You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-2 (201-450) Practice Test 2 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-2 (201-450)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
You have downloaded a source code archive named “program.tar.gz“ and need to decompress it before compiling. Which command should you use to unzip the file?
Correct
Correct Answer: D. gzip -d program.tar.gz Explanation: The correct command to decompress a file that has been compressed with gzip is gzip -d program.tar.gz. This command removes the .gz extension, leaving you with the uncompressed file. Option A is incorrect because ′gunzip′ is used for files with the .gz extension, not tar.gz archives. The correct command for tar.gz archives is ′tar -xf′. Option B is incorrect because it uses the ′tar′ command without the correct options to decompress a tar.gz archive. The correct options for decompressing and extracting are ′tar -xf′. Option C is incorrect because ′unzip′ is used for zip archives, not tar.gz archives. The correct command for tar.gz archives is ′tar -xf′.
Incorrect
Correct Answer: D. gzip -d program.tar.gz Explanation: The correct command to decompress a file that has been compressed with gzip is gzip -d program.tar.gz. This command removes the .gz extension, leaving you with the uncompressed file. Option A is incorrect because ′gunzip′ is used for files with the .gz extension, not tar.gz archives. The correct command for tar.gz archives is ′tar -xf′. Option B is incorrect because it uses the ′tar′ command without the correct options to decompress a tar.gz archive. The correct options for decompressing and extracting are ′tar -xf′. Option C is incorrect because ′unzip′ is used for zip archives, not tar.gz archives. The correct command for tar.gz archives is ′tar -xf′.
Unattempted
Correct Answer: D. gzip -d program.tar.gz Explanation: The correct command to decompress a file that has been compressed with gzip is gzip -d program.tar.gz. This command removes the .gz extension, leaving you with the uncompressed file. Option A is incorrect because ′gunzip′ is used for files with the .gz extension, not tar.gz archives. The correct command for tar.gz archives is ′tar -xf′. Option B is incorrect because it uses the ′tar′ command without the correct options to decompress a tar.gz archive. The correct options for decompressing and extracting are ′tar -xf′. Option C is incorrect because ′unzip′ is used for zip archives, not tar.gz archives. The correct command for tar.gz archives is ′tar -xf′.
Question 2 of 60
2. Question
A system administrator wants to launch the top command but wants it to only refresh every 10 seconds, rather than the default. Which command should the administrator use to achieve this?
Correct
Correct Answer: A. top -d 10 Explanation: Using top -d 10 will update the top command display every 10 seconds. The -d option specifies the delay between screen updates. Option B is incorrect. top does not have a -r option for specifying refresh rates. Option C is incorrect. While top does have a -s option, it‘s related to “secure mode“ and not setting refresh intervals. Option D is incorrect. top does not have a -f option for setting the refresh rate.
Incorrect
Correct Answer: A. top -d 10 Explanation: Using top -d 10 will update the top command display every 10 seconds. The -d option specifies the delay between screen updates. Option B is incorrect. top does not have a -r option for specifying refresh rates. Option C is incorrect. While top does have a -s option, it‘s related to “secure mode“ and not setting refresh intervals. Option D is incorrect. top does not have a -f option for setting the refresh rate.
Unattempted
Correct Answer: A. top -d 10 Explanation: Using top -d 10 will update the top command display every 10 seconds. The -d option specifies the delay between screen updates. Option B is incorrect. top does not have a -r option for specifying refresh rates. Option C is incorrect. While top does have a -s option, it‘s related to “secure mode“ and not setting refresh intervals. Option D is incorrect. top does not have a -f option for setting the refresh rate.
Question 3 of 60
3. Question
Alex, a system administrator, needs to configure advanced network settings, including routing and interface parameters, on a Linux server. Which utility should Alex use for this task?
Correct
Correct Answer: B. ip Explanation: The ip command is a versatile tool for configuring network interfaces, routing tables, and policy routing on Linux systems. It provides more advanced functionality than the deprecated ifconfig and route commands. Option A is incorrect. ifconfig is a traditional tool for basic interface configuration but is considered deprecated in favor of ip. Option C is incorrect. The ′route′ command is used for displaying and modifying the IP routing table, not for comprehensive interface and routing configuration. Option D is incorrect. ′netstat′ is used for displaying various network-related information, such as routing tables and interface statistics, but it is not primarily used for configuring interfaces or routing. The ′ip′ command has largely replaced ′netstat′ for these tasks.
Incorrect
Correct Answer: B. ip Explanation: The ip command is a versatile tool for configuring network interfaces, routing tables, and policy routing on Linux systems. It provides more advanced functionality than the deprecated ifconfig and route commands. Option A is incorrect. ifconfig is a traditional tool for basic interface configuration but is considered deprecated in favor of ip. Option C is incorrect. The ′route′ command is used for displaying and modifying the IP routing table, not for comprehensive interface and routing configuration. Option D is incorrect. ′netstat′ is used for displaying various network-related information, such as routing tables and interface statistics, but it is not primarily used for configuring interfaces or routing. The ′ip′ command has largely replaced ′netstat′ for these tasks.
Unattempted
Correct Answer: B. ip Explanation: The ip command is a versatile tool for configuring network interfaces, routing tables, and policy routing on Linux systems. It provides more advanced functionality than the deprecated ifconfig and route commands. Option A is incorrect. ifconfig is a traditional tool for basic interface configuration but is considered deprecated in favor of ip. Option C is incorrect. The ′route′ command is used for displaying and modifying the IP routing table, not for comprehensive interface and routing configuration. Option D is incorrect. ′netstat′ is used for displaying various network-related information, such as routing tables and interface statistics, but it is not primarily used for configuring interfaces or routing. The ′ip′ command has largely replaced ′netstat′ for these tasks.
Question 4 of 60
4. Question
After working with some files on a USB drive, you want to ensure that all data has been written to the drive before safely removing it. Which command should you execute to make sure all buffered data for the file system is flushed to the storage device?
Correct
Correct Answer: C. sync Explanation: The sync command is used to flush the file system buffers, ensuring that all data is written to the physical storage devices. This helps in preventing data loss when removing storage devices like USB drives. Option A is incorrect. While ′umount′ will unmount the file system and ensure data is written before doing so, it is not specifically for flushing buffers. Once a filesystem is unmounted, it can‘t be written to without remounting. Option B is incorrect. There isn‘t a standard command named ′flush′ to achieve this purpose in Linux. Option D is incorrect. The ′mount′ command doesn‘t have a ′–flush′ option. ′mount′ is primarily used to mount filesystems, not to flush filesystem buffers.
Incorrect
Correct Answer: C. sync Explanation: The sync command is used to flush the file system buffers, ensuring that all data is written to the physical storage devices. This helps in preventing data loss when removing storage devices like USB drives. Option A is incorrect. While ′umount′ will unmount the file system and ensure data is written before doing so, it is not specifically for flushing buffers. Once a filesystem is unmounted, it can‘t be written to without remounting. Option B is incorrect. There isn‘t a standard command named ′flush′ to achieve this purpose in Linux. Option D is incorrect. The ′mount′ command doesn‘t have a ′–flush′ option. ′mount′ is primarily used to mount filesystems, not to flush filesystem buffers.
Unattempted
Correct Answer: C. sync Explanation: The sync command is used to flush the file system buffers, ensuring that all data is written to the physical storage devices. This helps in preventing data loss when removing storage devices like USB drives. Option A is incorrect. While ′umount′ will unmount the file system and ensure data is written before doing so, it is not specifically for flushing buffers. Once a filesystem is unmounted, it can‘t be written to without remounting. Option B is incorrect. There isn‘t a standard command named ′flush′ to achieve this purpose in Linux. Option D is incorrect. The ′mount′ command doesn‘t have a ′–flush′ option. ′mount′ is primarily used to mount filesystems, not to flush filesystem buffers.
Question 5 of 60
5. Question
During a server upgrade, Matthew notices that the system is not booting correctly. Upon inspecting the boot loader configuration, he sees that thereÂ’s a parameter defined as root=/dev/sda3. What does this parameter specify in relation to kernel loading?
Correct
Correct Answer: D. The root filesystem for the Linux system Explanation: In the context of booting and kernel parameters, the root= parameter specifies the device or partition that contains the root filesystem for the Linux system. This is where the kernel will pivot to after it‘s loaded into memory. Option A is incorrect. The boot loader‘s location is independent of the ′root=′ parameter in the kernel loading process. Option B is incorrect. The swap partition is not defined by the ′root=′ parameter. Option C is incorrect. While kernel modules are essential, the ′root=′ parameter doesn‘t point to their location. It points to the root filesystem.
Incorrect
Correct Answer: D. The root filesystem for the Linux system Explanation: In the context of booting and kernel parameters, the root= parameter specifies the device or partition that contains the root filesystem for the Linux system. This is where the kernel will pivot to after it‘s loaded into memory. Option A is incorrect. The boot loader‘s location is independent of the ′root=′ parameter in the kernel loading process. Option B is incorrect. The swap partition is not defined by the ′root=′ parameter. Option C is incorrect. While kernel modules are essential, the ′root=′ parameter doesn‘t point to their location. It points to the root filesystem.
Unattempted
Correct Answer: D. The root filesystem for the Linux system Explanation: In the context of booting and kernel parameters, the root= parameter specifies the device or partition that contains the root filesystem for the Linux system. This is where the kernel will pivot to after it‘s loaded into memory. Option A is incorrect. The boot loader‘s location is independent of the ′root=′ parameter in the kernel loading process. Option B is incorrect. The swap partition is not defined by the ′root=′ parameter. Option C is incorrect. While kernel modules are essential, the ′root=′ parameter doesn‘t point to their location. It points to the root filesystem.
Question 6 of 60
6. Question
You have a compressed file named “data.gz“ that you want to decompress and display the content without creating a new file. What command should you use?
Correct
Correct Answer: B. gunzip -c data.gz Explanation: The correct command to decompress and display the content of a gzip-compressed file without creating a new file is gunzip -c data.gz. The -c option sends the decompressed content to the standard output. Option A is incorrect because ′gzip -d′ is used to decompress the file, but it does not display the content without creating a new file. Option C is incorrect because it uses the ′tar′ command, which is used for tar archives. The correct command for decompressing a gzip file without creating a new file is ′gunzip -c′. Option D is incorrect because ′zcat′ is used for displaying the content of compressed files, but it‘s typically associated with compressing tools other than gzip. The correct command for gzip files is ′gunzip -c′.
Incorrect
Correct Answer: B. gunzip -c data.gz Explanation: The correct command to decompress and display the content of a gzip-compressed file without creating a new file is gunzip -c data.gz. The -c option sends the decompressed content to the standard output. Option A is incorrect because ′gzip -d′ is used to decompress the file, but it does not display the content without creating a new file. Option C is incorrect because it uses the ′tar′ command, which is used for tar archives. The correct command for decompressing a gzip file without creating a new file is ′gunzip -c′. Option D is incorrect because ′zcat′ is used for displaying the content of compressed files, but it‘s typically associated with compressing tools other than gzip. The correct command for gzip files is ′gunzip -c′.
Unattempted
Correct Answer: B. gunzip -c data.gz Explanation: The correct command to decompress and display the content of a gzip-compressed file without creating a new file is gunzip -c data.gz. The -c option sends the decompressed content to the standard output. Option A is incorrect because ′gzip -d′ is used to decompress the file, but it does not display the content without creating a new file. Option C is incorrect because it uses the ′tar′ command, which is used for tar archives. The correct command for decompressing a gzip file without creating a new file is ′gunzip -c′. Option D is incorrect because ′zcat′ is used for displaying the content of compressed files, but it‘s typically associated with compressing tools other than gzip. The correct command for gzip files is ′gunzip -c′.
Question 7 of 60
7. Question
A system administrator wants to display the process tree of all processes on the system in a tree structure. Which of the following commands will achieve this?
Correct
Correct Answer: B. pstree Explanation: The pstree command displays all processes in a tree structure, showing the hierarchy of parent and child processes. Option A is incorrect. There is no -tree option for the ps command. The correct command to view processes in a tree structure is pstree. Option C is incorrect. The ps -ef command displays extended information about processes, but there is no –tree option for the ps command. Option D is incorrect. The ps -aux command displays information about all running processes, but piping it to tree will not display processes in a tree structure. The tree command is used to display directory structures, not process trees.
Incorrect
Correct Answer: B. pstree Explanation: The pstree command displays all processes in a tree structure, showing the hierarchy of parent and child processes. Option A is incorrect. There is no -tree option for the ps command. The correct command to view processes in a tree structure is pstree. Option C is incorrect. The ps -ef command displays extended information about processes, but there is no –tree option for the ps command. Option D is incorrect. The ps -aux command displays information about all running processes, but piping it to tree will not display processes in a tree structure. The tree command is used to display directory structures, not process trees.
Unattempted
Correct Answer: B. pstree Explanation: The pstree command displays all processes in a tree structure, showing the hierarchy of parent and child processes. Option A is incorrect. There is no -tree option for the ps command. The correct command to view processes in a tree structure is pstree. Option C is incorrect. The ps -ef command displays extended information about processes, but there is no –tree option for the ps command. Option D is incorrect. The ps -aux command displays information about all running processes, but piping it to tree will not display processes in a tree structure. The tree command is used to display directory structures, not process trees.
Question 8 of 60
8. Question
A system administrator wants to alter the write cache setting of a SCSI hard drive represented by /dev/sda using the sdparm command. Which of the following commands is appropriate for this task?
Correct
Correct Answer: A. sdparm –set=WCE /dev/sda Explanation: The sdparm tool allows the setting of SCSI device parameters. The –set=WCE option is used to modify the Write Cache Enable setting. Option B is incorrect. Using ′–vpd′ with ′–set′ is not appropriate, as VPD is related to retrieving Vital Product Data, not setting device parameters. Option C is incorrect. The ′–get′ option retrieves a parameter but doesn‘t set it. Option D is incorrect. The ′–page′ option deals with displaying or changing a MODE page and would not be used in the context described.
Incorrect
Correct Answer: A. sdparm –set=WCE /dev/sda Explanation: The sdparm tool allows the setting of SCSI device parameters. The –set=WCE option is used to modify the Write Cache Enable setting. Option B is incorrect. Using ′–vpd′ with ′–set′ is not appropriate, as VPD is related to retrieving Vital Product Data, not setting device parameters. Option C is incorrect. The ′–get′ option retrieves a parameter but doesn‘t set it. Option D is incorrect. The ′–page′ option deals with displaying or changing a MODE page and would not be used in the context described.
