Linux+ Final Exam 2
Quiz Summary
0 of 75 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 75 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 75
1. Question
An administrator installed an application from source into /opt/operations1/ and has received numerous reports that users are not able to access the application without having to use the full path /opt/operations1/bin/*. Which of the following commands should be used to resolve this issue?
CorrectIncorrect -
Question 2 of 75
2. Question
A Linux system is getting an error indicating the root filesystem is full. Which of the following commands should be used by the systems administrator to resolve this issue?
CorrectIncorrect -
Question 3 of 75
3. Question
A cloud engineer is asked to copy the file deployment.yaml from a container to the host where the container is running. Which of the following commands can accomplish this task?
CorrectIncorrect -
Question 4 of 75
4. Question
A Linux system is failing to start due to issues with several critical system processes. Which of the following options can be used to boot the system into the single user mode?
CorrectIncorrect -
Question 5 of 75
5. Question
A DevOps engineer needs to allow incoming traffic to ports in the range of 4000 to 5000 on a Linux server. Which of the following commands will enforce this rule?
CorrectIncorrect -
Question 6 of 75
6. Question
A Linux administrator needs to determine whether a hostname is in the DNS. Which of the following would supply the information that is needed?
CorrectIncorrect -
Question 7 of 75
7. Question
A server is experiencing intermittent connection issues. Some connections to the Internet work as intended, but some fail as if there is no connectivity. The systems administrator inspects the server configuration:
Which of the following is MOST likely the cause of the issue?CorrectIncorrect -
Question 8 of 75
8. Question
A cloud engineer needs to block the IP address 192.168.10.50 from accessing a Linux server. Which of the following commands will achieve this goal?
CorrectIncorrect -
Question 9 of 75
9. Question
A Linux systems administrator is configuring a new filesystem that needs the capability to be mounted persistently across reboots. Which of the following commands will accomplish this task?
CorrectIncorrect -
Question 10 of 75
10. Question
A Linux administrator is alerted to a storage capacity issue on a server without a specific mount point or directory. Which of the following commands would be MOST helpful for troubleshooting?
CorrectIncorrect -
Question 11 of 75
11. Question
A systems administrator pressed Ctrl+Z after starting a program using the command line, and the shell prompt was presented. In order to go back to the program, which of the following commands can the administrator use?
CorrectIncorrect -
Question 12 of 75
12. Question
A systems administrator received a notification that a system is performing slowly. When running the top command, the systems administrator can see the following values:
Which of the following commands will the administrator most likely run NEXT?CorrectIncorrect -
Question 13 of 75
13. Question
Which of the following technologies provides load balancing, encryption, and observability in containerized environments?
CorrectIncorrect -
Question 14 of 75
14. Question
A development team asks an engineer to guarantee the persistency of journal log files across system reboots. Which of the following commands would accomplish this task?
CorrectIncorrect -
Question 15 of 75
15. Question
A systems administrator is receiving tickets from users who cannot reach the application app that should be listening on port 9443/tcp on a Linux server.
To troubleshoot the issue, the systems administrator runs netstat and receives the following output:
Based on the information above, which of the following is causing the issue?CorrectIncorrect -
Question 16 of 75
16. Question
A systems administrator is troubleshooting a connectivity issue pertaining to access to a system named db.example.com. The system IP address should be 192.168.20.88. The administrator issues the dig command and receives the following output:
The administrator runs grep db.example.com /etc/hosts and receives the following output:
Given this scenario, which of the following should the administrator do to address this issue?CorrectIncorrect -
Question 17 of 75
17. Question
Users have been unable to reach www.comptia.org from a Linux server. A systems administrator is troubleshooting the issue and does the following:
Based on the information above, which of the following is causing the issue?CorrectIncorrect -
Question 18 of 75
18. Question
A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following commands will allow the technician to execute those services and continue deploying other microservices within the same terminal section?
