You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CompTIA Linux+ Practice Test 2 "
0 of 65 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CompTIA Linux+ (XK0-004)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Answered
Review
Question 1 of 65
1. Question
When cloning a repository with git clone, you need to change the name of the remote so that it is not called origin. Which option can be added to git clone to accomplish this task?
Correct
Using the –origin or -o option enables the name to be changed instead of the default of origin. The other choices are not options with git clone.
Incorrect
Using the –origin or -o option enables the name to be changed instead of the default of origin. The other choices are not options with git clone.
Unattempted
Using the –origin or -o option enables the name to be changed instead of the default of origin. The other choices are not options with git clone.
Question 2 of 65
2. Question
You are using the route command to view routes. However, name resolution is taking a long time and causing delay in the response from the route command. Which option to route can be added to cause it to not perform name resolution?
Correct
The -n option causes route to use numeric values only, performing no name resolution. This option is useful for the scenario described. The -e option causes the output to be in netstat format. There is no -d or -f option for the route command.
Incorrect
The -n option causes route to use numeric values only, performing no name resolution. This option is useful for the scenario described. The -e option causes the output to be in netstat format. There is no -d or -f option for the route command.
Unattempted
The -n option causes route to use numeric values only, performing no name resolution. This option is useful for the scenario described. The -e option causes the output to be in netstat format. There is no -d or -f option for the route command.
Question 3 of 65
3. Question
You need to disable the ability to reboot the Linux computer using the Ctrl+Alt+Del key combination. Within which file will you find the configuration for this key combination?
Correct
The /etc/inittab file contains a line similar to ca:12345:ctrlaltdel:/sbin/ shutdown -t1 -a -r now. Commenting out this line with a pound sign (#) will disable this key combination after restarting the system.
Incorrect
The /etc/inittab file contains a line similar to ca:12345:ctrlaltdel:/sbin/ shutdown -t1 -a -r now. Commenting out this line with a pound sign (#) will disable this key combination after restarting the system.
Unattempted
The /etc/inittab file contains a line similar to ca:12345:ctrlaltdel:/sbin/ shutdown -t1 -a -r now. Commenting out this line with a pound sign (#) will disable this key combination after restarting the system.
Question 4 of 65
4. Question
Which file is used to provide a list of users that can add and delete cron jobs?
Correct
The /etc/cron.allow file is a list of users who have permission to create and remove their own cron jobs. The /etc/crontab file is used to store cron jobs. The other files do not exist.
Incorrect
The /etc/cron.allow file is a list of users who have permission to create and remove their own cron jobs. The /etc/crontab file is used to store cron jobs. The other files do not exist.
Unattempted
The /etc/cron.allow file is a list of users who have permission to create and remove their own cron jobs. The /etc/crontab file is used to store cron jobs. The other files do not exist.
Question 5 of 65
5. Question
When working with a CentOS 6 system, which command is used to create the initial RAM disk?
Correct
The dracut command is used to create the initial RAM disk for newer systems and has replaced the legacy mkinitrd command used for the same purpose.
Incorrect
The dracut command is used to create the initial RAM disk for newer systems and has replaced the legacy mkinitrd command used for the same purpose.
Unattempted
The dracut command is used to create the initial RAM disk for newer systems and has replaced the legacy mkinitrd command used for the same purpose.
Question 6 of 65
6. Question
When working in a virtual server environment, which column within iostat output shows the amount (percentage) of time spent in an involuntary wait scenario due to the hypervisor?
Correct
The steal column shows the percentage of time that was spent waiting due to the hypervisor stealing cycles for another virtual processor and can be used with infrastructure automation to indicate that additional CPU resources need to be deployed.
Incorrect
The steal column shows the percentage of time that was spent waiting due to the hypervisor stealing cycles for another virtual processor and can be used with infrastructure automation to indicate that additional CPU resources need to be deployed.
Unattempted
The steal column shows the percentage of time that was spent waiting due to the hypervisor stealing cycles for another virtual processor and can be used with infrastructure automation to indicate that additional CPU resources need to be deployed.
Question 7 of 65
7. Question
You have replaced a device on the network but used the IP from another active device. Which command can be run to remove the MAC address entry from your computer so that it performs the address resolution again?
Correct
Because youÂ’re working with MAC addresses, the arp command will be used. The -d option removes or deletes an ARP entry, which would be appropriate here so that the MAC address resolution occurs again. The netstat command will not be used for this purpose. The hostname and dig commands work with name resolution but not for MAC addresses or the ARP table.
Incorrect
Because youÂ’re working with MAC addresses, the arp command will be used. The -d option removes or deletes an ARP entry, which would be appropriate here so that the MAC address resolution occurs again. The netstat command will not be used for this purpose. The hostname and dig commands work with name resolution but not for MAC addresses or the ARP table.