Unattempted
Correct Answer: A. sdparm –set=WCE /dev/sda Explanation: The sdparm tool allows the setting of SCSI device parameters. The –set=WCE option is used to modify the Write Cache Enable setting. Option B is incorrect. Using ′–vpd′ with ′–set′ is not appropriate, as VPD is related to retrieving Vital Product Data, not setting device parameters. Option C is incorrect. The ′–get′ option retrieves a parameter but doesn‘t set it. Option D is incorrect. The ′–page′ option deals with displaying or changing a MODE page and would not be used in the context described.
Question 9 of 60
9. Question
While preparing to roll out a new custom kernel across several Linux servers, Jennifer decides to start by installing her freshly compiled kernel on a test server. Which command would help her to install the new main kernel image?
Correct
Correct Answer: D. make install Explanation: The make install command is used to install the main kernel image after it has been built. Option A is incorrect. make modules_install installs the kernel modules, not the main kernel image. Option B is incorrect. make install_kernel is not a recognized make target for the kernel. Option C is incorrect. make kernel is not a standard command for installing the kernel.
Incorrect
Correct Answer: D. make install Explanation: The make install command is used to install the main kernel image after it has been built. Option A is incorrect. make modules_install installs the kernel modules, not the main kernel image. Option B is incorrect. make install_kernel is not a recognized make target for the kernel. Option C is incorrect. make kernel is not a standard command for installing the kernel.
Unattempted
Correct Answer: D. make install Explanation: The make install command is used to install the main kernel image after it has been built. Option A is incorrect. make modules_install installs the kernel modules, not the main kernel image. Option B is incorrect. make install_kernel is not a recognized make target for the kernel. Option C is incorrect. make kernel is not a standard command for installing the kernel.
Question 10 of 60
10. Question
A Linux system administrator is tasked with setting up an iSCSI target on a server to provide disk space to another server acting as an iSCSI initiator. Which utility should the administrator use to set up the target on the server?
Correct
Correct Answer: C. targetcli Explanation: targetcli is a utility that allows administrators to manage and configure iSCSI targets. It is an advanced tool for configuring various aspects of the Linux LIO kernel target subsystem. Option A is incorrect. ′iscsiadm′ is a utility used on the initiator side to manage iSCSI sessions. Option B is incorrect. ′iscsid′ is the iSCSI daemon used on the initiator side to establish and maintain iSCSI sessions. Option D is incorrect. While ′iscsi-target′ sounds related, it‘s not the standard utility used for setting up an iSCSI target on Linux. The right tool for this task is ′targetcli′.
Incorrect
Correct Answer: C. targetcli Explanation: targetcli is a utility that allows administrators to manage and configure iSCSI targets. It is an advanced tool for configuring various aspects of the Linux LIO kernel target subsystem. Option A is incorrect. ′iscsiadm′ is a utility used on the initiator side to manage iSCSI sessions. Option B is incorrect. ′iscsid′ is the iSCSI daemon used on the initiator side to establish and maintain iSCSI sessions. Option D is incorrect. While ′iscsi-target′ sounds related, it‘s not the standard utility used for setting up an iSCSI target on Linux. The right tool for this task is ′targetcli′.
Unattempted
Correct Answer: C. targetcli Explanation: targetcli is a utility that allows administrators to manage and configure iSCSI targets. It is an advanced tool for configuring various aspects of the Linux LIO kernel target subsystem. Option A is incorrect. ′iscsiadm′ is a utility used on the initiator side to manage iSCSI sessions. Option B is incorrect. ′iscsid′ is the iSCSI daemon used on the initiator side to establish and maintain iSCSI sessions. Option D is incorrect. While ′iscsi-target′ sounds related, it‘s not the standard utility used for setting up an iSCSI target on Linux. The right tool for this task is ′targetcli′.
Question 11 of 60
11. Question
An administrator wants to change the operating mode of a wireless interface, wlan0, to “Ad-Hoc“ mode. Which of the following commands should be used?
Correct
Correct Answer: B. iwconfig wlan0 mode Ad-Hoc Explanation: Using the iwconfig command, you can set the mode of a wireless interface with the “mode“ keyword followed by the desired mode. In this case, “Ad-Hoc“ is the desired mode. Option A is incorrect. This command sets the interface to “Managed“ mode, which is not the desired “Ad-Hoc“ mode. Option C is incorrect. The syntax ′set mode=Ad-Hoc′ is not valid for ′iwconfig′. Option D is incorrect. The ′iwconfig′ command does not support the “configure mode“ syntax.
Incorrect
Correct Answer: B. iwconfig wlan0 mode Ad-Hoc Explanation: Using the iwconfig command, you can set the mode of a wireless interface with the “mode“ keyword followed by the desired mode. In this case, “Ad-Hoc“ is the desired mode. Option A is incorrect. This command sets the interface to “Managed“ mode, which is not the desired “Ad-Hoc“ mode. Option C is incorrect. The syntax ′set mode=Ad-Hoc′ is not valid for ′iwconfig′. Option D is incorrect. The ′iwconfig′ command does not support the “configure mode“ syntax.
Unattempted
Correct Answer: B. iwconfig wlan0 mode Ad-Hoc Explanation: Using the iwconfig command, you can set the mode of a wireless interface with the “mode“ keyword followed by the desired mode. In this case, “Ad-Hoc“ is the desired mode. Option A is incorrect. This command sets the interface to “Managed“ mode, which is not the desired “Ad-Hoc“ mode. Option C is incorrect. The syntax ′set mode=Ad-Hoc′ is not valid for ′iwconfig′. Option D is incorrect. The ′iwconfig′ command does not support the “configure mode“ syntax.
Question 12 of 60
12. Question
After a system crash, Lisa is trying to recover a server that uses an NVMe drive as its primary storage. While booting up, she realizes that the system isnÂ’t detecting the NVMe drive. Which of the following steps should she consider FIRST in her troubleshooting process?
Correct
Correct Answer: A. Check if the NVMe module is loaded in the kernel Explanation: If the system is not detecting the NVMe drive during the boot process, it might be due to the NVMe module not being loaded. Ensuring that the NVMe module is part of the kernel or is correctly loaded as a module should be the first step in troubleshooting. Option B is incorrect. NVMe drives do not use the SATA interface, so the SATA configuration mode is irrelevant in this context. Option C is incorrect. While it‘s essential for an NVMe drive to have a file system for the OS to use it, the lack of a file system would not prevent the system from detecting the drive itself. Option D is incorrect. Simply replacing an NVMe drive with an SSD is not a logical first step in troubleshooting, especially without diagnosing the actual problem.
Incorrect
Correct Answer: A. Check if the NVMe module is loaded in the kernel Explanation: If the system is not detecting the NVMe drive during the boot process, it might be due to the NVMe module not being loaded. Ensuring that the NVMe module is part of the kernel or is correctly loaded as a module should be the first step in troubleshooting. Option B is incorrect. NVMe drives do not use the SATA interface, so the SATA configuration mode is irrelevant in this context. Option C is incorrect. While it‘s essential for an NVMe drive to have a file system for the OS to use it, the lack of a file system would not prevent the system from detecting the drive itself. Option D is incorrect. Simply replacing an NVMe drive with an SSD is not a logical first step in troubleshooting, especially without diagnosing the actual problem.
Unattempted
Correct Answer: A. Check if the NVMe module is loaded in the kernel Explanation: If the system is not detecting the NVMe drive during the boot process, it might be due to the NVMe module not being loaded. Ensuring that the NVMe module is part of the kernel or is correctly loaded as a module should be the first step in troubleshooting. Option B is incorrect. NVMe drives do not use the SATA interface, so the SATA configuration mode is irrelevant in this context. Option C is incorrect. While it‘s essential for an NVMe drive to have a file system for the OS to use it, the lack of a file system would not prevent the system from detecting the drive itself. Option D is incorrect. Simply replacing an NVMe drive with an SSD is not a logical first step in troubleshooting, especially without diagnosing the actual problem.
Question 13 of 60
13. Question
Laura, a system administrator, has been tasked with gathering historical data on CPU usage on a Linux server. She recalls a tool that can fetch these metrics but canÂ’t remember the exact command. Which sar command should Laura use to display historical CPU statistics?
Correct
Correct Answer: B. sar -u Explanation: The sar -u command provides CPU utilization statistics. This includes the percentage of time the CPU spends running user processes, system processes, I/O wait, and being idle. Option A is incorrect. The sar -n DEV command is used to display network statistics, not CPU statistics. Option C is incorrect. The sar -d command is used to display activity for block devices, not CPU activity. Option D is incorrect. The sar -r command provides memory utilization statistics, not CPU statistics.
Incorrect
Correct Answer: B. sar -u Explanation: The sar -u command provides CPU utilization statistics. This includes the percentage of time the CPU spends running user processes, system processes, I/O wait, and being idle. Option A is incorrect. The sar -n DEV command is used to display network statistics, not CPU statistics. Option C is incorrect. The sar -d command is used to display activity for block devices, not CPU activity. Option D is incorrect. The sar -r command provides memory utilization statistics, not CPU statistics.
Unattempted
Correct Answer: B. sar -u Explanation: The sar -u command provides CPU utilization statistics. This includes the percentage of time the CPU spends running user processes, system processes, I/O wait, and being idle. Option A is incorrect. The sar -n DEV command is used to display network statistics, not CPU statistics. Option C is incorrect. The sar -d command is used to display activity for block devices, not CPU activity. Option D is incorrect. The sar -r command provides memory utilization statistics, not CPU statistics.
Question 14 of 60
14. Question
Emily is responsible for monitoring real-time network usage on her Linux server and wants a tool that provides a visual representation of current bandwidth usage. Which utility should she use?
Correct
Correct Answer: D. nload Explanation: The nload command is used to monitor incoming and outgoing traffic separately and provides a visual representation of bandwidth usage in real-time, making it suitable for monitoring network usage. Option A is incorrect. iftop displays a list of network connections and their bandwidth usage but does not provide a visual representation of real-time bandwidth usage. Option B is incorrect. ′netstat′ displays information about network connections, routing tables, interface statistics, masquerade connections, and more, but it does not provide a visual representation of real-time bandwidth. Option C is incorrect. ′tcpdump′ is a packet analyzer and does not offer a visual representation of real-time bandwidth usage. It is more focused on capturing and analyzing packets at the packet level.
Incorrect
Correct Answer: D. nload Explanation: The nload command is used to monitor incoming and outgoing traffic separately and provides a visual representation of bandwidth usage in real-time, making it suitable for monitoring network usage. Option A is incorrect. iftop displays a list of network connections and their bandwidth usage but does not provide a visual representation of real-time bandwidth usage. Option B is incorrect. ′netstat′ displays information about network connections, routing tables, interface statistics, masquerade connections, and more, but it does not provide a visual representation of real-time bandwidth. Option C is incorrect. ′tcpdump′ is a packet analyzer and does not offer a visual representation of real-time bandwidth usage. It is more focused on capturing and analyzing packets at the packet level.
Unattempted
Correct Answer: D. nload Explanation: The nload command is used to monitor incoming and outgoing traffic separately and provides a visual representation of bandwidth usage in real-time, making it suitable for monitoring network usage. Option A is incorrect. iftop displays a list of network connections and their bandwidth usage but does not provide a visual representation of real-time bandwidth usage. Option B is incorrect. ′netstat′ displays information about network connections, routing tables, interface statistics, masquerade connections, and more, but it does not provide a visual representation of real-time bandwidth. Option C is incorrect. ′tcpdump′ is a packet analyzer and does not offer a visual representation of real-time bandwidth usage. It is more focused on capturing and analyzing packets at the packet level.
Question 15 of 60
15. Question
You are working on a Linux system and need to determine the kernel version. Which command should you use for this purpose?
Correct
Correct Answer: A. uname -r Explanation: The correct command to determine the kernel version is uname -r. This command prints the kernel release information. Option B is incorrect because there is no standard command called ′kernelinfo′ for retrieving kernel version information. The correct command is ′uname -r′. Option C is incorrect because there is no standard command called ′versioninfo′ for retrieving kernel version information. The correct command is ′uname -r′. Option D is incorrect because there is no standard command called ′sysinfo′ for retrieving kernel version information. The correct command is ′uname -r′.
Incorrect
Correct Answer: A. uname -r Explanation: The correct command to determine the kernel version is uname -r. This command prints the kernel release information. Option B is incorrect because there is no standard command called ′kernelinfo′ for retrieving kernel version information. The correct command is ′uname -r′. Option C is incorrect because there is no standard command called ′versioninfo′ for retrieving kernel version information. The correct command is ′uname -r′. Option D is incorrect because there is no standard command called ′sysinfo′ for retrieving kernel version information. The correct command is ′uname -r′.
Unattempted
Correct Answer: A. uname -r Explanation: The correct command to determine the kernel version is uname -r. This command prints the kernel release information. Option B is incorrect because there is no standard command called ′kernelinfo′ for retrieving kernel version information. The correct command is ′uname -r′. Option C is incorrect because there is no standard command called ′versioninfo′ for retrieving kernel version information. The correct command is ′uname -r′. Option D is incorrect because there is no standard command called ′sysinfo′ for retrieving kernel version information. The correct command is ′uname -r′.
Question 16 of 60
16. Question
You have downloaded the source code for a program and need to compile it. What is the primary purpose of the make command in this context?
Correct
Correct Answer: D. To automate the compilation process Explanation: The make command is used to automate the compilation process by reading a file called a Makefile that specifies how the program should be built. It analyzes dependencies and executes the necessary compilation commands. Option A is incorrect because the primary purpose of the ′make′ command is not to execute the program but to automate the compilation process. Option B is incorrect because the source code is already downloaded, and the ′make′ command is not used to generate the source code. Option C is incorrect because the configuration process is typically done with tools like ′configure′ or ′cmake′. The ′make′ command comes into play after the configuration, during the actual compilation.
Incorrect
Correct Answer: D. To automate the compilation process Explanation: The make command is used to automate the compilation process by reading a file called a Makefile that specifies how the program should be built. It analyzes dependencies and executes the necessary compilation commands. Option A is incorrect because the primary purpose of the ′make′ command is not to execute the program but to automate the compilation process. Option B is incorrect because the source code is already downloaded, and the ′make′ command is not used to generate the source code. Option C is incorrect because the configuration process is typically done with tools like ′configure′ or ′cmake′. The ′make′ command comes into play after the configuration, during the actual compilation.
Unattempted
Correct Answer: D. To automate the compilation process Explanation: The make command is used to automate the compilation process by reading a file called a Makefile that specifies how the program should be built. It analyzes dependencies and executes the necessary compilation commands. Option A is incorrect because the primary purpose of the ′make′ command is not to execute the program but to automate the compilation process. Option B is incorrect because the source code is already downloaded, and the ′make′ command is not used to generate the source code. Option C is incorrect because the configuration process is typically done with tools like ′configure′ or ′cmake′. The ′make′ command comes into play after the configuration, during the actual compilation.
