incorrect. The -l option of the ls command as well as the chmod command both are used for basic security permissions and not SELinux permissions, so options C and D are both incorrect.
60
61- Which of the following is a PAM module involved with enforcing strong passwords? (Choose all that apply.) * pam_pwhistory.so * pam_unix.so * pam_pwquality.so * pam_tally2.so * pam_cracklib.so
* **pam_pwhistory.so** * **pam_unix.so** * **pam_pwquality.so** * **pam_cracklib.so** The pam_pwhistory.so, pam_unix.so, and pam_pwquality.so are all involved with enforcing strong passwords for PAM‐aware applications, so options A, B, and C are correct answers. The pam_cracklib.so is an earlier version of the pam_pwquality.so module, so option E is also a correct choice. The pam_tally2.so helps to prevent brute‐force attacks by locking accounts after so many failed login attempts. Therefore, option D is an incorrect choice.
61
62- Which of the following is true concerning PKI? (Choose all that apply.) * Through the PKI framework, self‐signed certificates are implemented. * The PKI framework prevents brute‐force attacks via implementing strong passwords. * Via the PKI structure, CA signed certificates are implemented. * PKI ensures that proper encryption algorithms are employed. * The PKI framework helps to protect key integrity.
* **Via the PKI structure, CA signed certificates are implemented.** * **The PKI framework helps to protect key integrity.** Explanation Signed certificates are implemented via the PKI framework. These certificates help to prove authenticity and validation of the keys as well as the keys’ owner. Thus, options C and E are correct answers. Self‐signed certifications are not provided via the PKI structure, so option A is a wrong answer. The PKI framework is not involved with implementing strong passwords or preventing brute‐force attacks. Therefore, option B is an incorrect answer. Also, the PKI does not ensure that proper encryption algorithms are used, so option D is an incorrect choice as well.
62
63- When using an SSH agent for authentication, what command is used to add a key to the agent session? * The ssh-keygen command * The ssh-agent command * The ssh-copy-id command * The ssh-add command * The scp command
**The ssh-add command** The ssh-add command allows you to add your identity key to the agent session to use for authentication. Therefore, option D is the correct answer. The ssh-keygen is for generating keys, and thus option A is the wrong answer. The ssh-agent command will start an agent session but does not add keys to the session, so option B is a wrong choice. The ssh-copy-id command allows you to copy an identity key to a remote system and add it to the ~/.ssh/authorized_keys file for password‐less authentication. Therefore, option C is a wrong answer. The scp command allows you to copy files over a network via an SSH tunnel but not add files to an SSH agent session, and thus option E is an incorrect choice.
63
64- Which of the following best describes IPSec tunnel mode? * The data is encrypted along with a message digest of the original plaintext. * Only the payload is encrypted. * The data is turned into ciphertext via a hash algorithm. * The payload is encrypted using a symmetric key, and a public key is used for confirming the systems’ identity. * The payload and routing headers are encrypted.
**The payload and routing headers are encrypted.** Used within VPN software, IPSec provides either tunnel or transport mode. Tunnel mode is when both the payload (data) and the routing headers are encrypted. Therefore, option E is the correct answer. Option A describes a digital signature, and thus it is a wrong answer. IPSec transport mode is described by option B, and therefore it also is a wrong choice. Option C describes the hashing process, so it is an incorrect answer. SSL/TLS and DTLS both use the security feature described in option D, so it is an incorrect choice as well.
64
66- What rsyslog utility is commonly used to split log files into separate files based on a time or the size of the file? * rsyslogd * logrotate * logger * systemd-journald * syslogd
**logrotate** The logrotate utility normally runs in the background and splits log files either when they reach a predetermined size or after a predetermined number of days, so option B is correct. The rsyslogd and syslogd commands are the logger programs themselves, so options A and E are both incorrect. The logger command allows you to manually make an entry into the log files but not split the log files, so option C is incorrect. The systemd-journald program is the logging program for systemd systems and can rotate the logs automatically, but it doesn’t work on rsyslog systems, so option D is incorrect.
