An administrator is writing a Bash script to audit SSH logins. Which of the following logs would the administrator parse to find the needed information?
A developer has contacted a systems administrator because an application is not receiving a response from the client. The application must purge the message queue before terminating. Which of the following should the systems administrator perform in order to BEST address the issue?
A systems administrator would like to back up all of the'. conf' files on a server The administrator runs the command:
Find / --name ‘’*conf’’ > backup,tar
After investigating the backup, tar file the administrator realizes that the contents of the configuration files were not backed up property. Which of the following would BEST accomplish this task?
A newly deployed application is not able to reach the database that is running on a Linux server. The connection should occur at port 1521/tcp from appsrv 192.168.1.11 to dbsrv
A server administrator runs a few diagnostic commands with following results:
The same command when run from the application server gives the following result:
Both machines are in the same IP subnet, so no external network device is causing the issue.
Which of the following commands BEST solves the connectivity issue at the dbsrv machine? (Select TWO).
A user needs to modify the IP address of a laptop. Which of the following files can be used to configure the network interface named eth0?
A junior systems administrator is scanning archive.tar files with an antivirus scanner. The administrator is given the following tasks:
Which of the following actions should be performed to meet these requirements? (Choose two.)
A Linux administrator updated the graphics drivers using a package manager but now the server does not boot. Which of the following is the BEST way to get the server back into an operational state?
Which of the following is a file that can define how to build, deploy, and install various components for a Linux application hosted in a cloud environment?
A Linux administrator needs to schedule a backup job to run every Friday at 2 15 a.m. Which of the following lines should the administrator add to the crontab file?
A systems administrator wants to disable the Linux Kernel WatchDog Timer Driver for security purposes.
Which of the following will accomplish this task?
A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user’s account?
A Linux administrator is testing a new web application on a local laptop and consistently shows the following 403 errors in the laptop’s logs”
The web server starts properly, but an error is generated in the audit log. Which of the following settings should be enabled to prevent this audit message?
A Linux administrator is configuring a server to log security events for the ping command while allowing the request to occur. The Linux server is using AppArmor to manage its security services.
Which of the following commands is the BEST option?
A systems administrator needs to install a new piece of hardware that requires a new driver. The driver should be manually installed. Which of the following describes the order of commands required to obtain module information, install the module, and check the log for any errors during module installation?
Which of the following is used on the client to boot a Linux system from a TFTP server?
A technician suspects a company's border firewall is down, thus blocking Internet access. The technician executes the following commands:
#ping -c 1 firewall.company.com
64 bytes from firewall.company.com (192.168.1.1): icmp_seq=1 ttl=64 time=0.061ms
#ping -c 16 www.comptia.com
16 packets transmitted, 0 received, 100% packet loss, time 14999ms
Which of the following commands should the technician use to BEST determine the source of this outage?
A systems administrator uses a remote execution engine to iterate through each IP address in a network and run a script on remote hosts. The script captures the remote system's hostname, IP address, OS distribution, and system uptime. The output of the script gets saved to the administrator's local workstation for future processing.
Which of the following is this an example of?
A file server is sharing a directory called /share between team members inside a company. The fileshare
needs to be moved from serverA to /newshare located on serverB with all permissions and attributes
preserved. Which of the following commands would BEST achieve this task?
A directory called /employee is shared with many employees in a company. New hardware was acquired, and the systems administrator needs to back up all files in /employee before the server is replaced.
Which of the following commands should be used to back up all the files and compress them to use little space in the filesystem?
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
Which of the following files should be edited to accomplish this?
A junior Linux administrator needs to create 16 empty files quickly that will contain sales information for each
quarter for the past four years. Which of the following commands will meet this requirement?
A user receives an access_denied error when trying to modify a file, even though the file permissions are set
to 777. Which of the following commands should be used to view additional file permissions?
A Linux administrator tries to ping a hostname in a network but receives the message: hostname not found. The administrator is sure the name exists on the network and wants to verify if the DNS server is correctly configured on the client. Which of the following files should the administrator use to verify this information?
An administrator notices a directory on a web server named /var/www/html/old_reports that should no
longer be accessible on the web. Which of the following commands will accomplish this task?
A junior administrator is installing kernel modules. The administrator is given a checklist that outlines the
following tasks to be completed:
Display currently installed module version.
Display which modules loaded at startup.
Which of the following commands would be used to accomplish these tasks? (Choose two.)
A systems administrator downloads an application’s source files, compiles the application, and installs it per
the application’s installation instructions. When trying to run the application, the system states:
bash: occmd: command not found…
Running the locate command shows it does exist in the following location:
Which of the following should the administrator do to allow the command to run properly? (Choose two.)
An administrator needs to see the type of CPU that a server is running. Which of the following files contains this information?
A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?
A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task?
Which of the following BEST describes running on a Linux system?
A Linux administrator is restoring the SELinux contexts on an entire system. Which of the following commands
is the BEST option to complete this task?
A Linux storage administrator wants to create a logical volume group. Which of the following commands is required to start the process?
A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file.
Which of the following is the BEST reason to do this?
A junior system administrator had trouble installing and running an Apache web server on a Linux server. You have been tasked with installing the Apache web server on the Linux server and resolving the issue that prevented the junior administrator from running Apache.
Install Apache and start the service. Verify that the Apache service is running with the defaults.