Question 17 of 60
17. Question
A system administrator needs to determine the frequency and channel on which a wireless network interface, wlan0, is currently operating. Which command should the administrator use?
Correct
Correct Answer: C. iw wlan0 info Explanation: The command iw wlan0 info provides detailed information about the wireless network interface, including the current frequency and channel on which it is operating. Option A is incorrect. There is no ′get frequency′ command in the ′iw′ tool. Option B is incorrect. The ′iw′ tool does not have a ′freq′ keyword for displaying frequency information. Option D is incorrect. The ′iw′ tool does not have a ′show channel′ command.
Incorrect
Correct Answer: C. iw wlan0 info Explanation: The command iw wlan0 info provides detailed information about the wireless network interface, including the current frequency and channel on which it is operating. Option A is incorrect. There is no ′get frequency′ command in the ′iw′ tool. Option B is incorrect. The ′iw′ tool does not have a ′freq′ keyword for displaying frequency information. Option D is incorrect. The ′iw′ tool does not have a ′show channel′ command.
Unattempted
Correct Answer: C. iw wlan0 info Explanation: The command iw wlan0 info provides detailed information about the wireless network interface, including the current frequency and channel on which it is operating. Option A is incorrect. There is no ′get frequency′ command in the ′iw′ tool. Option B is incorrect. The ′iw′ tool does not have a ′freq′ keyword for displaying frequency information. Option D is incorrect. The ′iw′ tool does not have a ′show channel′ command.
Question 18 of 60
18. Question
During a troubleshooting session, Emily noticed that her Linux machine stops just after the boot loader stage and does not hand over control to the kernel. What is a common reason for this scenario?
Correct
Correct Answer: A. The kernel is not located in the specified path in the boot loader configuration Explanation: If the boot loader can‘t find the kernel at the specified path mentioned in its configuration, it won‘t be able to load the kernel and hand off control. This results in the system halting after the boot loader stage. Option B is incorrect. The file system type of the ′/home′ directory wouldn‘t prevent the kernel from being loaded by the boot loader. Option C is incorrect. Missing service scripts in ′init.d′ would affect services at the initialization stage, not the kernel loading process. Option D is incorrect. Incorrect system time and date might cause other issues but won‘t stop the boot loader from handing control to the kernel.
Incorrect
Correct Answer: A. The kernel is not located in the specified path in the boot loader configuration Explanation: If the boot loader can‘t find the kernel at the specified path mentioned in its configuration, it won‘t be able to load the kernel and hand off control. This results in the system halting after the boot loader stage. Option B is incorrect. The file system type of the ′/home′ directory wouldn‘t prevent the kernel from being loaded by the boot loader. Option C is incorrect. Missing service scripts in ′init.d′ would affect services at the initialization stage, not the kernel loading process. Option D is incorrect. Incorrect system time and date might cause other issues but won‘t stop the boot loader from handing control to the kernel.
Unattempted
Correct Answer: A. The kernel is not located in the specified path in the boot loader configuration Explanation: If the boot loader can‘t find the kernel at the specified path mentioned in its configuration, it won‘t be able to load the kernel and hand off control. This results in the system halting after the boot loader stage. Option B is incorrect. The file system type of the ′/home′ directory wouldn‘t prevent the kernel from being loaded by the boot loader. Option C is incorrect. Missing service scripts in ′init.d′ would affect services at the initialization stage, not the kernel loading process. Option D is incorrect. Incorrect system time and date might cause other issues but won‘t stop the boot loader from handing control to the kernel.
Question 19 of 60
19. Question
An administrator wants to display the information about currently logged in users and their activity but wants to hide the header. Which command will achieve this?
Correct
Correct Answer: A. w -nh Explanation: The command w -nh provides information about the currently logged-in users and their activity while excluding the header. Option B is incorrect. The w command does not have a –no-header option. The correct option to hide the header is -nh. Option C is incorrect. Although piping the w command‘s output to grep -v HEADER can effectively exclude lines containing the word “HEADER,“ it‘s not the most direct or efficient way to achieve the desired outcome. Option D is incorrect. The w -H command includes the header in the output, which is the opposite of what the question specifies.
Incorrect
Correct Answer: A. w -nh Explanation: The command w -nh provides information about the currently logged-in users and their activity while excluding the header. Option B is incorrect. The w command does not have a –no-header option. The correct option to hide the header is -nh. Option C is incorrect. Although piping the w command‘s output to grep -v HEADER can effectively exclude lines containing the word “HEADER,“ it‘s not the most direct or efficient way to achieve the desired outcome. Option D is incorrect. The w -H command includes the header in the output, which is the opposite of what the question specifies.
Unattempted
Correct Answer: A. w -nh Explanation: The command w -nh provides information about the currently logged-in users and their activity while excluding the header. Option B is incorrect. The w command does not have a –no-header option. The correct option to hide the header is -nh. Option C is incorrect. Although piping the w command‘s output to grep -v HEADER can effectively exclude lines containing the word “HEADER,“ it‘s not the most direct or efficient way to achieve the desired outcome. Option D is incorrect. The w -H command includes the header in the output, which is the opposite of what the question specifies.
Question 20 of 60
20. Question
Emily, a network administrator, needs to analyze the status and performance of network devices on a Linux server. Which utility is commonly used for this purpose?
Correct
Correct Answer: C. iptraf-ng Explanation: The iptraf-ng command is a real-time console-based network monitoring utility that provides information about network traffic, interfaces, and connections. It is useful for analyzing the status and performance of network devices. Option A is incorrect. iftop is a utility that displays real-time bandwidth usage on an interface but does not provide the comprehensive network analysis offered by iptraf-ng. Option B is incorrect. ′traceroute′ is used for tracking the route that packets take across a network, showing the IP addresses of routers along the path, but it doesn‘t provide continuous monitoring or detailed statistics. Option D is incorrect. ′ping′ is a basic utility for testing network connectivity by sending ICMP echo requests, but it does not offer detailed analysis of network devices or traffic.
Incorrect
Correct Answer: C. iptraf-ng Explanation: The iptraf-ng command is a real-time console-based network monitoring utility that provides information about network traffic, interfaces, and connections. It is useful for analyzing the status and performance of network devices. Option A is incorrect. iftop is a utility that displays real-time bandwidth usage on an interface but does not provide the comprehensive network analysis offered by iptraf-ng. Option B is incorrect. ′traceroute′ is used for tracking the route that packets take across a network, showing the IP addresses of routers along the path, but it doesn‘t provide continuous monitoring or detailed statistics. Option D is incorrect. ′ping′ is a basic utility for testing network connectivity by sending ICMP echo requests, but it does not offer detailed analysis of network devices or traffic.
Unattempted
Correct Answer: C. iptraf-ng Explanation: The iptraf-ng command is a real-time console-based network monitoring utility that provides information about network traffic, interfaces, and connections. It is useful for analyzing the status and performance of network devices. Option A is incorrect. iftop is a utility that displays real-time bandwidth usage on an interface but does not provide the comprehensive network analysis offered by iptraf-ng. Option B is incorrect. ′traceroute′ is used for tracking the route that packets take across a network, showing the IP addresses of routers along the path, but it doesn‘t provide continuous monitoring or detailed statistics. Option D is incorrect. ′ping′ is a basic utility for testing network connectivity by sending ICMP echo requests, but it does not offer detailed analysis of network devices or traffic.
Question 21 of 60
21. Question
A system administrator needs to manually add a static ARP entry associating IP address 192.168.1.10 with MAC address 00:11:22:33:44:55. Which command would accomplish this task?
Correct
Correct Answer: A. arp -s 192.168.1.10 00:11:22:33:44:55 Explanation: The arp -s command allows the user to manually add a new ARP entry to the system‘s ARP cache, where the IP address and MAC address are specified in the command. Option B is incorrect. The ′arp′ command does not use the ′set′ keyword to add static ARP entries. Option C is incorrect. The syntax of this command is incorrect; the ′arp′ command does not use the ′add′ keyword or ′=′ symbol in this manner. Option D is incorrect. The ′arp′ command does not have a ′push′ keyword.
Incorrect
Correct Answer: A. arp -s 192.168.1.10 00:11:22:33:44:55 Explanation: The arp -s command allows the user to manually add a new ARP entry to the system‘s ARP cache, where the IP address and MAC address are specified in the command. Option B is incorrect. The ′arp′ command does not use the ′set′ keyword to add static ARP entries. Option C is incorrect. The syntax of this command is incorrect; the ′arp′ command does not use the ′add′ keyword or ′=′ symbol in this manner. Option D is incorrect. The ′arp′ command does not have a ′push′ keyword.
Unattempted
Correct Answer: A. arp -s 192.168.1.10 00:11:22:33:44:55 Explanation: The arp -s command allows the user to manually add a new ARP entry to the system‘s ARP cache, where the IP address and MAC address are specified in the command. Option B is incorrect. The ′arp′ command does not use the ′set′ keyword to add static ARP entries. Option C is incorrect. The syntax of this command is incorrect; the ′arp′ command does not use the ′add′ keyword or ′=′ symbol in this manner. Option D is incorrect. The ′arp′ command does not have a ′push′ keyword.
Question 22 of 60
22. Question
Thomas is planning to deploy a storage server and is considering using ZFS for its advanced features. Which of the following statements about ZFS is accurate?
Correct
Correct Answer: C. ZFS combines the roles of a filesystem and a volume manager Explanation: ZFS, short for Zettabyte File System, offers a combined filesystem and volume manager. It provides several advanced features, including data protection against corruption, support for high storage capacities, data compression, and more. Option A is incorrect. ZFS stands for “Zettabyte File System,“ not “Zone File System.“ Option B is incorrect. One of the notable features of ZFS is its ability to create snapshots of the filesystem, allowing for point-in-time copies of data. Option D is incorrect. ZFS does support data deduplication, a feature that eliminates redundant data blocks to save storage space.
Incorrect
Correct Answer: C. ZFS combines the roles of a filesystem and a volume manager Explanation: ZFS, short for Zettabyte File System, offers a combined filesystem and volume manager. It provides several advanced features, including data protection against corruption, support for high storage capacities, data compression, and more. Option A is incorrect. ZFS stands for “Zettabyte File System,“ not “Zone File System.“ Option B is incorrect. One of the notable features of ZFS is its ability to create snapshots of the filesystem, allowing for point-in-time copies of data. Option D is incorrect. ZFS does support data deduplication, a feature that eliminates redundant data blocks to save storage space.
Unattempted
Correct Answer: C. ZFS combines the roles of a filesystem and a volume manager Explanation: ZFS, short for Zettabyte File System, offers a combined filesystem and volume manager. It provides several advanced features, including data protection against corruption, support for high storage capacities, data compression, and more. Option A is incorrect. ZFS stands for “Zettabyte File System,“ not “Zone File System.“ Option B is incorrect. One of the notable features of ZFS is its ability to create snapshots of the filesystem, allowing for point-in-time copies of data. Option D is incorrect. ZFS does support data deduplication, a feature that eliminates redundant data blocks to save storage space.
Question 23 of 60
23. Question
A system administrator is troubleshooting network connectivity on a server. They want to view the list of all active network connections, both incoming and outgoing. Which netstat command will allow them to view this information?
Correct
Correct Answer: C. netstat -an Explanation: Using the netstat -an command displays all active network connections associated with the server, both listening and established, without resolving names. Option A is incorrect. The netstat -tuln command shows only listening TCP/UDP sockets without resolving names. It doesn‘t display established connections. Option B is incorrect. The netstat -rn command displays the routing table, not the active network connections. Option D is incorrect. The netstat -s command provides statistics by protocol. It doesn‘t specifically show active network connections.
Incorrect
Correct Answer: C. netstat -an Explanation: Using the netstat -an command displays all active network connections associated with the server, both listening and established, without resolving names. Option A is incorrect. The netstat -tuln command shows only listening TCP/UDP sockets without resolving names. It doesn‘t display established connections. Option B is incorrect. The netstat -rn command displays the routing table, not the active network connections. Option D is incorrect. The netstat -s command provides statistics by protocol. It doesn‘t specifically show active network connections.
Unattempted
Correct Answer: C. netstat -an Explanation: Using the netstat -an command displays all active network connections associated with the server, both listening and established, without resolving names. Option A is incorrect. The netstat -tuln command shows only listening TCP/UDP sockets without resolving names. It doesn‘t display established connections. Option B is incorrect. The netstat -rn command displays the routing table, not the active network connections. Option D is incorrect. The netstat -s command provides statistics by protocol. It doesn‘t specifically show active network connections.
Question 24 of 60
24. Question
James encounters a boot issue on his Linux system and decides to troubleshoot using the GRUB shell. He wants to set the root device to the first partition on the first hard drive. Which of the following GRUB commands should James use inside the GRUB shell to achieve this?
Correct
Correct Answer: A. root(hd0,1) Explanation: In the GRUB shell, to set the root device to a specific partition, you use the root command followed by the device notation. The first hard drive is represented as hd0, and partition numbering starts from 0. Hence, the first partition on the first hard drive is represented as (hd0,1). Option B is incorrect. The syntax ′set root=(hd0,1)′ is for GRUB 2, not for the legacy GRUB shell. Option C is incorrect. ′(hd1,0)′ would represent the first partition on the second hard drive, not the first hard drive. Option D is incorrect. While ′(hd0,0)′ does refer to the first hard drive, it points to the first primary partition, not the second one.
Incorrect
Correct Answer: A. root(hd0,1) Explanation: In the GRUB shell, to set the root device to a specific partition, you use the root command followed by the device notation. The first hard drive is represented as hd0, and partition numbering starts from 0. Hence, the first partition on the first hard drive is represented as (hd0,1). Option B is incorrect. The syntax ′set root=(hd0,1)′ is for GRUB 2, not for the legacy GRUB shell. Option C is incorrect. ′(hd1,0)′ would represent the first partition on the second hard drive, not the first hard drive. Option D is incorrect. While ′(hd0,0)′ does refer to the first hard drive, it points to the first primary partition, not the second one.
Unattempted
Correct Answer: A. root(hd0,1) Explanation: In the GRUB shell, to set the root device to a specific partition, you use the root command followed by the device notation. The first hard drive is represented as hd0, and partition numbering starts from 0. Hence, the first partition on the first hard drive is represented as (hd0,1). Option B is incorrect. The syntax ′set root=(hd0,1)′ is for GRUB 2, not for the legacy GRUB shell. Option C is incorrect. ′(hd1,0)′ would represent the first partition on the second hard drive, not the first hard drive. Option D is incorrect. While ′(hd0,0)′ does refer to the first hard drive, it points to the first primary partition, not the second one.