65
logrotate
* **a system utility that automatically manages log file rotation, compression, and cleanup to prevent log files from consuming excessive disk space by creating new log files and archiving or deleting old ones** * It runs via cron (typically daily) and uses configuration files in /etc/logrotate.conf and /etc/logrotate.d/ to define rotation policies like file size limits, age limits, number of copies to keep, and compression settings * Common features include rotating logs weekly/monthly, compressing old logs with gzip, keeping a specified number of rotations, and executing post-rotation scripts to restart services - essential for maintaining system storage and log management
66
67- What configuration setting should you set in systemd-journald to also forward events to an rsyslogd server? * ForwardToSyslog * Storage * Compress * Storage=volatile * Storage=persistent
**ForwardToSyslog** You use the ForwardToSyslog setting to forward the systemd events to an rsyslogd server, so option A is correct. The Storage setting determines how the logs are stored on the local server, not whether they’re forwarded to an rsyslogd server, so options B, D, and E are all incorrect. The Compress setting determines if the log files are compressed, not whether they’re forwarded to an rsyslogd server, so option C is incorrect.
67
68- What journalctl command‐line options should you use to display just the kernel events? * -a * -r * \_TRANSPORT=kernel * PRIORITY=0 * \_HOSTNAME=localhost
**\_TRANSPORT=kernel** The \_TRANSPORT command‐line option determines what transport events to display, so setting that value to kernel displays only kernel‐level events, making option C correct. The -a command‐line option displays all of the log fields for all of the events, so option A is incorrect. Using the -r option reverses the output so that the newest entries are displayed first, but it doesn’t filter only the kernel events, so option B is incorrect. The PRIORITY option filters out only the entries with the specified priority, not only kernel events, so option D is incorrect. The \_HOSTNAME option filters out only the entries from a specified hostname, not just the kernel entries, so option E is incorrect.
68
70- Which of the following describes firewall persistency? * The firewall survives repeated malicious attacks on the system and continues to protect the system. * The firewall survives repeated malicious attacks on the system as well as firewall misconfigurations. * The firewall survives attacks on the system and can alert administrators of the attacks. * The firewall can alert administrators of attacks and take needed action to block the attacks. * The firewall configuration survives system reboots as well as the firewall being restarted or reloaded.
**The firewall configuration survives system reboots as well as the firewall being restarted or reloaded.** Firewall persistency is best described by the fact that the firewall configuration survives system reboots as well as the firewall being restarted or reloaded. Thus, option E is the correct answer. While a firewall may survive repeated malicious attacks on the system and continue to protect the system, this does not describe persistency. Therefore, option A is a wrong answer. Surviving a firewall misconfiguration also does not describe persistency, so option B is also an incorrect answer. While the description in option C may be available within some firewall software packages, it does not describe persistency, so option C is a wrong choice. Option D describes an intrusion detection system (IDS) and not persistency. Therefore, option D is an incorrect choice as well.
69
71- You want to add the NFS service to the public zone in firewalld. What command will accomplish this? * sudo firewalld-cmd --add-service=nfs --zone=public * sudo firewalld-cmd --service=nfs --zone=public * sudo firewall-cmd --add-service=nfs --zone=public * sudo firewall-cmd --service=nfs --zone=public * sudo firewall-cmd --add=nfs --zone=public
**sudo firewall-cmd --add-service=nfs --zone=public** The sudo firewall-cmd --add-service=nfs --zone=public command will add the NFS service to the public zone in firewalld. Therefore, option C is the correct answer. There is no firewalld-cmd command, and thus options A and B are wrong answers. In addition, neither the --service nor the --add option is valid, so options D and E are also incorrect choices.
70
72- You want to peruse UFW profiles. Where are they stored? * /etc/default/ufw * /etc/ufw/applications.d/ * /etc/services * /etc/ufw/user.rules * /etc/ufw/user6.rules
**/etc/ufw/applications.d/** UFW profiles are stored in the /etc/ufw/applications.d/ directory. Therefore, option B is the correct answer. The UFW configuration file is the /etc/default/ufw file. Thus, option A is the wrong answer. The /etc/services file is used by UFW to determine the appropriate port and protocol information for service names used in its command syntax. Therefore, option C is also an incorrect answer. Any user‐added rules are stored in the /etc/ufw/ directory, with IPv4 rules in the user.rules file and IPv6 rules in the user6.rules file. Thus, options D and E are incorrect choices.
71
73- Where is the /usr/bin/nologin file used, and why would you use it? * When used as the default shell for a user defined in the /etc/passwd file, it prevents that user account from logging in. * When used as the default shell for a user defined in the /etc/passwd file, it prevents the user from logging in only at the console. * When used as the default shell in the inittab file, it prevents user accounts from logging in on a specific terminal. * When used as the default shell in the inittab file, it prevents users from logging in on all terminals. * When used in the inttab file, it prevents users from logging in only at the console.
