Due to security policies, a restriction was implemented that forbids direct access to the database server. The
junior administrator needs to connect using SSH tunneling. Which of the following commands allows the junior
administrator to connect from a desktop?
A Linux administrator attempts to install the package newprogram.x86_64.rpm using a package manager.
The administrator receives a warning indicating the command that was run was using a deprecated package manager. Which of the following commands should the administrator use to avoid the warning and install the newprogram.x86_64.rpm program?
In which of the following Linux GUI environments would the Konsole application MOST likely be found?
Which of the following BEST describes the difference between a container and a VM?
A user wants to use terminal services from a Windows workstation to manage a Linux server. Which of the following should be installed on the Linux server to enable this functionality?
A developer reports a web sever is unable to connect to the database server. The developer reviews the following output from each server:
Web server output:
Database server output:
Which of the following will resolve the issue?
A raw VM image is being compressed with bzip2 and copied to a flash drive at /dev/hdb for off-site use by
the marketing department. Which of the following command lines accomplishes this task?
A Linux administrator needs to configure a new firewall without an existing ACL to allow incoming web traffic.
The firewall must log the allowed network traffic. Which of the following command sequences would
accomplish this task when they are executed in order?
During the final step of staging new Linux hardware, GRUB2 is installed to the system drive. Which of the
following BEST describes the role of GRUB2 in a new Linux installation?
A user is unable to write data to an NFS datastore at /mnt/storage. A df command indicates 50% free
inodes.
Which of the following commands should the user attempt NEXT to diagnose the situation?
Which of the following is used on the client to boot a Linux system from a TFTP server?
An administrator is installing a new kernel but is getting an error indicating the filesystem is out of space. A disk
usage check shows / has plenty of space.
Which of the following BEST represents where the administrator should check next?
A directory called /employee is shared with many employees in a company. New hardware was acquired, and the systems administrator needs to back up all files in /employee before the server is replaced.
Which of the following commands should be used to back up all the files and compress them to use little space in the filesystem?
A Linux administrator wants to fetch a Git repository from a remote Git server.
Which of the following is the BEST command to perform this task?
A junior systems administrator is creating a cron job. The cron job requirements are as follows:
Run the hello.sh script every hour (24 times in one day).
Run it on Monday only.
Given this scenario, which of the following crontab options should be configured to meet these requirements?
A system administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used.
Which of the following files should be watched by the agents?
A Linux systems administrator needs to set permissions on an application with the following parameters:
The owner of the application should be able to read, write, and execute the application.
Members of the group should be able to read and execute the application.
Everyone else should not have access to the application.
Which of the following commands would BEST accomplish these tasks?
A systems administrator needs to install a new piece of hardware that requires a new driver. The driver should be manually installed. Which of the following describes the order of commands required to obtain module information, install the module, and check the log for any errors during module installation?
An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set.
Which of the following commands would prevent the script from being killed?
As a Systems Administrator, to reduce disk space, you were tasked to create a shell script that does the following:
Add relevant content to /tmp/script.sh, so that it finds and compresses rotated files in /var/log without recursion.
INSTRUCTIONS
Fill the blanks to build a script that performs the actual compression of rotated log files.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A systems administrator configured a new kernel module, but it stopped working after reboot. Which of the following will allow the systems administrator to check for module problems during server startup?
A user wants to list the lines of a log, adding a correlative number at the beginning of each line separated by a set of dashes from the actual message. Which of the following scripts will complete this task?
A Linux administrator needs to schedule a cron job to run at 1:15 p.m. every Friday to report the amount of free disk space on the system and to send the output to a file named “freespace”. Which of the following would meet this requirement?
A junior Linux administrator needs to ensure a service will start on system boot. Which of the following commands should be used to accomplish this task?
A Linux system is running normally when the systems administrator receives an alert that one application spawned many processes. The application is consuming a lot of memory, and it will soon cause the machine to become unresponsive. Which of the following commands will stop each application process?
Which of the following statements BEST represents what the term “agentless” means regarding orchestration?
Which of the following techniques would BEST ensure the setup and desired state of a server are consistently maintained?
Which of the following boot methods can a Linux administrator use to boot a Linux server remotely via a network interface card instead of a local disk?
A junior Linux administrator is installing patches using YUM. The administrator issues the following command:
yum list installed
The output of the command is as follows:
Given this scenario and the output, which of the following should the administrator do to address this issue?
A Linux server needs to be accessed, but the root password is not available.
Which of the following would BEST allow an administrator to regain access and set a new known password at the same time?
Joe, a user, asks a systems administrator to schedule the daily execution of a custom script.
Which of the following commands will allow the systems administrator to set up Joe’s cron job?
A Linux administrator needs to take stock of USB devices attached to the system.
Which of the following commands would be BEST to complete this task?
Some Bash scripts arc being versioned and stored in a Git repository Which of the following commands should the Linux administrator use to exclude tmp Wes from being added to the repository during any code adds and commits?
After running an Nmap scan on a local area network, a penetration tester notices several older Linux servers have port 23 open Which of the following should the systems administrator do as a secunty best practice?