Question 25 of 60
25. Question
While troubleshooting a boot issue on a server, James identifies that the system is not recognizing the primary hard drive. Before investigating further, he wants to confirm the mode in which the system firmware is set up. Which of the following methods can help James identify if the system is using UEFI or Legacy BIOS mode?
Correct
Correct Answer: A. Check for the presence of /sys/firmware/efi directory Explanation: If the system is booted in UEFI mode, the directory /sys/firmware/efi will be present. This is a quick and reliable method to identify the firmware mode in which the system is running. Option B is incorrect. The ′df -h′ command displays disk space usage, not information about the firmware mode. Option C is incorrect. The ′/etc/fstab′ file contains filesystem mount information and does not indicate whether the system is using UEFI or Legacy BIOS. Option D is incorrect. The ′lsmod′ command lists loaded kernel modules, not firmware details.
Incorrect
Correct Answer: A. Check for the presence of /sys/firmware/efi directory Explanation: If the system is booted in UEFI mode, the directory /sys/firmware/efi will be present. This is a quick and reliable method to identify the firmware mode in which the system is running. Option B is incorrect. The ′df -h′ command displays disk space usage, not information about the firmware mode. Option C is incorrect. The ′/etc/fstab′ file contains filesystem mount information and does not indicate whether the system is using UEFI or Legacy BIOS. Option D is incorrect. The ′lsmod′ command lists loaded kernel modules, not firmware details.
Unattempted
Correct Answer: A. Check for the presence of /sys/firmware/efi directory Explanation: If the system is booted in UEFI mode, the directory /sys/firmware/efi will be present. This is a quick and reliable method to identify the firmware mode in which the system is running. Option B is incorrect. The ′df -h′ command displays disk space usage, not information about the firmware mode. Option C is incorrect. The ′/etc/fstab′ file contains filesystem mount information and does not indicate whether the system is using UEFI or Legacy BIOS. Option D is incorrect. The ′lsmod′ command lists loaded kernel modules, not firmware details.
Question 26 of 60
26. Question
Emma is tasked with compiling a custom Linux kernel for her organizationÂ’s server. She is informed that the kernel source is traditionally stored in a specific location in the file system. Which directory is typically designated for Linux kernel source files?
Correct
Correct Answer: D. /usr/src/linux/ Explanation: The traditional location for the Linux kernel source is /usr/src/linux/. This directory contains all the source code files, configuration files, and build scripts required to compile a custom kernel. Option A is incorrect. The /etc/ directory is generally reserved for system-wide configuration files and shell scripts used during startup and shutdown, but not for source files. Option B is incorrect. While /usr/local/ is often used for locally compiled applications and their associated files, the kernel source code has its traditional place in /usr/src/linux/. Option C is incorrect. /usr/bin/ is reserved for essential command binaries but not for source files.
Incorrect
Correct Answer: D. /usr/src/linux/ Explanation: The traditional location for the Linux kernel source is /usr/src/linux/. This directory contains all the source code files, configuration files, and build scripts required to compile a custom kernel. Option A is incorrect. The /etc/ directory is generally reserved for system-wide configuration files and shell scripts used during startup and shutdown, but not for source files. Option B is incorrect. While /usr/local/ is often used for locally compiled applications and their associated files, the kernel source code has its traditional place in /usr/src/linux/. Option C is incorrect. /usr/bin/ is reserved for essential command binaries but not for source files.
Unattempted
Correct Answer: D. /usr/src/linux/ Explanation: The traditional location for the Linux kernel source is /usr/src/linux/. This directory contains all the source code files, configuration files, and build scripts required to compile a custom kernel. Option A is incorrect. The /etc/ directory is generally reserved for system-wide configuration files and shell scripts used during startup and shutdown, but not for source files. Option B is incorrect. While /usr/local/ is often used for locally compiled applications and their associated files, the kernel source code has its traditional place in /usr/src/linux/. Option C is incorrect. /usr/bin/ is reserved for essential command binaries but not for source files.
Question 27 of 60
27. Question
A system administrator, while monitoring resources, notices that a specific process is consuming an unusually high amount of memory. Using htop, the administrator wants to send a termination signal to that process directly. What action should the administrator take within htop?
Correct
Correct Answer: C. Press the F9 key Explanation: In htop, pressing the F9 key will bring up the menu to send signals to the selected process. The most common signal for terminating a process is SIGTERM, which can be sent from this menu. Option A is incorrect. While k is used in the basic top command to kill a process, in htop it doesn‘t serve this function. Option B is incorrect. The t key does not send a termination signal in htop. Option D is incorrect. Pressing F5 in htop switches the display to tree view, showing parent-child relationships of processes.
Incorrect
Correct Answer: C. Press the F9 key Explanation: In htop, pressing the F9 key will bring up the menu to send signals to the selected process. The most common signal for terminating a process is SIGTERM, which can be sent from this menu. Option A is incorrect. While k is used in the basic top command to kill a process, in htop it doesn‘t serve this function. Option B is incorrect. The t key does not send a termination signal in htop. Option D is incorrect. Pressing F5 in htop switches the display to tree view, showing parent-child relationships of processes.
Unattempted
Correct Answer: C. Press the F9 key Explanation: In htop, pressing the F9 key will bring up the menu to send signals to the selected process. The most common signal for terminating a process is SIGTERM, which can be sent from this menu. Option A is incorrect. While k is used in the basic top command to kill a process, in htop it doesn‘t serve this function. Option B is incorrect. The t key does not send a termination signal in htop. Option D is incorrect. Pressing F5 in htop switches the display to tree view, showing parent-child relationships of processes.
Question 28 of 60
28. Question
A system administrator has been noticing performance issues on a server and suspects that swapping might be the issue. They decide to use vmstat to monitor and gather statistics about the systemÂ’s virtual memory. Which column in the vmstat output specifically displays the amount of memory swapped in from the disk and swapped out to the disk per second?
Correct
Correct Answer: D. si and so Explanation: The si and so columns in the vmstat output represent the amount of memory swapped in from disk and swapped out to disk per second, respectively. This allows administrators to quickly determine if the system is heavily reliant on swapping, which can impact performance. Option A is incorrect. While bi and bo columns display blocks received from a block device (like a disk) and blocks sent to a block device, they don‘t specifically relate to swapping. Option B is incorrect. The us and sy columns show the percentage of CPU time spent in user mode and system mode, respectively, and are not related to swapping. Option C is incorrect. The in and cs columns display the number of interrupts and context switches per second, respectively, and do not represent swapping activities.
Incorrect
Correct Answer: D. si and so Explanation: The si and so columns in the vmstat output represent the amount of memory swapped in from disk and swapped out to disk per second, respectively. This allows administrators to quickly determine if the system is heavily reliant on swapping, which can impact performance. Option A is incorrect. While bi and bo columns display blocks received from a block device (like a disk) and blocks sent to a block device, they don‘t specifically relate to swapping. Option B is incorrect. The us and sy columns show the percentage of CPU time spent in user mode and system mode, respectively, and are not related to swapping. Option C is incorrect. The in and cs columns display the number of interrupts and context switches per second, respectively, and do not represent swapping activities.
Unattempted
Correct Answer: D. si and so Explanation: The si and so columns in the vmstat output represent the amount of memory swapped in from disk and swapped out to disk per second, respectively. This allows administrators to quickly determine if the system is heavily reliant on swapping, which can impact performance. Option A is incorrect. While bi and bo columns display blocks received from a block device (like a disk) and blocks sent to a block device, they don‘t specifically relate to swapping. Option B is incorrect. The us and sy columns show the percentage of CPU time spent in user mode and system mode, respectively, and are not related to swapping. Option C is incorrect. The in and cs columns display the number of interrupts and context switches per second, respectively, and do not represent swapping activities.
Question 29 of 60
29. Question
You want to decompress a file named “data.gz“ quickly. Which command should you use?
Correct
Correct Answer: B. gzip -d data.gz Explanation: The correct command to quickly decompress a file that has been compressed with gzip is gzip -d data.gz. This command removes the .gz extension, leaving you with the uncompressed file. Option A is incorrect because ′gunzip′ is used for files with the .gz extension, not gzip files. The correct command for gzip files is ′gzip -d′. Option C is incorrect because it uses the ′tar′ command without the correct options to decompress a gzip file. The correct options for decompressing and extracting are ′tar -xf′ for tar.gz archives. Option D is incorrect because ′unzip′ is used for zip archives, not gzip files. The correct command for gzip files is ′gzip -d′.
Incorrect
Correct Answer: B. gzip -d data.gz Explanation: The correct command to quickly decompress a file that has been compressed with gzip is gzip -d data.gz. This command removes the .gz extension, leaving you with the uncompressed file. Option A is incorrect because ′gunzip′ is used for files with the .gz extension, not gzip files. The correct command for gzip files is ′gzip -d′. Option C is incorrect because it uses the ′tar′ command without the correct options to decompress a gzip file. The correct options for decompressing and extracting are ′tar -xf′ for tar.gz archives. Option D is incorrect because ′unzip′ is used for zip archives, not gzip files. The correct command for gzip files is ′gzip -d′.
Unattempted
Correct Answer: B. gzip -d data.gz Explanation: The correct command to quickly decompress a file that has been compressed with gzip is gzip -d data.gz. This command removes the .gz extension, leaving you with the uncompressed file. Option A is incorrect because ′gunzip′ is used for files with the .gz extension, not gzip files. The correct command for gzip files is ′gzip -d′. Option C is incorrect because it uses the ′tar′ command without the correct options to decompress a gzip file. The correct options for decompressing and extracting are ′tar -xf′ for tar.gz archives. Option D is incorrect because ′unzip′ is used for zip archives, not gzip files. The correct command for gzip files is ′gzip -d′.
Question 30 of 60
30. Question
Jessica, a system administrator, needs to create a new subvolume named ‘projects’ on her Btrfs filesystem mounted at /mnt/data. Which command should she use to achieve this?
Correct
Correct Answer: C. btrfs subvolume create /mnt/data/projects Explanation: The btrfs subvolume create command is used to create a new subvolume within a Btrfs filesystem. The provided path specifies where the subvolume should be created. Option A is incorrect. There‘s no ′btrfs subvolume new′ command in standard Btrfs utilities. Option B is incorrect. The correct syntax is ′btrfs subvolume create′, not ′btrfs create subvolume′. Option D is incorrect. There‘s no ′btrfs add subvolume′ command in standard Btrfs utilities.
Incorrect
Correct Answer: C. btrfs subvolume create /mnt/data/projects Explanation: The btrfs subvolume create command is used to create a new subvolume within a Btrfs filesystem. The provided path specifies where the subvolume should be created. Option A is incorrect. There‘s no ′btrfs subvolume new′ command in standard Btrfs utilities. Option B is incorrect. The correct syntax is ′btrfs subvolume create′, not ′btrfs create subvolume′. Option D is incorrect. There‘s no ′btrfs add subvolume′ command in standard Btrfs utilities.
Unattempted
Correct Answer: C. btrfs subvolume create /mnt/data/projects Explanation: The btrfs subvolume create command is used to create a new subvolume within a Btrfs filesystem. The provided path specifies where the subvolume should be created. Option A is incorrect. There‘s no ′btrfs subvolume new′ command in standard Btrfs utilities. Option B is incorrect. The correct syntax is ′btrfs subvolume create′, not ′btrfs create subvolume′. Option D is incorrect. There‘s no ′btrfs add subvolume′ command in standard Btrfs utilities.
Question 31 of 60
31. Question
Michael is working on customizing a Linux kernel for an embedded device. He needs to ensure that the kernel image size is as small as possible due to storage constraints. However, he doesnÂ’t want to compromise much on decompression speed. Which kernel image compression method would best fit MichaelÂ’s requirements?
Correct
Correct Answer: C. xz Explanation: The xz compression method provides one of the highest compression ratios among the available options, resulting in smaller kernel image sizes. While there are faster decompression methods, xz offers a good balance between size and decompression speed. Option A is incorrect. lz4 is known for its extremely fast compression and decompression speeds. However, in terms of compression ratio, it doesn‘t compress as tightly as xz. Option B is incorrect. While lzo offers fast compression and decompression, its compression ratio isn‘t as high as that of xz. Option D is incorrect. tar is an archiving utility, not a compression method for kernel images.
Incorrect
Correct Answer: C. xz Explanation: The xz compression method provides one of the highest compression ratios among the available options, resulting in smaller kernel image sizes. While there are faster decompression methods, xz offers a good balance between size and decompression speed. Option A is incorrect. lz4 is known for its extremely fast compression and decompression speeds. However, in terms of compression ratio, it doesn‘t compress as tightly as xz. Option B is incorrect. While lzo offers fast compression and decompression, its compression ratio isn‘t as high as that of xz. Option D is incorrect. tar is an archiving utility, not a compression method for kernel images.
Unattempted
Correct Answer: C. xz Explanation: The xz compression method provides one of the highest compression ratios among the available options, resulting in smaller kernel image sizes. While there are faster decompression methods, xz offers a good balance between size and decompression speed. Option A is incorrect. lz4 is known for its extremely fast compression and decompression speeds. However, in terms of compression ratio, it doesn‘t compress as tightly as xz. Option B is incorrect. While lzo offers fast compression and decompression, its compression ratio isn‘t as high as that of xz. Option D is incorrect. tar is an archiving utility, not a compression method for kernel images.
Question 32 of 60
32. Question
A system administrator is tasked with diagnosing a server thatÂ’s experiencing slowdowns during peak times. While monitoring with top, the administrator notices that CPU and memory usage are within nominal ranges, but thereÂ’s consistently high I/O wait time. The administrator decides to inspect disk I/O performance next. Which of the following tools would be the most appropriate to determine disk I/O bottlenecks?
Correct
Correct Answer: B. iostat Explanation: iostat is a utility that provides statistics about CPU utilization and input/output statistics for devices, partitions, and network filesystems, making it ideal for investigating disk I/O bottlenecks. Option A is incorrect. netstat is a command-line tool that provides information about network connections, routing tables, interface statistics, and more. It does not directly provide insights into disk I/O bottlenecks. Option C is incorrect. iftop displays bandwidth usage on an interface by host. It is related to network traffic monitoring and not disk I/O bottlenecks. Option D is incorrect. vmstat displays information about system processes, memory, paging, block IO, traps, and CPU activity. Although it gives an overview of I/O waits, for a detailed disk I/O investigation, iostat would be more appropriate.
