You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-2 (201-450) Practice Test 3 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-2 (201-450)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Amelia is troubleshooting an issue with her web server. Upon system startup, the Apache web service is failing to initialize. What should Amelia check FIRST to determine the cause of the service initialization failure?
Correct
Correct Answer: D. Review the Apache service logs in /var/log/apache2/error.log Explanation: When a specific service like Apache fails to initialize, it is best to start troubleshooting by reviewing the logs specific to that service. The Apache error log typically contains detailed messages that can help pinpoint the cause of initialization failures. Option A is incorrect. While the system log can contain valuable information about various system events, for a specific service initialization issue, the direct service log would be more informative. Option B is incorrect. Firewall rules can block incoming or outgoing traffic, but they aren‘t typically the primary cause for a service failing to initialize. Option C is incorrect. Storage disk errors might cause broader system issues, but for a specific service initialization problem, it‘s better to first check the service-specific logs.
Incorrect
Correct Answer: D. Review the Apache service logs in /var/log/apache2/error.log Explanation: When a specific service like Apache fails to initialize, it is best to start troubleshooting by reviewing the logs specific to that service. The Apache error log typically contains detailed messages that can help pinpoint the cause of initialization failures. Option A is incorrect. While the system log can contain valuable information about various system events, for a specific service initialization issue, the direct service log would be more informative. Option B is incorrect. Firewall rules can block incoming or outgoing traffic, but they aren‘t typically the primary cause for a service failing to initialize. Option C is incorrect. Storage disk errors might cause broader system issues, but for a specific service initialization problem, it‘s better to first check the service-specific logs.
Unattempted
Correct Answer: D. Review the Apache service logs in /var/log/apache2/error.log Explanation: When a specific service like Apache fails to initialize, it is best to start troubleshooting by reviewing the logs specific to that service. The Apache error log typically contains detailed messages that can help pinpoint the cause of initialization failures. Option A is incorrect. While the system log can contain valuable information about various system events, for a specific service initialization issue, the direct service log would be more informative. Option B is incorrect. Firewall rules can block incoming or outgoing traffic, but they aren‘t typically the primary cause for a service failing to initialize. Option C is incorrect. Storage disk errors might cause broader system issues, but for a specific service initialization problem, it‘s better to first check the service-specific logs.
Question 2 of 60
2. Question
A system administrator needs to update the GRUB bootloader configuration. In which directory would the administrator typically find the main configuration file for GRUB on a modern Linux system?
Correct
Correct Answer: C. /boot/grub/ Explanation: The main configuration file for GRUB, known as grub.cfg, is typically located in the /boot/grub/ directory on a modern Linux system. Option A is incorrect. While the ′/boot/′ directory contains the kernel and initial ramdisk, it‘s not where the main GRUB configuration file is located. Option B is incorrect. ′/boot/efi/EFI/linux/′ is a possible location for EFI boot files but not specifically for the GRUB configuration. Option D is incorrect. The GRUB configuration is not found in ′/etc/grub/′.
Incorrect
Correct Answer: C. /boot/grub/ Explanation: The main configuration file for GRUB, known as grub.cfg, is typically located in the /boot/grub/ directory on a modern Linux system. Option A is incorrect. While the ′/boot/′ directory contains the kernel and initial ramdisk, it‘s not where the main GRUB configuration file is located. Option B is incorrect. ′/boot/efi/EFI/linux/′ is a possible location for EFI boot files but not specifically for the GRUB configuration. Option D is incorrect. The GRUB configuration is not found in ′/etc/grub/′.
Unattempted
Correct Answer: C. /boot/grub/ Explanation: The main configuration file for GRUB, known as grub.cfg, is typically located in the /boot/grub/ directory on a modern Linux system. Option A is incorrect. While the ′/boot/′ directory contains the kernel and initial ramdisk, it‘s not where the main GRUB configuration file is located. Option B is incorrect. ′/boot/efi/EFI/linux/′ is a possible location for EFI boot files but not specifically for the GRUB configuration. Option D is incorrect. The GRUB configuration is not found in ′/etc/grub/′.
Question 3 of 60
3. Question
A system administrator needs to determine the speed with which data is read from a specific SATA hard drive without any filesystem overhead. Which tool and option should they use?
Correct
Correct Answer: A. hdparm -Tt /dev/sda Explanation: hdparm -Tt /dev/sda is a command that tests the read speed of the device /dev/sda. The -T option tests the OS cache read speed, and the -t option tests the device read speed, bypassing the filesystem overhead. Option B is incorrect. The ′sdparm′ utility doesn‘t have a ′–read′ option. It is primarily used for SCSI/SAS devices to retrieve or change device parameters. Option C is incorrect. The ′hdparm –info /dev/sda′ command retrieves and displays the device‘s configuration details but does not perform a read speed test. Option D is incorrect. ′sdparm –command=start /dev/sda′ would be used to start (spin up) a device, not test its read speed.
Incorrect
Correct Answer: A. hdparm -Tt /dev/sda Explanation: hdparm -Tt /dev/sda is a command that tests the read speed of the device /dev/sda. The -T option tests the OS cache read speed, and the -t option tests the device read speed, bypassing the filesystem overhead. Option B is incorrect. The ′sdparm′ utility doesn‘t have a ′–read′ option. It is primarily used for SCSI/SAS devices to retrieve or change device parameters. Option C is incorrect. The ′hdparm –info /dev/sda′ command retrieves and displays the device‘s configuration details but does not perform a read speed test. Option D is incorrect. ′sdparm –command=start /dev/sda′ would be used to start (spin up) a device, not test its read speed.
Unattempted
Correct Answer: A. hdparm -Tt /dev/sda Explanation: hdparm -Tt /dev/sda is a command that tests the read speed of the device /dev/sda. The -T option tests the OS cache read speed, and the -t option tests the device read speed, bypassing the filesystem overhead. Option B is incorrect. The ′sdparm′ utility doesn‘t have a ′–read′ option. It is primarily used for SCSI/SAS devices to retrieve or change device parameters. Option C is incorrect. The ′hdparm –info /dev/sda′ command retrieves and displays the device‘s configuration details but does not perform a read speed test. Option D is incorrect. ′sdparm –command=start /dev/sda′ would be used to start (spin up) a device, not test its read speed.
Question 4 of 60
4. Question
Lara, a Linux system administrator, is troubleshooting an issue with a specific kernel module on her server. She needs to quickly view the current status and properties of a module named netfilter. Which command should Lara use to achieve this?
Correct
Correct Answer: B. modinfo netfilter Explanation: Using the modinfo netfilter command, Lara can display information about the netfilter module, such as its description, parameters, dependencies, and more. Option A is incorrect. The modprobe command is used for adding or removing modules from the Linux kernel. It doesn‘t display module information. Option C is incorrect. There‘s no standard command called modsave in the context of module tools. Option D is incorrect. modconf is not a standard command related to module tools for displaying module information.
Incorrect
Correct Answer: B. modinfo netfilter Explanation: Using the modinfo netfilter command, Lara can display information about the netfilter module, such as its description, parameters, dependencies, and more. Option A is incorrect. The modprobe command is used for adding or removing modules from the Linux kernel. It doesn‘t display module information. Option C is incorrect. There‘s no standard command called modsave in the context of module tools. Option D is incorrect. modconf is not a standard command related to module tools for displaying module information.
Unattempted
Correct Answer: B. modinfo netfilter Explanation: Using the modinfo netfilter command, Lara can display information about the netfilter module, such as its description, parameters, dependencies, and more. Option A is incorrect. The modprobe command is used for adding or removing modules from the Linux kernel. It doesn‘t display module information. Option C is incorrect. There‘s no standard command called modsave in the context of module tools. Option D is incorrect. modconf is not a standard command related to module tools for displaying module information.
Question 5 of 60
5. Question
You need to perform a partial backup of critical system files on a Linux server to ensure a quick recovery in case of a failure. Which command would you use to create a backup of the /etc directory?
Correct
Correct Answer: B. tar -czvf etc_backup.tar.gz /etc Explanation: The correct command to perform a partial backup of the /etc directory using tar is tar -czvf etc_backup.tar.gz /etc. This creates a compressed tarball (tar.gz) of the /etc directory. Option A is incorrect because while ′rsync′ is a powerful tool for synchronization and copying, the given command is incomplete for creating a backup and lacks compression. Option C is incorrect because using ′cp′ for creating backups can be inefficient and may not preserve ownership and permissions of files. Option D is incorrect because using ′dd′ for backups is typically used at the block level and creates an image file, but it may not be the most efficient way to back up specific directories like ′/etc′.
Incorrect
Correct Answer: B. tar -czvf etc_backup.tar.gz /etc Explanation: The correct command to perform a partial backup of the /etc directory using tar is tar -czvf etc_backup.tar.gz /etc. This creates a compressed tarball (tar.gz) of the /etc directory. Option A is incorrect because while ′rsync′ is a powerful tool for synchronization and copying, the given command is incomplete for creating a backup and lacks compression. Option C is incorrect because using ′cp′ for creating backups can be inefficient and may not preserve ownership and permissions of files. Option D is incorrect because using ′dd′ for backups is typically used at the block level and creates an image file, but it may not be the most efficient way to back up specific directories like ′/etc′.
Unattempted
Correct Answer: B. tar -czvf etc_backup.tar.gz /etc Explanation: The correct command to perform a partial backup of the /etc directory using tar is tar -czvf etc_backup.tar.gz /etc. This creates a compressed tarball (tar.gz) of the /etc directory. Option A is incorrect because while ′rsync′ is a powerful tool for synchronization and copying, the given command is incomplete for creating a backup and lacks compression. Option C is incorrect because using ′cp′ for creating backups can be inefficient and may not preserve ownership and permissions of files. Option D is incorrect because using ′dd′ for backups is typically used at the block level and creates an image file, but it may not be the most efficient way to back up specific directories like ′/etc′.
Question 6 of 60
6. Question
Jeremy recently compiled a new Linux kernel and wants to ensure that the boot process can load the necessary modules and drivers during the initial boot phase. He is considering using dracut to create an initramfs. Which command would Jeremy use to generate an initramfs for a specific kernel version, say 5.8.10?
Correct
Correct Answer: B. dracut -f /boot/initramfs-5.8.10.img 5.8.10 Explanation: The command dracut -f /boot/initramfs-5.8.10.img 5.8.10 is used to forcefully create or overwrite an initramfs for the specified kernel version. Option A is incorrect. There is no –kernel option for the dracut command. The kernel version is typically specified as a positional argument at the end of the command. Option C is incorrect. There‘s no create option in the dracut command. Option D is incorrect. Simply specifying the path to the kernel image does not provide sufficient information for dracut to generate the initramfs image.
Incorrect
Correct Answer: B. dracut -f /boot/initramfs-5.8.10.img 5.8.10 Explanation: The command dracut -f /boot/initramfs-5.8.10.img 5.8.10 is used to forcefully create or overwrite an initramfs for the specified kernel version. Option A is incorrect. There is no –kernel option for the dracut command. The kernel version is typically specified as a positional argument at the end of the command. Option C is incorrect. There‘s no create option in the dracut command. Option D is incorrect. Simply specifying the path to the kernel image does not provide sufficient information for dracut to generate the initramfs image.
Unattempted
Correct Answer: B. dracut -f /boot/initramfs-5.8.10.img 5.8.10 Explanation: The command dracut -f /boot/initramfs-5.8.10.img 5.8.10 is used to forcefully create or overwrite an initramfs for the specified kernel version. Option A is incorrect. There is no –kernel option for the dracut command. The kernel version is typically specified as a positional argument at the end of the command. Option C is incorrect. There‘s no create option in the dracut command. Option D is incorrect. Simply specifying the path to the kernel image does not provide sufficient information for dracut to generate the initramfs image.
Question 7 of 60
7. Question
Lisa wants to view a summary of socket statistics on her Linux system, including the number of established connections, listening sockets, and more. Which ss command should she use?
Correct
Correct Answer: C. ss -s Explanation: The ss -s command is used on Linux to display a summary of socket statistics, including the number of established connections, listening sockets, and more. Option A is incorrect. The -t option in ss -t is used to display only TCP sockets, not socket statistics. Option B is incorrect. The ′-l′ option in ′ss -l′ is used to display only listening sockets, not socket statistics. Option D is incorrect. The ′-a′ option in ′ss -a′ is used to display all sockets, not socket statistics.
Incorrect
Correct Answer: C. ss -s Explanation: The ss -s command is used on Linux to display a summary of socket statistics, including the number of established connections, listening sockets, and more. Option A is incorrect. The -t option in ss -t is used to display only TCP sockets, not socket statistics. Option B is incorrect. The ′-l′ option in ′ss -l′ is used to display only listening sockets, not socket statistics. Option D is incorrect. The ′-a′ option in ′ss -a′ is used to display all sockets, not socket statistics.
Unattempted
Correct Answer: C. ss -s Explanation: The ss -s command is used on Linux to display a summary of socket statistics, including the number of established connections, listening sockets, and more. Option A is incorrect. The -t option in ss -t is used to display only TCP sockets, not socket statistics. Option B is incorrect. The ′-l′ option in ′ss -l′ is used to display only listening sockets, not socket statistics. Option D is incorrect. The ′-a′ option in ′ss -a′ is used to display all sockets, not socket statistics.
Question 8 of 60
8. Question
You need to create a backup image of a hard drive and store it in a file named backup.img. Which dd command would you use for this purpose?
Correct
Correct Answer: A. dd if=/dev/sda of=backup.img bs=4M Explanation: The correct command to create a backup image of a hard drive is dd if=/dev/sda of=backup.img bs=4M. This command reads from the source (/dev/sda) and writes to the destination (backup.img) with a block size of 4 megabytes. Option B is incorrect because it attempts to write the contents of an existing file (′backup.img′) to the hard drive (′/dev/sda′), which is not the intended operation. Option C is incorrect because it specifies the input file (′/dev/sda′) but does not specify the output file, which is necessary for creating a backup image. Option D is incorrect because it attempts to write the contents of an existing file (′backup.img′) to the hard drive (′/dev/sda′), which is not the intended operation.
Incorrect
Correct Answer: A. dd if=/dev/sda of=backup.img bs=4M Explanation: The correct command to create a backup image of a hard drive is dd if=/dev/sda of=backup.img bs=4M. This command reads from the source (/dev/sda) and writes to the destination (backup.img) with a block size of 4 megabytes. Option B is incorrect because it attempts to write the contents of an existing file (′backup.img′) to the hard drive (′/dev/sda′), which is not the intended operation. Option C is incorrect because it specifies the input file (′/dev/sda′) but does not specify the output file, which is necessary for creating a backup image. Option D is incorrect because it attempts to write the contents of an existing file (′backup.img′) to the hard drive (′/dev/sda′), which is not the intended operation.