CorrectIncorrect -
Question 19 of 75
19. Question
A Linux administrator was notified that a virtual server has an I/O bottleneck. The Linux administrator analyzes the following output:
Given there is a single CPU in the sever, which of the following is causing the slowness?CorrectIncorrect -
Question 20 of 75
20. Question
Employees in the finance department are having trouble accessing the file /opt/work/file. All IT employees can read and write the file. Systems administrator reviews the following output:
Which of the following commands would permanently fix the access issue while limiting access to IT and finance department employees?CorrectIncorrect -
Question 21 of 75
21. Question
A Linux engineer needs to create a custom script, cleanup.sh, to run at boot as part of the system services. Which of the following processes would accomplish this task?
CorrectIncorrect -
Question 22 of 75
22. Question
A Linux system is failing to boot. The following error is displayed in the serial console:
[[1;33mDEPEND[Om] Dependency failed for /data.
[[1;33mDEPEND[Om] Dependency failed for Local File Systems
…
Welcome to emergency mode! After logging in, type “journalctl -xb” to viewsystem logs, “systemctl reboot” to reboot, “systemctl default” to try again to boot into default mode.
Give root password for maintenance
(or type Control-D to continue}
Which of the following files will need to be modified for this server to be able to boot again?CorrectIncorrect -
Question 23 of 75
23. Question
A systems administrator frequently connects to a remote host via SSH and a non-standard port. The systems administrator would like to avoid passing the port parameter on the command line every time. Which of the following files can be used to set a different port value for that host?
CorrectIncorrect -
Question 24 of 75
24. Question
A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?
CorrectIncorrect -
Question 25 of 75
25. Question
A cloud engineer needs to check the link status of a network interface named eth1 in a Linux server. Which of the following commands can help to achieve the goal?
CorrectIncorrect -
Question 26 of 75
26. Question
A systems administrator is tasked with setting up key-based SSH authentication. In which of the following locations should the administrator place the public keys for the server?
CorrectIncorrect -
Question 27 of 75
27. Question
A Linux administrator needs to create a new user named user02. However, user02 must be in a different home directory, which is under /comptia/projects. Which of the following commands will accomplish this task?
CorrectIncorrect -
Question 28 of 75
28. Question
One leg of an LVM-mirrored volume failed due to the underlying physical volume, and a systems administrator is troubleshooting the issue. The following output has been provided:
Given this scenario, which of the following should the administrator do to recover this volume?CorrectIncorrect -
Question 29 of 75
29. Question
A systems administrator created a new Docker image called test. After building the image, the administrator forgot to version the release. Which of the following will allow the administrator to assign the v1 version to the image?
CorrectIncorrect -
Question 30 of 75
30. Question
A Linux systems administrator receives a notification that one of the server’s filesystems is full. Which of the following commands would help the administrator to identify this filesystem?
CorrectIncorrect -
Question 31 of 75
31. Question
A systems administrator is notified that the mysqld process stopped unexpectedly. The systems administrator issues the following command:
sudo grep –i -r ‘out of memory’ /var/log
The output of the command shows the following:
kernel: Out of memory: Kill process 9112 (mysqld) score 511 or sacrifice child.
Which of the following commands should the systems administrator execute NEXT to troubleshoot this issue?CorrectIncorrect -
Question 32 of 75
32. Question
Users have reported that the interactive sessions were lost on a Linux server. A Linux administrator verifies the server was switched to rescue.target mode for maintenance. Which of the following commands will restore the server to its usual target?
CorrectIncorrect -
Question 33 of 75
33. Question
A systems administrator was tasked with assigning the temporary IP address/netmask 192.168.168.1/255.255.255.255 to the interface eth0 of a Linux server.
When adding the address, the following error appears:
# ip address add 192.168.168.1/33 dev eth0
Error: any valid prefix is expected rather than “192.168.168.1/33”.
Based on the command and its output above, which of the following is the cause of the issue?CorrectIncorrect -
Question 34 of 75
34. Question
A Linux administrator has been tasked with installing the most recent versions of packages on a RPM-based OS. Which of the following commands will accomplish this task?
CorrectIncorrect -
Question 35 of 75
35. Question
A Linux user reported the following error after trying to connect to the system remotely: ssh: connect to host 10.0.1.10 port 22: Resource temporarily unavailable
The Linux systems administrator executed the following commands in the Linux system while trying to diagnose this issue:
Which of the following commands will resolve this issue?CorrectIncorrect -
Question 36 of 75
36. Question
A Linux administrator needs to expand a volume group using a new disk. Which of the following options presents the correct sequence of commands to accomplish the task?