Incorrect
Correct Answer: B. iostat Explanation: iostat is a utility that provides statistics about CPU utilization and input/output statistics for devices, partitions, and network filesystems, making it ideal for investigating disk I/O bottlenecks. Option A is incorrect. netstat is a command-line tool that provides information about network connections, routing tables, interface statistics, and more. It does not directly provide insights into disk I/O bottlenecks. Option C is incorrect. iftop displays bandwidth usage on an interface by host. It is related to network traffic monitoring and not disk I/O bottlenecks. Option D is incorrect. vmstat displays information about system processes, memory, paging, block IO, traps, and CPU activity. Although it gives an overview of I/O waits, for a detailed disk I/O investigation, iostat would be more appropriate.
Unattempted
Correct Answer: B. iostat Explanation: iostat is a utility that provides statistics about CPU utilization and input/output statistics for devices, partitions, and network filesystems, making it ideal for investigating disk I/O bottlenecks. Option A is incorrect. netstat is a command-line tool that provides information about network connections, routing tables, interface statistics, and more. It does not directly provide insights into disk I/O bottlenecks. Option C is incorrect. iftop displays bandwidth usage on an interface by host. It is related to network traffic monitoring and not disk I/O bottlenecks. Option D is incorrect. vmstat displays information about system processes, memory, paging, block IO, traps, and CPU activity. Although it gives an overview of I/O waits, for a detailed disk I/O investigation, iostat would be more appropriate.
Question 33 of 60
33. Question
An administrator is working with mdadm.conf and wants to ensure that RAID arrays are assembled in a particular order during boot-up. Which directive in the mdadm.conf file should they configure to achieve this?
Correct
Correct Answer: C. ARRAYS Explanation: In the mdadm.conf file, the order in which arrays are listed within the ARRAYS section determines the order of assembly during boot-up. By positioning specific arrays at the beginning of this section, an administrator can ensure they are assembled first. Option A is incorrect. There isn‘t a directive named “STARTUP_ORDER“ in the ′mdadm.conf′ file for specifying the order of RAID assembly. Option B is incorrect. “DEVICE_ORDER“ is not a directive in the ′mdadm.conf′ file, and it does not determine the assembly order of RAID arrays during boot-up. Option D is incorrect. There isn‘t a directive named “BOOT_SEQUENCE“ in the ′mdadm.conf′ file for specifying the order of RAID assembly.
Incorrect
Correct Answer: C. ARRAYS Explanation: In the mdadm.conf file, the order in which arrays are listed within the ARRAYS section determines the order of assembly during boot-up. By positioning specific arrays at the beginning of this section, an administrator can ensure they are assembled first. Option A is incorrect. There isn‘t a directive named “STARTUP_ORDER“ in the ′mdadm.conf′ file for specifying the order of RAID assembly. Option B is incorrect. “DEVICE_ORDER“ is not a directive in the ′mdadm.conf′ file, and it does not determine the assembly order of RAID arrays during boot-up. Option D is incorrect. There isn‘t a directive named “BOOT_SEQUENCE“ in the ′mdadm.conf′ file for specifying the order of RAID assembly.
Unattempted
Correct Answer: C. ARRAYS Explanation: In the mdadm.conf file, the order in which arrays are listed within the ARRAYS section determines the order of assembly during boot-up. By positioning specific arrays at the beginning of this section, an administrator can ensure they are assembled first. Option A is incorrect. There isn‘t a directive named “STARTUP_ORDER“ in the ′mdadm.conf′ file for specifying the order of RAID assembly. Option B is incorrect. “DEVICE_ORDER“ is not a directive in the ′mdadm.conf′ file, and it does not determine the assembly order of RAID arrays during boot-up. Option D is incorrect. There isn‘t a directive named “BOOT_SEQUENCE“ in the ′mdadm.conf′ file for specifying the order of RAID assembly.
Question 34 of 60
34. Question
After replacing a failed disk in a RAID 1 array, an administrator wants to verify that the RAID is resyncing properly. In the /proc/mdstat output, which keyword indicates that the RAID is currently undergoing a resynchronization process?
Correct
Correct Answer: D. [==>……..] Explanation: In the /proc/mdstat output, a series of symbols such as [==>……..] indicates the progress of the RAID resynchronization process. The more symbols, the closer the resynchronization is to completion. Option A is incorrect. The term ′degraded′ in ′/proc/mdstat′ output indicates that one or more devices in the RAID array are missing or failed, and the RAID is not operating at full redundancy. Option B is incorrect. The term ′active′ indicates that the RAID array is currently active and operational but doesn‘t specifically signify a resynchronization process. Option C is incorrect. While the term ′resyncing′ accurately describes what is happening, ′/proc/mdstat′ uses the series of symbols (like ′[==>……..]′) to visually indicate the progress of the resynchronization, rather than the word ′resyncing′.
Incorrect
Correct Answer: D. [==>……..] Explanation: In the /proc/mdstat output, a series of symbols such as [==>……..] indicates the progress of the RAID resynchronization process. The more symbols, the closer the resynchronization is to completion. Option A is incorrect. The term ′degraded′ in ′/proc/mdstat′ output indicates that one or more devices in the RAID array are missing or failed, and the RAID is not operating at full redundancy. Option B is incorrect. The term ′active′ indicates that the RAID array is currently active and operational but doesn‘t specifically signify a resynchronization process. Option C is incorrect. While the term ′resyncing′ accurately describes what is happening, ′/proc/mdstat′ uses the series of symbols (like ′[==>……..]′) to visually indicate the progress of the resynchronization, rather than the word ′resyncing′.
Unattempted
Correct Answer: D. [==>……..] Explanation: In the /proc/mdstat output, a series of symbols such as [==>……..] indicates the progress of the RAID resynchronization process. The more symbols, the closer the resynchronization is to completion. Option A is incorrect. The term ′degraded′ in ′/proc/mdstat′ output indicates that one or more devices in the RAID array are missing or failed, and the RAID is not operating at full redundancy. Option B is incorrect. The term ′active′ indicates that the RAID array is currently active and operational but doesn‘t specifically signify a resynchronization process. Option C is incorrect. While the term ′resyncing′ accurately describes what is happening, ′/proc/mdstat′ uses the series of symbols (like ′[==>……..]′) to visually indicate the progress of the resynchronization, rather than the word ′resyncing′.
Question 35 of 60
35. Question
Lucas is trying to debug a custom service on a legacy system. He needs to run the service in debug mode to obtain more logs. Which command should Lucas use to invoke the debug mode if the initialization script for the service is located in /etc/init.d/ and accepts the “debug” option?
Correct
Correct Answer: C. /etc/init.d/serviceName debug Explanation: On systems using SysV init scripts located in /etc/init.d/, you would invoke a custom command, like “debug“, by appending it to the script path. Hence, /etc/init.d/serviceName debug is the correct way to start the service in debug mode if the script supports it. Option A is incorrect. ′systemctl′ is a command associated with systemd, not SysV init scripts. Option B is incorrect. There‘s no standalone “debug“ command for services in this context. Option D is incorrect. The ′service′ command does allow for control of services, but the syntax provided does not fit with SysV init script conventions.
Incorrect
Correct Answer: C. /etc/init.d/serviceName debug Explanation: On systems using SysV init scripts located in /etc/init.d/, you would invoke a custom command, like “debug“, by appending it to the script path. Hence, /etc/init.d/serviceName debug is the correct way to start the service in debug mode if the script supports it. Option A is incorrect. ′systemctl′ is a command associated with systemd, not SysV init scripts. Option B is incorrect. There‘s no standalone “debug“ command for services in this context. Option D is incorrect. The ′service′ command does allow for control of services, but the syntax provided does not fit with SysV init script conventions.
Unattempted
Correct Answer: C. /etc/init.d/serviceName debug Explanation: On systems using SysV init scripts located in /etc/init.d/, you would invoke a custom command, like “debug“, by appending it to the script path. Hence, /etc/init.d/serviceName debug is the correct way to start the service in debug mode if the script supports it. Option A is incorrect. ′systemctl′ is a command associated with systemd, not SysV init scripts. Option B is incorrect. There‘s no standalone “debug“ command for services in this context. Option D is incorrect. The ′service′ command does allow for control of services, but the syntax provided does not fit with SysV init script conventions.
Question 36 of 60
36. Question
Hector, an experienced sysadmin, needs to disable a particular service from starting at boot on an older Linux system. If he is working within the /etc/rc.d/ directory structure, which of the following directories would he likely navigate to in order to adjust the links for the default runlevel?
Correct
Correct Answer: C. /etc/rc.d/rc5.d/ Explanation: In the SysV init system, the /etc/rc.d/rc5.d/ directory typically contains the scripts and symbolic links that define the services to be started or stopped in runlevel 5, which is the default runlevel for multi-user graphical mode in many Linux distributions. Option A is incorrect. While ′/etc/rc.d/init.d/′ contains the base service scripts, it does not contain the symbolic links defining which services are started or stopped at specific runlevels. Option B is incorrect. ′/etc/rc.d/rc0.d/′ corresponds to runlevel 0, which is typically the system halt or shutdown state. Option D is incorrect. ′/etc/rc.d/boot.d/′ is not a standard directory in the SysV init system for defining runlevel-specific service startups.
Incorrect
Correct Answer: C. /etc/rc.d/rc5.d/ Explanation: In the SysV init system, the /etc/rc.d/rc5.d/ directory typically contains the scripts and symbolic links that define the services to be started or stopped in runlevel 5, which is the default runlevel for multi-user graphical mode in many Linux distributions. Option A is incorrect. While ′/etc/rc.d/init.d/′ contains the base service scripts, it does not contain the symbolic links defining which services are started or stopped at specific runlevels. Option B is incorrect. ′/etc/rc.d/rc0.d/′ corresponds to runlevel 0, which is typically the system halt or shutdown state. Option D is incorrect. ′/etc/rc.d/boot.d/′ is not a standard directory in the SysV init system for defining runlevel-specific service startups.
Unattempted
Correct Answer: C. /etc/rc.d/rc5.d/ Explanation: In the SysV init system, the /etc/rc.d/rc5.d/ directory typically contains the scripts and symbolic links that define the services to be started or stopped in runlevel 5, which is the default runlevel for multi-user graphical mode in many Linux distributions. Option A is incorrect. While ′/etc/rc.d/init.d/′ contains the base service scripts, it does not contain the symbolic links defining which services are started or stopped at specific runlevels. Option B is incorrect. ′/etc/rc.d/rc0.d/′ corresponds to runlevel 0, which is typically the system halt or shutdown state. Option D is incorrect. ′/etc/rc.d/boot.d/′ is not a standard directory in the SysV init system for defining runlevel-specific service startups.
Question 37 of 60
37. Question
Jeremy is compiling a new kernel for an old embedded system. Due to the systemÂ’s constraints, he needs a compressed kernel image. Which of the following kernel image types is compressed and suitable for systems with memory limitations?
Correct
Correct Answer: D. zImage Explanation: The zImage format is a compressed kernel image, designed to be small enough to fit on systems with memory constraints, particularly old embedded systems. Option A is incorrect. While bzImage (big zImage) is also a compressed kernel image format, it‘s suited for modern systems and can be larger than zImage. Option B is incorrect. There is no standard xImage kernel image format in the Linux kernel. Option C is incorrect. vmlinux is an uncompressed kernel image, which isn‘t suitable for systems with severe memory constraints.
Incorrect
Correct Answer: D. zImage Explanation: The zImage format is a compressed kernel image, designed to be small enough to fit on systems with memory constraints, particularly old embedded systems. Option A is incorrect. While bzImage (big zImage) is also a compressed kernel image format, it‘s suited for modern systems and can be larger than zImage. Option B is incorrect. There is no standard xImage kernel image format in the Linux kernel. Option C is incorrect. vmlinux is an uncompressed kernel image, which isn‘t suitable for systems with severe memory constraints.
Unattempted
Correct Answer: D. zImage Explanation: The zImage format is a compressed kernel image, designed to be small enough to fit on systems with memory constraints, particularly old embedded systems. Option A is incorrect. While bzImage (big zImage) is also a compressed kernel image format, it‘s suited for modern systems and can be larger than zImage. Option B is incorrect. There is no standard xImage kernel image format in the Linux kernel. Option C is incorrect. vmlinux is an uncompressed kernel image, which isn‘t suitable for systems with severe memory constraints.
Question 38 of 60
38. Question
After updating the /etc/fstab file, you want to ensure that all the entries are correct without rebooting the system or unmounting and remounting the filesystems. Which command allows you to test the new entries without affecting the currently mounted filesystems?
Correct
Correct Answer: B. mount –fake Explanation: The mount –fake or mount -f command will do a “fake“ mount, which means it wonÂ’t actually mount the filesystem, but will only go through the motions to check if everything is correct. Option A is incorrect. The ′mount -a′ command attempts to mount all filesystems mentioned in ′/etc/fstab′. This could disrupt currently mounted filesystems if there are errors. Option C is incorrect. There is no ′–fstab-only′ option with the ′mount′ command. Option D is incorrect. The ′mount -o remount′ command is used to remount an already-mounted filesystem, potentially with different options. This doesn‘t check new entries in ′/etc/fstab′.
Incorrect
Correct Answer: B. mount –fake Explanation: The mount –fake or mount -f command will do a “fake“ mount, which means it wonÂ’t actually mount the filesystem, but will only go through the motions to check if everything is correct. Option A is incorrect. The ′mount -a′ command attempts to mount all filesystems mentioned in ′/etc/fstab′. This could disrupt currently mounted filesystems if there are errors. Option C is incorrect. There is no ′–fstab-only′ option with the ′mount′ command. Option D is incorrect. The ′mount -o remount′ command is used to remount an already-mounted filesystem, potentially with different options. This doesn‘t check new entries in ′/etc/fstab′.
Unattempted
Correct Answer: B. mount –fake Explanation: The mount –fake or mount -f command will do a “fake“ mount, which means it wonÂ’t actually mount the filesystem, but will only go through the motions to check if everything is correct. Option A is incorrect. The ′mount -a′ command attempts to mount all filesystems mentioned in ′/etc/fstab′. This could disrupt currently mounted filesystems if there are errors. Option C is incorrect. There is no ′–fstab-only′ option with the ′mount′ command. Option D is incorrect. The ′mount -o remount′ command is used to remount an already-mounted filesystem, potentially with different options. This doesn‘t check new entries in ′/etc/fstab′.
Question 39 of 60
39. Question
A system administrator wants to specify the location of the spare devices that are part of the software RAID array configuration. Which section within the mdadm.conf file is dedicated to listing these spare devices?