Unattempted
Correct Answer: A. dd if=/dev/sda of=backup.img bs=4M Explanation: The correct command to create a backup image of a hard drive is dd if=/dev/sda of=backup.img bs=4M. This command reads from the source (/dev/sda) and writes to the destination (backup.img) with a block size of 4 megabytes. Option B is incorrect because it attempts to write the contents of an existing file (′backup.img′) to the hard drive (′/dev/sda′), which is not the intended operation. Option C is incorrect because it specifies the input file (′/dev/sda′) but does not specify the output file, which is necessary for creating a backup image. Option D is incorrect because it attempts to write the contents of an existing file (′backup.img′) to the hard drive (′/dev/sda′), which is not the intended operation.
Question 9 of 60
9. Question
Julia, an IT administrator, is keen on setting up a centralized monitoring system that collects metrics from multiple servers and offers visualization capabilities. She wants a solution that supports a wide variety of data sources and provides alerting features. Which of the following tools would best suit her requirements?
Correct
Correct Answer: C. Grafana Explanation: Grafana is an open-source platform for monitoring and observability. It allows you to query, visualize, alert on, and understand your metrics no matter where they are stored. It can integrate with multiple data sources including Graphite, InfluxDB, Prometheus, and many others. Option A is incorrect. awk is a powerful text processing command in UNIX. It is not a tool designed for centralized monitoring or visualization of IT infrastructure metrics. Option B is incorrect. Graphite is indeed a tool that can store numeric time-series data, but on its own, it does not offer the wide range of visualization capabilities or the broad integration with multiple data sources like Grafana does. While Grafana can use Graphite as a data source, it‘s Grafana that offers the centralized visualization and alerting capabilities Julia is seeking. Option D is incorrect. lsof is a command line utility which provides information about files that are opened by processes. It is not a monitoring or visualization tool for IT infrastructure.
Incorrect
Correct Answer: C. Grafana Explanation: Grafana is an open-source platform for monitoring and observability. It allows you to query, visualize, alert on, and understand your metrics no matter where they are stored. It can integrate with multiple data sources including Graphite, InfluxDB, Prometheus, and many others. Option A is incorrect. awk is a powerful text processing command in UNIX. It is not a tool designed for centralized monitoring or visualization of IT infrastructure metrics. Option B is incorrect. Graphite is indeed a tool that can store numeric time-series data, but on its own, it does not offer the wide range of visualization capabilities or the broad integration with multiple data sources like Grafana does. While Grafana can use Graphite as a data source, it‘s Grafana that offers the centralized visualization and alerting capabilities Julia is seeking. Option D is incorrect. lsof is a command line utility which provides information about files that are opened by processes. It is not a monitoring or visualization tool for IT infrastructure.
Unattempted
Correct Answer: C. Grafana Explanation: Grafana is an open-source platform for monitoring and observability. It allows you to query, visualize, alert on, and understand your metrics no matter where they are stored. It can integrate with multiple data sources including Graphite, InfluxDB, Prometheus, and many others. Option A is incorrect. awk is a powerful text processing command in UNIX. It is not a tool designed for centralized monitoring or visualization of IT infrastructure metrics. Option B is incorrect. Graphite is indeed a tool that can store numeric time-series data, but on its own, it does not offer the wide range of visualization capabilities or the broad integration with multiple data sources like Grafana does. While Grafana can use Graphite as a data source, it‘s Grafana that offers the centralized visualization and alerting capabilities Julia is seeking. Option D is incorrect. lsof is a command line utility which provides information about files that are opened by processes. It is not a monitoring or visualization tool for IT infrastructure.
Question 10 of 60
10. Question
An enterprise is planning to use a high-speed, lossless network protocol for their SAN, which ensures reliable data transfer without the overhead of TCP/IP. They also want the ability to merge with their existing Fibre Channel infrastructure. Which protocol would meet these requirements?
Correct
Correct Answer: C. FCoE (Fibre Channel over Ethernet) Explanation: FCoE (Fibre Channel over Ethernet) is a protocol that allows Fibre Channel communications to run directly over Ethernet. It is lossless, meaning it ensures reliable data transfer, and does not use TCP/IP, eliminating that overhead. It also allows for the convergence of FC and Ethernet networks. Option A is incorrect. While AoE does run over Ethernet without the overhead of TCP/IP, it does not integrate with Fibre Channel infrastructure. Option B is incorrect. iSCSI is an IP-based storage networking protocol. It does use TCP/IP for communication, and it does not natively integrate with Fibre Channel. Option D is incorrect. NFS (Network File System) is a protocol used for sharing files over a network. It does not specifically deal with SAN implementations or Fibre Channel infrastructure.
Incorrect
Correct Answer: C. FCoE (Fibre Channel over Ethernet) Explanation: FCoE (Fibre Channel over Ethernet) is a protocol that allows Fibre Channel communications to run directly over Ethernet. It is lossless, meaning it ensures reliable data transfer, and does not use TCP/IP, eliminating that overhead. It also allows for the convergence of FC and Ethernet networks. Option A is incorrect. While AoE does run over Ethernet without the overhead of TCP/IP, it does not integrate with Fibre Channel infrastructure. Option B is incorrect. iSCSI is an IP-based storage networking protocol. It does use TCP/IP for communication, and it does not natively integrate with Fibre Channel. Option D is incorrect. NFS (Network File System) is a protocol used for sharing files over a network. It does not specifically deal with SAN implementations or Fibre Channel infrastructure.
Unattempted
Correct Answer: C. FCoE (Fibre Channel over Ethernet) Explanation: FCoE (Fibre Channel over Ethernet) is a protocol that allows Fibre Channel communications to run directly over Ethernet. It is lossless, meaning it ensures reliable data transfer, and does not use TCP/IP, eliminating that overhead. It also allows for the convergence of FC and Ethernet networks. Option A is incorrect. While AoE does run over Ethernet without the overhead of TCP/IP, it does not integrate with Fibre Channel infrastructure. Option B is incorrect. iSCSI is an IP-based storage networking protocol. It does use TCP/IP for communication, and it does not natively integrate with Fibre Channel. Option D is incorrect. NFS (Network File System) is a protocol used for sharing files over a network. It does not specifically deal with SAN implementations or Fibre Channel infrastructure.
Question 11 of 60
11. Question
A system administrator wants to automatically discard blocks weekly on the /dev/sda1 SSD. Where should they configure this?
Correct
Correct Answer: B. Create a cron job running fstrim /dev/sda1 weekly Explanation: Setting up a cron job allows administrators to schedule the fstrim command to run at specific intervals, like weekly. This ensures that blocks are discarded regularly. Option A is incorrect. The discard option in /etc/fstab activates continuous TRIM, which may not be ideal for all SSDs due to potential performance issues. It doesn‘t ensure weekly trimming. Option C is incorrect. ′/etc/rc.local′ is used to execute commands at the end of the system‘s boot-up process. This won‘t ensure a weekly discard of blocks. Option D is incorrect. There isn‘t a standard ′/etc/trim.conf′ file for configuring ′fstrim′.
Incorrect
Correct Answer: B. Create a cron job running fstrim /dev/sda1 weekly Explanation: Setting up a cron job allows administrators to schedule the fstrim command to run at specific intervals, like weekly. This ensures that blocks are discarded regularly. Option A is incorrect. The discard option in /etc/fstab activates continuous TRIM, which may not be ideal for all SSDs due to potential performance issues. It doesn‘t ensure weekly trimming. Option C is incorrect. ′/etc/rc.local′ is used to execute commands at the end of the system‘s boot-up process. This won‘t ensure a weekly discard of blocks. Option D is incorrect. There isn‘t a standard ′/etc/trim.conf′ file for configuring ′fstrim′.
Unattempted
Correct Answer: B. Create a cron job running fstrim /dev/sda1 weekly Explanation: Setting up a cron job allows administrators to schedule the fstrim command to run at specific intervals, like weekly. This ensures that blocks are discarded regularly. Option A is incorrect. The discard option in /etc/fstab activates continuous TRIM, which may not be ideal for all SSDs due to potential performance issues. It doesn‘t ensure weekly trimming. Option C is incorrect. ′/etc/rc.local′ is used to execute commands at the end of the system‘s boot-up process. This won‘t ensure a weekly discard of blocks. Option D is incorrect. There isn‘t a standard ′/etc/trim.conf′ file for configuring ′fstrim′.
Question 12 of 60
12. Question
An administrator wants to set a specific last checked date on an ext4 filesystem located at “/dev/sdb1” without actually performing a filesystem check. Which of the following tune2fs commands would achieve this?
Correct
Correct Answer: B. tune2fs -T now /dev/sdb1 Explanation: The tune2fs -T option allows you to set the last checked timestamp of the filesystem. When combined with “now“, it sets the last checked time to the current time without performing an actual check. Option A is incorrect. There is no –set-last-checked option in the tune2fs command. Option C is incorrect. There is no ′–date-checked′ option in the ′tune2fs′ command. Option D is incorrect. The ′-C′ option sets the mount count but does not adjust the last checked timestamp.
Incorrect
Correct Answer: B. tune2fs -T now /dev/sdb1 Explanation: The tune2fs -T option allows you to set the last checked timestamp of the filesystem. When combined with “now“, it sets the last checked time to the current time without performing an actual check. Option A is incorrect. There is no –set-last-checked option in the tune2fs command. Option C is incorrect. There is no ′–date-checked′ option in the ′tune2fs′ command. Option D is incorrect. The ′-C′ option sets the mount count but does not adjust the last checked timestamp.
Unattempted
Correct Answer: B. tune2fs -T now /dev/sdb1 Explanation: The tune2fs -T option allows you to set the last checked timestamp of the filesystem. When combined with “now“, it sets the last checked time to the current time without performing an actual check. Option A is incorrect. There is no –set-last-checked option in the tune2fs command. Option C is incorrect. There is no ′–date-checked′ option in the ′tune2fs′ command. Option D is incorrect. The ′-C′ option sets the mount count but does not adjust the last checked timestamp.
Question 13 of 60
13. Question
A company is looking to set up a Storage Area Network (SAN) that leverages their existing Ethernet infrastructure without requiring additional hardware like FC switches or HBAs. Which protocol should they consider using for this purpose?
Correct
Correct Answer: A. AoE (ATA over Ethernet) Explanation: AoE (ATA over Ethernet) is a network protocol that allows ATA storage devices to be accessed over an Ethernet network without the need for TCP/IP. It leverages the existing Ethernet infrastructure, which makes it suitable for environments that don‘t want to invest in specialized hardware. Option B is incorrect. While iSCSI also leverages Ethernet infrastructure, it uses TCP/IP for communication, which can introduce overhead. However, the question specifically mentions a solution without the need for TCP/IP, making AoE the right choice. Option C is incorrect. FC (Fibre Channel) is a high-speed data transfer protocol typically used in SANs, but it requires specialized hardware such as FC switches and HBAs. Option D is incorrect. SAS (Serial Attached SCSI) is a point-to-point serial protocol that deals with direct attached storage rather than networked storage like SAN.
Incorrect
Correct Answer: A. AoE (ATA over Ethernet) Explanation: AoE (ATA over Ethernet) is a network protocol that allows ATA storage devices to be accessed over an Ethernet network without the need for TCP/IP. It leverages the existing Ethernet infrastructure, which makes it suitable for environments that don‘t want to invest in specialized hardware. Option B is incorrect. While iSCSI also leverages Ethernet infrastructure, it uses TCP/IP for communication, which can introduce overhead. However, the question specifically mentions a solution without the need for TCP/IP, making AoE the right choice. Option C is incorrect. FC (Fibre Channel) is a high-speed data transfer protocol typically used in SANs, but it requires specialized hardware such as FC switches and HBAs. Option D is incorrect. SAS (Serial Attached SCSI) is a point-to-point serial protocol that deals with direct attached storage rather than networked storage like SAN.
Unattempted
Correct Answer: A. AoE (ATA over Ethernet) Explanation: AoE (ATA over Ethernet) is a network protocol that allows ATA storage devices to be accessed over an Ethernet network without the need for TCP/IP. It leverages the existing Ethernet infrastructure, which makes it suitable for environments that don‘t want to invest in specialized hardware. Option B is incorrect. While iSCSI also leverages Ethernet infrastructure, it uses TCP/IP for communication, which can introduce overhead. However, the question specifically mentions a solution without the need for TCP/IP, making AoE the right choice. Option C is incorrect. FC (Fibre Channel) is a high-speed data transfer protocol typically used in SANs, but it requires specialized hardware such as FC switches and HBAs. Option D is incorrect. SAS (Serial Attached SCSI) is a point-to-point serial protocol that deals with direct attached storage rather than networked storage like SAN.
Question 14 of 60
14. Question
You are configuring a backup script, and you need to specify the shell that will be used to execute the script. Which shell is commonly located at /bin/sh in many Unix-like systems?
Correct
Correct Answer: C. Dash Explanation: The shell commonly located at /bin/sh in many Unix-like systems is Dash (Debian Almquist Shell). Dash is a lightweight and efficient shell that is often used for scripting purposes. Option A is incorrect because Bash (Bourne Again SHell) is a powerful and feature-rich shell but is typically located at ′/bin/bash′. Option B is incorrect because Zsh (Z Shell) is another powerful shell but is not commonly located at ′/bin/sh′. Option D is incorrect because Fish (Friendly Interactive SHell) is a user-friendly shell but is not commonly located at ′/bin/sh′.
Incorrect
Correct Answer: C. Dash Explanation: The shell commonly located at /bin/sh in many Unix-like systems is Dash (Debian Almquist Shell). Dash is a lightweight and efficient shell that is often used for scripting purposes. Option A is incorrect because Bash (Bourne Again SHell) is a powerful and feature-rich shell but is typically located at ′/bin/bash′. Option B is incorrect because Zsh (Z Shell) is another powerful shell but is not commonly located at ′/bin/sh′. Option D is incorrect because Fish (Friendly Interactive SHell) is a user-friendly shell but is not commonly located at ′/bin/sh′.
Unattempted
Correct Answer: C. Dash Explanation: The shell commonly located at /bin/sh in many Unix-like systems is Dash (Debian Almquist Shell). Dash is a lightweight and efficient shell that is often used for scripting purposes. Option A is incorrect because Bash (Bourne Again SHell) is a powerful and feature-rich shell but is typically located at ′/bin/bash′. Option B is incorrect because Zsh (Z Shell) is another powerful shell but is not commonly located at ′/bin/sh′. Option D is incorrect because Fish (Friendly Interactive SHell) is a user-friendly shell but is not commonly located at ′/bin/sh′.
Question 15 of 60
15. Question
A critical system file has been accidentally deleted, and you need to restore it from a backup. Which command would you use to fully restore the file /etc/network/interfaces from a backup named system_backup.tar.gz?