**When used as the default shell for a user defined in the /etc/passwd file, it prevents that user account from logging in.** The /usr/bin/nologin file prevents a user account from logging in from any terminal when specified as the user’s default shell in the /etc/passwd file, so option A is correct. When specified as the default shell, it applies to any terminal the user attempts to log in from, so option B is incorrect. The default shell is specified in the /etc/passwd file and not the inittab file, so options C, D, and E are all incorrect.
72
77- Which of the following are potential causes of packet drop? (Choose all that apply.) * An improperly connected network cable * An adapter that is failing * A firewall blocking traffic * A saturated network segment * An incorrectly entered FQDN
* **An improperly connected network cable** * **An adapter that is failing** * **A saturated network segment** An improperly connected network cable, an adapter that is failing, and a saturated network segment all are potential causes of packet drop. Therefore, options A, B and D are correct answers. A firewall blocking traffic and an incorrectly entered FQDN are situations where a timeout may occur but not packet loss. Thus, options C and E are incorrect choices.
73
79- Which of the following best describes a load average? * The amount of time a processor must wait on disk I/O * A series of kernel actions that handle I/O requests * The amount of time processes are waiting for or using the CPU * High deviations from a network’s average latency * Preset time periods that are used for handling unplanned network events
**The amount of time processes are waiting for or using the CPU** Option C best describes load averages. Thus, it is the correct answer. Option A describes I/O wait, and therefore, it is a wrong answer. Option B is describing I/O scheduling. Thus, it is also an incorrect choice. Option D describes network jitter, and therefore it is a wrong answer. Option E is describing timeouts. Thus, it is an incorrect choice.
74
80- You want to view detailed information about your system’s memory. Which command should you use? * ipcs -m * cat /proc/meminfo * free * sar * vmstat
**cat /proc/meminfo** For detailed information concerning a system’s RAM, use the cat /proc/meminfo command to view it. Therefore, option B is the correct answer. The ipcs -m command allows you to see shared memory segments instead of detailed RAM information. Thus, option A is the wrong answer. The free command shows memory items such as free memory, used memory, and buffer/cache usage. Thus, option C is an incorrect answer. The sar utility can provide memory performance information, but that is not what is needed here. Thus, option D is an incorrect answer. The vmstat utility provides a lot of memory statistics, including disk I/O specific to swapping as well as total blocks in and blocks out to the device. However, it does not provide detailed information about your system’s memory, so option E is an incorrect choice.
75
ipcs -m
displays information about shared memory segments currently allocated on the system, showing segment IDs, keys, sizes, and ownership - useful for troubleshooting inter-process communication issues
76
cat /proc/meminfo
shows detailed memory statistics from the kernel including total/free/available RAM, swap usage, buffers, cache, and various memory subsystem counters in a comprehensive text format
77
free
provides a simple summary of memory usage showing total, used, free, shared, buffer/cache, and available memory for both RAM and swap space - commonly used with -h for human-readable format
78
sar
**System Activity Reporter** collects and displays historical system performance statistics including CPU, memory, I/O, and network usage over time - part of the sysstat package for performance monitoring
79
vmstat
displays virtual memory statistics including processes, memory, swap, I/O, system calls, and CPU activity - useful for real-time system performance monitoring with options like vmstat 5 for 5-second intervals
80
81- For the ps command, which type of parameters must you precede with a single dash? * Unix‐style parameters * BSD‐style parameters * GNU long parameters * Linux style * Numeric style
**Unix‐style parameters** The ps command in Linux supports Unix‐style, BSD‐style, and GNU long parameters, thus options D and E are both incorrect. To differentiate between the three, Unix‐style parameters are preceded by a dash, so option A is correct. BSD‐style parameters are not preceded by anything, making option B incorrect. GNU long parameters are preceded by a double dash, making option C incorrect.
81
82- What output does the command ps -e produce? * All processes running on the terminal * All processes * Only sleeping processes * All processes run by the current shell * All processes run by the current user
**All processes** The -e Unix‐style parameter for the ps command displays the status of all processes running on the system, so option B is correct. To display processes running on a specific terminal, you use the -t parameter, not the -e parameter, so option A is incorrect. The -e parameter does display sleeping processes but active processes as well, so option C is incorrect. To only display processes run by the current shell, you don’t specify any parameters to the ps command, so option D is incorrect. To display all processes run by the current user, you use the -x parameter, not the -e parameter, so option E is incorrect.