Unattempted
Because youÂ’re working with MAC addresses, the arp command will be used. The -d option removes or deletes an ARP entry, which would be appropriate here so that the MAC address resolution occurs again. The netstat command will not be used for this purpose. The hostname and dig commands work with name resolution but not for MAC addresses or the ARP table.
Question 8 of 65
8. Question
Within which directory are the predefined zones for firewalld?
Correct
The directory /usr/lib/firewalld/zones/ contains predefined zones for use with firewalld. The files are copied to /etc/firewalld/zones/ when modified.
Incorrect
The directory /usr/lib/firewalld/zones/ contains predefined zones for use with firewalld. The files are copied to /etc/firewalld/zones/ when modified.
Unattempted
The directory /usr/lib/firewalld/zones/ contains predefined zones for use with firewalld. The files are copied to /etc/firewalld/zones/ when modified.
Question 9 of 65
9. Question
Which of the following commands schedules a series of commands to execute one hour from now?
Correct
The at command is used to run a series of commands that you enter. Unlike cron, you can schedule commands from the command line to be executed in the same order entered rather than having to create a specific script for the commands. The syntax shown in option B sets the time to be one hour from now.
Incorrect
The at command is used to run a series of commands that you enter. Unlike cron, you can schedule commands from the command line to be executed in the same order entered rather than having to create a specific script for the commands. The syntax shown in option B sets the time to be one hour from now.
Unattempted
The at command is used to run a series of commands that you enter. Unlike cron, you can schedule commands from the command line to be executed in the same order entered rather than having to create a specific script for the commands. The syntax shown in option B sets the time to be one hour from now.
Question 10 of 65
10. Question
If youÂ’d like a value set with the sysctl command to take effect on boot, within which file should you place the variable and its value?
Correct
Variables and values placed in /etc/sysctl.conf will take effect on boot. The other files listed are not valid.
Incorrect
Variables and values placed in /etc/sysctl.conf will take effect on boot. The other files listed are not valid.
Unattempted
Variables and values placed in /etc/sysctl.conf will take effect on boot. The other files listed are not valid.
Question 11 of 65
11. Question
If you need to temporarily reconfigure all locale variables and settings for a given session, which environment variable can be used?
Correct
The LC_ALL variable can be used to set environment variables for the locale and will override others. This can be used when there is a need for a temporary change. The other variables listed here are not used for this purpose and are not created by default.
Incorrect
The LC_ALL variable can be used to set environment variables for the locale and will override others. This can be used when there is a need for a temporary change. The other variables listed here are not used for this purpose and are not created by default.
Unattempted
The LC_ALL variable can be used to set environment variables for the locale and will override others. This can be used when there is a need for a temporary change. The other variables listed here are not used for this purpose and are not created by default.
Question 12 of 65
12. Question
When looking to parse the output of the ip command, which option can be set to remove newlines such that the output could be piped to the grep command?
Correct
The -o option removes newlines from the output, thereby making the output more suitable for the grep command. The -l option specifies the number of loops for the ip addr flush command. The -f option specifies the protocol family. There is no -n option.
Incorrect
The -o option removes newlines from the output, thereby making the output more suitable for the grep command. The -l option specifies the number of loops for the ip addr flush command. The -f option specifies the protocol family. There is no -n option.
Unattempted
The -o option removes newlines from the output, thereby making the output more suitable for the grep command. The -l option specifies the number of loops for the ip addr flush command. The -f option specifies the protocol family. There is no -n option.
Question 13 of 65
13. Question
You need to set a bootloader password for GRUB. To do so, which of the following configuration options should be set in /boot/grub/grub.conf?
Correct
The password configuration option is set in /boot/grub/grub.conf. The other options shown for this question are not valid for the scenario.
Incorrect
The password configuration option is set in /boot/grub/grub.conf. The other options shown for this question are not valid for the scenario.
Unattempted
The password configuration option is set in /boot/grub/grub.conf. The other options shown for this question are not valid for the scenario.
Question 14 of 65
14. Question
You need to delete a user from the system, including their home directory. Which of the following commands accomplishes this task?
Correct
The userdel command is used for this purpose, and the -r option (lowercase) deletes both the home directory and mail spool files. The -R (uppercase) option informs the userdel command to use a chroot directory.
Incorrect
The userdel command is used for this purpose, and the -r option (lowercase) deletes both the home directory and mail spool files. The -R (uppercase) option informs the userdel command to use a chroot directory.
Unattempted
The userdel command is used for this purpose, and the -r option (lowercase) deletes both the home directory and mail spool files. The -R (uppercase) option informs the userdel command to use a chroot directory.
Question 15 of 65
15. Question
Which of the following options to modprobe will show the dependencies for a module?
Correct
The –show-depends option displays the dependencies for a given module. The other options are not valid for the modprobe command.
Incorrect
The –show-depends option displays the dependencies for a given module. The other options are not valid for the modprobe command.
