141-150 Flashcards
A Linux systems administrator receives reports from various users that an application hosted on a server has stopped responding at similar times for several days in a row. The administrator logs in to the system and obtains the following output:
Output 1:
Linux 3.10.0-328.13.1 x86_64 #1 (hostname) 31/08/2021 _x8664 (8 CPU)
16:00:01 PM|CPU|%user|%nice|%system|%iowait|%steal|%idle
16:10:01 PM|all|17:58|0.00|9.36|0.00|0.00|73.06
16:20:01 PM|all|22.34|0.00|11.75|0.00|0.00|65.91
16:30:01 PM|all|25.49|0.00|11.69|0.00|0|62.82
Output 3:
$ free -m
total|used|free|shared|buff/cahe|available
Mem: 16704|15026|174|92|619|793
Swap: 0|0|0
Which of the following should the administrator do to provide the BEST solution for the reported issue?
A. Configure memory allocation policies during business hours and prevent the Java process from going into a zombie state while the server is idle.
B. Configure a different nice value for the Java process to allow for more users and prevent the Java process from restarting during business hours.
C. Configure more CPU cores to allow for the server to allocate more processing and prevent the Java process from consuming all of the available resources.
D. Configure the swap space to allow for spikes in usage during peak hours and prevent the Java process from stopping due to a lack of memory.
A. Configure memory allocation policies during business hours and prevent the Java process from going into a zombie state while the server is idle.
A Linux administrator found many containers in an exited state. Which of the following commands will allow the administrator to clean up the containers in an exited state?
A. docker rm –all
B. docker rm $(docker ps -aq)
C. docker images prune *
D. docker rm –state exited
D. docker rm –state exited
A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing entries in uppercase or lowercase letters should be included in the list. Which of the following commands should the administrator use to accomplish this task?
A. find . -type f -print | xrags grep -ln denied
B. find . -type f -print | xrags grep -nv denied
C. find . -type f -print | xrags grep -wL denied
D. find . -type f -print | xrags grep -li denied
A. find . -type f -print | xrags grep -ln denied
A cloud engineer needs to launch a container named web-01 in background mode. Which of the following commands will accomplish this task?
A. docker builder -f –name web-01 httpd
B. docker load –name web-01 httpd
C. docker ps -a –name web-01 httpd
D. docker run -d –name web-01 httpd
D. docker run -d –name web-01 httpd
A Linux administrator is providing a new Nginx image from the registry to local cache. Which of the following commands would allow this to happen?
A. docker pull nginx
B. docker attach nginx
C. docker commit nginx
D. docker import nginx
A. docker pull nginx
Which of the following tools is BEST suited to orchestrate a large number of containers across many different servers?
A. Kubernetes
B. Ansible
C. Podman
D. Terraform
A. Kubernetes
A Linux administrator is installing a web server and needs to check whether web traffic has already been allowed through the firewall. Which of the following commands should the administrator use to accomplish this task?
A. firewalld query-service-http
B. firewall-cmd –check-service http
C. firewall-cmd –query-service http
D. firewalld –check-service http
C. firewall-cmd –query-service http
A systems administrator is encountering performance issues. The administrator runs a command with the following output:
09:10:18 up 457 days, 32min, 5 users, load average: 4.22 6.63 5.58
The Linux server has the following system properties:
CPU 4 vCPU -
Memory: 50GB -
Which of the following accurately describes this situation?
A. The system is under CPU pressure and will require additional vCPUs.
B. The system has been running for over a year and requires a reboot.
C. Too many users are currently logged in to the system.
D. The system requires more memory.
B. The system has been running for over a year and requires a reboot.
A Linux administrator has set up a new DNS forwarder and is configuring all internal servers to use the new forwarder to look up external DNS requests. The administrator needs to modify the firewall on the server for the DNS forwarder to allow the internal servers to communicate to it and make the changes persistent between server reboots. Which of the following commands should be run on the DNS forwarder server to accomplish this task?
A. ufw allow out dns
B. systemctl reload firewalld
C. iptables -A OUTPUT -p udp -m udp -dport 53 -j ACCEPT
D. firewall-cmd –zone=public –add-port=53/udp –permanent
D. firewall-cmd –zone=public –add-port=53/udp –permanent
A Linux engineer receives reports that files created within a certain group are being modified by users who are not group members. The engineer wants to reconfigure the server so that only file owners and group members can modify new files by default. Which of the following commands would accomplish this task?
A. chmod 775
B. umask. 002
C. chattr -Rv
D. chown -cf
B. umask. 002