82
85- A new user account, Hansen7o9, was created, but the user cannot log into the system. You suspect a password was not set for this account. What command should you use to investigate this suspicion? * sudo chage -l Hansen7o9 * sudo passwd -S Hansen7o9 * sudo getent passwd Hansen7o9 * sudo getent shadow Hansen7o9 * sudo lastlog Hansen7o9
**sudo getent shadow Hansen7o9** The sudo getent shadow Hansen7o9 command will show only an exclamation point in the account’s password field if a password has not been set for this account. Therefore, option D is the correct answer. The chage -l command shows password information, but not whether or not a password was set, so option A is a wrong answer. The passwd -S command will show an L indicating that the account is locked, but it does not tell you if the account was locked via a command or by just not setting a password for it, so option B is an incorrect choice. The getent passwd command shows fields for the /etc/passwd file and not the /etc/shadow file, where modern distributions store their accounts’ password information. Therefore, option C is also a wrong answer. The lastlog command will not show anything for the Hansen7o9 account because this account has not yet been used to log into the system. Thus, option E is an incorrect choice.
83
getent
* **retrieves entries from system databases (like /etc/passwd, /etc/group, /etc/hosts) through the Name Service Switch (NSS), allowing you to query both local files and network sources like LDAP or NIS** * It's useful for testing name resolution and user/group lookups across different data sources - common usage includes getent passwd username to look up user info, getent group groupname for group details, and getent hosts hostname for hostname resolution * Unlike directly reading files like /etc/passwd, getent respects the NSS configuration in /etc/nsswitch.conf and will query all configured sources (files, LDAP, NIS, etc.) making it essential for troubleshooting authentication in networked environments
84
86- The user Hansen7o9 has tried multiple times to access their account but was using the wrong password. They think the system has now locked them out. Assuming your system employs PAM for authentication, which of the following utilities can you use to see if their account was locked out due to failed login attempts? (Choose all that apply.) * ausearch * pam_tally2 * sealert * faillock * id -Z
* **pam_tally2** * **faillock** Depending on your system’s employment of PAM, either the pam_tally2 or faillock utility will allow you to see if the user was locked out of the system due to failed login attempts. Thus, options B and D are correct answer. The ausearch command is used with AppArmor and not PAM, so option A is a wrong answer. The sealert and id -Z commands are used with SELinux, and not PAM, so options C and E are incorrect choices as well.
85
87- A user cannot create a file in their directory. You recognize that this is occurring for everyone using that same filesystem and suspect inode exhaustion. What command can you use to see if your suspicion is correct? * touch * df -i * df -h * du -i * du -h
**df -i** When a filesystem runs out of inode numbers (inode exhaustion), no additional files can be created on it. To check if this is what is happening on a system, use the df -i command, which shows each filesystem’s inode use and whether or not it is exhausted. Therefore, option B is the correct answer. While the touch command would allow you to try to create a file on this filesystem to see if it fails, it does not help in determining whether or not inode exhaustion is the problem, so option A is a wrong answer. The df -h command shows disk space usages for the various filesystems in human‐readable format but not inode usage, so option C is an incorrect answer. The du command cannot display inode usage and there is no -i option for this particular utility. Thus, options D and E are both incorrect choices.
86
88- You attempt to delete a file using super user privileges and receive a permission error. You determine that the file, ST.txt, has the immutable bit set. What command would you issue to remove this bit from the file? * lsattr ST.txt * lsattr -l ST.txt * chattr -i ST.txt * chattr +i ST.txt * mv ST.txt SS.txt
**chattr -i ST.txt** To remove the immutable bit from the ST.txt file, you need to employ the chattr -i ST.txt command. Thus, option C is the correct answer. The lsattr ST.txt command displays the file’s attributes, allowing you to see whether or not the immutable bit is set, but it does not allow you to change it. Therefore, option A is a wrong answer. The lsattr -l ST.txt command displays a file’s attributes using long names instead of abbreviations, which is handy, but it does not remove attributes, such as the immutable bit. Thus, option B is an incorrect answer. The chattr +i ST.txt command would add the immutable bit instead of removing the immutable bit from the ST.txt file’s attributes. Therefore, option D is also a wrong answer. The mv ST.txt SS.txt command would fail if the file has the immutable bit set because you cannot rename (move) a file with that attribute. Also, the command does not remove the immutable bit, so option E is an incorrect choice.