Unattempted
The –show-depends option displays the dependencies for a given module. The other options are not valid for the modprobe command.
Question 16 of 65
16. Question
A set of commands to execute on a client node is an example of which type of infrastructure automation?
Correct
A procedure is one or more commands that are executed on a client node as part of infrastructure automation.
Incorrect
A procedure is one or more commands that are executed on a client node as part of infrastructure automation.
Unattempted
A procedure is one or more commands that are executed on a client node as part of infrastructure automation.
Question 17 of 65
17. Question
Which option to the arp command creates a new entry for a given IP address to MAC address pair?
Correct
The -s option creates an ARP table entry. The -d option removes an entry. The -c and –add options do not exist.
Incorrect
The -s option creates an ARP table entry. The -d option removes an entry. The -c and –add options do not exist.
Unattempted
The -s option creates an ARP table entry. The -d option removes an entry. The -c and –add options do not exist.
Question 18 of 65
18. Question
Assuming that the output from the sestatus command indicates that SELinux is in Permissive mode, which of the following commands is used to change the mode to Enforcing?
Correct
The setenforce command is used for this purpose and can be given an argument of the number 1 or the word Enforcing to enable Enforcing mode. This can be verified with the sestatus command.
Incorrect
The setenforce command is used for this purpose and can be given an argument of the number 1 or the word Enforcing to enable Enforcing mode. This can be verified with the sestatus command.
Unattempted
The setenforce command is used for this purpose and can be given an argument of the number 1 or the word Enforcing to enable Enforcing mode. This can be verified with the sestatus command.
Question 19 of 65
19. Question
Which of the following commands changes a group called DomainAdmins to DomainUsers?
Correct
The groupmod command is used for this purpose, and the -n option is used to change the group name. The other commands listed do not exist.
Incorrect
The groupmod command is used for this purpose, and the -n option is used to change the group name. The other commands listed do not exist.
Unattempted
The groupmod command is used for this purpose, and the -n option is used to change the group name. The other commands listed do not exist.
Question 20 of 65
20. Question
Which of the following commands mounts /dev/sda1 in the /boot partition?
Correct
The format for the mount command is [partition] [target], thereby making option C correct. The other options are not valid because the arguments are in the wrong order
Incorrect
The format for the mount command is [partition] [target], thereby making option C correct. The other options are not valid because the arguments are in the wrong order
Unattempted
The format for the mount command is [partition] [target], thereby making option C correct. The other options are not valid because the arguments are in the wrong order
Question 21 of 65
21. Question
Which character sequence is used to indicate the end of an individual clause within a case statement in a bash script?
Correct
Double semicolons are used to indicate the end of an individual clause within a Bash script. The other sequences shown do not accomplish the task described.
Incorrect
Double semicolons are used to indicate the end of an individual clause within a Bash script. The other sequences shown do not accomplish the task described.
Unattempted
Double semicolons are used to indicate the end of an individual clause within a Bash script. The other sequences shown do not accomplish the task described.
Question 22 of 65
22. Question
Which option to tcpdump displays a list of available interfaces on which tcpdump can operate?
Correct
The -D option lists the interfaces on a given computer. The -d option dumps compiled matching code, and -i selects an interface. There is no -a option.
Incorrect
The -D option lists the interfaces on a given computer. The -d option dumps compiled matching code, and -i selects an interface. There is no -a option.
Unattempted
The -D option lists the interfaces on a given computer. The -d option dumps compiled matching code, and -i selects an interface. There is no -a option.
Question 23 of 65
23. Question
Your organization uses ssh-agent for authentication assistance with SSH. Which command can be used to add a private key to ssh-agent?
Correct
The ssh-add command is used for this purpose. The other commands shown do not exist.
Incorrect
The ssh-add command is used for this purpose. The other commands shown do not exist.
Unattempted
The ssh-add command is used for this purpose. The other commands shown do not exist.
Question 24 of 65
24. Question
Within which directory would you find a list of files corresponding to the users who have current cron jobs on the system?
Correct
The /var/spool/cron/crontabs directory contains a file for each user that currently has one or more cron jobs or entries. Note that the other files listed here are not valid for this purpose.
Incorrect
The /var/spool/cron/crontabs directory contains a file for each user that currently has one or more cron jobs or entries. Note that the other files listed here are not valid for this purpose.
Unattempted
The /var/spool/cron/crontabs directory contains a file for each user that currently has one or more cron jobs or entries. Note that the other files listed here are not valid for this purpose.
Question 25 of 65
25. Question
Which of the following commands changes the boot order for the next boot?
Correct
The -n option changes the boot order for the next boot only and boots from the specified partition. The -b along with -B modifies and then deletes the option. The -o option sets the boot order. The -c option creates a boot number.
Incorrect
The -n option changes the boot order for the next boot only and boots from the specified partition. The -b along with -B modifies and then deletes the option. The -o option sets the boot order. The -c option creates a boot number.
