An administrator updates the network configuration on a server but wants to ensure the change will not cause an outage if something goes wrong. Which of the following commands allows the administrator to accomplish this goal?
A Linux user needs to download the latest Debian image from a Docker repository. Which of the following commands makes this task possible?
Adocker image init debian
Bdocker image pull Debian
Cdocker image import debian
Ddocker image save debian
Which of the following best describes a use case for playbooks in a Linux system?
ATo provide a set of tasks and configurations to deploy an application
BTo provide the instructions for implementing version control on a repository
CTo provide the security information required for a container
DTo provide the storage volume information required for a pod
Which of the following is a reason multiple password changes on the same day are not allowed?
ATo avoid brute-forced password attacks by making them too long to perform
BTo increase password complexity and the system’s security
CTo stop users from circulating through the password history to return to the originally used password
DTo enforce using multifactor authentication with stronger encryption algorithms instead of passwords
A Linux administrator needs to analyze a compromised disk for traces of malware. To complete the analysis, the administrator wants to make an exact, block-level copy of the disk. Which of the following commands accomplishes this task?
Acp -rp /dev/sdc/* /tmp/image
Bcpio -i /dev/sdc -ov /tmp/image
Ctar cvzf /tmp/image /dev/sdc
Ddd if=/dev/sdc of=/tmp/image bs=8192
Question 6
Security
0
Question 7
System Management
Question 8
System Management
Question 9
Security
Question 10
Security
Question 11
Security
Question 12
Services and User Management
Question 13
Automation, Orchestration, and Scripting
Question 14
Automation, Orchestration, and Scripting
Question 15
System Management
Question 16
System Management
Question 17
System Management
Question 18
Automation, Orchestration, and Scripting
Question 19
System Management
Question 20
Automation, Orchestration, and Scripting
Question 21
System Management
Question 22
System Management
Question 23
System Management
Question 24
System Management
Question 25
Services and User Management
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
An administrator must secure an account for a user who is going on extended leave. Which of the following steps should the administrator take? (Choose two).
ASet the user’s files to immutable.
BInstruct the user to log in once per week.
CDelete the user’s /home folder.
DRun the command passwd -l user.
EChange the date on the /home folder to that of the expected return date.
FChange the user’s shell to /sbin/nologin.
Which of the following best describes journald?
AA system service that collects and stores logging data
BA feature that creates crash dumps in case of kernel failure
CA service responsible for keeping the filesystem journal
DA service responsible for writing audit records to a disk
An administrator attempts to install updates on a Linux system but receives error messages regarding a specific repository. Which of the following commands should the administrator use to verify that the repository is installed and enabled?
Ayum repo-pkgs
Byum list installed repos
Cyum reposync available
Dyum repolist all
Which of the following is the main reason for setting up password expiry policies?
ATo avoid using the same passwords repeatedly
BTo mitigate the use of exposed passwords
CTo force usage of passwordless authentication
DTo increase password strength and complexity
Which of the following utilities supports the automation of security compliance and vulnerability management?
ASELinux
BNmap
CAIDE
DOpenSCAP
A systems administrator is configuring new Linux systems and needs to enable passwordless authentication between two of the servers. Which of the following commands should the administrator use?
An administrator needs to verify the user ID, home directory, and assigned shell for the user named “accounting.” Which of the following commands should the administrator use to retrieve this information?
Aqetent passwd accounting
Bid accounting
Cgrep accounting /etc/shadow
Dwho accounting
A Linux administrator needs to create and then connect to the app-01-image container. Which of the following commands accomplishes this task?
Adocker run -it app-01-image
Bdocker start -td app-01-image
Cdocker build -ic app-01-image
Ddocker exec -dc app-01-image
A Linux administrator wants to use AI to deploy infrastructure as code. Which of the following is a best practice regarding the use of AI for this task?
AUsing copy and paste when possible
BGenerating monolithic code
CLinting generated code
DMerging CI/CD pipelines
Which of the following commands should a Linux administrator use to determine the version of a kernel module?
Amodprobe bluetooth
Blsmod bluetooth
Cdepmod bluetooth
Dmodinfo bluetooth
Which of the following commands should an administrator use to see a full hardware inventory of a Linux system?
Admidecode
Blsmod
Cdmesg
Dlscpu
Which of the following filesystems contains non-persistent or volatile data?
A/boot
B/usr
C/proc
D/var
A Linux software developer wants to use AI to optimize source code used in a commercial product. Which of the following steps should the developer take first?
AResearch which of the available AI chatbots are best at optimizing source code.
BVerify that the company has a policy governing the use of AI in software development.
CInstall a private LLM to use on the internal network for source code optimization.
DUse open-source LLMs that undergo regular security reviews by the community.
A systems administrator needs to check the statuses of all the services on a Linux server. Which of the following commands accomplishes this task?
Asystemctl is-active --services
Bsystemctl list-sockets --type-services
Csystemctl is-enabled --services
Dsystemctl list-units --type-services
Which of the following is a characteristic of Python 3?
AIt is closed source.
BIt is extensible through modules.
CIt is fully backwards compatible.
DIt is binary compatible with Java.
A Linux administrator is making changes to local files that are part of a Git repository. The administrator needs to retrieve changes from the remote Git repository. Which of the following commands should the administrator use to save the local modifications for later review?
Agit stash
Bgit pull
Cgit merge
Dgit fetch
Which of the following commands should an administrator use to convert a KVM disk file to a different format?
Aqemu-kvm
Bqemu-ng
Cqemu-io
Dqemu-img
A systems administrator needs to set the IP address of a new DNS server. Which of the following files should the administrator modify to complete this task?
A/etc/whois.conf
B/etc/resolv.conf
C/etc/nsswitch.conf
D/etc/dnsmasq.conf
Which of the following describes the method of consolidating system events to a single location?
ALog aggregation
BHealth checks
CWebhooks
DThreshold monitoring
A Linux administrator wants to add a user to the Docker group without changing their primary group. Which of the following commands should the administrator use to complete this task?