87
90- If the Linux system doesn’t recognize a hardware device at boot time, what command can you use to check for errors? * dmesg * lsusb * lspci * lsdev * lsblk
**dmesg** The kernel logs device errors detected at boot time in the kernel ring buffer. The dmesg program allows you to view the messages in the kernel ring buffer, so option A is correct. The lsusb, lspci, lsdev, and lsblk commands allow you to view current settings and statistics for various types of devices on the Linux system, but they don’t allow you to view errors that occurred at boot time, so options B, C, D, and E are all incorrect.
88
91- Which command displays current information about all the devices on the Linux system? * dmesg * lsusb * lspci * lsdev * lsblk
**lsdev** The lsdev command displays information on all the devices currently installed on the Linux system, so option D is correct. The dmesg command displays information from the kernel ring buffer, which may contain information about devices found at boot time, but not the current information on the device, so option A is incorrect. The lsusb command only displays information about USB devices, the lspci command only displays information about PCI devices, and the lsblk command only displays information about block devices, making options B, C, and E all incorrect.
89
udev
the device manager for the Linux kernel that dynamically creates and removes device files in /dev when hardware devices are added or removed, replacing the older static /dev directory approach It uses rules files (typically in /etc/udev/rules.d/) to define how devices should be named, what permissions they should have, and what actions to take when devices are detected - enabling consistent device naming and automatic hardware configuration udev integrates with the kernel's hotplug system to handle device events in real-time, automatically loading drivers, creating device nodes, setting ownership/permissions, and can trigger scripts or notifications when devices are plugged in or removed
90
92- What program listens to kernel notifications about new hardware devices? * lsusb * lspci * udev * lsblk * dmesg
**udev** The udev program runs in background, listening for kernel notifications about new hardware devices and attempting to add them to the /dev device directory automatically, making option C correct. The lsusb, lspci, and lsblk commands only display information about currently installed devices, not new devices, so options A, B, and D are all incorrect. The dmesg command displays kernel notifications added to the kernel ring buffer, but it doesn’t listen for new events to be added, so option E is incorrect.
91
93- On Linux, the SCSI framework consists of what integral parts? (Choose all that apply.) * The device driver layer * The SBA driver layer * The HBA driver layer * The SCSI routing layer * The SCSI storage layer
* **The device driver layer** * **The HBA driver layer** * **The SCSI routing layer** On Linux, the SCSI framework consists of three integral parts—the device driver layer (upper), the SCSI routing layer (middle), and the host bus adapter (HBA) driver layer (lower). Problems typically occur in the upper and lower layers. Therefore, options A, C, and D, are the correct answers. There is no such thing as the SBA driver layer with SCSI, so option B is a wrong answer. Also, the SCSI framework does not have a SCSI storage layer, so option E is an incorrect choice.
92
94- The user Hansen7o9 ran a script, Borg.sh, which tried to run another program but got a privilege error. What should you check first? * Check if Hansen7o9 has the privileges to run the Borg.sh script by viewing the script’s permissions. * Check if Hansen7o9 has the privileges to run the Borg.sh script by viewing the script’s directory execute permissions. * Check if Hansen7o9 has the privileges to run the other program by viewing its permissions. * Check if Hansen7o9 has the privileges to run the other program by viewing its directory’s execute permissions. * Check if Hansen7o9 has the privileges to run the other program by viewing its directory tree’s execute permissions.
**Check if Hansen7o9 has the privileges to run the other program by viewing its permissions.** You should check if Hansen7o9 has the privileges to run the other program by viewing its permissions via the ls -l command. Thus, option C is the correct answer. The user Hansen7o9 can already run the script, Borg.sh, so options A and B are wrong answers. Directory execute permissions are not needed to run a script or program. Instead, they allow a user to change their present working directory to that location, but the permission must be set throughout the directory tree. Therefore, options D and E are incorrect choices.
93
95- A user goes to merge PDF files using the /usr/bin/pdfunite utility and it does not work. You recently updated the system and suspect the application had a library get updated. Before searching the package management log files for the updated library names, you must find the libraries used by this utility. What command should you issue? * rpm -q pdfunite --last * grep pdfunite /var/log/apt/history.log * grep pdfunite /etc/zypp/repos.d/*.* * grep pdfunite /etc/yum.repos.d/*.* * ldd /usr/bin/pdfunite
**ldd /usr/bin/pdfunite** The ldd /usr/bin/pdfunite command will show you all the libraries used by the pdfunite program. Therefore, option E is the correct answer. The rpm -q pdfunite --last command and the grep pdfunite /var/log/apt/history.log command attempt to find package installation information. However, they do not show an application’s employed libraries (and the package for pdfunite is poppler-utils), so options A and B are wrong answers. The /etc/zypp/repos.d/*.* and /etc/yum.repos.d/*.* are repository databases and they do not contain information on which libraries an application uses. Thus, options C and D are also incorrect choices.