A developer has contacted a systems administrator because an application is not receiving a response from the client. The application must purge the message queue before terminating. Which of the following should the systems administrator perform in order to BEST address the issue?
A Linux administrator needs to implement a secunty policy that prevents all connections from the marketing department that has the IP subnet 10.10.10.0/24 from reaching the current server. Which of the following commands can BEST accomplish this task?
An administrator was updating several systems and received the following warning for each one: No support Locale en_US.UTF-8. Which of the following should the administrator run to eliminate this warning?
A user deleted a log file because the disk was running out of space on a system running a mission-critical application. Even though the log file was large, the available disk space did not increase. The systems administrator determines the following files are still open:
Which of the following should the systems administrator perform to BEST free up disk space?
A user cannot reach the internet from a workstation. A systems administrator performs diagnostics with the following results:
Which of the following is the cause for lack of internet connectivity?
An end user is trying to execute a file within a different directory The end user executes the following command:
Which of the following commands should the Linux administrator use to run the shell scnpt within that folder?
A Linux administrator is optimizing a system in which an application needs to change the priority to one for the running process: 9014. Which of the following commands will achieve this task?
A systems administrator scheduled a new kernel module to replace an existing module while the system is running. Which of the ktoung wi accompfctfi ths task?
A)
B)
C)
D)
An administrator needs to run the rescript. sh script stored on the /nr.t/disk Wesystem. but permission is denied;
The system options are:
The script properties are:
Which of the following will resolve the issue?
The ability to add web servers dynamically during peak user activity and remove them when user activity decreases is an example of:
A Linux administrator wants to load the KVM module into the kernel. Which of the following commands should the administrator use?
An administrator wrote the following script, but it failed:
Which of the following is MOST likely the error in the script?
A Linux administrator has configured a local named caching server to reduce the amount of time to resolve common DNS addresses. The server resolves using the external server, however; the administrator wants to avoid this configuration. The administrator verifies the named, conf settings to confirm the following relevant settings:
The administrator then runs dig twice to look up an external address and receives the following relevant output the second time.
Which of the following should the administrator do to correct the configuration?
A system administrator is troubleshooting a web server that runs in a container. After the log is retained, the container occasionally stops logging to a log file. Fortunately, the vendor provides a custom signal that allows the application to reconnect to the log file. Which of the following would be BEST for the administrator to run the containers?
A system administrator is setting up a cron job that will copy thousands files from a remote directory on a scheduled basic. The file contents should retain their original permissions, including and group ownership, and the cron job should run for the least amount of the possible. Which of the following is the BEST program to use in this situation?
A new packages repository named repo10 has been installed on mirror site. A Linux administrator wants to use this new repository for local package installations. In which of the following locations should the administrator store the configuration information for the repo10 repository?
A Linux administrator is investigating an issue with an internal Linux server that is unable to resolve the following internal addresses:
The administrator runs the following commands as part of troubleshooting:
Which of the following is MOST likely resolve the issue?
An administrator is utilizing an automation engine than uses SSH to run commands on remote systems. Which of the fctowng does this describe?
A user submitted a ticket stating that the development environment is reporong the device does not have any space left. The user's application creates a lot of small files and does not remove these files when the application crashes. Given the following output:
Which of the following is the MOST likely cause for the error message indicating a lack of space?
A system administrator needs to bootstrap a series of Ubuntu images for a public provider. The administrator must ensure at the images contain the exact same updates, custom. Configure files after their first and then automatically. Which of the following tools the administrator user?
Which of the following commands should a system administrator use to configure a passwordless login to remote system? (Select TWO.)
A remote server reverts to the incorrect time when it is restarted. Which of the following will save the correct time to the BIOS clock once the time and date have been set on the server?
A Linux administrator needs to know the MAC address of the server’s gateway.
Which of the following commands should the administrator run to obtain this information?
A systems administrator wants to increase the existing drive space on a Linux server with a software RAID. After physically adding the new drive to the system, and then adding the drive to the RAID array,
the administrator notices the available drive space has not increased. A status of the array shows the new drive and the original storage space:
md0 : active Raid sdd1[3]S sdc1[2] sdb1[1] sda1[0]
954585654 blocks level5 64K chunk algorithm 2 [3/3] [UUU]
Which of the following should the administrator do to make all storage space available on the RAID array?
Which of the following will boot from a network-hosted ISO image at power on?
A Linux administrator is running a script that runs a Java application but receives the following error:
Error: Java_Home is not set
Java is installed on the Linux server and java –version returns a value. Which of the following should the administrator add to the script to resolve this issue?
An administrator is provisioning and attaching a secondary disk to a Linux server as a data drive. Which Of the following commands the administrator use to find the UUID Of the disk so the drive can be mounted upon boot?
An administrator received a request from a security officer to eliminate a blacklisting set called internal-blocked the company is using in the iptables firewall.
Which of the following commands will complete the task?
A security team informs the Linux administrator that a specific sever is acting as a n pen relay. To which of the following is the security team referring?