CorrectIncorrect -
Question 37 of 75
37. Question
Which of the following directories is the mount point in a UEFI system?
CorrectIncorrect -
Question 38 of 75
38. Question
A Linux administrator copied a Git repository locally, created a feature branch, and committed some changes to the feature branch. Which of the following Git actions should the Linux administrator use to publish the changes to the main branch of the remote repository?
CorrectIncorrect -
Question 39 of 75
39. Question
A Linux administrator needs to obtain a list of all volumes that are part of a volume group. Which of the following commands should the administrator use to accomplish this task?
CorrectIncorrect -
Question 40 of 75
40. Question
A Linux administrator is adding a new configuration file to a Git repository. Which of the following describes the correct order of Git commands to accomplish the task successfully?
CorrectIncorrect -
Question 41 of 75
41. Question
A systems administrator is tasked with mounting a USB drive on a system. The USB drive has a single partition, and it has been mapped by the system to the device /dev/sdb. Which of the following commands will mount the USB to /media/usb?
CorrectIncorrect -
Question 42 of 75
42. Question
User1 is a member of the accounting group. Members of this group need to be able to execute but not make changes to a script maintained by User2. The script should not be accessible to other users or groups. Which of the following will give proper access to the script?
CorrectIncorrect -
Question 43 of 75
43. Question
A systems administrator needs to verify whether the built container has the app.go file in its root directory. Which of the following can the administrator use to verify the root directory has this file?
CorrectIncorrect -
Question 44 of 75
44. Question
A Linux administrator is reviewing changes to a configuration file that includes the following section:
The Linux administrator is trying to select the appropriate syntax formatter to correct any issues with the configuration file. Which of the following should the syntax formatter support to meet this goal?CorrectIncorrect -
Question 45 of 75
45. Question
A systems administrator is investigating an issue in which one of the servers is not booting up properly. The journalctl entries show the following:
Which of the following will allow the administrator to boot the Linux system to normal mode quickly?CorrectIncorrect -
Question 46 of 75
46. Question
A Linux systems administrator receives reports from various users that an application hosted on a server has stopped responding at similar times for several days in a row. The administrator logs in to the system and obtains the following output:
Output 1:
Output 2:
Output 3:
Which of the following should the administrator do to provide the BEST solution for the reported issue?CorrectIncorrect -
Question 47 of 75
47. Question
A Linux administrator found many containers in an exited state. Which of the following commands will allow the administrator to clean up the containers in an exited state?
CorrectIncorrect -
Question 48 of 75
48. Question
A Linux administrator reviews a set of log output files and needs to identify files that contain any occurrence of the word denied. All log files containing entries in uppercase or lowercase letters should be included in the list. Which of the following commands should the administrator use to accomplish this task?
CorrectIncorrect -
Question 49 of 75
49. Question
A cloud engineer needs to launch a container named web-01 in background mode. Which of the following commands will accomplish this task?
CorrectIncorrect -
Question 50 of 75
50. Question
A Linux administrator is providing a new Nginx image from the registry to local cache. Which of the following commands would allow this to happen?
CorrectIncorrect -
Question 51 of 75
51. Question
Which of the following tools is BEST suited to orchestrate a large number of containers across many different servers?
CorrectIncorrect -
Question 52 of 75
52. Question
A Linux administrator is installing a web server and needs to check whether web traffic has already been allowed through the firewall. Which of the following commands should the administrator use to accomplish this task?
CorrectIncorrect -
Question 53 of 75
53. Question
A systems administrator is encountering performance issues. The administrator runs a command with the following output:
09:10:18 up 457 days, 32min, 5 users, load average: 4.22 6.63 5.58
The Linux server has the following system properties:CPU 4 vCPU –
Memory: 50GB –
Which of the following accurately describes this situation?CorrectIncorrect -
Question 54 of 75
54. Question
A Linux administrator has set up a new DNS forwarder and is configuring all internal servers to use the new forwarder to look up external DNS requests. The administrator needs to modify the firewall on the server for the DNS forwarder to allow the internal servers to communicate to it and make the changes persistent between server reboots. Which of the following commands should be run on the DNS forwarder server to accomplish this task?