Unattempted
The -n option changes the boot order for the next boot only and boots from the specified partition. The -b along with -B modifies and then deletes the option. The -o option sets the boot order. The -c option creates a boot number.
Question 26 of 65
26. Question
Which of the following commands removes a currently defined aliased command?
Correct
The unalias command is used to remove a previously defined alias. The rm command will remove regular files but not aliases. The other commands do not exist.
Incorrect
The unalias command is used to remove a previously defined alias. The rm command will remove regular files but not aliases. The other commands do not exist.
Unattempted
The unalias command is used to remove a previously defined alias. The rm command will remove regular files but not aliases. The other commands do not exist.
Question 27 of 65
27. Question
Which command can be used to print using a specially formatted string?
Correct
The printf command can be used to add special formatting to strings for printing. The echo command can be used somewhat for this purpose but is not as powerful at special-formatting capabilities as the printf command is. The other commands are not valid for this purpose.
Incorrect
The printf command can be used to add special formatting to strings for printing. The echo command can be used somewhat for this purpose but is not as powerful at special-formatting capabilities as the printf command is. The other commands are not valid for this purpose.
Unattempted
The printf command can be used to add special formatting to strings for printing. The echo command can be used somewhat for this purpose but is not as powerful at special-formatting capabilities as the printf command is. The other commands are not valid for this purpose.
Question 28 of 65
28. Question
Which option to nmap will cause it to always perform name resolution?
Correct
The -R option requires an attempt at name resolution be performed. The -n option does the opposite: it disables name resolution. There is no -b or -a option.
Incorrect
The -R option requires an attempt at name resolution be performed. The -n option does the opposite: it disables name resolution. There is no -b or -a option.
Unattempted
The -R option requires an attempt at name resolution be performed. The -n option does the opposite: it disables name resolution. There is no -b or -a option.
Question 29 of 65
29. Question
Which of the following commands is used to display information about the access control list for a given file?
Correct
The getfacl command is used to display access control list information for a file. The setfacl command is used to set this information. The other commands shown are not valid Linux commands.
Incorrect
The getfacl command is used to display access control list information for a file. The setfacl command is used to set this information. The other commands shown are not valid Linux commands.
Unattempted
The getfacl command is used to display access control list information for a file. The setfacl command is used to set this information. The other commands shown are not valid Linux commands.
Question 30 of 65
30. Question
Which command deletes an at job with an ID of 3?
Correct
The atrm command removes jobs given their ID. The ID can be obtained with the atq command. The atq and at -l commands shown will list jobs but not delete them. The rmat command is not valid.
Incorrect
The atrm command removes jobs given their ID. The ID can be obtained with the atq command. The atq and at -l commands shown will list jobs but not delete them. The rmat command is not valid.
Unattempted
The atrm command removes jobs given their ID. The ID can be obtained with the atq command. The atq and at -l commands shown will list jobs but not delete them. The rmat command is not valid.
Question 31 of 65
31. Question
You need to remove a series of files programmatically through a script. Which command can be used to remove these files?
Correct
The unlink command can be used to remove files and is sometimes faster than rm for simple uses. The other options are not valid.
Incorrect
The unlink command can be used to remove files and is sometimes faster than rm for simple uses. The other options are not valid.
Unattempted
The unlink command can be used to remove files and is sometimes faster than rm for simple uses. The other options are not valid.
Question 32 of 65
32. Question
Which bootloader can be used to boot from ISO with ISO9660 CD-ROMs?
Correct
ISOLINUX provides a means by which CD-ROMs formatted as ISO 9660 can be booted. ItÂ’s very common to have live CDs or rescue/recovery CDs that use ISOLINUX for boot. The other bootloaders are not valid for this purpose or donÂ’t exist.
Incorrect
ISOLINUX provides a means by which CD-ROMs formatted as ISO 9660 can be booted. ItÂ’s very common to have live CDs or rescue/recovery CDs that use ISOLINUX for boot. The other bootloaders are not valid for this purpose or donÂ’t exist.
Unattempted
ISOLINUX provides a means by which CD-ROMs formatted as ISO 9660 can be booted. ItÂ’s very common to have live CDs or rescue/recovery CDs that use ISOLINUX for boot. The other bootloaders are not valid for this purpose or donÂ’t exist.
Question 33 of 65
33. Question
Which of the following tests will determine if a file exists in the context of a shell script?
Correct
The -e option checks to ensure that a file exists and is typically used in the context of a conditional within a shell script. The other options may work within shell scripts but are not tests for file existence.
Incorrect
The -e option checks to ensure that a file exists and is typically used in the context of a conditional within a shell script. The other options may work within shell scripts but are not tests for file existence.
Unattempted
The -e option checks to ensure that a file exists and is typically used in the context of a conditional within a shell script. The other options may work within shell scripts but are not tests for file existence.