Correct
Correct Answer: A. tar -xzvf system_backup.tar.gz /etc/network/interfaces Explanation: The correct command to fully restore the file /etc/network/interfaces from the tarball system_backup.tar.gz is tar -xzvf system_backup.tar.gz /etc/network/interfaces. This extracts the specified file from the tarball and restores it to the original location. Option B is incorrect because the ′cp′ command is used for copying files, and the given command would not restore the file from the backup. Option C is incorrect because the ′rsync′ command is used for synchronization, and the given command does not specify the backup source. Option D is incorrect because the command uses ′gzip -d′ to decompress the tarball, but the subsequent ′tar -xvf′ command lacks the necessary ′-z′ option for handling gzip compression.
Incorrect
Correct Answer: A. tar -xzvf system_backup.tar.gz /etc/network/interfaces Explanation: The correct command to fully restore the file /etc/network/interfaces from the tarball system_backup.tar.gz is tar -xzvf system_backup.tar.gz /etc/network/interfaces. This extracts the specified file from the tarball and restores it to the original location. Option B is incorrect because the ′cp′ command is used for copying files, and the given command would not restore the file from the backup. Option C is incorrect because the ′rsync′ command is used for synchronization, and the given command does not specify the backup source. Option D is incorrect because the command uses ′gzip -d′ to decompress the tarball, but the subsequent ′tar -xvf′ command lacks the necessary ′-z′ option for handling gzip compression.
Unattempted
Correct Answer: A. tar -xzvf system_backup.tar.gz /etc/network/interfaces Explanation: The correct command to fully restore the file /etc/network/interfaces from the tarball system_backup.tar.gz is tar -xzvf system_backup.tar.gz /etc/network/interfaces. This extracts the specified file from the tarball and restores it to the original location. Option B is incorrect because the ′cp′ command is used for copying files, and the given command would not restore the file from the backup. Option C is incorrect because the ′rsync′ command is used for synchronization, and the given command does not specify the backup source. Option D is incorrect because the command uses ′gzip -d′ to decompress the tarball, but the subsequent ′tar -xvf′ command lacks the necessary ′-z′ option for handling gzip compression.
Question 16 of 60
16. Question
During a boot issue troubleshooting, you noticed that the EFI System Partition (ESP) is corrupted on a Linux server. Which of the following commands would you use to verify the contents of the ESP?
Correct
Correct Answer: D. fsck.vfat /dev/sda1 Explanation: To verify and repair a corrupted EFI System Partition, which is typically formatted as a FAT filesystem, you can use the fsck.vfat utility. The command fsck.vfat /dev/sda1 would check and attempt to repair the FAT filesystem on the first partition of the first disk (assuming it‘s the ESP). Option A is incorrect. There‘s no ′efiinfo′ command in typical Linux distributions to inspect the ESP. Option B is incorrect. While ′lsblk -o name,fstype′ will show the file system type of partitions, it won‘t verify the integrity of the ESP. Option C is incorrect. ′efibootmgr -v′ provides details about the EFI boot entries, not the contents or integrity of the ESP.
Incorrect
Correct Answer: D. fsck.vfat /dev/sda1 Explanation: To verify and repair a corrupted EFI System Partition, which is typically formatted as a FAT filesystem, you can use the fsck.vfat utility. The command fsck.vfat /dev/sda1 would check and attempt to repair the FAT filesystem on the first partition of the first disk (assuming it‘s the ESP). Option A is incorrect. There‘s no ′efiinfo′ command in typical Linux distributions to inspect the ESP. Option B is incorrect. While ′lsblk -o name,fstype′ will show the file system type of partitions, it won‘t verify the integrity of the ESP. Option C is incorrect. ′efibootmgr -v′ provides details about the EFI boot entries, not the contents or integrity of the ESP.
Unattempted
Correct Answer: D. fsck.vfat /dev/sda1 Explanation: To verify and repair a corrupted EFI System Partition, which is typically formatted as a FAT filesystem, you can use the fsck.vfat utility. The command fsck.vfat /dev/sda1 would check and attempt to repair the FAT filesystem on the first partition of the first disk (assuming it‘s the ESP). Option A is incorrect. There‘s no ′efiinfo′ command in typical Linux distributions to inspect the ESP. Option B is incorrect. While ′lsblk -o name,fstype′ will show the file system type of partitions, it won‘t verify the integrity of the ESP. Option C is incorrect. ′efibootmgr -v′ provides details about the EFI boot entries, not the contents or integrity of the ESP.
Question 17 of 60
17. Question
Samantha suspects that there might be some inconsistencies on her /dev/sdb2 ext4 partition. Before mounting it, she decides to perform a filesystem check but does not want the check to be carried out if the filesystem was unmounted cleanly. Which command should she use?
Correct
Correct Answer: B. fsck.ext4 -p /dev/sdb2 Explanation: The fsck.ext4 -p command checks the ext4 filesystem on /dev/sdb2 in a “preen“ mode. The “-p“ option causes the tool to automatically repair any inconsistencies found unless they‘re very serious, and it will not check the filesystem if it was unmounted cleanly. Option A is incorrect. The ′-f′ option forces the check even if the filesystem appears to be clean, which isn‘t what Samantha wants. Option C is incorrect. Using ′fsck′ without any options will prompt the user for confirmation before making any repairs, which isn‘t mentioned in Samantha‘s requirements. Option D is incorrect. The ′-c′ option checks for bad sectors and is not related to checking the cleanliness of the unmount.
Incorrect
Correct Answer: B. fsck.ext4 -p /dev/sdb2 Explanation: The fsck.ext4 -p command checks the ext4 filesystem on /dev/sdb2 in a “preen“ mode. The “-p“ option causes the tool to automatically repair any inconsistencies found unless they‘re very serious, and it will not check the filesystem if it was unmounted cleanly. Option A is incorrect. The ′-f′ option forces the check even if the filesystem appears to be clean, which isn‘t what Samantha wants. Option C is incorrect. Using ′fsck′ without any options will prompt the user for confirmation before making any repairs, which isn‘t mentioned in Samantha‘s requirements. Option D is incorrect. The ′-c′ option checks for bad sectors and is not related to checking the cleanliness of the unmount.
Unattempted
Correct Answer: B. fsck.ext4 -p /dev/sdb2 Explanation: The fsck.ext4 -p command checks the ext4 filesystem on /dev/sdb2 in a “preen“ mode. The “-p“ option causes the tool to automatically repair any inconsistencies found unless they‘re very serious, and it will not check the filesystem if it was unmounted cleanly. Option A is incorrect. The ′-f′ option forces the check even if the filesystem appears to be clean, which isn‘t what Samantha wants. Option C is incorrect. Using ′fsck′ without any options will prompt the user for confirmation before making any repairs, which isn‘t mentioned in Samantha‘s requirements. Option D is incorrect. The ′-c′ option checks for bad sectors and is not related to checking the cleanliness of the unmount.
Question 18 of 60
18. Question
An administrator is looking to discard unused blocks on an SSD mounted at /mnt/ssd_data to ensure better wear leveling. Which of the following commands would best achieve this?
Correct
Correct Answer: D. fstrim /mnt/ssd_data Explanation: The fstrim command is used to discard (or “trim“) blocks which are not in use by the filesystem. When a path like /mnt/ssd_data is provided, it will discard blocks on that specific mount point. Option A is incorrect. While the -a option is valid, it is used to trim all mounted filesystems that support it. Specifying a path with the -a option is redundant. Option B is incorrect. The ′-o′ option requires an offset value which specifies the start offset in bytes to start discarding. Option C is incorrect. The ′–all′ option is equivalent to ′-a′, which trims all mounted filesystems that support it, but specifying a specific path would be more appropriate in this scenario.
Incorrect
Correct Answer: D. fstrim /mnt/ssd_data Explanation: The fstrim command is used to discard (or “trim“) blocks which are not in use by the filesystem. When a path like /mnt/ssd_data is provided, it will discard blocks on that specific mount point. Option A is incorrect. While the -a option is valid, it is used to trim all mounted filesystems that support it. Specifying a path with the -a option is redundant. Option B is incorrect. The ′-o′ option requires an offset value which specifies the start offset in bytes to start discarding. Option C is incorrect. The ′–all′ option is equivalent to ′-a′, which trims all mounted filesystems that support it, but specifying a specific path would be more appropriate in this scenario.
Unattempted
Correct Answer: D. fstrim /mnt/ssd_data Explanation: The fstrim command is used to discard (or “trim“) blocks which are not in use by the filesystem. When a path like /mnt/ssd_data is provided, it will discard blocks on that specific mount point. Option A is incorrect. While the -a option is valid, it is used to trim all mounted filesystems that support it. Specifying a path with the -a option is redundant. Option B is incorrect. The ′-o′ option requires an offset value which specifies the start offset in bytes to start discarding. Option C is incorrect. The ′–all′ option is equivalent to ′-a′, which trims all mounted filesystems that support it, but specifying a specific path would be more appropriate in this scenario.
Question 19 of 60
19. Question
Tina, a system administrator, has just added a new kernel module to the system. Before booting the kernel, she wants to ensure all module dependencies are correctly resolved. Which tool should she use to generate the modules.dep file for module dependencies?
Correct
Correct Answer: C. depmod Explanation: The depmod utility generates the modules.dep file and other dependency-related files for kernel modules. This is vital to ensure modules and their dependencies are correctly loaded. Option A is incorrect. While modinfo is used to display information about a kernel module, it doesn‘t generate dependency files. Option B is incorrect. modprobe is used to add or remove modules from the kernel, taking into account dependencies. However, it doesn‘t generate the modules.dep file. Option D is incorrect. lsmod is used to show the status of modules in the Linux kernel, not for generating dependency files.
Incorrect
Correct Answer: C. depmod Explanation: The depmod utility generates the modules.dep file and other dependency-related files for kernel modules. This is vital to ensure modules and their dependencies are correctly loaded. Option A is incorrect. While modinfo is used to display information about a kernel module, it doesn‘t generate dependency files. Option B is incorrect. modprobe is used to add or remove modules from the kernel, taking into account dependencies. However, it doesn‘t generate the modules.dep file. Option D is incorrect. lsmod is used to show the status of modules in the Linux kernel, not for generating dependency files.
Unattempted
Correct Answer: C. depmod Explanation: The depmod utility generates the modules.dep file and other dependency-related files for kernel modules. This is vital to ensure modules and their dependencies are correctly loaded. Option A is incorrect. While modinfo is used to display information about a kernel module, it doesn‘t generate dependency files. Option B is incorrect. modprobe is used to add or remove modules from the kernel, taking into account dependencies. However, it doesn‘t generate the modules.dep file. Option D is incorrect. lsmod is used to show the status of modules in the Linux kernel, not for generating dependency files.
Question 20 of 60
20. Question
YouÂ’re troubleshooting a server which has been facing performance degradation. You suspect that a TCP-related kernel parameter is misconfigured. Which command will allow you to quickly inspect all TCP-related parameters?
Correct
Correct Answer: A. sysctl -a | grep tcp Explanation: The sysctl -a command displays all kernel parameters. By piping the output to grep tcp, you can filter to show only those parameters related to TCP, making it easier to inspect and troubleshoot. Option B is incorrect. ′sysctl′ does not have a ′-r′ option for querying parameters. Option C is incorrect. Simply using ′sysctl tcp′ would attempt to query a parameter named “tcp“, which is not a specific kernel parameter. Option D is incorrect. ′–load′ is used to read values from a file, and “tcp“ is not a file.
Incorrect
Correct Answer: A. sysctl -a | grep tcp Explanation: The sysctl -a command displays all kernel parameters. By piping the output to grep tcp, you can filter to show only those parameters related to TCP, making it easier to inspect and troubleshoot. Option B is incorrect. ′sysctl′ does not have a ′-r′ option for querying parameters. Option C is incorrect. Simply using ′sysctl tcp′ would attempt to query a parameter named “tcp“, which is not a specific kernel parameter. Option D is incorrect. ′–load′ is used to read values from a file, and “tcp“ is not a file.
Unattempted
Correct Answer: A. sysctl -a | grep tcp Explanation: The sysctl -a command displays all kernel parameters. By piping the output to grep tcp, you can filter to show only those parameters related to TCP, making it easier to inspect and troubleshoot. Option B is incorrect. ′sysctl′ does not have a ′-r′ option for querying parameters. Option C is incorrect. Simply using ′sysctl tcp′ would attempt to query a parameter named “tcp“, which is not a specific kernel parameter. Option D is incorrect. ′–load′ is used to read values from a file, and “tcp“ is not a file.
Question 21 of 60
21. Question
John needs to add a new static route to the routing table of his Linux system. Which command should he use to add a route for the network “192.168.2.0/24” via the gateway “192.168.1.1”?
Correct
Correct Answer: A. route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.1 Explanation: The correct syntax for adding a static route with the route command is route add -net network netmask netmask gw gateway. In this case, John should use route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.1. Option B is incorrect. Although this syntax is close, the correct format uses -net for specifying the network and netmask. Option C is incorrect. The correct syntax includes ′-net′ before specifying the network and netmask. Option D is incorrect. The ′route create′ command does not exist, and the correct command is ′route add′. The correct format uses ′-net′ before specifying the network and netmask.
Incorrect
Correct Answer: A. route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.1 Explanation: The correct syntax for adding a static route with the route command is route add -net network netmask netmask gw gateway. In this case, John should use route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.1. Option B is incorrect. Although this syntax is close, the correct format uses -net for specifying the network and netmask. Option C is incorrect. The correct syntax includes ′-net′ before specifying the network and netmask. Option D is incorrect. The ′route create′ command does not exist, and the correct command is ′route add′. The correct format uses ′-net′ before specifying the network and netmask.
Unattempted
Correct Answer: A. route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.1 Explanation: The correct syntax for adding a static route with the route command is route add -net network netmask netmask gw gateway. In this case, John should use route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.1.1. Option B is incorrect. Although this syntax is close, the correct format uses -net for specifying the network and netmask. Option C is incorrect. The correct syntax includes ′-net′ before specifying the network and netmask. Option D is incorrect. The ′route create′ command does not exist, and the correct command is ′route add′. The correct format uses ′-net′ before specifying the network and netmask.
Question 22 of 60
22. Question
An administrator wants to view the current boot order of a Linux system booting in UEFI mode. Which of the following efibootmgr commands should they execute to view the existing boot order?
Correct
Correct Answer: D. efibootmgr Explanation: Simply running efibootmgr without any options will display information about the boot entries, including the boot order. This allows the administrator to see which entry is set to boot first, second, and so on. Option A is incorrect. The ′–view′ option does not exist for ′efibootmgr′. Option B is incorrect. The ′–list′ option is not a standard option for ′efibootmgr′ to view the boot entries. Option C is incorrect. The ′-b′ option requires an additional parameter to specify a boot number and is used for other operations, not for viewing the boot order.
