Exam 14: Troubleshooting, Performance, and Security
Exam 1: Introduction to Linux50 Questions
Exam 2: Linux Installation and Usage50 Questions
Exam 3: Exploring Linux Filesystems50 Questions
Exam 4: Linux Filesystem Management50 Questions
Exam 5: Linux Filesystem Administration50 Questions
Exam 6: Linux Server Deployment50 Questions
Exam 7: Working With the Bash Shell50 Questions
Exam 8: System Initialization and X Windows50 Questions
Exam 9: Managing Linux Processes50 Questions
Exam 10: Common Administrative Tasks50 Questions
Exam 11: Compression, System Backup, and Software Installation50 Questions
Exam 12: Network Configuration50 Questions
Exam 13: Configuring Network Services50 Questions
Exam 14: Troubleshooting, Performance, and Security50 Questions
Select questions type
Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.
Free
(True/False)
4.7/5
(40)
Correct Answer:
False
Performance problems are caused by hardware, not software.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
On a system that is not using Systemd, what two log files contain information related to PAM?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
B, C
How is the mpstat utility used? What information does it provide, and how can that information be interpreted?
(Essay)
4.8/5
(38)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-The connections that a program makes to files on a filesystem.
(Short Answer)
4.9/5
(24)
Select the iptables option that specifies the destination address of packets for a rule:
(Multiple Choice)
4.8/5
(39)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A measure of normal system activity.
(Short Answer)
4.8/5
(32)
After downloading an installing any shared libraries, what should be done to ensure the list of shared library directories and the list of shared libraries are updated?
(Multiple Choice)
4.8/5
(30)
What utility in the sysstat package measures the flow of information to and from disk devices?
(Multiple Choice)
4.8/5
(38)
When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.
(Short Answer)
4.9/5
(47)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A software program that can be used to automatically authenticate users using their private key.
(Short Answer)
4.7/5
(32)
What option for the iptables command can be used to specify the default policy for a certain chain type?
(Multiple Choice)
4.7/5
(37)
What two commands below can display memory information and swap usage?
(Multiple Choice)
4.8/5
(31)
What file contains the DSA public key in the /etc/ssh directory?
(Multiple Choice)
4.9/5
(42)
Select the option that, when used with the sar command, displays swap statistics:
(Multiple Choice)
4.8/5
(41)
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
(True/False)
4.9/5
(37)
Some peripheral devices can perform a great deal of processing that is normally performed by the CPU; this is known as ____________________.
(Short Answer)
4.7/5
(32)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A command that can be used to scan ports on network computers.
(Short Answer)
4.8/5
(39)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-An attack in which a network service is altered in memory
(Short Answer)
4.9/5
(37)
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
(True/False)
4.7/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)