A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts URL.
Which of the following commands would allow the administrator to download the current contents of the URL before updating?
A. curl www.comptia.org/contacts
B. dig www.comptia.org/contacts
C. apt-get www.comptia.org/contacts
D. yum list www.comptia.org/contacts
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms. Which of the following files should be edited to accomplish this?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh_config
C. ~/.ssh/ssh_config
D. /etc/ssh/known_hosts
A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate. The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?
A. nice -n 5 -p 2864
B. nice -n -5 -p 2864
C. renice -n 10 -p 2864
D. renice -n -10 -p 2864
A technician's laptop is configured with wired and wireless interfaces. Both interfaces have obtained the appropriate IP address from the organization's DHCP server.
Which of the following commands is MOST appropriate to remove the IP address from the wireless interface temporarily so network traffic is routed through the wired interface?
A. ip addr wlan0 del default
B. route delete default gw if wlan0
C. netstat -r wlan0
D. dhclient -r wlan0
The following tools help maintain consistency across different systems in an infrastructure:
SUSE Manager
Red Hat Satellite
Spacewalk
If a system file is changed, the tools roll back the file to a predefined configuration.
Which of the following concepts BEST describes this behavior?
A. Build automation
B. Infrastructure as code
C. Automated configuration management
D. Agentless system management
Joe, a user, asks a systems administrator to schedule the daily execution of a custom script. Which of the following commands will allow the systems administrator to set up Joe's cron job?
A. crontab -r -u joe
B. crontab -e -u joe
C. crontab -n -u joe
D. crontab -l -u joe
The dracut command is used to:
A. create initial RAMDisk images for preloading modules.
B. compile the Linux kernel images used to boot the OS.
C. create the bootloader executable files.
D. create the Boot Manager configuration files.
A file server is sharing a directory called /share between team members inside a company. The fileshare needs to be moved from serverA to /newshare located on serverB with all permissions and attributes preserved. Which of the following commands would BEST achieve this task?
A. rsync -aHAX /share/* serverB:/newshare
B. dd if=/share/* of=serverB:/newshare
C. tar -cvf /share/* serverB:/newshare
D. mirrorlv /share/* serverB:/newshare
A junior administrator is configuring local name lookups for fully qualified domain names in an isolated environment. The administrator is given a checklist and must accomplish the following tasks:
1.
Add localhost with loopback address.
2.
Add 192.168.192.12/24 to resolve to database01.comptia.org
Given this scenario, which of the following steps should the administrator perform to accomplish these tasks?
A. Open the /etc/nsswitch.conf file with a file editor and add the following lines:
127.0.0.1 localhost
192.168.192.12 database01.comptia.org
B. Open the /etc/dhcpd.conf file with a file editor and add the following lines:
127.0.0.1 localhost
192.168.192.12 database01.comptia.org
C. Open the /etc/hosts file with a file editor and add the following lines:
127.0.0.1 localhost
192.168.192.12 database01.comptia.org
D. Open the /etc/network file with a file editor and add the following lines:
127.0.0.1 localhost
192.168.192.12 database01.comptia.org
A Linux administrator needs to configure a new firewall without an existing ACL to allow incoming web traffic. The firewall must log the allowed network traffic. Which of the following command sequences would accomplish this task when they are executed in order?
A. iptables -A INPUT -p tcp --dport 80 -J LOG iptables -A INPUT -p tcp --dport 443 -J LOG iptables -I INPUT -p tcp --dport 80 -J ACCEPT iptables -I INPUT -p tcp --dport 443 -J ACCEPT
B. iptables -I INPUT -m multiport -p tcp --dports 80,443 -J LOG iptables -I INPUT -m multiport -p tcp --dports 80,443 -J ACCEPT
C. iptables -A INPUT -m multiport -p tcp --dports 80,443 -J LOG iptables -A INPUT -m multiport -p tcp --dports 80,443 -J ACCEPT
D. iptables -A INPUT -p tcp --dport 80 -J ACCEPT iptables -A INPUT -p tcp --dport 443 -J ACCEPT iptables -A INPUT -p tcp --dport 80 -J LOG iptables -A INPUT -p tcp --dport 443 -J LOG