A systems administrator is troubleshooting a connectivity issue pertaining to access to a system named db.example.com. The system IP address should be 192.168.20.88. The administrator issues the dig command and receives the following output:
Given this scenario, which of the following should the administrator do to address this issue?
A.
Modify the /etc/hosts file and change the db.example.com entry to 192.168.20.89
B.
Modify the /etc/network file and change the db.example.com entry to 192.168.20.88
C.
Modify the /etc/network file and change the db.example.com entry to 192.168.20.89.
D.
Modify the /etc/hosts file and change the db.example.com entry to 192.168.20.88.
Modify the /etc/hosts file and change the db.example.com entry to 192.168.20.89
A development team asks an engineer to guarantee the persistency of journal log files across system reboots. Which of the following commands would accomplish this task?
A.
grep -i auto /etc/systemd/journald.conf && systemctl restart systemd-journald.service
B.
cat /etc/systemd/journald.conf | awk '(print $1,$3)'
C.
sed -i 's/auto/persistent/g' /etc/systemd/journald.conf && sed -i 'persistent/s/ˆ#//q'
/etc/systemd/journald.conf
D.
journalctl --list-boots && systemctl restart systemd-journald.service
grep -i auto /etc/systemd/journald.conf && systemctl restart systemd-journald.service
A systems administrator received a notification that a system is performing slowly. When running the top command, the systems administrator can see the following values:
Which of the following commands will the administrator most likely run NEXT?
A.
vmstat
B.
strace
C.
htop
D.
lsof
vmstat
A Linux administrator has been tasked with installing the most recent versions of packages on a RPM-based OS. Which of the following commands will accomplish this task?
A.
apt-get upgrade
B.
rpm -a
C.
yum updateinfo
D.
dnf update
E.
yum check-update
dnf update
A Linux administrator needs to remove software from the server. Which of the following RPM options should be used?
A.
rpm -s
B.
rm -d
C.
rpm -q
D.
rpm -e
rpm -e
Due to low disk space, a Linux administrator finding and removing all log files that were modified more than 180 days ago. Which of the following commands will accomplish this task?
A.
find /var/log -type d -mtime +180 -print -exec rm {} \;
B.
find /var/log -type f -modified +180 -rm
C.
find /var/log -type f -mtime +180 -exec rm {} \
D.
find /var/log -type c -atime +180 –remove
find /var/log -type d -mtime +180 -print -exec rm {} \;
A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following commands will allow the technician to execute those services and continue deploying other microservices within the same terminal section?
A.
gedit & disown
B.
kill 9 %1
C.
fg %1
D.
bg %1 job name
gedit & disown
A junior administrator is trying to set up a passwordless SSH connection to one of the servers. The administrator follows the instructions and puts the key in the authorized_key file at the server, but the administrator is still asked to provide a password during the connection.
Given the following output:
Which of the following commands would resolve the issue and allow an SSH connection to be established without a password?
A.
restorecon -rv .ssh/authorized_key
B.
mv .ssh/authorized_key .ssh/authorized_keys
C.
systemctl restart sshd.service
D.
chmod 600 mv .ssh/authorized_key
systemctl restart sshd.service
A Linux administrator cloned an existing Linux server and built a new server from that clone. The administrator encountered the following error after booting the cloned server:
Which of the following should administrator use to resolve the device mismatch issue and mount the disk?
A.
mount disk by device-id
B.
fsck -A
C.
mount disk by-label
D.
mount disk by-blkid
mount disk by-blkid
Some servers in an organization have been compromised. Users are unable to access to the organization’s web page and other services. While reviewing the system log, a systems administrator notices messages from the kernel regarding firewall rules:
A.
Option A
B.
Option B
C.
Option C
D.
Option D
Option B
Page 9 out of 37 Pages |
Previous |