Exam 14: Troubleshooting, Performance, and Security
Exam 1: Introduction to Linux50 Questions
Exam 2: Linux Installation and Usage50 Questions
Exam 3: Exploring Linux Filesystems50 Questions
Exam 4: Linux Filesystem Management50 Questions
Exam 5: Linux Filesystem Administration50 Questions
Exam 6: Linux Server Deployment50 Questions
Exam 7: Working With the Bash Shell50 Questions
Exam 8: System Initialization and X Windows50 Questions
Exam 9: Managing Linux Processes50 Questions
Exam 10: Common Administrative Tasks50 Questions
Exam 11: Compression, System Backup, and Software Installation50 Questions
Exam 12: Network Configuration50 Questions
Exam 13: Configuring Network Services50 Questions
Exam 14: Troubleshooting, Performance, and Security50 Questions
Select questions type
Which command can be used to see what network services are running on your network?
(Multiple Choice)
4.8/5
(37)
What option can be specified with the rpm command to identify any missing files in a package or package dependency?
(Multiple Choice)
4.8/5
(37)
How can you identify filesystem corruption? How should you troubleshoot filesystem corruption on a non-critical partition?
(Essay)
4.7/5
(31)
What are the two most common technologies that provide asymmetric encryption on Linux systems?
(Multiple Choice)
4.9/5
(40)
If applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a specific kill signal may resolve the issue. Select the proper kill signal below:
(Multiple Choice)
4.7/5
(33)
What is the most common hardware component to fail on a Linux system?
(Multiple Choice)
4.9/5
(32)
Running background processes using what command allows you to exit your command-line shell without ending any background processes?
(Multiple Choice)
4.8/5
(42)
Older hardware that is malfunctioning may begin to send large amounts of information to the CPU when not in use. What is this process called?
(Multiple Choice)
4.7/5
(37)
What are the two golden rules that should guide you during any troubleshooting process? Describe each rule.
(Essay)
4.8/5
(33)
What command can be used to change the maximum number of file handles that can be used by a program?
(Multiple Choice)
4.8/5
(36)
If X Windows fails to start, what command can be used to troubleshoot the issue?
(Multiple Choice)
4.9/5
(46)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.
(Short Answer)
4.7/5
(45)
Which sar command option is used to display statistics for the processor queue?
(Multiple Choice)
4.8/5
(29)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A common IDS for Linux that monitors files and directories.
(Short Answer)
4.7/5
(21)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A command that lists the files that are currently being viewed or modified by software programs and users.
(Short Answer)
4.9/5
(38)
Asymmetric encryption uses a pair of keys that are unique generated on each system. What are these two keys called?
(Multiple Choice)
4.8/5
(33)
If network services that are started by inetd or xinetd are in use, what can be used to provide extra security?
(Multiple Choice)
4.7/5
(40)
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A program that can be used to detect unauthorized access to a Linux system.
(Short Answer)
4.8/5
(42)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)