Incorrect
Correct Answer: D. efibootmgr Explanation: Simply running efibootmgr without any options will display information about the boot entries, including the boot order. This allows the administrator to see which entry is set to boot first, second, and so on. Option A is incorrect. The ′–view′ option does not exist for ′efibootmgr′. Option B is incorrect. The ′–list′ option is not a standard option for ′efibootmgr′ to view the boot entries. Option C is incorrect. The ′-b′ option requires an additional parameter to specify a boot number and is used for other operations, not for viewing the boot order.
Unattempted
Correct Answer: D. efibootmgr Explanation: Simply running efibootmgr without any options will display information about the boot entries, including the boot order. This allows the administrator to see which entry is set to boot first, second, and so on. Option A is incorrect. The ′–view′ option does not exist for ′efibootmgr′. Option B is incorrect. The ′–list′ option is not a standard option for ′efibootmgr′ to view the boot entries. Option C is incorrect. The ′-b′ option requires an additional parameter to specify a boot number and is used for other operations, not for viewing the boot order.
Question 23 of 60
23. Question
Your organization is looking for a network backup solution that provides centralized management of backups for multiple servers. Which open-source backup solution is known for its scalability and ability to manage large, complex environments?
Correct
Correct Answer: B. Bacula Explanation: Bacula is an open-source network backup solution known for its scalability and ability to manage large and complex environments. It provides centralized management of backups for multiple servers in a network. Option A is incorrect because Amanda is another open-source backup solution, but it may not be as well-known for handling large and complex environments as Bacula. Option C is incorrect because Bareos is a fork of Bacula and offers similar features. However, Bacula is often associated with scalability and handling large environments. Option D is incorrect because BackupPC is a different type of backup solution that focuses on client-server backups for Linux and Windows systems. It is not specifically known for managing large and complex environments.
Incorrect
Correct Answer: B. Bacula Explanation: Bacula is an open-source network backup solution known for its scalability and ability to manage large and complex environments. It provides centralized management of backups for multiple servers in a network. Option A is incorrect because Amanda is another open-source backup solution, but it may not be as well-known for handling large and complex environments as Bacula. Option C is incorrect because Bareos is a fork of Bacula and offers similar features. However, Bacula is often associated with scalability and handling large environments. Option D is incorrect because BackupPC is a different type of backup solution that focuses on client-server backups for Linux and Windows systems. It is not specifically known for managing large and complex environments.
Unattempted
Correct Answer: B. Bacula Explanation: Bacula is an open-source network backup solution known for its scalability and ability to manage large and complex environments. It provides centralized management of backups for multiple servers in a network. Option A is incorrect because Amanda is another open-source backup solution, but it may not be as well-known for handling large and complex environments as Bacula. Option C is incorrect because Bareos is a fork of Bacula and offers similar features. However, Bacula is often associated with scalability and handling large environments. Option D is incorrect because BackupPC is a different type of backup solution that focuses on client-server backups for Linux and Windows systems. It is not specifically known for managing large and complex environments.
Question 24 of 60
24. Question
You need to capture and analyze network traffic on interface eth0. Which tcpdump command should you use?
Correct
Correct Answer: A. tcpdump -i eth0 Explanation: The -i option in tcpdump -i eth0 specifies the interface to capture traffic on. Option B is incorrect. The ′-s 0′ option in ′tcpdump -s 0 -i eth0′ sets the capture length to unlimited, but it‘s not required to specify the capture length in this context. Option C is incorrect. The ′-r′ option in ′tcpdump -r eth0′ is used for reading a saved capture file, not for capturing live traffic on a specific interface. Option D is incorrect. The ′-n′ option in ′tcpdump -n -i eth0′ is used to display numerical addresses instead of resolving hostnames. It doesn‘t specify the interface for capturing live traffic.
Incorrect
Correct Answer: A. tcpdump -i eth0 Explanation: The -i option in tcpdump -i eth0 specifies the interface to capture traffic on. Option B is incorrect. The ′-s 0′ option in ′tcpdump -s 0 -i eth0′ sets the capture length to unlimited, but it‘s not required to specify the capture length in this context. Option C is incorrect. The ′-r′ option in ′tcpdump -r eth0′ is used for reading a saved capture file, not for capturing live traffic on a specific interface. Option D is incorrect. The ′-n′ option in ′tcpdump -n -i eth0′ is used to display numerical addresses instead of resolving hostnames. It doesn‘t specify the interface for capturing live traffic.
Unattempted
Correct Answer: A. tcpdump -i eth0 Explanation: The -i option in tcpdump -i eth0 specifies the interface to capture traffic on. Option B is incorrect. The ′-s 0′ option in ′tcpdump -s 0 -i eth0′ sets the capture length to unlimited, but it‘s not required to specify the capture length in this context. Option C is incorrect. The ′-r′ option in ′tcpdump -r eth0′ is used for reading a saved capture file, not for capturing live traffic on a specific interface. Option D is incorrect. The ′-n′ option in ′tcpdump -n -i eth0′ is used to display numerical addresses instead of resolving hostnames. It doesn‘t specify the interface for capturing live traffic.
Question 25 of 60
25. Question
Alex is a system administrator who is planning to compile a new kernel for the organizationÂ’s servers. Before doing so, he wants to understand the current kernel configuration. Which file should Alex examine to find the default configuration of the source tree for the Linux kernel?
Correct
Correct Answer: D. /usr/src/linux/.config Explanation: The /usr/src/linux/.config file contains the configuration of the Linux kernel source tree. It specifies which features and drivers are enabled or disabled and holds various settings pertinent to the kernel‘s behavior. Option A is incorrect. There is no standard file named /usr/src/linux/kernel.conf for storing kernel configuration. Option B is incorrect. The path /usr/src/config/linux is not the standard location for the kernel‘s configuration file. Option C is incorrect. There is no standard directory or file named /usr/src/linux-defaults/config related to kernel configuration.
Incorrect
Correct Answer: D. /usr/src/linux/.config Explanation: The /usr/src/linux/.config file contains the configuration of the Linux kernel source tree. It specifies which features and drivers are enabled or disabled and holds various settings pertinent to the kernel‘s behavior. Option A is incorrect. There is no standard file named /usr/src/linux/kernel.conf for storing kernel configuration. Option B is incorrect. The path /usr/src/config/linux is not the standard location for the kernel‘s configuration file. Option C is incorrect. There is no standard directory or file named /usr/src/linux-defaults/config related to kernel configuration.
Unattempted
Correct Answer: D. /usr/src/linux/.config Explanation: The /usr/src/linux/.config file contains the configuration of the Linux kernel source tree. It specifies which features and drivers are enabled or disabled and holds various settings pertinent to the kernel‘s behavior. Option A is incorrect. There is no standard file named /usr/src/linux/kernel.conf for storing kernel configuration. Option B is incorrect. The path /usr/src/config/linux is not the standard location for the kernel‘s configuration file. Option C is incorrect. There is no standard directory or file named /usr/src/linux-defaults/config related to kernel configuration.
Question 26 of 60
26. Question
The system administrator received an alert regarding a potential hard drive failure. To monitor and log the SMART status of /dev/sdb in the background, ensuring it checks the status every 30 minutes, which of the following would be appropriate?
Correct
Correct Answer: D. Run smartd with a configuration file containing /dev/sdb -s (S/../.././30) Explanation: This entry in the smartd configuration file will cause it to check the SMART status of /dev/sdb every 30 minutes. Option A is incorrect. The ′smartd -i′ option does not set the interval for checks. Moreover, ′smartd′ does not have a ′-d′ option for specifying the device. Option B is incorrect. ′smartctl -s on′ enables SMART on the drive, but doesn‘t schedule checks. The ′-d′ option in ′smartctl′ specifies the type of drive but doesn‘t define an interval. Option C is incorrect. ′smartctl′ does not have an ′–interval′ option.
Incorrect
Correct Answer: D. Run smartd with a configuration file containing /dev/sdb -s (S/../.././30) Explanation: This entry in the smartd configuration file will cause it to check the SMART status of /dev/sdb every 30 minutes. Option A is incorrect. The ′smartd -i′ option does not set the interval for checks. Moreover, ′smartd′ does not have a ′-d′ option for specifying the device. Option B is incorrect. ′smartctl -s on′ enables SMART on the drive, but doesn‘t schedule checks. The ′-d′ option in ′smartctl′ specifies the type of drive but doesn‘t define an interval. Option C is incorrect. ′smartctl′ does not have an ′–interval′ option.
Unattempted
Correct Answer: D. Run smartd with a configuration file containing /dev/sdb -s (S/../.././30) Explanation: This entry in the smartd configuration file will cause it to check the SMART status of /dev/sdb every 30 minutes. Option A is incorrect. The ′smartd -i′ option does not set the interval for checks. Moreover, ′smartd′ does not have a ′-d′ option for specifying the device. Option B is incorrect. ′smartctl -s on′ enables SMART on the drive, but doesn‘t schedule checks. The ′-d′ option in ′smartctl′ specifies the type of drive but doesn‘t define an interval. Option C is incorrect. ′smartctl′ does not have an ′–interval′ option.
Question 27 of 60
27. Question
Alex is troubleshooting a Linux system that uses systemd and needs to boot into a mode that only starts the core of the system without any services or mounts. Which boot option should Alex use?
Correct
Correct Answer: D. systemd.unit=emergency.target Explanation: The emergency.target is a minimal boot-up sequence that only starts the core of the system without any services or mounts. It is useful for low-level troubleshooting and system recovery. Option A is incorrect. There is no such option as ′systemd.boot=rescue′. Option B is incorrect. While ′rescue.target′ does start in a rescue mode, it provides a more complete environment than ′emergency.target′ by starting essential services and mounting essential filesystems. Option C is incorrect. There is no such option as ′systemd.emergency=1′.
Incorrect
Correct Answer: D. systemd.unit=emergency.target Explanation: The emergency.target is a minimal boot-up sequence that only starts the core of the system without any services or mounts. It is useful for low-level troubleshooting and system recovery. Option A is incorrect. There is no such option as ′systemd.boot=rescue′. Option B is incorrect. While ′rescue.target′ does start in a rescue mode, it provides a more complete environment than ′emergency.target′ by starting essential services and mounting essential filesystems. Option C is incorrect. There is no such option as ′systemd.emergency=1′.
Unattempted
Correct Answer: D. systemd.unit=emergency.target Explanation: The emergency.target is a minimal boot-up sequence that only starts the core of the system without any services or mounts. It is useful for low-level troubleshooting and system recovery. Option A is incorrect. There is no such option as ′systemd.boot=rescue′. Option B is incorrect. While ′rescue.target′ does start in a rescue mode, it provides a more complete environment than ′emergency.target′ by starting essential services and mounting essential filesystems. Option C is incorrect. There is no such option as ′systemd.emergency=1′.
Question 28 of 60
28. Question
A system administrator wants to view the health of the hard drive /dev/sda on a Linux system and interpret the attributes and threshold values in a user-friendly format. Which command will achieve this?
Correct
Correct Answer: C. smartctl -a /dev/sda Explanation: The smartctl -a command displays all SMART information of a hard drive, which includes the health status, error logs, attributes, and thresholds in a readable format. Option A is incorrect. ′smartd′ is a daemon that monitors and reports on SMART attributes, but the ′–info′ option does not exist for this tool. Option B is incorrect. ′smartctl -i′ will display basic information about the drive and its SMART capabilities, but not all the attributes and their interpretations. Option D is incorrect. ′smartd -H′ is not a valid command option for ′smartd′. The ′-H′ option is used with ′smartctl′ to display the health status.
Incorrect
Correct Answer: C. smartctl -a /dev/sda Explanation: The smartctl -a command displays all SMART information of a hard drive, which includes the health status, error logs, attributes, and thresholds in a readable format. Option A is incorrect. ′smartd′ is a daemon that monitors and reports on SMART attributes, but the ′–info′ option does not exist for this tool. Option B is incorrect. ′smartctl -i′ will display basic information about the drive and its SMART capabilities, but not all the attributes and their interpretations. Option D is incorrect. ′smartd -H′ is not a valid command option for ′smartd′. The ′-H′ option is used with ′smartctl′ to display the health status.
Unattempted
Correct Answer: C. smartctl -a /dev/sda Explanation: The smartctl -a command displays all SMART information of a hard drive, which includes the health status, error logs, attributes, and thresholds in a readable format. Option A is incorrect. ′smartd′ is a daemon that monitors and reports on SMART attributes, but the ′–info′ option does not exist for this tool. Option B is incorrect. ′smartctl -i′ will display basic information about the drive and its SMART capabilities, but not all the attributes and their interpretations. Option D is incorrect. ′smartd -H′ is not a valid command option for ′smartd′. The ′-H′ option is used with ′smartctl′ to display the health status.
Question 29 of 60
29. Question
After a system crash, you want to check an XFS filesystem for consistency and, if necessary, repair any found issues. However, you want to ensure that the filesystem is not modified unless there is a consistency problem. Which command would be appropriate in this scenario?
Correct
Correct Answer: D. xfs_repair -n /data Explanation: The xfs_repair -n command checks the filesystem for consistency but does not make any changes, even if inconsistencies are found. It‘s a “no modify“ mode. Option A is incorrect. ′xfsdump′ is used to back up the contents of an XFS filesystem. It‘s not used for consistency checks or repairs. Option B is incorrect. ′xfs_info′ retrieves detailed information about an XFS filesystem but doesn‘t check for or repair inconsistencies. Option C is incorrect. ′xfs_check′ is an older tool that checks the consistency of an XFS filesystem. While it does check the filesystem, ′xfs_repair -n′ is more comprehensive and is typically preferred.
Incorrect
Correct Answer: D. xfs_repair -n /data Explanation: The xfs_repair -n command checks the filesystem for consistency but does not make any changes, even if inconsistencies are found. It‘s a “no modify“ mode. Option A is incorrect. ′xfsdump′ is used to back up the contents of an XFS filesystem. It‘s not used for consistency checks or repairs. Option B is incorrect. ′xfs_info′ retrieves detailed information about an XFS filesystem but doesn‘t check for or repair inconsistencies. Option C is incorrect. ′xfs_check′ is an older tool that checks the consistency of an XFS filesystem. While it does check the filesystem, ′xfs_repair -n′ is more comprehensive and is typically preferred.
Unattempted
Correct Answer: D. xfs_repair -n /data Explanation: The xfs_repair -n command checks the filesystem for consistency but does not make any changes, even if inconsistencies are found. It‘s a “no modify“ mode. Option A is incorrect. ′xfsdump′ is used to back up the contents of an XFS filesystem. It‘s not used for consistency checks or repairs. Option B is incorrect. ′xfs_info′ retrieves detailed information about an XFS filesystem but doesn‘t check for or repair inconsistencies. Option C is incorrect. ′xfs_check′ is an older tool that checks the consistency of an XFS filesystem. While it does check the filesystem, ′xfs_repair -n′ is more comprehensive and is typically preferred.
