Exam 18: CompTIA Linux+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A systems administrator clones copies of a Linux VM every time a new Linux server is needed. The administrator notices the command prompt always states localhost.localdomain . Which of the following should the administrator run to have the command prompt consistently labeled as Server1 rather than ?

(Multiple Choice)
4.7/5
(34)

A configuration management tool running every minute is enforcing the service HTTPd to be started. To perform maintenance, which of the following series of commands can be used to prevent the service from being started?

(Multiple Choice)
4.8/5
(33)

A Linux administrator is helping the security team troubleshoot an SELinux policy violation incident. Which of the following would be the BEST utility command to display SELinux violation and AVC denial messages?

(Multiple Choice)
4.8/5
(37)

An administrator needs to create a shared directory in which all users are able to read, write, and execute its content but none of the regular users are able to delete any content. Which of the following permissions should be applied to this shared directory?

(Multiple Choice)
4.8/5
(30)

A systems administration team has decided to their systems as immutable instances. They keep the desired state of each of their systems in version control and apply automation whenever they provision a new instance. If there is an issue with one of their servers, instead of troubleshooting the issue they terminate the instance and rebuild it using automation. Which of the following is this an example of?

(Multiple Choice)
4.9/5
(40)

An administrator is reviewing suspicious activity on a server and needs to determine which users logged into the system within the past 24 hours. Which of the following commands should the administrator run to determine this?

(Multiple Choice)
4.9/5
(39)

A Linux systems administrator needs to copy the contents of a directory named "working" on the local working system to a folder / var/www/html on a server named "corporate-web". Which of the following commands will allow the administrator to copy all the contents to the web server?

(Multiple Choice)
4.9/5
(36)

Which of the following is used in unattended server installation via PXE?

(Multiple Choice)
4.8/5
(35)

A Linux administrator needs to set permissions on an application with the following parameters: The owner of the application should be able to read, write, and execute the application. Members of the group should be able to read and execute the application. Everyone else should not have access to the application. Which of the following commands would BEST accomplish these tasks?

(Multiple Choice)
4.8/5
(37)

An administrator needs to look at a log for an application on a systemd -based system. There is no log for this application in /var/log . Which of the following is another way to view the application log on this system?

(Multiple Choice)
4.8/5
(33)

Joe, a user, reports that he is no longer able to write files to his home directory. Upon inspection, the Linux administrator discovers that attempting to create a new file gives the following error: No space left on device . However, the disk and partition are not full. Which of the following commands would be BEST for the administrator to use to continue troubleshooting this problem?

(Multiple Choice)
4.7/5
(32)

A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal?

(Multiple Choice)
4.8/5
(34)

A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?

(Multiple Choice)
4.8/5
(38)

A Linux user uses a VPN to securely access the company's systems from a laptop. Which of the following protocols are MOST likely used to secure the VPN connection? (Choose two.)

(Multiple Choice)
4.7/5
(34)

An administrator notices a website hosted on an httpd web server is not loading. Upon further inspection, the administrator learns there are no processes running. When starting the service, the site operates correctly for a few minutes before the process disappears again. Which of the following should the administrator consider as the MOST likely possibility before troubleshooting the issue?

(Multiple Choice)
4.9/5
(29)

Which of the following is modified to reconfigure the boot environment?

(Multiple Choice)
4.8/5
(40)

Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry: joe:x:505:505::/home/joe:/bin/false Which of the following commands should the administrator execute to resolve the problem?

(Multiple Choice)
4.9/5
(37)

A junior Linux administrator needs to create 16 empty files quickly that will contain sales information for each quarter for the past four years. Which of the following commands will meet this requirement?

(Multiple Choice)
4.7/5
(26)

A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error: No space left on device . The support engineer checks the directory, and it has 20GB of free space. Which of the following BEST describes a possible cause for this error?

(Multiple Choice)
4.9/5
(42)

An administrator needs to see a list of the system user's encrypted passwords. Which of the following Linux files does the administrator need to read?

(Multiple Choice)
4.8/5
(43)
Showing 201 - 220 of 252
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)