211-220 Flashcards

1
Q

A systems administrator needs to extend the logical volume /dev/mapper/linux-root to use all available space in its volume group. The filesystem should be extended as well. Which of the following commands will allow the administrator to achieve this goal?

A. lvm pvresize -r -l100% /dev/mapper/linux-root
B. lvchange -L100% /dev/mapper/linux-root
C. lvextend -l+100% /dev/mapper/linux-root
D. lvresize -l100%FREE -r /dev/mapper/linux-root

A

D. lvresize -l100%FREE -r /dev/mapper/linux-root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A systems administrator is gathering information about a file type and the contents of a file. Which of the following commands should the administrator use to accomplish this task?

A. file filename
B. touch filename
C. grep filename
D. lsof filename

A

A. file filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A systems administrator is investigating a service that is not starting up. Given the following information:

root@localhost ~]# systemctl status network
network.service - LSB: Bring up/down netowrking
Loaded: loaded (etc/rc.d/init.d/network; bad; vendor preset: disabled)
Active: failed (Result: exit-code) since Jan 2022-01-02 22:55:15 CST;
Docs: man:systemd-sysv-generator(8)
Process: 1083 ExecStart=/etc/rc.d/init.d/network.start (code=exited, status=1/FAILURE)
Jan 02 22:55:15 localhost.localdomain netowrk[1083]: Bringing up interface enp0s25: Error: Con…n.
Jan 02 22:55:15 localhost.localdomain network[1083]: [FAILED]
[…]

Which of the following systemd commands should the administrator use in order to obtain more details about the failing service?

A. systemctl analyze network
B. systemctl info network
C. sysctl -a network
D. journalctl -xu network

A

D. journalctl -xu network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A DevOps engineer wants to allow the same Kubernetes container configurations to be deployed in development, testing, and production environments. A key requirement is that the containers should be configured so that developers do not have to statically configure custom, environment-specific locations. Which of the following should the engineer use to meet this requirement?

A. Custom scheduler
B. Node affinity
C. Overlay network
D. Ambassador container

A

D. Ambassador container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After starting an Apache web server, the administrator receives the following error:

Apr 23 11:49:06 Localhost.localdomain httpd(4618): (98)Address already in use: AH000072: make_sock: could not bind to address [::]:80

Which of the following commands should the administrator use to further troubleshoot this issue?

A. ss
B. ip
C. dig
D. nc

A

A. ss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following commands should a technician use to create an administrative account for the username Joe?

A. sudo useradd -G wheel joe
B. sudo useradd joe; sudo passwd -l joe
C. sudo useradd joe; sudo cat key.pem > ~/.ssh/authorized_keys
D. sudo useradd joe; groupadd admin joe

A

A. sudo useradd -G wheel joe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Due to performance issues on a server, a Linux administrator needs to terminate an unresponsive process. Which of the following commands should the administrator use to terminate the process immediately without waiting for a graceful shutdown?

A. kill -SIGKILL 5545
B. kill -SIGTERM 5545
C. kill -SIGHUP 5545
D. kill -SIGINT 5545

A

A. kill -SIGKILL 5545

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Linux administrator generated a list of users who have root-level command-line access to the Linux server to meet an audit requirement. The administrator analyzes the following /etc/passwd and /etc/sudoers files:

$ cat /etc/passwd
root:x:0:0::/home/root:/bin/bash
lee:x:500:500::/home/lee:/bin/tcsh
mallory:x:501:501::/root:/bin/bash
eve:x:502:502:/home/eve:/bin/nologin
carl:x:0:503::/home/carl:/bin/sh
bob:x:504:504::/home/bob:/bin/ksh
alice:x:505:505::/home/alice:/bin/rsh

$ cat /etc/sudoers
Cmnd_Alias SHELLS = /bin/tcsh, /bin/sh, /bin/bash
Cmnd_Alias SYSADMIN = /usr/sbin/tcpdump
lee ALL = (ALL) ALL
bob ALL = NOPASSWD: SYSADMIN

Which of the following users, in addition to the root user, should be listed in the audit report as having root-level command-line access? (Choose two.)

A. Carl
B. Lee
C. Mallory
D. Eve
E. Bob
F. Alice

A

A. Carl

C. Mallory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The group named support is unable to make changes to the config file. An administrator is reviewing the permissions and sees the following:

$ ls -l config
-rw-rw—-. 1 root app 4682 02-15 11:25 config

Which of the following should the administrator execute in order to give the support group access to modify the file while preserving the current ownership?

A. chown :support config
B. setfacl -m g:support:rw- config
C. chmod 664 config
D. chmod g+s config

A

B. setfacl -m g:support:rw- config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following actions are considered good security practices when hardening a Linux server? (Choose two.)

A. Renaming the root account to something else
B. Removing unnecessary packages
C. Changing the default shell to /bin/csh
D. Disabling public key authentication
E. Disabling the SSH root login possibility
F. Changing the permissions on the root filesystem to 600

A

B. Removing unnecessary packages

E. Disabling the SSH root login possibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly