A newly installed desktop is unable to connect to networked resources. The systems administrator executes various commands and reviews the following output snippets:
Which of the following should the systems administrator try NEXT to restore connectivity?
An administrator is adding an existing user named ‘’buddy’’ to the Apache group. Which of the following should the administrator perform to accomplish this task?
A Linux administrator has configured a local named caching server to reduce the amount of time to resolve common DNS addresses. The server resolves using the external server, however; the administrator wants to avoid this configuration. The administrator verifies the named, conf settings to confirm the following relevant settings:
The administrator then runs dig twice to look up an external address and receives the following relevant output the second time.
Which of the following should the administrator do to correct the configuration?
A systems administrator clones copies of a Linux VM every time a new Linux server is needed. The
administrator notices the command prompt always states localhost.localdomain.
Which of the following should the administrator run to have the command prompt consistently labeled as Server1 rather than localhost.localdomain?
An administrator is trying to optimize a connection to an off-site NFS server.
Which of the following commands would BEST display the problems with packet sizes between hops on the network?
A junior systems administrator is diagnosing an issue with latency. The administrator issues the command mtr www.comptia.org at a terminal and receives the following output:
Given this scenario and the output, which of the following should be reported to the network team for investigation? (Choose two.)
An administrator needs to set the time of a VM that has no network connectivity to an NTP server. The VM’s host, however, is synchronized with NTP.
Which of the following allows the administrator to synchronize the time of the VM with the host?
Which of the following is considered best practices when using definition files for the provisioning of Linus servers to the cloud?
Joe, a member of the accounting group on a Linux system, is unable to write a file called “taxes” in the accounting shared directory. The ownership and permissions on the directory and file are as follows:
accounting drwxrw-r-- user = ann, group = accounting
taxes -rw-r--r-- , user = ann, group = accounting
Which of the following commands would allow Joe to write to the file? (Choose two.)
A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user’s account?
An administrator needs to deploy 100 identical CentOS workstations via PXE boot. Which of the following should the administrator use to minimize the amount of interaction with the consoles needed?
A Linux administrator is adding a static IP address to a network interface on a Linux system. The administrator modifies the ifcfg- eth0 configuration file with the following settings:
After the administrator restarts the Linux server, the system is not connected to the network. Which of the following configuration settings needs to be changed?
Find the file named core and remove it from the system.
INSTRUCTIONS
Type “help” to display a list of available commands.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A Linux administrator is using a public cloud provider to host servers for a company’s website. Using the provider’s tools, the administrator wrote a JSON file to define how to deploy the servers. Which of the following techniques did the administrator use?
A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?
An administrator is uncomfortable allowing users to log in as root. Which of the following ensures that root logins are disallowed?
A Linux server needs to be accessed, but the root password is not available.
Which of the following would BEST allow an administrator to regain access and set a new known password at the same time?
A Linux administrator needs to take stock of USB devices attached to the system.
Which of the following commands would be BEST to complete this task?
A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?
An administrator needs to mount the shared NFS file system testhost:/testvolume to mount point /mnt/testvol and make the mount persistent after reboot.
Which of the following BEST demonstrates the commands necessary to accomplish this task?
A Linux administrator has installed a web application firewall in front of a web server running on HTTP port 8080 and successfully started the HTTP server. However, after opening the application URL in an Internet browser, the administrator discovered that the application does not work. The administrator performed the following diagnostic steps:
Output of sysctl -a command:
Output of iptables -L command:
Output of netstat –nltop | grep "8080":
Which of the following is the NEXT step the administrator should perform to permanently fix the issue at the kernel level?
A junior Linux administrator is installing a new application with CPU architecture requirements that have the following specifications:
x64 bit
3.0GHz speed
Minimum quad core
The administrator wants to leverage existing equipment but is unsure whether the requirements of these systems are adequate. The administrator issues the following command cat/proc/cpuinfo. The output of the command is as follows:
Which of the following is the recommended course of action the administrator should take based on this output?
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
Which of the following files should be edited to accomplish this?
A Linux administrator needs to switch from text mode to GUI. Which of the following runlevels will start the GUI by default?
An administrator is logged into a server remotely and wants to determine if the system is a VM. Which of the following commands would assist with this?
A Linux administrator needs to back up the folder /usr/domain, and the output must be a gzip compressed tar. Which of the following commands should be used?
A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts URL.
Which of the following commands would allow the administrator to download the current contents of the URL before updating?
A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication. to which of the following files should the RSA token be added to allow this access?
Given the output below:
Which of the following commands can be used to remove MyPhoto.jpg from the current directory?
A security team informs the Linux administrator that a specific server is acting as an open relay.
To which of the following is the security team referring?
A systems administrator has scheduled a system update for a server. The update includes a resynchronization
of the package database and updates to the current packages and the system distribution packages. Which of
the following commands contains the proper order of this update?
A Linux administrator is getting an error message indicating a device does not have any space left on it. However, the administrator runs the following commands and receives the output below:
Which of the following is the MOST likely cause of the issue?
Which of the following can be used to check the status of wireless devices that are connected to the system?
A systems administrator needs to write a script that performs unattended package upgrades. Which of the folowing flags should be used with either yum or apt to meet this goal?
A systems administrator a retting an HTTPO server on a Lnux server and configuring as a proxy server The administrator runs the following commands to venfy that the service is running:
However, the arjminrstraior is getting a 503 error when browsing to portal.company. internal. After reviewing the logs, the following error information is discovered:
Which of the following commands BEST resolves the issue?
A server administrator notices that one of the servers cannot connect to its gateway, which has the IP
10.10.10.1.
Which of the following commands should the administrator execute to determine the default gateway of the
server?
An administrator is installing a Linux VM on a personal hypervisor. The administrator wants to have the VM’s IP address on the same network as the hypervisor host so the VM has the same network properties as the physical interface of the host. To which of the following should the administrator set the network properties?
A corporate server security policy states, “Ensure password hashes are not readable by non-administrative
users.” The administrator should check the permissions on which of the following files to ensure the server
satisfies this policy?
An administrator receives a USB drive and wants to make an exact copy of the disk before starting to work on it. One of the partitions on the USB drive was mounted as /dev/sdc1.
Which of the following commands should the administrator use?
Which of the following techniques would BEST allow a client computer to connect to a server that is not normally accessible because the server’s application port is blocked by a firewall?
Due to security policies, a restriction was implemented that forbids direct access to the database server. The
junior administrator needs to connect using SSH tunneling. Which of the following commands allows the junior
administrator to connect from a desktop?
A Linux team is using Git to version a set of custom scripts. A team member has made an update to a script
and published the changes to the repository.
Which of the following is the BEST way to retrieve the latest changes to the administrator's local working copy?
A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate.
The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?
A Linux administrator has downloaded the network-tools-12.1-17.i386.rpm package for installation to a local system. The administrator issues the rpm -ivh nerwork-cools-12.1-17.i386.rpm command to
install the package. After attempting to use the newly installed package, the administrator realizes the package for the system’s architecture was not installed correctly.
Which of the following commands should the administrator use to remove the package from the system?
A junior Linux administrator needs to ensure a service will start on system boot. Which of the following commands should be used to accomplish this task?
A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task?
An engineer is working on a production application deployment that requires changing a web application property file called server.property that is managed by the Git version control system. A cloned copy of the remote repository in which the server.property file exists is on the local desktop computer. The engineer makes appropriate changes to the files, saves it as server.property, and executes git commit –m “changed the property file” server.property. Which of the following commands did the engineer fail to perform?
A Linux administrator must identify a user with high disk usage. The administrator runs the # du –s /home/* command and gets the following output:
Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space.
Which of the following commands will accomplish this task?
Ann, a junior systems administrator, is required to add a line to the /etc/yum.conf file. However, she receives the following error message when she tries to add the line:
Ann performs some diagnostics to attempt to find the root cause:
Which of the following commands should Ann execute to write content to /etc/yum?
During the final step of staging new Linux hardware, GRUB2 is installed to the system drive. Which of the
following BEST describes the role of GRUB2 in a new Linux installation?
An issue was discovered on a testing branch of a Git repository. A file was inadvertently modified and needs to be reverted to the master branch version. Which of the following is the BEST option to resolve the issue?
A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?
A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal?
Which of the following statements BEST represents what the term “agentless” means regarding orchestration?