Question 34 of 65
34. Question
Which of the following commands provides a live traceroute of the route between two hosts, updating the information for each hop in near real-time?
Correct
The mtr command provides a unique way to view real-time information about each hop in a route between hosts. Both the traceroute and route commands are valid, but the options shown for each are not. There is no liveroute command.
Incorrect
The mtr command provides a unique way to view real-time information about each hop in a route between hosts. Both the traceroute and route commands are valid, but the options shown for each are not. There is no liveroute command.
Unattempted
The mtr command provides a unique way to view real-time information about each hop in a route between hosts. Both the traceroute and route commands are valid, but the options shown for each are not. There is no liveroute command.
Question 35 of 65
35. Question
You need to copy a file to a remote system, but that remote system does not have FTP or any other file-sharing services running. You have the ability to SSH into the server. Which of the following commands can be used for this purpose?
Correct
The scp command copies or transfers a file over SSH. The ncftp command cannot be used for this purpose. The other commands are not valid.
Incorrect
The scp command copies or transfers a file over SSH. The ncftp command cannot be used for this purpose. The other commands are not valid.
Unattempted
The scp command copies or transfers a file over SSH. The ncftp command cannot be used for this purpose. The other commands are not valid.
Question 36 of 65
36. Question
Which of the following commands can be used to prevent the root user from logging in at the console?
Correct
By overwriting /etc/securetty with an empty echo command, root will not be able to log in at the console directly. Of the other potential answers, option C removes /etc/securetty, the effect of which is to allow root to log in from anywhere.
Incorrect
By overwriting /etc/securetty with an empty echo command, root will not be able to log in at the console directly. Of the other potential answers, option C removes /etc/securetty, the effect of which is to allow root to log in from anywhere.
Unattempted
By overwriting /etc/securetty with an empty echo command, root will not be able to log in at the console directly. Of the other potential answers, option C removes /etc/securetty, the effect of which is to allow root to log in from anywhere.
Question 37 of 65
37. Question
Which of the following is used as a system-wide cron file?
Correct
The /etc/crontab file is a plain-text file that is treated as a system-wide cron file. As such, the file is generally not associated with any single user, and itÂ’s not necessary to run a special command after editing this file.
Incorrect
The /etc/crontab file is a plain-text file that is treated as a system-wide cron file. As such, the file is generally not associated with any single user, and itÂ’s not necessary to run a special command after editing this file.
Unattempted
The /etc/crontab file is a plain-text file that is treated as a system-wide cron file. As such, the file is generally not associated with any single user, and itÂ’s not necessary to run a special command after editing this file.
Question 38 of 65
38. Question
When using UEFI, which of the following files can be used as a bootloader?
Correct
Due to the decidedly insecure decisions made with the design of MicrosoftÂ’s UEFI, a shim is often needed to enable Linux to boot on a system with UEFI. The file shim.efi can be used as an initial bootloader for this purpose.
Incorrect
Due to the decidedly insecure decisions made with the design of MicrosoftÂ’s UEFI, a shim is often needed to enable Linux to boot on a system with UEFI. The file shim.efi can be used as an initial bootloader for this purpose.
Unattempted
Due to the decidedly insecure decisions made with the design of MicrosoftÂ’s UEFI, a shim is often needed to enable Linux to boot on a system with UEFI. The file shim.efi can be used as an initial bootloader for this purpose.
Question 39 of 65
39. Question
Which HTTP status code is returned when TraceEnable has been set to Off within Apache?
Correct
A “405, Method not allowed” response will be sent when TraceEnable is off. A 100 code is continue, while 302 is redirect and 200 is OK.
Incorrect
A “405, Method not allowed” response will be sent when TraceEnable is off. A 100 code is continue, while 302 is redirect and 200 is OK.
Unattempted
A “405, Method not allowed” response will be sent when TraceEnable is off. A 100 code is continue, while 302 is redirect and 200 is OK.
Question 40 of 65
40. Question
Which of the following values for the LANG environment variable will configure the system to bypass locale translations where possible?
Correct
Setting LANG=C is an alias for POSIX compatibility and will cause programs to bypass locale translations. The other options shown for LANG are not valid.
Incorrect
Setting LANG=C is an alias for POSIX compatibility and will cause programs to bypass locale translations. The other options shown for LANG are not valid.
Unattempted
Setting LANG=C is an alias for POSIX compatibility and will cause programs to bypass locale translations. The other options shown for LANG are not valid.
Question 41 of 65
41. Question
You are using a local RAID array and investigating a performance issue. When using mdadm in monitor mode, which option sets the polling interval?
Correct
The –delay option sets the interval between checks of array health. The argument value is in seconds. The other options shown are not valid.
Incorrect
The –delay option sets the interval between checks of array health. The argument value is in seconds. The other options shown are not valid.
Unattempted
The –delay option sets the interval between checks of array health. The argument value is in seconds. The other options shown are not valid.