Question 30 of 60
30. Question
While trying to recover a malfunctioning system, Emma wants to attach a file system in read-only mode to ensure no changes are accidentally made to the data. Which of the following mount commands should she use?
Correct
Correct Answer: A. mount -o ro /dev/sdc1 /mnt/data Explanation: The -o ro option with the mount command mounts the file system in read-only mode. This ensures that the file system is not modified during the mount process, which can be crucial during recovery. Option B is incorrect. The order of the mount point and device is reversed in this option. Additionally, ′-r′ is a shorthand for read-only mode, but the order still makes this command incorrect. Option C is incorrect. There is no ′–readonly′ long option for the ′mount′ command. Option D is incorrect. The correct option for mounting in read-only mode is ′ro′, not ′read′.
Incorrect
Correct Answer: A. mount -o ro /dev/sdc1 /mnt/data Explanation: The -o ro option with the mount command mounts the file system in read-only mode. This ensures that the file system is not modified during the mount process, which can be crucial during recovery. Option B is incorrect. The order of the mount point and device is reversed in this option. Additionally, ′-r′ is a shorthand for read-only mode, but the order still makes this command incorrect. Option C is incorrect. There is no ′–readonly′ long option for the ′mount′ command. Option D is incorrect. The correct option for mounting in read-only mode is ′ro′, not ′read′.
Unattempted
Correct Answer: A. mount -o ro /dev/sdc1 /mnt/data Explanation: The -o ro option with the mount command mounts the file system in read-only mode. This ensures that the file system is not modified during the mount process, which can be crucial during recovery. Option B is incorrect. The order of the mount point and device is reversed in this option. Additionally, ′-r′ is a shorthand for read-only mode, but the order still makes this command incorrect. Option C is incorrect. There is no ′–readonly′ long option for the ′mount′ command. Option D is incorrect. The correct option for mounting in read-only mode is ′ro′, not ′read′.
Question 31 of 60
31. Question
The system administrator is trying to diagnose a performance issue on a Linux server. They believe that certain devices are not being balanced properly across the available CPU cores for interrupt processing. Which tool can the administrator use to ensure interrupts are balanced across CPUs?
Correct
Correct Answer: B. irqbalance Explanation: irqbalance is a daemon designed to distribute the load of hardware interrupts across all processors on a multiprocessor system, ensuring optimal performance. Option A is incorrect. ′iostat′ is a command-line tool that shows statistics for I/O devices but doesn‘t provide balancing capabilities for interrupts. Option C is incorrect. ′sysstat′ is a collection of performance monitoring tools for Linux, but it does not specifically manage interrupt balancing. Option D is incorrect. ′nstat′ displays network statistics and does not concern itself with hardware interrupts or their distribution.
Incorrect
Correct Answer: B. irqbalance Explanation: irqbalance is a daemon designed to distribute the load of hardware interrupts across all processors on a multiprocessor system, ensuring optimal performance. Option A is incorrect. ′iostat′ is a command-line tool that shows statistics for I/O devices but doesn‘t provide balancing capabilities for interrupts. Option C is incorrect. ′sysstat′ is a collection of performance monitoring tools for Linux, but it does not specifically manage interrupt balancing. Option D is incorrect. ′nstat′ displays network statistics and does not concern itself with hardware interrupts or their distribution.
Unattempted
Correct Answer: B. irqbalance Explanation: irqbalance is a daemon designed to distribute the load of hardware interrupts across all processors on a multiprocessor system, ensuring optimal performance. Option A is incorrect. ′iostat′ is a command-line tool that shows statistics for I/O devices but doesn‘t provide balancing capabilities for interrupts. Option C is incorrect. ′sysstat′ is a collection of performance monitoring tools for Linux, but it does not specifically manage interrupt balancing. Option D is incorrect. ′nstat′ displays network statistics and does not concern itself with hardware interrupts or their distribution.
Question 32 of 60
32. Question
A network administrator needs to obtain detailed information about the available wireless networks in the vicinity, including their signal quality and encryption type. Which command should the administrator use?
Correct
Correct Answer: A. iwlist wlan0 scan Explanation: The iwlist command, when used with the scan option, provides a detailed list of available wireless networks, including signal quality, encryption type, and other relevant information. Option B is incorrect. The ′iwlist′ command does not have an ′info′ option for displaying detailed information about a specific network. Option C is incorrect. The correct syntax is ′iwlist wlan0 scan′ to list available networks, not ′iwlist wlan0 networks′. Option D is incorrect. The ′iwlist′ command does not have a ′status′ option for displaying network status.
Incorrect
Correct Answer: A. iwlist wlan0 scan Explanation: The iwlist command, when used with the scan option, provides a detailed list of available wireless networks, including signal quality, encryption type, and other relevant information. Option B is incorrect. The ′iwlist′ command does not have an ′info′ option for displaying detailed information about a specific network. Option C is incorrect. The correct syntax is ′iwlist wlan0 scan′ to list available networks, not ′iwlist wlan0 networks′. Option D is incorrect. The ′iwlist′ command does not have a ′status′ option for displaying network status.
Unattempted
Correct Answer: A. iwlist wlan0 scan Explanation: The iwlist command, when used with the scan option, provides a detailed list of available wireless networks, including signal quality, encryption type, and other relevant information. Option B is incorrect. The ′iwlist′ command does not have an ′info′ option for displaying detailed information about a specific network. Option C is incorrect. The correct syntax is ′iwlist wlan0 scan′ to list available networks, not ′iwlist wlan0 networks′. Option D is incorrect. The ′iwlist′ command does not have a ′status′ option for displaying network status.
Question 33 of 60
33. Question
An administrator needs to add a new static route for the 10.0.0.0/24 network via the gateway 192.168.1.1. Which command should the administrator use?
Correct
Correct Answer: B. route add 10.0.0.0/24 via 192.168.1.1 Explanation: The route add command is used to add static routes to the routing table. Option B is the correct syntax for adding a route to the 10.0.0.0/24 network via the gateway 192.168.1.1. Option A is incorrect. While this syntax might work on some systems, it is not a universally recognized command. The correct syntax uses “via“ instead of “gw“. Option C is incorrect. The ′route′ command does not use the ′set′ keyword in this context. Option D is incorrect. The ′route′ command does not use the ′new′ keyword in this context.
Incorrect
Correct Answer: B. route add 10.0.0.0/24 via 192.168.1.1 Explanation: The route add command is used to add static routes to the routing table. Option B is the correct syntax for adding a route to the 10.0.0.0/24 network via the gateway 192.168.1.1. Option A is incorrect. While this syntax might work on some systems, it is not a universally recognized command. The correct syntax uses “via“ instead of “gw“. Option C is incorrect. The ′route′ command does not use the ′set′ keyword in this context. Option D is incorrect. The ′route′ command does not use the ′new′ keyword in this context.
Unattempted
Correct Answer: B. route add 10.0.0.0/24 via 192.168.1.1 Explanation: The route add command is used to add static routes to the routing table. Option B is the correct syntax for adding a route to the 10.0.0.0/24 network via the gateway 192.168.1.1. Option A is incorrect. While this syntax might work on some systems, it is not a universally recognized command. The correct syntax uses “via“ instead of “gw“. Option C is incorrect. The ′route′ command does not use the ′set′ keyword in this context. Option D is incorrect. The ′route′ command does not use the ′new′ keyword in this context.
Question 34 of 60
34. Question
Sophia wants to change the runlevel of her system without restarting it. Which of the following commands will help her achieve this and set the system to runlevel 3?
Correct
Correct Answer: C. telinit 3 Explanation: The telinit command can be used to change the system runlevel without restarting the system. By specifying a runlevel number after telinit, the system‘s runlevel will be changed to that number. Thus, telinit 3 will change the system‘s runlevel to 3. Option A is incorrect. Although ′init 3′ can be used to change the runlevel to 3, ′telinit′ is the more conventional way to achieve this without rebooting. Option B is incorrect. The ′-3′ flag is not a valid option for ′telinit′. Option D is incorrect. There is no ′–set′ option for the ′init′ command.
Incorrect
Correct Answer: C. telinit 3 Explanation: The telinit command can be used to change the system runlevel without restarting the system. By specifying a runlevel number after telinit, the system‘s runlevel will be changed to that number. Thus, telinit 3 will change the system‘s runlevel to 3. Option A is incorrect. Although ′init 3′ can be used to change the runlevel to 3, ′telinit′ is the more conventional way to achieve this without rebooting. Option B is incorrect. The ′-3′ flag is not a valid option for ′telinit′. Option D is incorrect. There is no ′–set′ option for the ′init′ command.
Unattempted
Correct Answer: C. telinit 3 Explanation: The telinit command can be used to change the system runlevel without restarting the system. By specifying a runlevel number after telinit, the system‘s runlevel will be changed to that number. Thus, telinit 3 will change the system‘s runlevel to 3. Option A is incorrect. Although ′init 3′ can be used to change the runlevel to 3, ′telinit′ is the more conventional way to achieve this without rebooting. Option B is incorrect. The ′-3′ flag is not a valid option for ′telinit′. Option D is incorrect. There is no ′–set′ option for the ′init′ command.
Question 35 of 60
35. Question
Alex has been tasked to create a new ext4 filesystem on a newly attached disk /dev/sdb1. He wants to use a block size of 4096 bytes. Which command should he use to accomplish this?
Correct
Correct Answer: B. mkfs -t ext4 -b 4096 /dev/sdb1 Explanation: The mkfs command is used to create a new filesystem, and the -t option specifies the type of filesystem (in this case, ext4). The -b option specifies the block size for the filesystem. Therefore, the correct command to create an ext4 filesystem with a block size of 4096 bytes on /dev/sdb1 is mkfs -t ext4 -b 4096 /dev/sdb1. Option A is incorrect. The command is using ′mkfs.ext4′ directly, but it‘s specifying ′/dev/sdb′ (the entire disk) instead of ′/dev/sdb1′ (the partition). Option C is incorrect. Although it will create an ext4 filesystem on ′/dev/sdb1′, it does not explicitly set the block size to 4096 bytes. Option D is incorrect. The ′-s′ option is not valid for specifying block size with ′mkfs.ext4′.
Incorrect
Correct Answer: B. mkfs -t ext4 -b 4096 /dev/sdb1 Explanation: The mkfs command is used to create a new filesystem, and the -t option specifies the type of filesystem (in this case, ext4). The -b option specifies the block size for the filesystem. Therefore, the correct command to create an ext4 filesystem with a block size of 4096 bytes on /dev/sdb1 is mkfs -t ext4 -b 4096 /dev/sdb1. Option A is incorrect. The command is using ′mkfs.ext4′ directly, but it‘s specifying ′/dev/sdb′ (the entire disk) instead of ′/dev/sdb1′ (the partition). Option C is incorrect. Although it will create an ext4 filesystem on ′/dev/sdb1′, it does not explicitly set the block size to 4096 bytes. Option D is incorrect. The ′-s′ option is not valid for specifying block size with ′mkfs.ext4′.
Unattempted
Correct Answer: B. mkfs -t ext4 -b 4096 /dev/sdb1 Explanation: The mkfs command is used to create a new filesystem, and the -t option specifies the type of filesystem (in this case, ext4). The -b option specifies the block size for the filesystem. Therefore, the correct command to create an ext4 filesystem with a block size of 4096 bytes on /dev/sdb1 is mkfs -t ext4 -b 4096 /dev/sdb1. Option A is incorrect. The command is using ′mkfs.ext4′ directly, but it‘s specifying ′/dev/sdb′ (the entire disk) instead of ′/dev/sdb1′ (the partition). Option C is incorrect. Although it will create an ext4 filesystem on ′/dev/sdb1′, it does not explicitly set the block size to 4096 bytes. Option D is incorrect. The ′-s′ option is not valid for specifying block size with ′mkfs.ext4′.
Question 36 of 60
36. Question
You have a file named “data.txt“ that you want to compress using xz. What command should you use?
Correct
Correct Answer: A. xz data.txt Explanation: The correct command to compress a file using xz is xz data.txt. This command compresses the file in place and adds the .xz extension to the filename. Option B is incorrect. Option B is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′xz data.txt′. Option C is incorrect. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with xz is ′xz data.txt′. Option D is incorrect. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for xz compression. The correct command is ′xz data.txt′.
Incorrect
Correct Answer: A. xz data.txt Explanation: The correct command to compress a file using xz is xz data.txt. This command compresses the file in place and adds the .xz extension to the filename. Option B is incorrect. Option B is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′xz data.txt′. Option C is incorrect. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with xz is ′xz data.txt′. Option D is incorrect. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for xz compression. The correct command is ′xz data.txt′.
Unattempted
Correct Answer: A. xz data.txt Explanation: The correct command to compress a file using xz is xz data.txt. This command compresses the file in place and adds the .xz extension to the filename. Option B is incorrect. Option B is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′xz data.txt′. Option C is incorrect. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with xz is ′xz data.txt′. Option D is incorrect. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for xz compression. The correct command is ′xz data.txt′.
Question 37 of 60
37. Question
In a Debian-based Linux distribution, Jake wants to remove all symbolic links for the ssh service without removing its init script. Which of the following update-rc.d commands should he use?
Correct
Correct Answer: D. update-rc.d -f ssh remove Explanation: To remove all symbolic links for a service without deleting its init script in Debian-based distributions, one should use update-rc.d -f service_name remove. The -f option forces the removal of any existing symlinks, and remove specifies that all links for the given service should be removed. Option A is incorrect. While ′update-rc.d ssh remove′ seems close, it doesn‘t have the ′-f′ option, which is essential to forcefully remove the symbolic links. Option B is incorrect. The ′delete′ keyword is not a valid option for ′update-rc.d′. Option C is incorrect. The ′defaults′ option creates symbolic links based on the default runlevels, not remove them.
Incorrect
Correct Answer: D. update-rc.d -f ssh remove Explanation: To remove all symbolic links for a service without deleting its init script in Debian-based distributions, one should use update-rc.d -f service_name remove. The -f option forces the removal of any existing symlinks, and remove specifies that all links for the given service should be removed. Option A is incorrect. While ′update-rc.d ssh remove′ seems close, it doesn‘t have the ′-f′ option, which is essential to forcefully remove the symbolic links. Option B is incorrect. The ′delete′ keyword is not a valid option for ′update-rc.d′. Option C is incorrect. The ′defaults′ option creates symbolic links based on the default runlevels, not remove them.
