Exam 14: Troubleshooting, Performance, and Security
Exam 1: Introduction to Linux45 Questions
Exam 2: Linux Installation and Usage45 Questions
Exam 3: Exploring Linux Filesystems45 Questions
Exam 4: Linux Filesystem Management45 Questions
Exam 5: Linux Filesystem Administration45 Questions
Exam 6: Advanced Installation45 Questions
Exam 7: Working With the Bash Shell45 Questions
Exam 8: System Initialization and X Windows45 Questions
Exam 9: Managing Linux Processes45 Questions
Exam 10: Common Administrative Tasks45 Questions
Exam 11: Compression, System Backup, and Software Installation45 Questions
Exam 12: Network Configuration45 Questions
Exam 13: Configuring Network Services45 Questions
Exam 14: Troubleshooting, Performance, and Security45 Questions
Select questions type
What are the two golden rules that should guide you during any troubleshooting process? Describe each rule.
(Essay)
4.7/5
(38)
A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet. _________________________
(True/False)
4.9/5
(38)
Almost all hardware problems are the result of damaged hardware.
(True/False)
4.9/5
(37)
By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.
(Multiple Choice)
4.9/5
(33)
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
(Multiple Choice)
4.9/5
(31)
When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.
(Short Answer)
4.9/5
(36)
To see what network services are running on your network, you can run the ____ command.
(Multiple Choice)
4.8/5
(29)
____ are the most common hardware component to fail on Linux systems.
(Multiple Choice)
4.8/5
(40)
Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.
(Short Answer)
4.8/5
(42)
Match each term with the correct statement below.
-The directory that contains most system log files.
(Multiple Choice)
4.8/5
(34)
Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.
(Multiple Choice)
4.9/5
(30)
Match each term with the correct statement below.
-A command that can be used to increase the number of processes that users can start in the shell.
(Multiple Choice)
4.9/5
(34)
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
(Multiple Choice)
4.9/5
(29)
The ____ option for the sar command is used to displays statistics for the processor queue.
(Multiple Choice)
4.8/5
(36)
To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.
(Multiple Choice)
4.8/5
(37)
When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.
(Multiple Choice)
4.8/5
(33)
To identify which shared libraries are required by a certain program, you can use the ldconfig command. _________________________
(True/False)
4.8/5
(35)
The ____________________ command is used to view the current SELinux status.
(Short Answer)
4.7/5
(31)
The free command can be used to display the total amounts of physical and swap memory in Kilobytes and their utilizations. _________________________
(True/False)
4.8/5
(42)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)