94
ldd
* **List Dynamic Dependencies** **displays the shared libraries that an executable or shared library depends on, showing which .so files are required and where they're located in the filesystem** * It's essential for troubleshooting missing library errors and understanding program dependencies - common usage: ldd /bin/ls shows all libraries needed by the ls command, including their full paths * ldd helps diagnose "library not found" errors, verify library versions, and understand what happens when you move executables between systems - critical for debugging dynamic linking issues and dependency problems
95
96- You recently installed additional RAM on a Linux server to help improve its performance. The primary application uses a great deal of memory and the new RAM has helped. However, at application peak usage times, the free utility shows there is plenty of free memory, but the system slows and sometimes hangs. Which of the following items should you use to troubleshoot this problem? (Choose all that apply.) * memtest or memtest86+ * localectl * lshw --class memory * cat /var/log/Xorg.0.log * dmidecode -t memory
* **memtest or memtest86+** * **lshw --class memory** * **dmidecode -t memory** You can conduct a memory test via a system reboot and accessing the memtest or memtest86+ option in the server’s boot menu. Therefore, option A is a correct answer. The lshw --class memory and dmidecode -t memory commands will allow you to determine hardware information concerning your memory, which may be of use as well in the troubleshooting process. Thus, options C and E are also correct answers. The localectl command on a Red Hat–based distribution, with no options, displays your current key map. This is employed in key mapping troubleshooting, not RAM, so option B is a wrong answer. You view the /var/log/Xorg.0.log file for X11 video problems, so option D is also an incorrect choice.
96
97- What operator appends output to an existing file? * | * ˂ * ˃ * ≪ * ≫
**≫** The ≫ operator appends output from a command to a file, so option E is correct. The pipe symbol (|) redirects output to a command, not a file, so option A is incorrect. The ˂ operator redirects input from a file into a program, so option B is incorrect. The ˃ operator redirects output to a new file or overwrites an existing file; it doesn’t append data to an existing file, so option C is incorrect. The ≪ symbol isn’t a valid shell operator, so option D is incorrect.
97
99- How do you reference the first command‐line argument in a shell script? * $a * $A * $1 * $0 * #0
**$1** The $1 special shell variable represents the first parameter specified on the command line when a command is submitted, so option C is correct. The $a and $A variables are normal user variables that can contain data, but they don’t interact with the command‐line parameters, so options A and B are incorrect. The $0 special shell variable represents the entire command line, including the command and all parameters, not just the first parameter, so option D is incorrect. The #0 symbol is not a valid shell variable symbol, so option E is incorrect.
98
100- What format would you use to store the output from the who command into the variable $users? * who ˃ $users * who | $users * $users ˂ who * users=$(who) * users=$[ who ]
**users=$(who)** The $() operator redirects output from a command to a variable, so option D is correct. The ˃ operator redirects output from a command to a file, not a variable, so option A is incorrect. The pipe symbol (|) redirects output to another command, not a variable, so option B is incorrect. The ˂ operator redirects input from a file to a command, not output to a variable, so option C is incorrect. The $[] operator performs integer math; it doesn’t redirect the output of a command, so option E is incorrect.
99
102- What file does the nohup command place the script output in by default? * nohup.out in the current directory * nohup.out in the /tmp directory * out.nohup in the current directory * out.nohup in the /tmp directory * output.txt in the /etc directory
**nohup.out in the current directory** The nohup command disconnects the submitted command from the command line and redirects all output from the command to the nohup.out file in the current directory, making option A correct. The nohup.out file is not placed in the /tmp directory, so option B is incorrect. The output filename is nohup.out, so options C, D, and E are all incorrect.
100
103- In Linux, what key combination pauses an application running in foreground? * Ctrl+C * Ctrl+Z * Ctrl+D * Ctrl+l * Ctrl+A
**Ctrl+Z** The Ctrl+Z key combination pauses an application and places it in sleep mode, so option B is correct. The Ctrl+C key combination stops a running process; it doesn’t pause it, so option A is incorrect. The Ctrl+D key combination logs out from the terminal session, pausing any running processes, so option C is incorrect. The Ctrl+l key combination clears the terminal window; it doesn’t pause the running application, so option D is incorrect. The Ctrl+A key combination moves the cursor to the beginning of the command line; it doesn’t pause a running application, so option E is incorrect.