Unattempted
Correct Answer: D. update-rc.d -f ssh remove Explanation: To remove all symbolic links for a service without deleting its init script in Debian-based distributions, one should use update-rc.d -f service_name remove. The -f option forces the removal of any existing symlinks, and remove specifies that all links for the given service should be removed. Option A is incorrect. While ′update-rc.d ssh remove′ seems close, it doesn‘t have the ′-f′ option, which is essential to forcefully remove the symbolic links. Option B is incorrect. The ′delete′ keyword is not a valid option for ′update-rc.d′. Option C is incorrect. The ′defaults′ option creates symbolic links based on the default runlevels, not remove them.
Question 38 of 60
38. Question
You have a file named “archive.txt“ that you want to compress using bzip2. What command should you use?
Correct
Correct Answer: B. bzip archive.txt Explanation: The correct command to compress a file using bzip2 is bzip2 archive.txt. This command compresses the file in place and adds the .bz2 extension to the filename. Option A is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′bzip2 archive.txt′. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with bzip2 is ′bzip2 archive.txt′. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for bzip2 compression. The correct command is ′bzip2 archive.txt′.
Incorrect
Correct Answer: B. bzip archive.txt Explanation: The correct command to compress a file using bzip2 is bzip2 archive.txt. This command compresses the file in place and adds the .bz2 extension to the filename. Option A is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′bzip2 archive.txt′. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with bzip2 is ′bzip2 archive.txt′. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for bzip2 compression. The correct command is ′bzip2 archive.txt′.
Unattempted
Correct Answer: B. bzip archive.txt Explanation: The correct command to compress a file using bzip2 is bzip2 archive.txt. This command compresses the file in place and adds the .bz2 extension to the filename. Option A is incorrect because it uses the ′-c′ option, which writes the compressed output to the standard output. In this case, it‘s not necessary, and the correct command is simply ′bzip2 archive.txt′. Option C is incorrect because it uses the ′tar′ command, which is used for creating tar archives. The correct command for compressing a file with bzip2 is ′bzip2 archive.txt′. Option D is incorrect because it uses the outdated ′compress′ command, which is not commonly used for bzip2 compression. The correct command is ′bzip2 archive.txt′.
Question 39 of 60
39. Question
An administrator has been noticing sporadic system freezes on a Linux server. They suspect it might be related to hardware interrupts. Which command can the administrator use to observe a detailed real-time view of the systemÂ’s interrupt activity?
Correct
Correct Answer: D. watch -n 1 cat /proc/interrupts Explanation: The /proc/interrupts file provides detailed information on hardware interrupts. Using the watch command in conjunction with cat /proc/interrupts allows the administrator to observe these interrupts in real-time. Option A is incorrect. The ′top′ command provides an ongoing look at processor activity but doesn‘t offer detailed interrupt information. Option B is incorrect. ′vmstat′ provides reports about processes, memory, paging, block IO, traps, and cpu activity but doesn‘t offer the granularity on interrupts as ′/proc/interrupts′. Option C is incorrect. ′irqbalance′ is a daemon that distributes hardware interrupts across processors on a multiprocessor system, but it doesn‘t provide real-time viewing capabilities.
Incorrect
Correct Answer: D. watch -n 1 cat /proc/interrupts Explanation: The /proc/interrupts file provides detailed information on hardware interrupts. Using the watch command in conjunction with cat /proc/interrupts allows the administrator to observe these interrupts in real-time. Option A is incorrect. The ′top′ command provides an ongoing look at processor activity but doesn‘t offer detailed interrupt information. Option B is incorrect. ′vmstat′ provides reports about processes, memory, paging, block IO, traps, and cpu activity but doesn‘t offer the granularity on interrupts as ′/proc/interrupts′. Option C is incorrect. ′irqbalance′ is a daemon that distributes hardware interrupts across processors on a multiprocessor system, but it doesn‘t provide real-time viewing capabilities.
Unattempted
Correct Answer: D. watch -n 1 cat /proc/interrupts Explanation: The /proc/interrupts file provides detailed information on hardware interrupts. Using the watch command in conjunction with cat /proc/interrupts allows the administrator to observe these interrupts in real-time. Option A is incorrect. The ′top′ command provides an ongoing look at processor activity but doesn‘t offer detailed interrupt information. Option B is incorrect. ′vmstat′ provides reports about processes, memory, paging, block IO, traps, and cpu activity but doesn‘t offer the granularity on interrupts as ′/proc/interrupts′. Option C is incorrect. ′irqbalance′ is a daemon that distributes hardware interrupts across processors on a multiprocessor system, but it doesn‘t provide real-time viewing capabilities.
Question 40 of 60
40. Question
Michael, a system administrator, suspects that there might be some inconsistencies on an ext4 filesystem mounted at /data. He wishes to check and fix any potential issues without mounting the filesystem. Which utility should Michael use for this purpose?
Correct
Correct Answer: A. fsck.ext4 /dev/sdb1 Explanation: fsck.ext4 is the filesystem check utility specifically designed for ext4 filesystems. It checks and repairs inconsistencies or errors if any are present on the specified filesystem. Option B is incorrect. ′mkfs.ext4′ is used to create an ′ext4′ filesystem, not to check for inconsistencies. Option C is incorrect. There isn‘t a standard utility named ′modfs.ext4′. Option D is incorrect. The ′chown′ command is used to change file owner and group, not to check or repair filesystem inconsistencies.
Incorrect
Correct Answer: A. fsck.ext4 /dev/sdb1 Explanation: fsck.ext4 is the filesystem check utility specifically designed for ext4 filesystems. It checks and repairs inconsistencies or errors if any are present on the specified filesystem. Option B is incorrect. ′mkfs.ext4′ is used to create an ′ext4′ filesystem, not to check for inconsistencies. Option C is incorrect. There isn‘t a standard utility named ′modfs.ext4′. Option D is incorrect. The ′chown′ command is used to change file owner and group, not to check or repair filesystem inconsistencies.
Unattempted
Correct Answer: A. fsck.ext4 /dev/sdb1 Explanation: fsck.ext4 is the filesystem check utility specifically designed for ext4 filesystems. It checks and repairs inconsistencies or errors if any are present on the specified filesystem. Option B is incorrect. ′mkfs.ext4′ is used to create an ′ext4′ filesystem, not to check for inconsistencies. Option C is incorrect. There isn‘t a standard utility named ′modfs.ext4′. Option D is incorrect. The ′chown′ command is used to change file owner and group, not to check or repair filesystem inconsistencies.
Question 41 of 60
41. Question
An administrator wants to connect to a newly configured iSCSI target from an initiator system. Which tool should the administrator use to discover available iSCSI targets on a given target server with IP 192.168.1.10?
Correct
Correct Answer: A. iscsiadm -m discovery -t sendtargets -p 192.168.1.10 Explanation: iscsiadm is the utility that administrators use on the initiator side to manage iSCSI sessions. The -m discovery option with -t sendtargets is used to discover iSCSI targets on a specified IP. Option B is incorrect. ′targetcli′ is used on the target side for configuration, not for discovery on the initiator side. Option C is incorrect. ′iscsid′ is the iSCSI daemon used on the initiator side to establish and maintain iSCSI sessions but doesn‘t have a direct ‘discover‘ command as described. Option D is incorrect. ′iscsi-target′ is not the standard utility for this operation. The correct utility for discovery on the initiator side is ′iscsiadm′.
Incorrect
Correct Answer: A. iscsiadm -m discovery -t sendtargets -p 192.168.1.10 Explanation: iscsiadm is the utility that administrators use on the initiator side to manage iSCSI sessions. The -m discovery option with -t sendtargets is used to discover iSCSI targets on a specified IP. Option B is incorrect. ′targetcli′ is used on the target side for configuration, not for discovery on the initiator side. Option C is incorrect. ′iscsid′ is the iSCSI daemon used on the initiator side to establish and maintain iSCSI sessions but doesn‘t have a direct ‘discover‘ command as described. Option D is incorrect. ′iscsi-target′ is not the standard utility for this operation. The correct utility for discovery on the initiator side is ′iscsiadm′.
Unattempted
Correct Answer: A. iscsiadm -m discovery -t sendtargets -p 192.168.1.10 Explanation: iscsiadm is the utility that administrators use on the initiator side to manage iSCSI sessions. The -m discovery option with -t sendtargets is used to discover iSCSI targets on a specified IP. Option B is incorrect. ′targetcli′ is used on the target side for configuration, not for discovery on the initiator side. Option C is incorrect. ′iscsid′ is the iSCSI daemon used on the initiator side to establish and maintain iSCSI sessions but doesn‘t have a direct ‘discover‘ command as described. Option D is incorrect. ′iscsi-target′ is not the standard utility for this operation. The correct utility for discovery on the initiator side is ′iscsiadm′.
Question 42 of 60
42. Question
As an administrator, youÂ’re configuring a new high-performance Linux server with NVMe SSDs. You need to gather detailed information about the NVMe drives, including the firmware version, to ensure compatibility. Which command would you employ to fetch this information?
Correct
Correct Answer: B. nvme-cli Explanation: The nvme-cli tool provides a suite of NVMe management commands allowing administrators to retrieve information, update firmware, and manage various other aspects of NVMe drives. Option A is incorrect. While ′hdparm′ is used for hard disk parameters, especially with ATA/IDE drives, it‘s not the standard tool for NVMe management. Option C is incorrect. ′smartctl′ controls and monitors storage devices using the SMART system, but while it can fetch some details about NVMe drives, the primary command for NVMe management is ′nvme-cli′. Option D is incorrect. ′fsck′ is a filesystem check and repair utility. It is unrelated to storage device information retrieval or management.
Incorrect
Correct Answer: B. nvme-cli Explanation: The nvme-cli tool provides a suite of NVMe management commands allowing administrators to retrieve information, update firmware, and manage various other aspects of NVMe drives. Option A is incorrect. While ′hdparm′ is used for hard disk parameters, especially with ATA/IDE drives, it‘s not the standard tool for NVMe management. Option C is incorrect. ′smartctl′ controls and monitors storage devices using the SMART system, but while it can fetch some details about NVMe drives, the primary command for NVMe management is ′nvme-cli′. Option D is incorrect. ′fsck′ is a filesystem check and repair utility. It is unrelated to storage device information retrieval or management.
Unattempted
Correct Answer: B. nvme-cli Explanation: The nvme-cli tool provides a suite of NVMe management commands allowing administrators to retrieve information, update firmware, and manage various other aspects of NVMe drives. Option A is incorrect. While ′hdparm′ is used for hard disk parameters, especially with ATA/IDE drives, it‘s not the standard tool for NVMe management. Option C is incorrect. ′smartctl′ controls and monitors storage devices using the SMART system, but while it can fetch some details about NVMe drives, the primary command for NVMe management is ′nvme-cli′. Option D is incorrect. ′fsck′ is a filesystem check and repair utility. It is unrelated to storage device information retrieval or management.
Question 43 of 60
43. Question
John is configuring advanced network settings on his Linux server and needs a tool that allows him to show or manipulate routing, devices, policy routing, and tunnels. Which utility should he use?
Correct
Correct Answer: A. ip Explanation: The ip command is a versatile tool that allows users to show or manipulate routing, devices, policy routing, and tunnels. It is a more powerful and modern replacement for the older ifconfig, route, and netstat commands. Option B is incorrect. ifconfig is an older command that is now considered deprecated in favor of ip. While it can display and configure network interfaces, it doesn‘t cover all the functionalities provided by ip. Option C is incorrect. The ′route′ command is used for displaying and modifying the IP routing table, but it is not as comprehensive as the ′ip′ command in terms of functionality. Option D is incorrect. ′netstat′ displays information about network connections, routing tables, interface statistics, and more, but it is not as versatile or modern as the ′ip′ command. The ′ip′ command is recommended for advanced network configuration.
Incorrect
Correct Answer: A. ip Explanation: The ip command is a versatile tool that allows users to show or manipulate routing, devices, policy routing, and tunnels. It is a more powerful and modern replacement for the older ifconfig, route, and netstat commands. Option B is incorrect. ifconfig is an older command that is now considered deprecated in favor of ip. While it can display and configure network interfaces, it doesn‘t cover all the functionalities provided by ip. Option C is incorrect. The ′route′ command is used for displaying and modifying the IP routing table, but it is not as comprehensive as the ′ip′ command in terms of functionality. Option D is incorrect. ′netstat′ displays information about network connections, routing tables, interface statistics, and more, but it is not as versatile or modern as the ′ip′ command. The ′ip′ command is recommended for advanced network configuration.
Unattempted
Correct Answer: A. ip Explanation: The ip command is a versatile tool that allows users to show or manipulate routing, devices, policy routing, and tunnels. It is a more powerful and modern replacement for the older ifconfig, route, and netstat commands. Option B is incorrect. ifconfig is an older command that is now considered deprecated in favor of ip. While it can display and configure network interfaces, it doesn‘t cover all the functionalities provided by ip. Option C is incorrect. The ′route′ command is used for displaying and modifying the IP routing table, but it is not as comprehensive as the ′ip′ command in terms of functionality. Option D is incorrect. ′netstat′ displays information about network connections, routing tables, interface statistics, and more, but it is not as versatile or modern as the ′ip′ command. The ′ip′ command is recommended for advanced network configuration.
Question 44 of 60
44. Question
Angela has compiled and installed a new Linux kernel on her server. She wants to ensure that her GRUB2 boot manager will successfully boot using the new kernel. Which file should she edit to add an entry for her new kernel?
Correct
Correct Answer: B. /boot/grub2/grub.cfg Explanation: For GRUB2, the configuration file that contains the menu entries displayed at boot time is /boot/grub2/grub.cfg. Option A is incorrect. /etc/default/grub is a configuration file for setting GRUB2 default options, but does not contain individual boot entries. Option C is incorrect. There isn‘t a standard /etc/grub2/grub.cfg file. The boot configuration for GRUB2 is usually stored in the /boot/grub2/ directory. Option D is incorrect. /boot/grub/grub.lst was used in the older GRUB Legacy bootloader, not GRUB2.
Incorrect
Correct Answer: B. /boot/grub2/grub.cfg Explanation: For GRUB2, the configuration file that contains the menu entries displayed at boot time is /boot/grub2/grub.cfg. Option A is incorrect. /etc/default/grub is a configuration file for setting GRUB2 default options, but does not contain individual boot entries. Option C is incorrect. There isn‘t a standard /etc/grub2/grub.cfg file. The boot configuration for GRUB2 is usually stored in the /boot/grub2/ directory. Option D is incorrect. /boot/grub/grub.lst was used in the older GRUB Legacy bootloader, not GRUB2.
Unattempted
Correct Answer: B. /boot/grub2/grub.cfg Explanation: For GRUB2, the configuration file that contains the menu entries displayed at boot time is /boot/grub2/grub.cfg. Option A is incorrect. /etc/default/grub is a configuration file for setting GRUB2 default options, but does not contain individual boot entries. Option C is incorrect. There isn‘t a standard /etc/grub2/grub.cfg file. The boot configuration for GRUB2 is usually stored in the /boot/grub2/ directory. Option D is incorrect. /boot/grub/grub.lst was used in the older GRUB Legacy bootloader, not GRUB2.