Correct
Correct Answer: D. SPAREGROUPS Explanation: In the mdadm.conf file, the SPAREGROUPS section is used to specify spare devices that are part of the software RAID configuration. These are devices that can be automatically utilized in case one of the devices in the RAID array fails. Option A is incorrect. While “SPARES“ might seem like the logical section for listing spare devices, there isn‘t a direct section named “SPARES“ in ′mdadm.conf′ for this purpose. Option B is incorrect. The ′DEVICES′ section is used to specify which devices can be considered by ′mdadm′ for assembly of RAID arrays. It doesn‘t specifically focus on spare devices. Option C is incorrect. The ′ARRAYS′ section is used to define specific arrays and their properties, not specifically for spare devices.
Incorrect
Correct Answer: D. SPAREGROUPS Explanation: In the mdadm.conf file, the SPAREGROUPS section is used to specify spare devices that are part of the software RAID configuration. These are devices that can be automatically utilized in case one of the devices in the RAID array fails. Option A is incorrect. While “SPARES“ might seem like the logical section for listing spare devices, there isn‘t a direct section named “SPARES“ in ′mdadm.conf′ for this purpose. Option B is incorrect. The ′DEVICES′ section is used to specify which devices can be considered by ′mdadm′ for assembly of RAID arrays. It doesn‘t specifically focus on spare devices. Option C is incorrect. The ′ARRAYS′ section is used to define specific arrays and their properties, not specifically for spare devices.
Unattempted
Correct Answer: D. SPAREGROUPS Explanation: In the mdadm.conf file, the SPAREGROUPS section is used to specify spare devices that are part of the software RAID configuration. These are devices that can be automatically utilized in case one of the devices in the RAID array fails. Option A is incorrect. While “SPARES“ might seem like the logical section for listing spare devices, there isn‘t a direct section named “SPARES“ in ′mdadm.conf′ for this purpose. Option B is incorrect. The ′DEVICES′ section is used to specify which devices can be considered by ′mdadm′ for assembly of RAID arrays. It doesn‘t specifically focus on spare devices. Option C is incorrect. The ′ARRAYS′ section is used to define specific arrays and their properties, not specifically for spare devices.
Question 40 of 60
40. Question
You need to create a compressed archive of a directory named “project“ using the tar command with gzip compression. What command should you use?
Correct
Correct Answer: A. tar -czvf project.tar.gz project Explanation: The correct command to create a compressed archive of a directory using tar with gzip compression is tar -czvf project.tar.gz project. This command creates a tar archive, compresses it with gzip, and names the resulting file “project.tar.gz.“ Option B is incorrect because it lacks the ′-z′ option needed for gzip compression. The correct command for gzip compression with tar is ′tar -czvf′. Option C is incorrect because it uses the ′gzip′ command separately and does not create a tar archive. The correct command for creating a compressed tar archive is ′tar -czvf′. Option D is incorrect because it uses the ′zip′ command, which is not compatible with tar archives. The correct command for creating a compressed tar archive is ′tar -czvf′.
Incorrect
Correct Answer: A. tar -czvf project.tar.gz project Explanation: The correct command to create a compressed archive of a directory using tar with gzip compression is tar -czvf project.tar.gz project. This command creates a tar archive, compresses it with gzip, and names the resulting file “project.tar.gz.“ Option B is incorrect because it lacks the ′-z′ option needed for gzip compression. The correct command for gzip compression with tar is ′tar -czvf′. Option C is incorrect because it uses the ′gzip′ command separately and does not create a tar archive. The correct command for creating a compressed tar archive is ′tar -czvf′. Option D is incorrect because it uses the ′zip′ command, which is not compatible with tar archives. The correct command for creating a compressed tar archive is ′tar -czvf′.
Unattempted
Correct Answer: A. tar -czvf project.tar.gz project Explanation: The correct command to create a compressed archive of a directory using tar with gzip compression is tar -czvf project.tar.gz project. This command creates a tar archive, compresses it with gzip, and names the resulting file “project.tar.gz.“ Option B is incorrect because it lacks the ′-z′ option needed for gzip compression. The correct command for gzip compression with tar is ′tar -czvf′. Option C is incorrect because it uses the ′gzip′ command separately and does not create a tar archive. The correct command for creating a compressed tar archive is ′tar -czvf′. Option D is incorrect because it uses the ′zip′ command, which is not compatible with tar archives. The correct command for creating a compressed tar archive is ′tar -czvf′.
Question 41 of 60
41. Question
Sarah is a systems administrator and has just finished configuring the kernel using make menuconfig. She now needs to build the new kernel as well as the associated kernel modules. Which two commands should Sarah use in the correct order to accomplish this?
Correct
Correct Answer: A. make bzImage then make modules Explanation: First, Sarah would build the new kernel using make bzImage. Once that‘s done, she would then compile the appropriate kernel modules using make modules. Option B is incorrect. Kernel modules should be compiled after the main kernel image, not before. Option C is incorrect. Both make oldconfig and make menuconfig are related to configuring the kernel, not compiling it or its modules. Option D is incorrect. make clean removes intermediate files created during the previous compilation. make modules_install installs the modules, but it doesn‘t build them.
Incorrect
Correct Answer: A. make bzImage then make modules Explanation: First, Sarah would build the new kernel using make bzImage. Once that‘s done, she would then compile the appropriate kernel modules using make modules. Option B is incorrect. Kernel modules should be compiled after the main kernel image, not before. Option C is incorrect. Both make oldconfig and make menuconfig are related to configuring the kernel, not compiling it or its modules. Option D is incorrect. make clean removes intermediate files created during the previous compilation. make modules_install installs the modules, but it doesn‘t build them.
Unattempted
Correct Answer: A. make bzImage then make modules Explanation: First, Sarah would build the new kernel using make bzImage. Once that‘s done, she would then compile the appropriate kernel modules using make modules. Option B is incorrect. Kernel modules should be compiled after the main kernel image, not before. Option C is incorrect. Both make oldconfig and make menuconfig are related to configuring the kernel, not compiling it or its modules. Option D is incorrect. make clean removes intermediate files created during the previous compilation. make modules_install installs the modules, but it doesn‘t build them.
Question 42 of 60
42. Question
On a Linux system using the SysV init system, Maria is trying to see the current status of all system services across different runlevels. Which command utilizing chkconfig will allow her to view this information?
Correct
Correct Answer: A. chkconfig –list Explanation: The chkconfig –list command displays the status of services across different runlevels. This allows administrators to quickly view and evaluate which services are active or inactive in each runlevel. Option B is incorrect. ′chkconfig –all′ is not a valid ′chkconfig′ command for listing all services. Option C is incorrect. While ′chkconfig –status-all′ does exist, it lists services with their status but not across all runlevels in a comprehensive manner like ′chkconfig –list′ does. Option D is incorrect. ′chkconfig –show′ is not a valid option for the ′chkconfig′ utility.
Incorrect
Correct Answer: A. chkconfig –list Explanation: The chkconfig –list command displays the status of services across different runlevels. This allows administrators to quickly view and evaluate which services are active or inactive in each runlevel. Option B is incorrect. ′chkconfig –all′ is not a valid ′chkconfig′ command for listing all services. Option C is incorrect. While ′chkconfig –status-all′ does exist, it lists services with their status but not across all runlevels in a comprehensive manner like ′chkconfig –list′ does. Option D is incorrect. ′chkconfig –show′ is not a valid option for the ′chkconfig′ utility.
Unattempted
Correct Answer: A. chkconfig –list Explanation: The chkconfig –list command displays the status of services across different runlevels. This allows administrators to quickly view and evaluate which services are active or inactive in each runlevel. Option B is incorrect. ′chkconfig –all′ is not a valid ′chkconfig′ command for listing all services. Option C is incorrect. While ′chkconfig –status-all′ does exist, it lists services with their status but not across all runlevels in a comprehensive manner like ′chkconfig –list′ does. Option D is incorrect. ′chkconfig –show′ is not a valid option for the ′chkconfig′ utility.
Question 43 of 60
43. Question
Emily, a system administrator, has been facing performance issues on her server. Upon investigation, she discovers that a malfunctioning application has been intensively using the swap space. She decides to temporarily deactivate the swap space /dev/sda2 without affecting other running applications. Which command should Emily use?
Correct
Correct Answer: C. swapoff /dev/sda2 Explanation: The swapoff command is used to disable swap devices or files. In this scenario, to deactivate the swap space /dev/sda2, Emily should use swapoff /dev/sda2. Option A is incorrect. There‘s no standard command named ′unswap′ for deactivating swap in Linux. Option B is incorrect. Though ′swapoff′ is the correct command, ′/dev/sda1′ is not the swap space in question. Emily wants to deactivate ′/dev/sda2′. Option D is incorrect. There‘s no standard command named ′remove-swap′ for deactivating swap in Linux.
Incorrect
Correct Answer: C. swapoff /dev/sda2 Explanation: The swapoff command is used to disable swap devices or files. In this scenario, to deactivate the swap space /dev/sda2, Emily should use swapoff /dev/sda2. Option A is incorrect. There‘s no standard command named ′unswap′ for deactivating swap in Linux. Option B is incorrect. Though ′swapoff′ is the correct command, ′/dev/sda1′ is not the swap space in question. Emily wants to deactivate ′/dev/sda2′. Option D is incorrect. There‘s no standard command named ′remove-swap′ for deactivating swap in Linux.
Unattempted
Correct Answer: C. swapoff /dev/sda2 Explanation: The swapoff command is used to disable swap devices or files. In this scenario, to deactivate the swap space /dev/sda2, Emily should use swapoff /dev/sda2. Option A is incorrect. There‘s no standard command named ′unswap′ for deactivating swap in Linux. Option B is incorrect. Though ′swapoff′ is the correct command, ′/dev/sda1′ is not the swap space in question. Emily wants to deactivate ′/dev/sda2′. Option D is incorrect. There‘s no standard command named ′remove-swap′ for deactivating swap in Linux.
Question 44 of 60
44. Question
Alex wants to prepare the kernel source code for compilation. He needs to ensure that all source files have their dependencies properly set and that certain files are linked correctly. Which make target should Alex use to prepare the kernel source for building?
Correct
Correct Answer: B. make prepare Explanation: The make prepare target is specifically used to prepare the kernel source for building. It ensures all source file dependencies are in place and performs some initial linkages needed for compilation. Option A is incorrect. make oldconfig is used to take the current kernel‘s configuration and migrate it to the new kernel‘s setup, prompting for any new options or changes. Option C is incorrect. make clean is used to clean up the kernel source directory by removing compiled objects and other build artifacts. Option D is incorrect. make modules_install is used to install kernel modules after the kernel has been compiled.
Incorrect
Correct Answer: B. make prepare Explanation: The make prepare target is specifically used to prepare the kernel source for building. It ensures all source file dependencies are in place and performs some initial linkages needed for compilation. Option A is incorrect. make oldconfig is used to take the current kernel‘s configuration and migrate it to the new kernel‘s setup, prompting for any new options or changes. Option C is incorrect. make clean is used to clean up the kernel source directory by removing compiled objects and other build artifacts. Option D is incorrect. make modules_install is used to install kernel modules after the kernel has been compiled.
Unattempted
Correct Answer: B. make prepare Explanation: The make prepare target is specifically used to prepare the kernel source for building. It ensures all source file dependencies are in place and performs some initial linkages needed for compilation. Option A is incorrect. make oldconfig is used to take the current kernel‘s configuration and migrate it to the new kernel‘s setup, prompting for any new options or changes. Option C is incorrect. make clean is used to clean up the kernel source directory by removing compiled objects and other build artifacts. Option D is incorrect. make modules_install is used to install kernel modules after the kernel has been compiled.
Question 45 of 60
45. Question
Alex has just made several critical changes to a system and wants to take a snapshot of his Btrfs filesystem mounted at /mnt/system before continuing. He intends to name this snapshot ‘pre-upgrade’. Which command will correctly accomplish this?
Correct
Correct Answer: B. btrfs subvolume snapshot /mnt/system /mnt/system/pre-upgrade Explanation: The btrfs subvolume snapshot command is utilized to create a snapshot of a Btrfs subvolume. The first path is the source subvolume, and the second path is where the snapshot will be created. Option A is incorrect. There‘s no ′btrfs snapshot save′ command in standard Btrfs utilities. Option C is incorrect. The correct syntax to create a snapshot is ′btrfs subvolume snapshot′, not ′btrfs subvolume save′. Option D is incorrect. The correct syntax is ′btrfs subvolume snapshot′, not ′btrfs create snapshot′.
Incorrect
Correct Answer: B. btrfs subvolume snapshot /mnt/system /mnt/system/pre-upgrade Explanation: The btrfs subvolume snapshot command is utilized to create a snapshot of a Btrfs subvolume. The first path is the source subvolume, and the second path is where the snapshot will be created. Option A is incorrect. There‘s no ′btrfs snapshot save′ command in standard Btrfs utilities. Option C is incorrect. The correct syntax to create a snapshot is ′btrfs subvolume snapshot′, not ′btrfs subvolume save′. Option D is incorrect. The correct syntax is ′btrfs subvolume snapshot′, not ′btrfs create snapshot′.
Unattempted
Correct Answer: B. btrfs subvolume snapshot /mnt/system /mnt/system/pre-upgrade Explanation: The btrfs subvolume snapshot command is utilized to create a snapshot of a Btrfs subvolume. The first path is the source subvolume, and the second path is where the snapshot will be created. Option A is incorrect. There‘s no ′btrfs snapshot save′ command in standard Btrfs utilities. Option C is incorrect. The correct syntax to create a snapshot is ′btrfs subvolume snapshot′, not ′btrfs subvolume save′. Option D is incorrect. The correct syntax is ′btrfs subvolume snapshot′, not ′btrfs create snapshot′.
Question 46 of 60
46. Question
While attempting to compile a program from source, you need to locate the default directory where source files are stored. What is the standard location for storing source files?
Correct
Correct Answer: A. /usr/src Explanation: The standard location for storing source files by default is /usr/src. This directory is commonly used to keep the source code for various software packages on Linux systems. Option B is incorrect. Option B is incorrect because there is no standard directory named ′/opt/sources′ for storing source files. The convention is to use ′/usr/src′. Option C is incorrect. Option C is incorrect because there is no standard directory named ′/var/sourcecode′ for storing source files. The convention is to use ′/usr/src′. Option D is incorrect. Option D is incorrect because ′/usr/local/src′ is not the standard location for storing source files. The convention is to use ′/usr/src′.
Incorrect
Correct Answer: A. /usr/src Explanation: The standard location for storing source files by default is /usr/src. This directory is commonly used to keep the source code for various software packages on Linux systems. Option B is incorrect. Option B is incorrect because there is no standard directory named ′/opt/sources′ for storing source files. The convention is to use ′/usr/src′. Option C is incorrect. Option C is incorrect because there is no standard directory named ′/var/sourcecode′ for storing source files. The convention is to use ′/usr/src′. Option D is incorrect. Option D is incorrect because ′/usr/local/src′ is not the standard location for storing source files. The convention is to use ′/usr/src′.