Typing “help” in the terminal will show a list of relevant commands.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
CentOS Command Prompt
See explanation below
Text Description automatically generated
Text Description automatically generated
An administrator is analyzing a Linux server which was recently hacked.
Which of the following will the administrator use to find all unsuccessful login attempts?
A Linux user wants to give read-only permissions to a directory and its contents. Which of the following
commands will allow the user to accomplish this task?
A Linux administrator needs to prevent the Postfix mail transfer agent from starting on boot.
Which of the following commands will accomplish this task?
An administrator is troubleshooting an issue where end users are waiting a very long times for processes to respond. The top command reveals that multiple processes seem to be m a non-responsive state or have become zombies. Which of the administrator use to clean up the system?
A Linux administrator opens a ticket to have an external hard drive mounted. As a security policy, external storage kernel modules are disabled.
Which of the following is the BEST command for adding the proper kernel module to enable external storage modules?
A junior administrator needs to unload an older video kernel module.
Which of the following commands would BEST accomplish this task?
A systems administrator must clean up all application files in the directory /var/log/app. However, the company’s security policy requires the files to be kept on the backup server for one year. The Linux server has only the tar and bzip2 packages installed.
Which of the following commands will package and compress the files?
A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?
A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?
Which of the following will MOST likely fix the issue?
A Linux administrator needs to ensure a service no longer starts when a system running SysVinit is booted. Which of the following commands should the administrator use?
A Linux administrator is confirming information on a system. The administrator issues a series of commands and gets the following output:
Which of the following did the administrator issue?
A security audit concludes that an organization's database servers need to be hardened As a result, an administrator obtans tie fofcjwwng partial Nmap output from a database server.
Which of the following commands should the administrator execute to mitigate security risks?
Which of the following should the systems administrator use to ensure the test account is disabled after 24 hours if the account's password has expired?
The grub2-mXconfig command is used to generate a new GRUB2 configuration after:
A Linux administrator created a new log file in /var/log/newlog to monitor a newly installed application. The administrator is now configuring paramters of the file so it will be rotated on a weekly basis or when it becomes larger than 1MB in...
should exist in the /var/log directory. Which of the following should be added to he /etc/ logrotate.conf file to meet this objectives?
A Linux administrator wants to load the KVM module into the kernel. Which of the following commands should the administrator use?
A system administrator needs to bootstrap a series of Ubuntu images for a public provider. The administrator must ensure at the images contain the exact same updates, custom. Configure files after their first and then automatically. Which of the following tools the administrator user?
A Linux administrator needs to know the MAC address of the server’s gateway.
Which of the following commands should the administrator run to obtain this information?
A Linux administrator is configuring a web server that connects to an external SQL database. However, after starting the web application, the logs are showing an error message:
Which of the following is the BEST way to resolve this issue?
A systems administrator is attempting to access a server by SSH. The Linux administrator ensures that the SSH keys on the remote server were unable to connect. The following error message is being displayed:
Which of the following needs to be changed on order for the administrator to access the server via SSH?
An administrator receives a USB drive and wants to make an exact copy of the disk before starting to work on it. One of the partitions on the USB drive was mounted as /dev/sdc1.
Which of the following commands should the administrator use?
An administrator wants to be able to access a remote server. After creating an SSH key pair, which of the following describes where the public key should be placed to allow for key-based authentication?
A network administrator installed a web server on a Linux host and added a firevalid command to open port tcp/80. The web server worked without error until an updated and patch kernel was installed on the system a month later. Now users are unable to access the web server even though the service is running, which of the following would fix the issue?
Which of the following is commonly implemented in external devices to provide unique event-based two-factor authentication credentials when a system is already implementing username and password authentication?
Which of the following command should an administrator use to prevent users from starting the httpd service on a system-based Linux system?
A systems administrator needs to install software packages on a server from an Internet-based repository. The server does not have Internet connectivity.
Which of the following can be used to allow the server to connect to the Internet through the systems administrator’s desktop?
A server administrator is given the hash of an account password that needs to be synchronized across all servers.
Which of the following will allow the server administrator to configure the account password?
A systems administrator a retting an HTTPO server on a Lnux server and configuring as a proxy server The administrator runs the following commands to venfy that the service is running:
However, the arjminrstraior is getting a 503 error when browsing to portal.company. internal. After reviewing the logs, the following error information is discovered:
Which of the following commands BEST resolves the issue?
Vytvcft of the following a a fie that can define how to build deploy and mstaf various components for a Linux application hosted m a cloud environment?
Which of the following is the MOST common method used to access Windows systems that are running in a cloud provider from a Linux system?
An administrator is setting UP a NAT gateway. Two interfaces have been configured:
The firewall configuration has been completed:
The IP forwarding configuration parameter is:
When testing the NAT from a workstation, the administrator encounters an issue:
Which of the following is the MOST likely cause of the packet loss?
A user wants to configure the application “myapp” to start on runlevels 2, 3, 4, and 5 every time the system starts.
Which of the following commands will accomplish this task?
Which of the following directories will help an administrator identify the specifications of a Linux server in term of resources?
A systems administrator is editing a service file for the web server. In order to continue testing, all web server processes must be shut down. The administrator accomplishes this with the following commands:
Based on the command output above, which of the following BEST explains how this was accomplished?