101
105- Bruce employs the git init command. This sets up which conceptual Git environment elements? (Choose all that apply.) * The working directory * The staging area * The index * The local repository * The remote repository
* **The staging area** * **The index** * **The local repository** The git init command creates the .git/ directory within the working directory and initializes the conceptual elements of the staging area (also called the index), and the local repository. Therefore, options B, C, and D are correct answers. The working directory should already be created prior to using the git init command, so option A is a wrong answer. The remote repository is provided by a third party, so option E is also an incorrect choice.
102
106- Natasha has added her username and email address to the global Git configuration. How can she view them? (Choose all that apply) * git config --list * git config --get username * cat ~/.gitconfig * git config --get email * git config
* **git config --list** * **cat ~/.gitconfig** The commands listed in options A and C will allow Natasha to view her username and email configuration information stored in the global Git configuration and are correct answers. The command in option B has username listed incorrectly. It should be user.name. Therefore, option B is a wrong answer. The same is true for the command in option D. It should be user.email, not email. Thus, option D is an incorrect answer too. The git config command is missing options and arguments, so it will not work. Therefore, option E is an incorrect choice as well.
103
107- A developer has created their working files and added them individually to the staging area using the git add command. However, that was a few hours ago, and they are ready to move their project to the local repository. What command can the developer issue to ensure that no files in their working directory are unregistered with the index? * git log * git commit * git branch * git config --list * git status
**git status** The developer should issue the command git status, which will show the names of all the files that have been added to the staging area (index) but have not yet been committed to the local repository. Therefore, option E is the correct answer. The git log command displays the commit history for the local repository, so option A is wrong answer. The git commit command begins the process of committing project files from the staging area to the local repository, so option B is also an incorrect answer. The git branch command shows the current project branch in use. Therefore, option C is a wrong choice. The git config --list command will show Git configuration information, so option D is also an incorrect choice.
104
108- You want to see which Git branch is currently employed. You issue the git branch command to see all the project branches. How do you tell which one is current? * The first branch listed is current. * The last branch listed is current. * The branch with an asterisk by it is current. * The branch with the word current by it is current. * The branch with the word active by it is current.
**The branch with an asterisk by it is current.** You can tell which branch is current by the git branch command’s output by looking for an asterisk. This indicates that branch is current. Therefore, option C is the correct answer. All the other answers are made up and thus incorrect.
105
113- Which of the following are directly associated with VMM? (Choose all that apply.) * The Virtual Machine Manager application * A virtual machine manager (VMM), also called a hypervisor * The virt-manager command * The virt-viewer client viewer * A voicemail message
* **The Virtual Machine Manager application** * **The virt-manager command** * **The virt-viewer client viewer** The VMM acronym is associated with the Virtual Machine Manager application, the virt-manager command, and the virt-viewer client viewer. Thus, options A, C, and D are correct answers. A virtual machine manager (VMM), which is also called a hypervisor, is not directly associated with the Virtual Machine Manager application. Therefore, option B is a wrong answer. While a voicemail message does share the acronym VMM, with a hypervisor, it is not directly associated with the Virtual Machine Manager application, so option E is an incorrect choice.
106
114- Which of the following are involved in bootstrapping? (Choose all that apply.) * Kickstart file * Booting script * AutoYaST * Preseed * Anaconda
* **Kickstart file** * **AutoYaST** * **Preseed** * **Anaconda** On Red Hat–based distros, a kickstart file created from an anaconda file is involved in the bootstrap process, so options A and E are correct answers. On openSUSE, the AutoYaST application is involved with bootstrapping, so option C is also a correct choice. On Ubuntu, preseed is involved in the bootstrap process. Thus, option D is also a correct choice. Bootstrapping (booting and installing an operating system) is different than booting (starting up a system), so a booting script is not involved in the bootstrap process, making option B the only incorrect choice.
107
115- A system administrator needs to overprovision their virtual storage with data persevering through VM reboots. Which storage type should they employ? (Choose all that apply.) * Persistent * Temporary * Thick provisioning * Thin provisioning * Provisional
* **Persistent** * **Thin provisioning** For the data to persevere through VM reboots, it needs to be persistent, so option A is a correct choice. To allow virtual storage to be overprovisioned (more space granted than available), the admin will need to employ thin provisioning, which only consumes the space is currently needs. Thus, option D is also a correct answer. Temporary (also called provisional) data will not allow the VM data to survive a reboot, so options B and E are wrong answers. Thick provisioning does not allow overprovisioning to occur. Thus, option C is also an incorrect choice.