Unattempted
Correct Answer: A. /usr/src Explanation: The standard location for storing source files by default is /usr/src. This directory is commonly used to keep the source code for various software packages on Linux systems. Option B is incorrect. Option B is incorrect because there is no standard directory named ′/opt/sources′ for storing source files. The convention is to use ′/usr/src′. Option C is incorrect. Option C is incorrect because there is no standard directory named ′/var/sourcecode′ for storing source files. The convention is to use ′/usr/src′. Option D is incorrect. Option D is incorrect because ′/usr/local/src′ is not the standard location for storing source files. The convention is to use ′/usr/src′.
Question 47 of 60
47. Question
As a system administrator, youÂ’re setting up a new disk on your server. Before adding its entry to /etc/fstab, you need to determine the UUID of the new disk partition. Which command would you use?
Correct
Correct Answer: A. blkid /dev/sdb1 Explanation: The blkid command is used to display the UUID and other attributes of block devices. By providing the device‘s path, such as /dev/sdb1, the blkid command will display its UUID along with other details. Option B is incorrect. The ′mount′ command with ′-U′ option doesn‘t exist. The ′mount′ command is generally used for mounting filesystems, not for retrieving UUIDs. Option C is incorrect. The ′umount′ command is used for unmounting filesystems, not for fetching UUIDs or other details of a block device. Option D is incorrect. The ′df -h′ command displays disk usage statistics in human-readable format, but it does not display the UUID of block devices.
Incorrect
Correct Answer: A. blkid /dev/sdb1 Explanation: The blkid command is used to display the UUID and other attributes of block devices. By providing the device‘s path, such as /dev/sdb1, the blkid command will display its UUID along with other details. Option B is incorrect. The ′mount′ command with ′-U′ option doesn‘t exist. The ′mount′ command is generally used for mounting filesystems, not for retrieving UUIDs. Option C is incorrect. The ′umount′ command is used for unmounting filesystems, not for fetching UUIDs or other details of a block device. Option D is incorrect. The ′df -h′ command displays disk usage statistics in human-readable format, but it does not display the UUID of block devices.
Unattempted
Correct Answer: A. blkid /dev/sdb1 Explanation: The blkid command is used to display the UUID and other attributes of block devices. By providing the device‘s path, such as /dev/sdb1, the blkid command will display its UUID along with other details. Option B is incorrect. The ′mount′ command with ′-U′ option doesn‘t exist. The ′mount′ command is generally used for mounting filesystems, not for retrieving UUIDs. Option C is incorrect. The ′umount′ command is used for unmounting filesystems, not for fetching UUIDs or other details of a block device. Option D is incorrect. The ′df -h′ command displays disk usage statistics in human-readable format, but it does not display the UUID of block devices.
Question 48 of 60
48. Question
A Linux system administrator is trying to troubleshoot a server that seems to be under a SYN flood attack. They want to use the ss tool to monitor SYN-RECV TCP states, which will help confirm the attack. Which of the following commands will provide the desired output?
Correct
Correct Answer: B. ss -ta | grep SYN-RECV Explanation: The ss -ta command displays all TCP sockets. Piping this to grep SYN-RECV filters the output to show only the sockets in the SYN-RECV state, which indicates a half-open connection, common in SYN flood attacks. Option A is incorrect. The ss -tuln command displays listening TCP and UDP sockets without resolving names, but it doesn‘t specifically show sockets in the SYN-RECV state. Option C is incorrect. The ss -tl | grep SYN command will display only the listening TCP sockets and then filter for the term “SYN“. This will not effectively capture sockets in the SYN-RECV state. Option D is incorrect. The ss -tu | grep LISTEN command will display both TCP and UDP sockets but then filters for the LISTEN state, which doesn‘t directly indicate a SYN flood attack.
Incorrect
Correct Answer: B. ss -ta | grep SYN-RECV Explanation: The ss -ta command displays all TCP sockets. Piping this to grep SYN-RECV filters the output to show only the sockets in the SYN-RECV state, which indicates a half-open connection, common in SYN flood attacks. Option A is incorrect. The ss -tuln command displays listening TCP and UDP sockets without resolving names, but it doesn‘t specifically show sockets in the SYN-RECV state. Option C is incorrect. The ss -tl | grep SYN command will display only the listening TCP sockets and then filter for the term “SYN“. This will not effectively capture sockets in the SYN-RECV state. Option D is incorrect. The ss -tu | grep LISTEN command will display both TCP and UDP sockets but then filters for the LISTEN state, which doesn‘t directly indicate a SYN flood attack.
Unattempted
Correct Answer: B. ss -ta | grep SYN-RECV Explanation: The ss -ta command displays all TCP sockets. Piping this to grep SYN-RECV filters the output to show only the sockets in the SYN-RECV state, which indicates a half-open connection, common in SYN flood attacks. Option A is incorrect. The ss -tuln command displays listening TCP and UDP sockets without resolving names, but it doesn‘t specifically show sockets in the SYN-RECV state. Option C is incorrect. The ss -tl | grep SYN command will display only the listening TCP sockets and then filter for the term “SYN“. This will not effectively capture sockets in the SYN-RECV state. Option D is incorrect. The ss -tu | grep LISTEN command will display both TCP and UDP sockets but then filters for the LISTEN state, which doesn‘t directly indicate a SYN flood attack.
Question 49 of 60
49. Question
A system administrator is setting up a server that incorporates a combination of AHCI-based SATA SSDs and NVMe SSDs. They need to optimize the drives for Linux. While they already have hdparm installed, which additional utility should they install for comprehensive management of both AHCI and NVMe SSDs?
Correct
Correct Answer: D. nvme-cli Explanation: The nvme-cli tool allows administrators to manage NVMe drives effectively, while hdparm (already installed) can be used for AHCI-based SATA SSDs. Option A is incorrect. ′nvme-ahci′ is not a standard Linux utility for managing SSDs. Option B is incorrect. While ′smartctl′ provides some monitoring capabilities for both SATA and NVMe drives, it doesn‘t offer the comprehensive management capabilities of ′hdparm′ and ′nvme-cli′ for their respective drive types. Option C is incorrect. ′ssd-toolkit′ is not a standard or recognized utility for managing SSDs in Linux.
Incorrect
Correct Answer: D. nvme-cli Explanation: The nvme-cli tool allows administrators to manage NVMe drives effectively, while hdparm (already installed) can be used for AHCI-based SATA SSDs. Option A is incorrect. ′nvme-ahci′ is not a standard Linux utility for managing SSDs. Option B is incorrect. While ′smartctl′ provides some monitoring capabilities for both SATA and NVMe drives, it doesn‘t offer the comprehensive management capabilities of ′hdparm′ and ′nvme-cli′ for their respective drive types. Option C is incorrect. ′ssd-toolkit′ is not a standard or recognized utility for managing SSDs in Linux.
Unattempted
Correct Answer: D. nvme-cli Explanation: The nvme-cli tool allows administrators to manage NVMe drives effectively, while hdparm (already installed) can be used for AHCI-based SATA SSDs. Option A is incorrect. ′nvme-ahci′ is not a standard Linux utility for managing SSDs. Option B is incorrect. While ′smartctl′ provides some monitoring capabilities for both SATA and NVMe drives, it doesn‘t offer the comprehensive management capabilities of ′hdparm′ and ′nvme-cli′ for their respective drive types. Option C is incorrect. ′ssd-toolkit′ is not a standard or recognized utility for managing SSDs in Linux.
Question 50 of 60
50. Question
John is a systems administrator and has been tasked with compiling a new kernel. Before doing so, he wants to use a text-based interface to customize the current kernelÂ’s configuration. Which command should he use to achieve this?
Correct
Correct Answer: B. make menuconfig Explanation: The make menuconfig command presents a text-based interface (with a menu-driven approach) that allows users to customize the kernel‘s configuration. This is commonly used to enable or disable specific kernel features or modules. Option A is incorrect. make xconfig is a graphical interface for kernel configuration using the Qt framework. Option C is incorrect. make bzImage is a command used to build the compressed kernel image but doesn‘t involve configuration. Option D is incorrect. make modules_install is used to install kernel modules after the kernel has been compiled.
Incorrect
Correct Answer: B. make menuconfig Explanation: The make menuconfig command presents a text-based interface (with a menu-driven approach) that allows users to customize the kernel‘s configuration. This is commonly used to enable or disable specific kernel features or modules. Option A is incorrect. make xconfig is a graphical interface for kernel configuration using the Qt framework. Option C is incorrect. make bzImage is a command used to build the compressed kernel image but doesn‘t involve configuration. Option D is incorrect. make modules_install is used to install kernel modules after the kernel has been compiled.
Unattempted
Correct Answer: B. make menuconfig Explanation: The make menuconfig command presents a text-based interface (with a menu-driven approach) that allows users to customize the kernel‘s configuration. This is commonly used to enable or disable specific kernel features or modules. Option A is incorrect. make xconfig is a graphical interface for kernel configuration using the Qt framework. Option C is incorrect. make bzImage is a command used to build the compressed kernel image but doesn‘t involve configuration. Option D is incorrect. make modules_install is used to install kernel modules after the kernel has been compiled.
Question 51 of 60
51. Question
You are preparing to compile a program from source, and you need to configure the build parameters. What command should you use to generate the necessary makefiles for the build?
Correct
Correct Answer: D. configure Explanation: The correct command to generate the necessary makefiles for the build configuration is ./configure. The configure script evaluates your system and sets up the build environment accordingly. Option A is incorrect because there is no standard command ′make config′ for configuring the build parameters. The correct command is ′./configure′. Option B is incorrect because ′autoconf′ is a tool used to generate configure scripts, not the command used for configuring the build. The correct command is ′./configure′. Option C is incorrect because ′cmake′ is another build system with its own configuration process, and it is not typically used with the ′configure′ script. The correct command for the ′configure′ script is ′./configure′.
Incorrect
Correct Answer: D. configure Explanation: The correct command to generate the necessary makefiles for the build configuration is ./configure. The configure script evaluates your system and sets up the build environment accordingly. Option A is incorrect because there is no standard command ′make config′ for configuring the build parameters. The correct command is ′./configure′. Option B is incorrect because ′autoconf′ is a tool used to generate configure scripts, not the command used for configuring the build. The correct command is ′./configure′. Option C is incorrect because ′cmake′ is another build system with its own configuration process, and it is not typically used with the ′configure′ script. The correct command for the ′configure′ script is ′./configure′.
Unattempted
Correct Answer: D. configure Explanation: The correct command to generate the necessary makefiles for the build configuration is ./configure. The configure script evaluates your system and sets up the build environment accordingly. Option A is incorrect because there is no standard command ′make config′ for configuring the build parameters. The correct command is ′./configure′. Option B is incorrect because ′autoconf′ is a tool used to generate configure scripts, not the command used for configuring the build. The correct command is ′./configure′. Option C is incorrect because ′cmake′ is another build system with its own configuration process, and it is not typically used with the ′configure′ script. The correct command for the ′configure′ script is ′./configure′.
Question 52 of 60
52. Question
James wants to make sure that a specific kernel module mymodule gets loaded with a particular option at boot time. Which file is typically used to specify module options that should be applied during the boot process?
Correct
Correct Answer: C. /etc/modprobe.d/mymodule.conf Explanation: The /etc/modprobe.d/ directory contains configuration files that can be used to set options for modules as they are loaded. Creating a file named after the module (e.g., mymodule.conf) is a common convention to specify options for that particular module. Option A is incorrect. While /etc/modprobe.d/ is the correct directory, there isn‘t a standard “options“ file used for module configurations. Instead, configurations are typically named after the relevant module. Option B is incorrect. /etc/modules.conf is an older configuration file from before the 2.6 Linux kernel. In modern systems, /etc/modprobe.d/ is the directory used for module configurations. Option D is incorrect. The /etc/modules-load.d/ directory contains configurations for modules that should be explicitly loaded at boot time, but it is not used for specifying module options.
Incorrect
Correct Answer: C. /etc/modprobe.d/mymodule.conf Explanation: The /etc/modprobe.d/ directory contains configuration files that can be used to set options for modules as they are loaded. Creating a file named after the module (e.g., mymodule.conf) is a common convention to specify options for that particular module. Option A is incorrect. While /etc/modprobe.d/ is the correct directory, there isn‘t a standard “options“ file used for module configurations. Instead, configurations are typically named after the relevant module. Option B is incorrect. /etc/modules.conf is an older configuration file from before the 2.6 Linux kernel. In modern systems, /etc/modprobe.d/ is the directory used for module configurations. Option D is incorrect. The /etc/modules-load.d/ directory contains configurations for modules that should be explicitly loaded at boot time, but it is not used for specifying module options.
Unattempted
Correct Answer: C. /etc/modprobe.d/mymodule.conf Explanation: The /etc/modprobe.d/ directory contains configuration files that can be used to set options for modules as they are loaded. Creating a file named after the module (e.g., mymodule.conf) is a common convention to specify options for that particular module. Option A is incorrect. While /etc/modprobe.d/ is the correct directory, there isn‘t a standard “options“ file used for module configurations. Instead, configurations are typically named after the relevant module. Option B is incorrect. /etc/modules.conf is an older configuration file from before the 2.6 Linux kernel. In modern systems, /etc/modprobe.d/ is the directory used for module configurations. Option D is incorrect. The /etc/modules-load.d/ directory contains configurations for modules that should be explicitly loaded at boot time, but it is not used for specifying module options.
Question 53 of 60
53. Question
During peak times, the network becomes slow and the administrator suspects that a particular host might be generating a lot of traffic. To monitor traffic statistics by IP addresses using iptraf, which option should the administrator select from the main interactive menu?
Correct
Correct Answer: B. IP traffic monitor Explanation: The “IP traffic monitor“ option in the iptraf interactive menu will provide a real-time display of IP packets‘ data sizes received and transmitted by hosts. Option A is incorrect. “Detailed interface statistics“ provides statistics based on the network interface, not on IP addresses. Option C is incorrect. “General interface statistics“ provides general data about the network interface, such as total packets and total bytes, but not broken down by IP address. Option D is incorrect. “Statistical breakdowns“ provide data based on packet size, protocol, and other factors, but it doesn‘t provide a real-time display of data sizes received and transmitted by individual hosts like the “IP traffic monitor“ does.
Incorrect
Correct Answer: B. IP traffic monitor Explanation: The “IP traffic monitor“ option in the iptraf interactive menu will provide a real-time display of IP packets‘ data sizes received and transmitted by hosts. Option A is incorrect. “Detailed interface statistics“ provides statistics based on the network interface, not on IP addresses. Option C is incorrect. “General interface statistics“ provides general data about the network interface, such as total packets and total bytes, but not broken down by IP address. Option D is incorrect. “Statistical breakdowns“ provide data based on packet size, protocol, and other factors, but it doesn‘t provide a real-time display of data sizes received and transmitted by individual hosts like the “IP traffic monitor“ does.