CorrectIncorrect -
Question 55 of 75
55. Question
A Linux engineer receives reports that files created within a certain group are being modified by users who are not group members. The engineer wants to reconfigure the server so that only file owners and group members can modify new files by default. Which of the following commands would accomplish this task?
CorrectIncorrect -
Question 56 of 75
56. Question
A Linux systems administrator needs to copy files and directories from Server A to Server B. Which of the following commands can be used for this purpose?
CorrectIncorrect -
Question 57 of 75
57. Question
A Linux administrator rebooted a server. Users then reported some of their files were missing. After doing some troubleshooting, the administrator found one of the filesystems was missing. The filesystem was not listed in /etc/fstab and might have been mounted manually by someone prior to reboot. Which of the following would prevent this issue from reoccurring in the future?
CorrectIncorrect -
Question 58 of 75
58. Question
Joe, a user, is unable to log in to the Linux system. Given the following output:
Which of the following commands would resolve the issue?CorrectIncorrect -
Question 59 of 75
59. Question
A developer reported an incident involving the application configuration file /etc/httpd/conf/httpd.conf that is missing from the server. Which of the following identifies the RPM package that installed the configuration file?
CorrectIncorrect -
Question 60 of 75
60. Question
Users have been unable to save documents to /home/tmp/temp and have been receiving the following error:
Path not found –
A junior technician checks the locations and sees that /home/tmp/tempa was accidentally created instead of /home/tmp/temp. Which of the following commands should the technician use to fix this issue?CorrectIncorrect -
Question 61 of 75
61. Question
A Linux administrator has logged in to a server for the first time and needs to know which services are allowed through the firewall. Which of the following options will return the results for which the administrator is looking?
CorrectIncorrect -
Question 62 of 75
62. Question
After installing a new version of a package, a systems administrator notices a new version of the corresponding .service file was installed. In order to use the new version of the .service file, which of the following commands must be issued FIRST?
CorrectIncorrect -
Question 63 of 75
63. Question
Which of the following commands is used to configure the default permissions for new files?
CorrectIncorrect -
Question 64 of 75
64. Question
A Linux administrator needs to connect securely to a remote server in order to install application software. Which of the following commands would allow this connection?
CorrectIncorrect -
Question 65 of 75
65. Question
In order to copy data from another VLAN, a systems administrator wants to temporarily assign IP address 10.0.6.5/24 to the newly added network interface enpls0f1. Which of the following commands should the administrator run to achieve the goal?
CorrectIncorrect -
Question 66 of 75
66. Question
A Linux engineer needs to download a ZIP file and wants to set the nice value to -10 for this new process. Which of the following commands will help to accomplish the task?
CorrectIncorrect -
Question 67 of 75
67. Question
Which of the following enables administrators to configure and enforce MFA on a Linux system?
CorrectIncorrect -
Question 68 of 75
68. Question
A database administrator requested the installation of a custom database on one of the servers. Which of the following should the Linux administrator configure so the requested packages can be installed?
CorrectIncorrect -
Question 69 of 75
69. Question
A systems administrator has been unable to terminate a process. Which of the following should the administrator use to forcibly stop the process?
CorrectIncorrect -
Question 70 of 75
70. Question
In which of the following filesystems are system logs commonly stored?
CorrectIncorrect -
Question 71 of 75
71. Question
A systems administrator is compiling a report containing information about processes that are listening on the network ports of a Linux server. Which of the following commands will allow the administrator to obtain the needed information?
CorrectIncorrect -
Question 72 of 75
72. Question
At what point is the Internal Certificate Authority (ICA) created?
CorrectIncorrect -
Question 73 of 75
73. Question
Using AD Query, the security gateway connections to the Active Directory Domain Controllers using what protocol?
CorrectIncorrect -
Question 74 of 75
74. Question
Rugged appliances are small appliances with ruggedized hardware and like Quantum Spark appliance they use which operating system?
CorrectIncorrect -
Question 75 of 75
75. Question
What is the main objective when using Application Control?
CorrectIncorrect