Exam 14: Troubleshooting, Performance, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the two golden rules that should guide you during any troubleshooting process? Describe each rule.

(Essay)
4.7/5
(38)

A room where you lock important computers, such as Linux servers, and to which only Linux administrators or trusted users have key access is commonly called a(n) server closet. _________________________

(True/False)
4.9/5
(38)

Almost all hardware problems are the result of damaged hardware.

(True/False)
4.9/5
(37)

By default, sar commands are scheduled using the cron daemon to run every ____ minutes in Fedora 13.

(Multiple Choice)
4.9/5
(33)

How can netfilter/iptables be used to create a firewall service?

(Essay)
4.9/5
(40)

Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

(Multiple Choice)
4.9/5
(31)

When performance issues arise, you can compare the output of performance utilities to the ____________________ values found in the system log book.

(Short Answer)
4.9/5
(36)

To see what network services are running on your network, you can run the ____ command.

(Multiple Choice)
4.8/5
(29)

____ are the most common hardware component to fail on Linux systems.

(Multiple Choice)
4.8/5
(40)

Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.

(Short Answer)
4.8/5
(42)

Match each term with the correct statement below. -The directory that contains most system log files.

(Multiple Choice)
4.8/5
(34)

Asymmetric encryption uses a pair of keys that are uniquely generated on each system: a(n) ____ key and a(n) ____ key.

(Multiple Choice)
4.9/5
(30)

Match each term with the correct statement below. -A command that can be used to increase the number of processes that users can start in the shell.

(Multiple Choice)
4.9/5
(34)

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

(Multiple Choice)
4.9/5
(29)

The ____ option for the sar command is used to displays statistics for the processor queue.

(Multiple Choice)
4.8/5
(36)

To identify any missing files in a package or package dependency, you can use the ____ option to the rpm command, followed by the name of the package.

(Multiple Choice)
4.8/5
(37)

When applications run into difficulties gaining resources during execution and stop functioning, restarting the process using a(n) ____ often solves this problem.

(Multiple Choice)
4.8/5
(33)

To identify which shared libraries are required by a certain program, you can use the ldconfig command. _________________________

(True/False)
4.8/5
(35)

The ____________________ command is used to view the current SELinux status.

(Short Answer)
4.7/5
(31)

The free command can be used to display the total amounts of physical and swap memory in Kilobytes and their utilizations. _________________________

(True/False)
4.8/5
(42)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)