108
117- In container orchestration, the use of configuration management and policy as code to automatically deploy and/or create multiple containers goes by what name? * Replication automation * Infrastructure as code * Build automation * Agentless * Inventory control
**Build automation** Build automation is where configuration management and policy as code are used to automatically deploy and/or create multiple containers. Therefore, option C is the correct answer. Replication automation is another way of saying automatically creating multiple containers, so it is a subset of build automation. Thus, option A is a wrong answer. Infrastructure as code is an umbrella term that covers configuration management as well as policy as code. Therefore, option B is also an incorrect answer. Agentless is a type of orchestration monitoring tool (or engine), and thus option D is a wrong choice. In orchestration, inventory control ensures that the needed or desired number of containers is running. Therefore, option E is also an incorrect choice.
109
118- With orchestration, you can enforce a static container environment. Why is this done? * So that the app’s infrastructure does not change * To promote faster deployment of the container * So that the version control system use is minimized * To allow agentless monitoring of the container * So that the app’s performance does not change
**So that the app’s infrastructure does not change** In orchestration, a container can be configured with preset libraries, an operating system version, security settings, and so on. These infrastructure features can then be set to be immutable (static), so that only the app is modified. This prevents errors from being introduced to the app via supporting software updates. Therefore, option A is the correct choice. A static container environment does not promote faster deployment of the container, so option B is a wrong answer. Also, it does not minimize the use of the version control system (which for the container environment is predetermined and documented, then entered into the version control system). Therefore, option C is an incorrect answer. Monitoring software options would be chosen prior to the container environment becoming static, so option D is a wrong choice. The app’s performance could be affected by a nonstatic (mutable) environment, but this is not the reason for enforcing a static container environment in orchestration. Therefore, option E is incorrect.
110
119- Your orchestration tool allows you to enter through its API the desired app container infrastructure documentation. It later uses this documentation for build automation. What is this process of documenting called? * Infrastructure as code * Build automation * Thick provisioning * Automated configuration management * Policy as code
**Automated configuration management** Automated configuration management is the process of entering the configuration management and policy as code data into the orchestration utility’s API. Therefore, option D is the correct answer. Infrastructure as code is the information entered, so option A is a wrong answer. Build automation uses the stored infrastructure as code data, so option B is also a wrong choice. Thick provisioning is a virtual storage concept. Thus, option C is also an incorrect answer. Policy as code is a subset of infrastructure as code, and therefore option E is an incorrect choice as well.
111
Infrastructure as Code
Managing and provisioning computing infrastructure through machine-readable definition files rather than physical hardware configuration or interactive configuration tools, using tools like Terraform or CloudFormation.
112
Build Automation
The process of automatically compiling source code, running tests, and creating deployable artifacts without manual intervention, typically using tools like Jenkins, GitLab CI, or GitHub Actions.
113
Automated Configuration Management
Using tools like Ansible, Puppet, or Chef to automatically configure and maintain system settings, software installations, and service configurations across multiple servers consistently.
114
Policy as Code
Defining security policies, compliance rules, and governance requirements as code that can be version-controlled, tested, and automatically enforced across infrastructure and applications.
115
When a container crashes, an orchestration system with the ability to self‐heal will deploy production app containers until what directive is reached? * Infrastructure as code * Desired state * K8s * Continuous delivery * Continuous integration
**Desired state** The desired state directive determines how many desired containers should be running at any one time. Therefore, if a container crashes, an orchestration system with the ability to self‐heal will deploy production app containers until desired state is reached. Thus, option B is the correct answer. Infrastructure as code is used by this self‐healing properly, but it is not the directive that determines the number of containers to be active. Therefore, option A is a wrong answer. K8s is another name for the Kubernetes orchestration system, and thus, option C is also an incorrect answer. Continuous delivery and continuous integration are DevOps concepts, not directives for the number of desired containers to be currently running. Therefore, options D and E are both incorrect choices.
116
Continuous Integration
The practice of automatically building, testing, and merging code changes into a shared repository frequently (often multiple times per day) to detect integration issues early and maintain code quality.
117
Continuous Delivery
Extending CI (Continuous Integration) by automatically preparing code changes for release to production through automated testing and deployment pipelines, ensuring that software can be released reliably at any time with minimal manual intervention.