Question 45 of 60
45. Question
After attending a conference on Linux kernel advancements, Alice learned about different compression methods for kernel images. She wants to use a compression method that provides a high compression ratio and is relatively fast when decompressing. Which compression method should Alice consider?
Correct
Correct Answer: C. xz Explanation: The xz compression method, based on the LZMA2 algorithm, offers a high compression ratio and is relatively fast during decompression. It‘s used for kernel compression because of its balance between size and decompression speed. Option A is incorrect. While gzip is a popular and older compression method for kernel images, it doesn‘t offer the same high compression ratio as xz. Option B is incorrect. bzip2 offers a good compression ratio, but it is slower than xz when it comes to decompression, making it less ideal for kernel image compression. Option D is incorrect. zip is not a standard compression method for Linux kernel images.
Incorrect
Correct Answer: C. xz Explanation: The xz compression method, based on the LZMA2 algorithm, offers a high compression ratio and is relatively fast during decompression. It‘s used for kernel compression because of its balance between size and decompression speed. Option A is incorrect. While gzip is a popular and older compression method for kernel images, it doesn‘t offer the same high compression ratio as xz. Option B is incorrect. bzip2 offers a good compression ratio, but it is slower than xz when it comes to decompression, making it less ideal for kernel image compression. Option D is incorrect. zip is not a standard compression method for Linux kernel images.
Unattempted
Correct Answer: C. xz Explanation: The xz compression method, based on the LZMA2 algorithm, offers a high compression ratio and is relatively fast during decompression. It‘s used for kernel compression because of its balance between size and decompression speed. Option A is incorrect. While gzip is a popular and older compression method for kernel images, it doesn‘t offer the same high compression ratio as xz. Option B is incorrect. bzip2 offers a good compression ratio, but it is slower than xz when it comes to decompression, making it less ideal for kernel image compression. Option D is incorrect. zip is not a standard compression method for Linux kernel images.
Question 46 of 60
46. Question
An administrator notices suspicious network activity on a server and suspects ARP spoofing. To investigate the local ARP cache of the server, which command should the administrator use?
Correct
Correct Answer: A. arp -n Explanation: The arp -n command displays the current ARP cache of the system in a numeric format. This means IP addresses are shown instead of hostnames, making the output clearer. Option B is incorrect. The ′arp′ command does not use the ′view′ keyword to display the ARP cache. Option C is incorrect. The ′arp′ command does not have a ′display′ keyword. Option D is incorrect. The ′arp′ command does not use the ′resolve′ keyword to show the ARP cache.
Incorrect
Correct Answer: A. arp -n Explanation: The arp -n command displays the current ARP cache of the system in a numeric format. This means IP addresses are shown instead of hostnames, making the output clearer. Option B is incorrect. The ′arp′ command does not use the ′view′ keyword to display the ARP cache. Option C is incorrect. The ′arp′ command does not have a ′display′ keyword. Option D is incorrect. The ′arp′ command does not use the ′resolve′ keyword to show the ARP cache.
Unattempted
Correct Answer: A. arp -n Explanation: The arp -n command displays the current ARP cache of the system in a numeric format. This means IP addresses are shown instead of hostnames, making the output clearer. Option B is incorrect. The ′arp′ command does not use the ′view′ keyword to display the ARP cache. Option C is incorrect. The ′arp′ command does not have a ′display′ keyword. Option D is incorrect. The ′arp′ command does not use the ′resolve′ keyword to show the ARP cache.
Question 47 of 60
47. Question
A system administrator is troubleshooting performance issues with an older IDE hard drive on a Linux server. They need a tool that can allow them to enable or disable DMA (Direct Memory Access) for the drive. Which command can help them achieve this?
Correct
Correct Answer: A. hdparm Explanation: The hdparm command in Linux is used to get or set hard disk parameters, particularly for ATA/IDE drives. It can be employed to enable or disable DMA on supported devices. Option B is incorrect. ′fsck′ is a filesystem check utility and has no functionality related to setting or checking DMA. Option C is incorrect. ′smartctl′ is used to control and monitor storage systems using the Self-Monitoring, Analysis, and Reporting Technology System (SMART). It does not manage DMA. Option D is incorrect. ′mdadm′ is a tool for managing Linux software RAID arrays and has no relation to configuring DMA.
Incorrect
Correct Answer: A. hdparm Explanation: The hdparm command in Linux is used to get or set hard disk parameters, particularly for ATA/IDE drives. It can be employed to enable or disable DMA on supported devices. Option B is incorrect. ′fsck′ is a filesystem check utility and has no functionality related to setting or checking DMA. Option C is incorrect. ′smartctl′ is used to control and monitor storage systems using the Self-Monitoring, Analysis, and Reporting Technology System (SMART). It does not manage DMA. Option D is incorrect. ′mdadm′ is a tool for managing Linux software RAID arrays and has no relation to configuring DMA.
Unattempted
Correct Answer: A. hdparm Explanation: The hdparm command in Linux is used to get or set hard disk parameters, particularly for ATA/IDE drives. It can be employed to enable or disable DMA on supported devices. Option B is incorrect. ′fsck′ is a filesystem check utility and has no functionality related to setting or checking DMA. Option C is incorrect. ′smartctl′ is used to control and monitor storage systems using the Self-Monitoring, Analysis, and Reporting Technology System (SMART). It does not manage DMA. Option D is incorrect. ′mdadm′ is a tool for managing Linux software RAID arrays and has no relation to configuring DMA.
Question 48 of 60
48. Question
Sarah, a system administrator, wants to quickly determine how long the server has been running since the last restart. Which command should she use to obtain this information directly?
Correct
Correct Answer: C. uptime Explanation: The uptime command provides the current time, how long the system has been running, how many users are currently logged on, and the system load averages for the past 1, 5, and 15 minutes. Option A is incorrect. The who -b command shows the last system boot time, but it doesn‘t provide the duration of how long the system has been up. Option B is incorrect. The uptime -s command provides the start time (when the system was last booted up) but doesn‘t show the duration. Option D is incorrect. Using dmesg | grep uptime would search the kernel ring buffer for messages containing the word “uptime“. This isn‘t a standard way to determine system uptime, and it might not return relevant results.
Incorrect
Correct Answer: C. uptime Explanation: The uptime command provides the current time, how long the system has been running, how many users are currently logged on, and the system load averages for the past 1, 5, and 15 minutes. Option A is incorrect. The who -b command shows the last system boot time, but it doesn‘t provide the duration of how long the system has been up. Option B is incorrect. The uptime -s command provides the start time (when the system was last booted up) but doesn‘t show the duration. Option D is incorrect. Using dmesg | grep uptime would search the kernel ring buffer for messages containing the word “uptime“. This isn‘t a standard way to determine system uptime, and it might not return relevant results.
Unattempted
Correct Answer: C. uptime Explanation: The uptime command provides the current time, how long the system has been running, how many users are currently logged on, and the system load averages for the past 1, 5, and 15 minutes. Option A is incorrect. The who -b command shows the last system boot time, but it doesn‘t provide the duration of how long the system has been up. Option B is incorrect. The uptime -s command provides the start time (when the system was last booted up) but doesn‘t show the duration. Option D is incorrect. Using dmesg | grep uptime would search the kernel ring buffer for messages containing the word “uptime“. This isn‘t a standard way to determine system uptime, and it might not return relevant results.
Question 49 of 60
49. Question
A Linux system administrator needs to retrieve the VPD (Vital Product Data) pages from a SCSI device /dev/sdb. Which command should they use to achieve this?
Correct
Correct Answer: B. sdparm –vpd /dev/sdb Explanation: The sdparm utility is used to get or set SCSI device parameters. The –vpd option is used to display the VPD pages of a SCSI device. Option A is incorrect. The ′–page′ option is used to display or change a MODE page, not VPD pages. Option C is incorrect. There isn‘t a ′–get′ option in the ′sdparm′ command for this purpose. Option D is incorrect. The ′–fetch′ option does not exist for the ′sdparm′ command.
Incorrect
Correct Answer: B. sdparm –vpd /dev/sdb Explanation: The sdparm utility is used to get or set SCSI device parameters. The –vpd option is used to display the VPD pages of a SCSI device. Option A is incorrect. The ′–page′ option is used to display or change a MODE page, not VPD pages. Option C is incorrect. There isn‘t a ′–get′ option in the ′sdparm′ command for this purpose. Option D is incorrect. The ′–fetch′ option does not exist for the ′sdparm′ command.
Unattempted
Correct Answer: B. sdparm –vpd /dev/sdb Explanation: The sdparm utility is used to get or set SCSI device parameters. The –vpd option is used to display the VPD pages of a SCSI device. Option A is incorrect. The ′–page′ option is used to display or change a MODE page, not VPD pages. Option C is incorrect. There isn‘t a ′–get′ option in the ′sdparm′ command for this purpose. Option D is incorrect. The ′–fetch′ option does not exist for the ′sdparm′ command.
Question 50 of 60
50. Question
While monitoring a Linux system’s I/O statistics, Maria notices a significant number of blocks being continuously read from the disk. To ascertain the rate of these “blocks in” on a block device, which field in the vmstat command output should she monitor?
Correct
Correct Answer: C. bi Explanation: The vmstat command provides various metrics related to virtual memory, processes, I/O blocks, and CPU activity. The ‘bi‘ field specifically represents blocks received from a block device, essentially the input I/O operations. Option A is incorrect. The bo field stands for blocks sent to a block device, which indicates the output I/O operations, not the input ones. Option B is incorrect. The si field pertains to the amount of memory swapped in from the disk (measured in kilobytes per second). It does not indicate blocks read into the system. Option D is incorrect. The so field relates to the amount of memory swapped out to the disk (measured in kilobytes per second) and not about blocks being read into the system.
Incorrect
Correct Answer: C. bi Explanation: The vmstat command provides various metrics related to virtual memory, processes, I/O blocks, and CPU activity. The ‘bi‘ field specifically represents blocks received from a block device, essentially the input I/O operations. Option A is incorrect. The bo field stands for blocks sent to a block device, which indicates the output I/O operations, not the input ones. Option B is incorrect. The si field pertains to the amount of memory swapped in from the disk (measured in kilobytes per second). It does not indicate blocks read into the system. Option D is incorrect. The so field relates to the amount of memory swapped out to the disk (measured in kilobytes per second) and not about blocks being read into the system.
Unattempted
Correct Answer: C. bi Explanation: The vmstat command provides various metrics related to virtual memory, processes, I/O blocks, and CPU activity. The ‘bi‘ field specifically represents blocks received from a block device, essentially the input I/O operations. Option A is incorrect. The bo field stands for blocks sent to a block device, which indicates the output I/O operations, not the input ones. Option B is incorrect. The si field pertains to the amount of memory swapped in from the disk (measured in kilobytes per second). It does not indicate blocks read into the system. Option D is incorrect. The so field relates to the amount of memory swapped out to the disk (measured in kilobytes per second) and not about blocks being read into the system.
Question 51 of 60
51. Question
Alex is investigating which processes have opened a specific file on his Linux server. Which command should he use?
Correct
Correct Answer: C. lsof /path/to/file Explanation: The lsof /path/to/file command is used to list processes that have the specified file open. Option A is incorrect. The -f option in lsof -f /path/to/file is used to filter based on a file descriptor, not to specify the file itself. Option B is incorrect. The ′-p′ option in ′lsof -p /path/to/file′ is used to list open files for a specific process ID, not to specify the file itself. Option D is incorrect. The ′-i′ option in ′lsof -i /path/to/file′ is used to list open files for processes that use internet sockets, not to specify the file itself.
Incorrect
Correct Answer: C. lsof /path/to/file Explanation: The lsof /path/to/file command is used to list processes that have the specified file open. Option A is incorrect. The -f option in lsof -f /path/to/file is used to filter based on a file descriptor, not to specify the file itself. Option B is incorrect. The ′-p′ option in ′lsof -p /path/to/file′ is used to list open files for a specific process ID, not to specify the file itself. Option D is incorrect. The ′-i′ option in ′lsof -i /path/to/file′ is used to list open files for processes that use internet sockets, not to specify the file itself.
Unattempted
Correct Answer: C. lsof /path/to/file Explanation: The lsof /path/to/file command is used to list processes that have the specified file open. Option A is incorrect. The -f option in lsof -f /path/to/file is used to filter based on a file descriptor, not to specify the file itself. Option B is incorrect. The ′-p′ option in ′lsof -p /path/to/file′ is used to list open files for a specific process ID, not to specify the file itself. Option D is incorrect. The ′-i′ option in ′lsof -i /path/to/file′ is used to list open files for processes that use internet sockets, not to specify the file itself.
Question 52 of 60
52. Question
After performing a backup of critical system files, you want to verify the integrity of the backup archive. Which command would you use to check the integrity of a tarball named system_backup.tar.gz?
Correct
Correct Answer: A. tar -tzvf system_backup.tar.gz Explanation: The correct command to check the integrity of a tarball is tar -tzvf system_backup.tar.gz. This command lists the contents of the tarball and verifies its integrity. Option B is incorrect because ′gzip -t′ checks the integrity of a gzip-compressed file but does not verify the tar archive within it. Option C is incorrect because ′md5sum′ is used to calculate and verify the MD5 checksum of a file but does not directly check the integrity of a tarball. Option D is incorrect because ′sha256sum′ calculates and verifies the SHA-256 checksum of a file but does not directly check the integrity of a tarball.
Incorrect
Correct Answer: A. tar -tzvf system_backup.tar.gz Explanation: The correct command to check the integrity of a tarball is tar -tzvf system_backup.tar.gz. This command lists the contents of the tarball and verifies its integrity. Option B is incorrect because ′gzip -t′ checks the integrity of a gzip-compressed file but does not verify the tar archive within it. Option C is incorrect because ′md5sum′ is used to calculate and verify the MD5 checksum of a file but does not directly check the integrity of a tarball. Option D is incorrect because ′sha256sum′ calculates and verifies the SHA-256 checksum of a file but does not directly check the integrity of a tarball.
Unattempted
Correct Answer: A. tar -tzvf system_backup.tar.gz Explanation: The correct command to check the integrity of a tarball is tar -tzvf system_backup.tar.gz. This command lists the contents of the tarball and verifies its integrity. Option B is incorrect because ′gzip -t′ checks the integrity of a gzip-compressed file but does not verify the tar archive within it. Option C is incorrect because ′md5sum′ is used to calculate and verify the MD5 checksum of a file but does not directly check the integrity of a tarball. Option D is incorrect because ′sha256sum′ calculates and verifies the SHA-256 checksum of a file but does not directly check the integrity of a tarball.