Question 42 of 65
42. Question
You need to provide a special username and other parameters related to a specific host to which you connect using SSH. To which file should you add this information?
Correct
The file ~/.ssh/config is the appropriate location for this type of configuration information. Of the other answers, only ~/.ssh/known_hosts exists and contains public key information for hosts to which you have connected.
Incorrect
The file ~/.ssh/config is the appropriate location for this type of configuration information. Of the other answers, only ~/.ssh/known_hosts exists and contains public key information for hosts to which you have connected.
Unattempted
The file ~/.ssh/config is the appropriate location for this type of configuration information. Of the other answers, only ~/.ssh/known_hosts exists and contains public key information for hosts to which you have connected.
Question 43 of 65
43. Question
Within which directory will you find scripts that are scheduled to run through cron every 24 hours?
Correct
The /etc/cron.daily directory contains files such as scripts that are executed daily. There are corresponding cron.hourly, cron.weekly, and cron.monthly directories that run on their respective schedules as indicated by the name of the directory.
Incorrect
The /etc/cron.daily directory contains files such as scripts that are executed daily. There are corresponding cron.hourly, cron.weekly, and cron.monthly directories that run on their respective schedules as indicated by the name of the directory.
Unattempted
The /etc/cron.daily directory contains files such as scripts that are executed daily. There are corresponding cron.hourly, cron.weekly, and cron.monthly directories that run on their respective schedules as indicated by the name of the directory.
Question 44 of 65
44. Question
Which of the following commands, executed from within the UEFI shell, controls the boot configuration?
Correct
The bcfg command within the UEFI shell is used to configure bootloaders on a UEFI-based system. The command can accept various parameters to configure how the bootloader and kernel will load on boot. Of the other commands shown, grub-install is valid but not within the UEFI shell.
Incorrect
The bcfg command within the UEFI shell is used to configure bootloaders on a UEFI-based system. The command can accept various parameters to configure how the bootloader and kernel will load on boot. Of the other commands shown, grub-install is valid but not within the UEFI shell.
Unattempted
The bcfg command within the UEFI shell is used to configure bootloaders on a UEFI-based system. The command can accept various parameters to configure how the bootloader and kernel will load on boot. Of the other commands shown, grub-install is valid but not within the UEFI shell.
Question 45 of 65
45. Question
Which option to the git config command shows all of the configuration parameters that have been set?
Correct
The –list option shows the current configuration parameters for git. The other options do not exist as options for the git config command.
Incorrect
The –list option shows the current configuration parameters for git. The other options do not exist as options for the git config command.
Unattempted
The –list option shows the current configuration parameters for git. The other options do not exist as options for the git config command.
Question 46 of 65
46. Question
When viewing the results of a traceroute, you see !H. To what does !H refer?
Correct
The !H sequence indicates host unreachable. Network unreachable is !N.
Incorrect
The !H sequence indicates host unreachable. Network unreachable is !N.
Unattempted
The !H sequence indicates host unreachable. Network unreachable is !N.
Question 47 of 65
47. Question
You are using chmod in order to change several web-related files so that the web server/ public can read them. Which option should you add to the chmod command in order for the permissions to inherit to other files?
Correct
The -R option is used to indicate recursive behavior. Of the other options, only -v is valid and provides verbose output.
Incorrect
The -R option is used to indicate recursive behavior. Of the other options, only -v is valid and provides verbose output.
Unattempted
The -R option is used to indicate recursive behavior. Of the other options, only -v is valid and provides verbose output.
Question 48 of 65
48. Question
You are running a process in the background and need the process to continue after you log out. Which command should be used to ensure that the process continues even after logout?
Correct
The nohup command causes the SIGHUP signal to be ignored, thereby enacting the scenario required for this question. The other commands are not valid.
Incorrect
The nohup command causes the SIGHUP signal to be ignored, thereby enacting the scenario required for this question. The other commands are not valid.
Unattempted
The nohup command causes the SIGHUP signal to be ignored, thereby enacting the scenario required for this question. The other commands are not valid.
Question 49 of 65
49. Question
When running useradd, which option needs to be specified in order for the user’s home directory to be created?
Correct
The -m option causes the userÂ’s home directory to be created. By default, if this option isnÂ’t specified and CREATE_HOME has not been set, the home directory wonÂ’t be created. The -h option displays help text, and the other options shown are not valid.
Incorrect
The -m option causes the userÂ’s home directory to be created. By default, if this option isnÂ’t specified and CREATE_HOME has not been set, the home directory wonÂ’t be created. The -h option displays help text, and the other options shown are not valid.
Unattempted
The -m option causes the userÂ’s home directory to be created. By default, if this option isnÂ’t specified and CREATE_HOME has not been set, the home directory wonÂ’t be created. The -h option displays help text, and the other options shown are not valid.
Question 50 of 65
50. Question
Which of the following can be identified as an initial sector on a disk that stores information about the disk partitioning and operating system location?
