Question 21
An administrator is analyzing a Linux server which was recently hacked.
Which of the following will the administrator use to find all unsuccessful login attempts?
A. nsswitch
B. faillock
C. pam_tally2
D. passwd
Question 22
A junior administrator needs to unload an older video kernel module.
Which of the following commands would BEST accomplish this task?
A. modprobe
B. insmod
C. rmmod
D. chmod
E. depmod
Question 23
An administrator is attempting to block SSH connections to 192.168.10.24 using the Linux firewall. After implementing a rule, a connection refused error is displayed when attempting to SSH to 192.168.10.24.
Which of the following rules was MOST likely implemented?
A. iptables -A -p tcp -d 192.168.10.24 --dport 22 -j REJECT
B. iptables -A -p tcp -d 192.168.10.24 --dport 22 -j DROP
C. iptables -A -p tcp -d 192.168.10.24 --dport 22 -j FORWARD
D. iptables -A -p tcp -d 192.168.10.24 --dport 22 -j REFUSE
Question 24
A junior Linux administrator is setting up system-wide configuration settings. The goal is to ensure the PATH environment variable includes the following locations for all users who log into a Linux system:
A. Update the /etc/profile.d file using a text editor, navigate to the PATH element, add the missing locations, and run the bash_completion.sh script to update the changes.
B. Update the /etc/profile file using a text editor, navigate to the PATH element, add the missing locations and run the . /etc/profile command to update the changes.
C. Update the /etc/profile.d file using a text editor, navigate to the PATH element, add the missing locations, and reboot to update the changes.
D. Update the /etc/profile file using a text editor navigate to the PATH element, add the missing locations, and restart the bash process to update the changes.
Question 25
A Linux systems administrator needs to provision multiple web servers into separate regional datacenters. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file.
Which of the following is the BEST reason to do this?
A. To document the infrastructure so it can be included in the system security plan
B. To ensure the administrator follows the planning phase of the systems development life cycle
C. To define the infrastructure so it can be provisioned consistently with minimal manual tasks
D. To validate user requirements have been met within each regional datacenter for compliance
Question 26
A Linux administrator needs to set permissions on an application with the following parameters:
- The owner of the application should be able to read, write, and execute the application.
- Members of the group should be able to read and execute the application.
- Everyone else should not have access to the application.
Which of the following commands would BEST accomplish these tasks?
A. chmod 710
B. chmod 730
C. chmod 750
D. chmod 760
Question 27
A junior Linux administrator is trying to verify connectivity to the remote host host1 and display round-trip statistics for ten ICMP requests.
Which of the following commands should the administrator execute?
A. ping -c 10 host1
B. traceroute -c 10 host1
C. netstat host1
D. pathping -c 10 host1
Question 28
A junior Linux administrator is updating local name resolution to support IPv6. The administrator issues the command cat /etc/hosts and receives the following output:127.0.0.1 localhost
Which of the following actions should the administrator perform to accomplish this task?
A. Modify the /etc/hosts file, and add the ipv6 localhost entry to the file.
B. Modify the /etc/hosts file, and add the ::1 localhost entry to the file.
C. Modify the /etc/hosts file, and add the ipv4 localhost entry to the file.
D. Modify the /etc/hosts file, and add the 0.0.0.0 localhost entry to the file.
Question 29
A Linux systems administrator needs to copy the contents of a directory named `working` on the local working system to a folder /var/www/html on a server named `corporate-web`.
Which of the following commands will allow the administrator to copy all the contents to the web server?
A. scp -r working/* webuser@corporate-web:/var/www/html
B. tar working/* webuser@corporate-web:/var/www/html
C. cp -r working/* webuser@corporate-web:/var/www/html
D. mv working webuser@corporate-web:/var/www/html
Question 30
A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?
A. mtr www.comptia.org
B. tracert www.comptia.org
C. ping www.comptia.org
D. netstat www.comptia.org