Question 53 of 60
53. Question
John is troubleshooting network issues on his Linux server and wants to see the routing table. Which netstat command should he use?
Correct
Correct Answer: B. netstat -r Explanation: The netstat -r command is used on Linux to display the kernel routing table, providing information about the routing of packets. Option A is incorrect. The -a option in netstat -a is used to display all sockets (both listening and non-listening), not the routing table. Option C is incorrect. The ′-t′ option in ′netstat -t′ is used to display only TCP connections, not the routing table. Option D is incorrect. The ′-l′ option in ′netstat -l′ is used to display only listening sockets, not the routing table.
Incorrect
Correct Answer: B. netstat -r Explanation: The netstat -r command is used on Linux to display the kernel routing table, providing information about the routing of packets. Option A is incorrect. The -a option in netstat -a is used to display all sockets (both listening and non-listening), not the routing table. Option C is incorrect. The ′-t′ option in ′netstat -t′ is used to display only TCP connections, not the routing table. Option D is incorrect. The ′-l′ option in ′netstat -l′ is used to display only listening sockets, not the routing table.
Unattempted
Correct Answer: B. netstat -r Explanation: The netstat -r command is used on Linux to display the kernel routing table, providing information about the routing of packets. Option A is incorrect. The -a option in netstat -a is used to display all sockets (both listening and non-listening), not the routing table. Option C is incorrect. The ′-t′ option in ′netstat -t′ is used to display only TCP connections, not the routing table. Option D is incorrect. The ′-l′ option in ′netstat -l′ is used to display only listening sockets, not the routing table.
Question 54 of 60
54. Question
A Linux system administrator wants to modify an ext4 filesystem labeled “data_drive” to disable the automatic filesystem check that occurs every 30 mounts. Which of the following commands would accomplish this?
Correct
Correct Answer: A. tune2fs -c 0 /dev/data_drive Explanation: The tune2fs -c option allows setting the maximum number of mounts after which a filesystem check (fsck) will be done. Setting it to 0 will disable this periodic check based on mount count. Option B is incorrect. There is no ′–no-check′ option in the ′tune2fs′ command. Option C is incorrect. The ′-l′ option lists the filesystem parameters but does not make any changes. Option D is incorrect. There is no ′–disable-fsck′ option in the ′tune2fs′ command.
Incorrect
Correct Answer: A. tune2fs -c 0 /dev/data_drive Explanation: The tune2fs -c option allows setting the maximum number of mounts after which a filesystem check (fsck) will be done. Setting it to 0 will disable this periodic check based on mount count. Option B is incorrect. There is no ′–no-check′ option in the ′tune2fs′ command. Option C is incorrect. The ′-l′ option lists the filesystem parameters but does not make any changes. Option D is incorrect. There is no ′–disable-fsck′ option in the ′tune2fs′ command.
Unattempted
Correct Answer: A. tune2fs -c 0 /dev/data_drive Explanation: The tune2fs -c option allows setting the maximum number of mounts after which a filesystem check (fsck) will be done. Setting it to 0 will disable this periodic check based on mount count. Option B is incorrect. There is no ′–no-check′ option in the ′tune2fs′ command. Option C is incorrect. The ′-l′ option lists the filesystem parameters but does not make any changes. Option D is incorrect. There is no ′–disable-fsck′ option in the ′tune2fs′ command.
Question 55 of 60
55. Question
You have a source code file named program.c, and you want to apply a patch file named fix.patch to address a bug. What command should you use to apply the patch?
Correct
Correct Answer: A. patch -p1 < fix.patch Explanation: The correct command to apply a patch file is patch -p1 < fix.patch. The -p1 option adjusts the strip level, and < fix.patch indicates the input from the patch file. Option B is incorrect because there is no standalone command called ′apply′ for applying patch files. The standard command is ′patch -p1 < fix.patch′. Option C is incorrect because the ′-f′ option for ′patch′ is used to force the patch application, but it‘s not the standard way to apply a patch file. The correct command is ′patch -p1 < fix.patch′. Option D is incorrect because using ′patch′ directly with the source file and patch file as arguments is not the standard approach. The correct command is ′patch -p1 < fix.patch′.
Incorrect
Correct Answer: A. patch -p1 < fix.patch Explanation: The correct command to apply a patch file is patch -p1 < fix.patch. The -p1 option adjusts the strip level, and < fix.patch indicates the input from the patch file. Option B is incorrect because there is no standalone command called ′apply′ for applying patch files. The standard command is ′patch -p1 < fix.patch′. Option C is incorrect because the ′-f′ option for ′patch′ is used to force the patch application, but it‘s not the standard way to apply a patch file. The correct command is ′patch -p1 < fix.patch′. Option D is incorrect because using ′patch′ directly with the source file and patch file as arguments is not the standard approach. The correct command is ′patch -p1 < fix.patch′.
Unattempted
Correct Answer: A. patch -p1 < fix.patch Explanation: The correct command to apply a patch file is patch -p1 < fix.patch. The -p1 option adjusts the strip level, and < fix.patch indicates the input from the patch file. Option B is incorrect because there is no standalone command called ′apply′ for applying patch files. The standard command is ′patch -p1 < fix.patch′. Option C is incorrect because the ′-f′ option for ′patch′ is used to force the patch application, but it‘s not the standard way to apply a patch file. The correct command is ′patch -p1 < fix.patch′. Option D is incorrect because using ′patch′ directly with the source file and patch file as arguments is not the standard approach. The correct command is ′patch -p1 < fix.patch′.
Question 56 of 60
56. Question
Jeremy, an IT administrator, has noticed that a business-critical application is gradually taking longer to process user requests. He suspects it might be a capacity-related issue. Which of the following steps should Jeremy take first to diagnose the issue?
Correct
Correct Answer: C. Analyze performance metrics and logs Explanation: Before taking any drastic steps, Jeremy should first analyze performance metrics and logs to understand if the issue is genuinely related to capacity and determine the root cause. Option A is incorrect. While increasing the server‘s RAM might help, it‘s a premature action without first understanding the root cause of the problem. Option B is incorrect. Restarting the application server may offer temporary relief, but it does not address the underlying issue. It‘s essential to diagnose the root cause before taking corrective measures. Option D is incorrect. Migrating the application to a cloud server might provide more resources, but without diagnosing the root cause, this could be an unnecessary and costly move.
Incorrect
Correct Answer: C. Analyze performance metrics and logs Explanation: Before taking any drastic steps, Jeremy should first analyze performance metrics and logs to understand if the issue is genuinely related to capacity and determine the root cause. Option A is incorrect. While increasing the server‘s RAM might help, it‘s a premature action without first understanding the root cause of the problem. Option B is incorrect. Restarting the application server may offer temporary relief, but it does not address the underlying issue. It‘s essential to diagnose the root cause before taking corrective measures. Option D is incorrect. Migrating the application to a cloud server might provide more resources, but without diagnosing the root cause, this could be an unnecessary and costly move.
Unattempted
Correct Answer: C. Analyze performance metrics and logs Explanation: Before taking any drastic steps, Jeremy should first analyze performance metrics and logs to understand if the issue is genuinely related to capacity and determine the root cause. Option A is incorrect. While increasing the server‘s RAM might help, it‘s a premature action without first understanding the root cause of the problem. Option B is incorrect. Restarting the application server may offer temporary relief, but it does not address the underlying issue. It‘s essential to diagnose the root cause before taking corrective measures. Option D is incorrect. Migrating the application to a cloud server might provide more resources, but without diagnosing the root cause, this could be an unnecessary and costly move.
Question 57 of 60
57. Question
Carla, a Linux systems engineer, wants to install a third-party kernel module for a specific kernel version. She needs to locate the directory where kernel modules for a given kernel version are stored. Which directory structure should Carla navigate to find the modules for a kernel version 5.8.10?
Correct
Correct Answer: A. /lib/modules/5.8.10/ Explanation: The directory /lib/modules/kernel-version/ is where modules specific to each kernel version are stored. For kernel version 5.8.10, the modules would be stored in /lib/modules/5.8.10/. Option B is incorrect. The /etc/ directory generally contains configuration files. Kernel modules are not stored under /etc/modules/. Option C is incorrect. While /usr/src/ can contain kernel source files, kernel modules for specific versions are not stored in /usr/src/modules/. Option D is incorrect. There isn‘t a standard directory called /var/lib/kernel/ for storing kernel modules.
Incorrect
Correct Answer: A. /lib/modules/5.8.10/ Explanation: The directory /lib/modules/kernel-version/ is where modules specific to each kernel version are stored. For kernel version 5.8.10, the modules would be stored in /lib/modules/5.8.10/. Option B is incorrect. The /etc/ directory generally contains configuration files. Kernel modules are not stored under /etc/modules/. Option C is incorrect. While /usr/src/ can contain kernel source files, kernel modules for specific versions are not stored in /usr/src/modules/. Option D is incorrect. There isn‘t a standard directory called /var/lib/kernel/ for storing kernel modules.
Unattempted
Correct Answer: A. /lib/modules/5.8.10/ Explanation: The directory /lib/modules/kernel-version/ is where modules specific to each kernel version are stored. For kernel version 5.8.10, the modules would be stored in /lib/modules/5.8.10/. Option B is incorrect. The /etc/ directory generally contains configuration files. Kernel modules are not stored under /etc/modules/. Option C is incorrect. While /usr/src/ can contain kernel source files, kernel modules for specific versions are not stored in /usr/src/modules/. Option D is incorrect. There isn‘t a standard directory called /var/lib/kernel/ for storing kernel modules.
Question 58 of 60
58. Question
Sarah wants to ensure that a third-party module remains compatible even after kernel upgrades on her Linux system. SheÂ’s been advised to utilize Dynamic Kernel Module Support (DKMS). Which command should Sarah use to add a module named thirdparty to DKMS?
Correct
Correct Answer: C. dkms add thirdparty Explanation: The dkms add command is used to register a kernel module source with DKMS, allowing the system to keep track of it and rebuild it as needed, especially after kernel upgrades. Option A is incorrect. dkms install is used to build and install a module into the kernel. It does not add the module source to DKMS for tracking. Option B is incorrect. dkms build is used to build the module for the current kernel or a specified kernel version. It doesn‘t add the module source to DKMS. Option D is incorrect. There is no dkms compile command in the DKMS utility. Instead, dkms build is the command that compiles the module for a specific kernel version.
Incorrect
Correct Answer: C. dkms add thirdparty Explanation: The dkms add command is used to register a kernel module source with DKMS, allowing the system to keep track of it and rebuild it as needed, especially after kernel upgrades. Option A is incorrect. dkms install is used to build and install a module into the kernel. It does not add the module source to DKMS for tracking. Option B is incorrect. dkms build is used to build the module for the current kernel or a specified kernel version. It doesn‘t add the module source to DKMS. Option D is incorrect. There is no dkms compile command in the DKMS utility. Instead, dkms build is the command that compiles the module for a specific kernel version.
Unattempted
Correct Answer: C. dkms add thirdparty Explanation: The dkms add command is used to register a kernel module source with DKMS, allowing the system to keep track of it and rebuild it as needed, especially after kernel upgrades. Option A is incorrect. dkms install is used to build and install a module into the kernel. It does not add the module source to DKMS for tracking. Option B is incorrect. dkms build is used to build the module for the current kernel or a specified kernel version. It doesn‘t add the module source to DKMS. Option D is incorrect. There is no dkms compile command in the DKMS utility. Instead, dkms build is the command that compiles the module for a specific kernel version.
Question 59 of 60
59. Question
Lara is preparing to compile a new Linux kernel. After configuring the kernel using make menuconfig, she wants to start the compilation process for the kernel and its modules. Which command should Lara use to accomplish this?
Correct
Correct Answer: B. make all Explanation: The command make all is used to compile both the Linux kernel and its modules. Option A is incorrect. make modules will only compile the modules, not the kernel itself. Option C is incorrect. make install is used to install the compiled kernel, not to compile it. Option D is incorrect. make modules_install is used to install the compiled modules into the appropriate directory, not to compile them.
Incorrect
Correct Answer: B. make all Explanation: The command make all is used to compile both the Linux kernel and its modules. Option A is incorrect. make modules will only compile the modules, not the kernel itself. Option C is incorrect. make install is used to install the compiled kernel, not to compile it. Option D is incorrect. make modules_install is used to install the compiled modules into the appropriate directory, not to compile them.
Unattempted
Correct Answer: B. make all Explanation: The command make all is used to compile both the Linux kernel and its modules. Option A is incorrect. make modules will only compile the modules, not the kernel itself. Option C is incorrect. make install is used to install the compiled kernel, not to compile it. Option D is incorrect. make modules_install is used to install the compiled modules into the appropriate directory, not to compile them.
Question 60 of 60
60. Question
You are responsible for performing regular backups on a Linux server. Which directory should always be included in your backup to ensure a complete system restore?
Correct
Correct Answer: D. /etc Explanation: The /etc directory contains system-wide configuration files crucial for the proper functioning of the system. Including this directory in your backups ensures that you can restore essential configuration settings after a system failure or data loss. Option A is incorrect because the ′/tmp′ directory typically contains temporary files that can be regenerated. It is not critical for system restoration. Option B is incorrect because while the ′/var/log′ directory contains important logs, it may not be necessary for a complete system restore. Logs can be regenerated, and including them in backups may lead to unnecessary data duplication. Option C is incorrect because the ′/proc′ directory is a virtual filesystem that contains information about running processes. It does not contain persistent data and does not need to be backed up for system restoration.
Incorrect
Correct Answer: D. /etc Explanation: The /etc directory contains system-wide configuration files crucial for the proper functioning of the system. Including this directory in your backups ensures that you can restore essential configuration settings after a system failure or data loss. Option A is incorrect because the ′/tmp′ directory typically contains temporary files that can be regenerated. It is not critical for system restoration. Option B is incorrect because while the ′/var/log′ directory contains important logs, it may not be necessary for a complete system restore. Logs can be regenerated, and including them in backups may lead to unnecessary data duplication. Option C is incorrect because the ′/proc′ directory is a virtual filesystem that contains information about running processes. It does not contain persistent data and does not need to be backed up for system restoration.
Unattempted
Correct Answer: D. /etc Explanation: The /etc directory contains system-wide configuration files crucial for the proper functioning of the system. Including this directory in your backups ensures that you can restore essential configuration settings after a system failure or data loss. Option A is incorrect because the ′/tmp′ directory typically contains temporary files that can be regenerated. It is not critical for system restoration. Option B is incorrect because while the ′/var/log′ directory contains important logs, it may not be necessary for a complete system restore. Logs can be regenerated, and including them in backups may lead to unnecessary data duplication. Option C is incorrect because the ′/proc′ directory is a virtual filesystem that contains information about running processes. It does not contain persistent data and does not need to be backed up for system restoration.
X
Use Page numbers below to navigate to other practice tests