Correct
The Master Boot Record, or MBR, is the first sector on a disk and contains information about the structure of the disk. If the MBR becomes corrupt, all data on the disk may be lost. The other options shown for this question are not valid.
Incorrect
The Master Boot Record, or MBR, is the first sector on a disk and contains information about the structure of the disk. If the MBR becomes corrupt, all data on the disk may be lost. The other options shown for this question are not valid.
Unattempted
The Master Boot Record, or MBR, is the first sector on a disk and contains information about the structure of the disk. If the MBR becomes corrupt, all data on the disk may be lost. The other options shown for this question are not valid.
Question 51 of 65
51. Question
Which character sequence should be used if you need to redirect STDERR to a file and append to the file?
Correct
The number 2 indicates STDERR redirection, and double greater-than signs indicate that the output will be appended rather than overwriting.
Incorrect
The number 2 indicates STDERR redirection, and double greater-than signs indicate that the output will be appended rather than overwriting.
Unattempted
The number 2 indicates STDERR redirection, and double greater-than signs indicate that the output will be appended rather than overwriting.
Question 52 of 65
52. Question
Assuming that policy routing has been enabled in the kernel, which option to the ping command can be used to mark the outgoing request appropriately in order to indicate that the packet should be processed according to a particular policy?
Correct
The -m option specifies how the packet should be marked or tagged. The -a option is an audible ping, and -p enables specification of custom padding. There is no -k option.
Incorrect
The -m option specifies how the packet should be marked or tagged. The -a option is an audible ping, and -p enables specification of custom padding. There is no -k option.
Unattempted
The -m option specifies how the packet should be marked or tagged. The -a option is an audible ping, and -p enables specification of custom padding. There is no -k option.
Question 53 of 65
53. Question
You have inserted a USB Bluetooth device into the computer. Which of the following commands is used to determine if the device was detected?
Correct
The lsusb command shows USB devices. When combined with grep -i (case insensitive), you can search for Bluetooth devices. The other options shown are not valid.
Incorrect
The lsusb command shows USB devices. When combined with grep -i (case insensitive), you can search for Bluetooth devices. The other options shown are not valid.
Unattempted
The lsusb command shows USB devices. When combined with grep -i (case insensitive), you can search for Bluetooth devices. The other options shown are not valid.
Question 54 of 65
54. Question
Which of the following commands can be used to obtain more information about a GUID partition table?
Correct
The gdisk command can be used to view GUIDs for a given partition. The other commands shown are not valid.
Incorrect
The gdisk command can be used to view GUIDs for a given partition. The other commands shown are not valid.
Unattempted
The gdisk command can be used to view GUIDs for a given partition. The other commands shown are not valid.
Question 55 of 65
55. Question
Which of the following commands locks out password-based login for a user but does not prevent other forms of login?
Correct
The usermod -L command locks an account by placing an ! in the encrypted password. If the user has another means to log in, such as with an SSH key, using usermod -L will not prevent their login.
Incorrect
The usermod -L command locks an account by placing an ! in the encrypted password. If the user has another means to log in, such as with an SSH key, using usermod -L will not prevent their login.
Unattempted
The usermod -L command locks an account by placing an ! in the encrypted password. If the user has another means to log in, such as with an SSH key, using usermod -L will not prevent their login.
Question 56 of 65
56. Question
When using PXE boot, which file must exist within /tftpboot on the TFTP server for the system that will use PXELINUX for its bootloader?
Correct
The file pxelinux.0 must exist within /tftpboot on the TFTP server in order for a system to use PXELINUX for booting. The other files are not valid or necessary for PXELINUX. Once booted, PXE boot can boot using an NFS-mounted filesystem where the filesystem is physically hosted on a different computer.
Incorrect
The file pxelinux.0 must exist within /tftpboot on the TFTP server in order for a system to use PXELINUX for booting. The other files are not valid or necessary for PXELINUX. Once booted, PXE boot can boot using an NFS-mounted filesystem where the filesystem is physically hosted on a different computer.
Unattempted
The file pxelinux.0 must exist within /tftpboot on the TFTP server in order for a system to use PXELINUX for booting. The other files are not valid or necessary for PXELINUX. Once booted, PXE boot can boot using an NFS-mounted filesystem where the filesystem is physically hosted on a different computer.
Question 57 of 65
57. Question
When working with infrastructure as code, you have received a file with a .yml extension. What is the likely format for the contents of this file?
Correct
A file with a .yml extension usually contains YAML. The question also gave a hint of infrastructure as code, where many tools use YAML for configuration and procedures.
Incorrect
A file with a .yml extension usually contains YAML. The question also gave a hint of infrastructure as code, where many tools use YAML for configuration and procedures.
Unattempted
A file with a .yml extension usually contains YAML. The question also gave a hint of infrastructure as code, where many tools use YAML for configuration and procedures.