Unattempted
Correct Answer: B. IP traffic monitor Explanation: The “IP traffic monitor“ option in the iptraf interactive menu will provide a real-time display of IP packets‘ data sizes received and transmitted by hosts. Option A is incorrect. “Detailed interface statistics“ provides statistics based on the network interface, not on IP addresses. Option C is incorrect. “General interface statistics“ provides general data about the network interface, such as total packets and total bytes, but not broken down by IP address. Option D is incorrect. “Statistical breakdowns“ provide data based on packet size, protocol, and other factors, but it doesn‘t provide a real-time display of data sizes received and transmitted by individual hosts like the “IP traffic monitor“ does.
Question 54 of 60
54. Question
During a system boot-up, Samuel noticed that his server doesnÂ’t progress beyond the bootloader stage. He wants to manually edit the kernel boot parameters for a single session. Using GRUB version 2, which key should he press during boot-up to edit the kernel parameters?
Correct
Correct Answer: D. E Explanation: In GRUB version 2, pressing the ‘E‘ key during boot-up allows users to edit the commands before the boot process continues, making it useful for troubleshooting and modifying kernel parameters temporarily. Option A is incorrect. F2 doesn‘t serve this specific purpose in the context of GRUB. Option B is incorrect. Del is often used to enter BIOS/UEFI settings but is not the correct key for editing kernel parameters in GRUB. Option C is incorrect. F8 doesn‘t have a function related to kernel parameter editing in GRUB.
Incorrect
Correct Answer: D. E Explanation: In GRUB version 2, pressing the ‘E‘ key during boot-up allows users to edit the commands before the boot process continues, making it useful for troubleshooting and modifying kernel parameters temporarily. Option A is incorrect. F2 doesn‘t serve this specific purpose in the context of GRUB. Option B is incorrect. Del is often used to enter BIOS/UEFI settings but is not the correct key for editing kernel parameters in GRUB. Option C is incorrect. F8 doesn‘t have a function related to kernel parameter editing in GRUB.
Unattempted
Correct Answer: D. E Explanation: In GRUB version 2, pressing the ‘E‘ key during boot-up allows users to edit the commands before the boot process continues, making it useful for troubleshooting and modifying kernel parameters temporarily. Option A is incorrect. F2 doesn‘t serve this specific purpose in the context of GRUB. Option B is incorrect. Del is often used to enter BIOS/UEFI settings but is not the correct key for editing kernel parameters in GRUB. Option C is incorrect. F8 doesn‘t have a function related to kernel parameter editing in GRUB.
Question 55 of 60
55. Question
Peter, a junior administrator, is trying to unmount a filesystem using the umount command, but he keeps receiving an error that the target is busy. WhatÂ’s the most common reason for this issue, and how can he resolve it?
Correct
Correct Answer: B. Peter is currently in the directory of the mounted filesystem Explanation: One of the common reasons why a filesystem reports as “busy“ when trying to unmount is that a user (or process) is currently working within that directory or has a file open from that filesystem. Peter should ensure that he‘s not in the directory of the mounted filesystem and that no processes are using files from it. Option A is incorrect. While filesystem corruption can cause various issues, the error “target is busy“ when unmounting is more commonly related to ongoing activities within the mounted filesystem. Option C is incorrect. While certain operations do require root privileges, the error message “target is busy“ isn‘t typically associated with a lack of permissions. Option D is incorrect. If the filesystem didn‘t exist or wasn‘t mounted, Peter wouldn‘t be receiving a “busy“ error. Instead, he‘d get a different error indicating that the specified target isn‘t mounted.
Incorrect
Correct Answer: B. Peter is currently in the directory of the mounted filesystem Explanation: One of the common reasons why a filesystem reports as “busy“ when trying to unmount is that a user (or process) is currently working within that directory or has a file open from that filesystem. Peter should ensure that he‘s not in the directory of the mounted filesystem and that no processes are using files from it. Option A is incorrect. While filesystem corruption can cause various issues, the error “target is busy“ when unmounting is more commonly related to ongoing activities within the mounted filesystem. Option C is incorrect. While certain operations do require root privileges, the error message “target is busy“ isn‘t typically associated with a lack of permissions. Option D is incorrect. If the filesystem didn‘t exist or wasn‘t mounted, Peter wouldn‘t be receiving a “busy“ error. Instead, he‘d get a different error indicating that the specified target isn‘t mounted.
Unattempted
Correct Answer: B. Peter is currently in the directory of the mounted filesystem Explanation: One of the common reasons why a filesystem reports as “busy“ when trying to unmount is that a user (or process) is currently working within that directory or has a file open from that filesystem. Peter should ensure that he‘s not in the directory of the mounted filesystem and that no processes are using files from it. Option A is incorrect. While filesystem corruption can cause various issues, the error “target is busy“ when unmounting is more commonly related to ongoing activities within the mounted filesystem. Option C is incorrect. While certain operations do require root privileges, the error message “target is busy“ isn‘t typically associated with a lack of permissions. Option D is incorrect. If the filesystem didn‘t exist or wasn‘t mounted, Peter wouldn‘t be receiving a “busy“ error. Instead, he‘d get a different error indicating that the specified target isn‘t mounted.
Question 56 of 60
56. Question
After setting up a new swap partition, Sarah wants to enable the swap space without rebooting her system. Which command should she use to activate the new swap partition /dev/sdb2?
Correct
Correct Answer: C. swapon /dev/sdb2 Explanation: The swapon command is used to enable swap partitions. To activate the swap partition /dev/sdb2, Sarah should use swapon /dev/sdb2. Option A is incorrect. The ′sync′ command is used to flush file system buffers, not to activate swap partitions. Option B is incorrect. Though ′swapon′ is the correct command, ′/dev/sdb1′ is not the correct partition as per the scenario. The partition Sarah wants to activate is ′/dev/sdb2′. Option D is incorrect. While the ′mount′ command is used to mount filesystems, the option ′-o swap′ is not valid for activating swap partitions.
Incorrect
Correct Answer: C. swapon /dev/sdb2 Explanation: The swapon command is used to enable swap partitions. To activate the swap partition /dev/sdb2, Sarah should use swapon /dev/sdb2. Option A is incorrect. The ′sync′ command is used to flush file system buffers, not to activate swap partitions. Option B is incorrect. Though ′swapon′ is the correct command, ′/dev/sdb1′ is not the correct partition as per the scenario. The partition Sarah wants to activate is ′/dev/sdb2′. Option D is incorrect. While the ′mount′ command is used to mount filesystems, the option ′-o swap′ is not valid for activating swap partitions.
Unattempted
Correct Answer: C. swapon /dev/sdb2 Explanation: The swapon command is used to enable swap partitions. To activate the swap partition /dev/sdb2, Sarah should use swapon /dev/sdb2. Option A is incorrect. The ′sync′ command is used to flush file system buffers, not to activate swap partitions. Option B is incorrect. Though ′swapon′ is the correct command, ′/dev/sdb1′ is not the correct partition as per the scenario. The partition Sarah wants to activate is ′/dev/sdb2′. Option D is incorrect. While the ′mount′ command is used to mount filesystems, the option ′-o swap′ is not valid for activating swap partitions.
Question 57 of 60
57. Question
An administrator, while optimizing a Linux workstation with an IDE hard drive, wants to check the current DMA setting of the drive. Which command and option would they use to verify the DMA setting?
Correct
Correct Answer: A. hdparm -d /dev/hda Explanation: Using the hdparm -d command followed by the device path, the administrator can check if DMA is enabled or disabled on the specified IDE device. Option B is incorrect. ′smartctl′ is used for controlling and monitoring storage systems using SMART and is not meant for checking DMA settings. Option C is incorrect. While ′hdparm′ is the correct tool for this purpose, the ′–check′ option is not a valid option for the ′hdparm′ command. Option D is incorrect. ′fsck′ is a filesystem check tool, and the ′–dma′ flag is not valid for this command.
Incorrect
Correct Answer: A. hdparm -d /dev/hda Explanation: Using the hdparm -d command followed by the device path, the administrator can check if DMA is enabled or disabled on the specified IDE device. Option B is incorrect. ′smartctl′ is used for controlling and monitoring storage systems using SMART and is not meant for checking DMA settings. Option C is incorrect. While ′hdparm′ is the correct tool for this purpose, the ′–check′ option is not a valid option for the ′hdparm′ command. Option D is incorrect. ′fsck′ is a filesystem check tool, and the ′–dma′ flag is not valid for this command.
Unattempted
Correct Answer: A. hdparm -d /dev/hda Explanation: Using the hdparm -d command followed by the device path, the administrator can check if DMA is enabled or disabled on the specified IDE device. Option B is incorrect. ′smartctl′ is used for controlling and monitoring storage systems using SMART and is not meant for checking DMA settings. Option C is incorrect. While ′hdparm′ is the correct tool for this purpose, the ′–check′ option is not a valid option for the ′hdparm′ command. Option D is incorrect. ′fsck′ is a filesystem check tool, and the ′–dma′ flag is not valid for this command.
Question 58 of 60
58. Question
Jake is in the process of compiling a new kernel. He wants to use the configuration from the currently running kernel but make a few tweaks. Which make target should Jake use to configure the kernel based on the current configuration and interactively make changes?
Correct
Correct Answer: A. make oldconfig Explanation: The make oldconfig target uses the configuration of the currently running kernel. If there have been any changes or additions to kernel configuration options since the last kernel version, make oldconfig will prompt Jake interactively for choices on those changes. Option B is incorrect. make xconfig launches a graphical interface for kernel configuration. It does not directly use the current configuration without prompting for all options. Option C is incorrect. make menuconfig launches a text-based menu system for kernel configuration. It‘s more extensive than oldconfig in terms of its interactivity. Option D is incorrect. make defconfig uses the default configuration for the architecture, not the current kernel‘s configuration.
Incorrect
Correct Answer: A. make oldconfig Explanation: The make oldconfig target uses the configuration of the currently running kernel. If there have been any changes or additions to kernel configuration options since the last kernel version, make oldconfig will prompt Jake interactively for choices on those changes. Option B is incorrect. make xconfig launches a graphical interface for kernel configuration. It does not directly use the current configuration without prompting for all options. Option C is incorrect. make menuconfig launches a text-based menu system for kernel configuration. It‘s more extensive than oldconfig in terms of its interactivity. Option D is incorrect. make defconfig uses the default configuration for the architecture, not the current kernel‘s configuration.
Unattempted
Correct Answer: A. make oldconfig Explanation: The make oldconfig target uses the configuration of the currently running kernel. If there have been any changes or additions to kernel configuration options since the last kernel version, make oldconfig will prompt Jake interactively for choices on those changes. Option B is incorrect. make xconfig launches a graphical interface for kernel configuration. It does not directly use the current configuration without prompting for all options. Option C is incorrect. make menuconfig launches a text-based menu system for kernel configuration. It‘s more extensive than oldconfig in terms of its interactivity. Option D is incorrect. make defconfig uses the default configuration for the architecture, not the current kernel‘s configuration.
Question 59 of 60
59. Question
You have a file named “document.txt“ that you want to compress using gzip. What command should you use?
Correct
Correct Answer: B. gzip document.txt Explanation: The correct command to compress a file using gzip is gzip document.txt. This command compresses the file in place and adds the .gz extension to the filename. Option A is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′gzip document.txt′. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with gzip is ′gzip document.txt′. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for gzip compression. The correct command is ′gzip document.txt′.
Incorrect
Correct Answer: B. gzip document.txt Explanation: The correct command to compress a file using gzip is gzip document.txt. This command compresses the file in place and adds the .gz extension to the filename. Option A is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′gzip document.txt′. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with gzip is ′gzip document.txt′. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for gzip compression. The correct command is ′gzip document.txt′.
Unattempted
Correct Answer: B. gzip document.txt Explanation: The correct command to compress a file using gzip is gzip document.txt. This command compresses the file in place and adds the .gz extension to the filename. Option A is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′gzip document.txt′. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with gzip is ′gzip document.txt′. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for gzip compression. The correct command is ′gzip document.txt′.
Question 60 of 60
60. Question
James, a system administrator, is setting up a new server. Upon booting, he notices that the server is not recognizing the attached RAID array. What should James first investigate to ensure correct hardware initialization for the RAID array?
Correct
Correct Answer: B. Verify if the RAID controller‘s firmware is up-to-date Explanation: If the RAID array is not recognized during boot, it could be due to outdated or incompatible firmware on the RAID controller. Ensuring the controller‘s firmware is up-to-date can help in proper hardware initialization. Option A is incorrect. The ′fstab′ entries come into play after hardware initialization, specifically during the mount phase. If the RAID isn‘t recognized, ′fstab′ isn‘t the first place to check. Option C is incorrect. The ′/etc/hosts′ file is related to hostname and network configuration and is not relevant to hardware initialization. Option D is incorrect. While the GRUB bootloader is important for the boot process, it doesn‘t play a direct role in the initialization of specific hardware components like a RAID array.
Incorrect
Correct Answer: B. Verify if the RAID controller‘s firmware is up-to-date Explanation: If the RAID array is not recognized during boot, it could be due to outdated or incompatible firmware on the RAID controller. Ensuring the controller‘s firmware is up-to-date can help in proper hardware initialization. Option A is incorrect. The ′fstab′ entries come into play after hardware initialization, specifically during the mount phase. If the RAID isn‘t recognized, ′fstab′ isn‘t the first place to check. Option C is incorrect. The ′/etc/hosts′ file is related to hostname and network configuration and is not relevant to hardware initialization. Option D is incorrect. While the GRUB bootloader is important for the boot process, it doesn‘t play a direct role in the initialization of specific hardware components like a RAID array.
Unattempted
Correct Answer: B. Verify if the RAID controller‘s firmware is up-to-date Explanation: If the RAID array is not recognized during boot, it could be due to outdated or incompatible firmware on the RAID controller. Ensuring the controller‘s firmware is up-to-date can help in proper hardware initialization. Option A is incorrect. The ′fstab′ entries come into play after hardware initialization, specifically during the mount phase. If the RAID isn‘t recognized, ′fstab′ isn‘t the first place to check. Option C is incorrect. The ′/etc/hosts′ file is related to hostname and network configuration and is not relevant to hardware initialization. Option D is incorrect. While the GRUB bootloader is important for the boot process, it doesn‘t play a direct role in the initialization of specific hardware components like a RAID array.
X
Use Page numbers below to navigate to other practice tests