Question 58 of 65
58. Question
When troubleshooting a possible issue with bad blocks on a disk, which option to fsck will report statistics such as CPU time used on completion of the fsck operation?
Correct
The -r option displays a report including CPU time and exit status about the justcompleted fsck operation. The -f option forces whatever operation is being requested, -s serializes fsck operations, and -l creates an exclusive flock.
Incorrect
The -r option displays a report including CPU time and exit status about the justcompleted fsck operation. The -f option forces whatever operation is being requested, -s serializes fsck operations, and -l creates an exclusive flock.
Unattempted
The -r option displays a report including CPU time and exit status about the justcompleted fsck operation. The -f option forces whatever operation is being requested, -s serializes fsck operations, and -l creates an exclusive flock.
Question 59 of 65
59. Question
Which option to setsebool writes the current values to disk so that they will be applied at next reboot?
Correct
The -P option makes the values persistent across reboots. The other options are not valid with setsebool
Incorrect
The -P option makes the values persistent across reboots. The other options are not valid with setsebool
Unattempted
The -P option makes the values persistent across reboots. The other options are not valid with setsebool
Question 60 of 65
60. Question
Which of the following will run a command called /usr/local/bin/changehome.sh as the www-data user when placed in /etc/crontab?
Correct
The format when adding a username places the username between the schedule and the command to run, thereby making option A correct. The other options shown for this question are invalid. In the case of option B, there is no schedule. In the case of options C and D, the schedule is incorrectly formatted.
Incorrect
The format when adding a username places the username between the schedule and the command to run, thereby making option A correct. The other options shown for this question are invalid. In the case of option B, there is no schedule. In the case of options C and D, the schedule is incorrectly formatted.
Unattempted
The format when adding a username places the username between the schedule and the command to run, thereby making option A correct. The other options shown for this question are invalid. In the case of option B, there is no schedule. In the case of options C and D, the schedule is incorrectly formatted.
Question 61 of 65
61. Question
Which option to grub-install will place the GRUB images into an alternate directory?
Correct
The –boot-directory option enables you to specify an alternate location for GRUB images rather than the default /boot. The other options shown for this question are not valid.
Incorrect
The –boot-directory option enables you to specify an alternate location for GRUB images rather than the default /boot. The other options shown for this question are not valid.
Unattempted
The –boot-directory option enables you to specify an alternate location for GRUB images rather than the default /boot. The other options shown for this question are not valid.
Question 62 of 65
62. Question
Which of the following files provides information on memory utilization including free memory, buffers, cache usage, and several additional items?
Correct
The file /proc/meminfo provides a wealth of information about memory usage and utilization. Much of this information is displayed by various commands, but the canonical source for those commands is usually found in this file. Of the other options, only /proc/cpuinfo is valid, and that file provides information on the CPU(s) for the computer.
Incorrect
The file /proc/meminfo provides a wealth of information about memory usage and utilization. Much of this information is displayed by various commands, but the canonical source for those commands is usually found in this file. Of the other options, only /proc/cpuinfo is valid, and that file provides information on the CPU(s) for the computer.
Unattempted
The file /proc/meminfo provides a wealth of information about memory usage and utilization. Much of this information is displayed by various commands, but the canonical source for those commands is usually found in this file. Of the other options, only /proc/cpuinfo is valid, and that file provides information on the CPU(s) for the computer.
Question 63 of 65
63. Question
When working with AppArmor, within which directory are profiles located?
Correct
The directory /etc/apparmor.d/ is the location in which profiles are located.
Incorrect
The directory /etc/apparmor.d/ is the location in which profiles are located.
Unattempted
The directory /etc/apparmor.d/ is the location in which profiles are located.
Question 64 of 65
64. Question
Which of the following commands produces a report listing the last password change date for all users on the system?
Correct
The passwd command will be used for this purpose. The -a option displays all users but requires the use of -S to indicate status. The -S option alone will not produce a report for all users, and the –all option is an alias for -a.
Incorrect
The passwd command will be used for this purpose. The -a option displays all users but requires the use of -S to indicate status. The -S option alone will not produce a report for all users, and the –all option is an alias for -a.
Unattempted
The passwd command will be used for this purpose. The -a option displays all users but requires the use of -S to indicate status. The -S option alone will not produce a report for all users, and the –all option is an alias for -a.
Question 65 of 65
65. Question
When using a shim for booting a UEFI-based system, which of the following files is loaded after shim.efi?
Correct
The shim.efi bootloader loads another bootloader, which is grubx64.efi by default. The other options are not valid filenames for the purpose described.
Incorrect
The shim.efi bootloader loads another bootloader, which is grubx64.efi by default. The other options are not valid filenames for the purpose described.
Unattempted
The shim.efi bootloader loads another bootloader, which is grubx64.efi by default. The other options are not valid filenames for the purpose described.
X
Use Page numbers below to navigate to other practice tests