Summer Goodies - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av5rz84q

Exact2Pass Menu

Question # 4

A newly installed desktop is unable to connect to networked resources. The systems administrator executes various commands and reviews the following output snippets:

Which of the following should the systems administrator try NEXT to restore connectivity?

A.

arp -s 20:ad:1f:ab:10:0f 192.168.1.10

B.

route add -net 192.168.1.0 netmask 255.255.255.0

C.

dig -x @127.0.0.1 192.168.1.10

D.

ip link set wlo1 up

E.

killall -HUP NetworkManager

Full Access
Question # 5

An administrator is adding an existing user named ‘’buddy’’ to the Apache group. Which of the following should the administrator perform to accomplish this task?

A.

sseradd –g apache buddy

B.

ssermod –g apche buddy

C.

sudo useradd –g apache buddy

D.

sudo usermod –g apachebuddy

Full Access
Question # 6

A Linux administrator has configured a local named caching server to reduce the amount of time to resolve common DNS addresses. The server resolves using the external server, however; the administrator wants to avoid this configuration. The administrator verifies the named, conf settings to confirm the following relevant settings:

The administrator then runs dig twice to look up an external address and receives the following relevant output the second time.

Which of the following should the administrator do to correct the configuration?

A.

Modify /etc/resolve.config and set nameserver to 127.0.0.1

B.

Add 1270.0.1 to the forwards in the named confi file.

C.

Alias the dig commands to use nslookup instead.

D.

Configure the name service in system to be masked

Full Access
Question # 7

A systems administrator clones copies of a Linux VM every time a new Linux server is needed. The

administrator notices the command prompt always states localhost.localdomain.

Which of the following should the administrator run to have the command prompt consistently labeled as Server1 rather than localhost.localdomain?

A.

host Server1

B.

echo "127.0.0.1 Server1 Server1.localdomain" >> /etc/hosts

C.

hostnamectl set-hostname "Server1" --pretty

D.

hostnamectl set-hostname Server1 --transient

E.

hostnamectl set-hostname Server1.localdomain --static

Full Access
Question # 8

An administrator is trying to optimize a connection to an off-site NFS server.

Which of the following commands would BEST display the problems with packet sizes between hops on the network?

A.

tracepath

B.

ping

C.

tracert

D.

nmap

Full Access
Question # 9

A junior systems administrator is diagnosing an issue with latency. The administrator issues the command mtr www.comptia.org at a terminal and receives the following output:

Given this scenario and the output, which of the following should be reported to the network team for investigation? (Choose two.)

A.

Host 1 is set to filter ICMP reply packets.

B.

Host 1 is set to filter ICMP echo packets.

C.

Host 2 is experiencing high packet loss, indicating the link is overloaded.

D.

Host 2 is experiencing low bandwidth, indicating the ISP is blocking traffic.

E.

Host 3 is set to filter ICMP reply packets.

F.

Host 3 is set to filter ICMP echo packets.

Full Access
Question # 10

An administrator needs to set the time of a VM that has no network connectivity to an NTP server. The VM’s host, however, is synchronized with NTP.

Which of the following allows the administrator to synchronize the time of the VM with the host?

A.

time

B.

date

C.

hwclock

D.

ntpdate

Full Access
Question # 11

Which of the following is considered best practices when using definition files for the provisioning of Linus servers to the cloud?

A.

Build automation

B.

Container orchestration

C.

Infrastructure as code

D.

Continuous integration

Full Access
Question # 12

Joe, a member of the accounting group on a Linux system, is unable to write a file called “taxes” in the accounting shared directory. The ownership and permissions on the directory and file are as follows:

accounting drwxrw-r-- user = ann, group = accounting

taxes -rw-r--r-- , user = ann, group = accounting

Which of the following commands would allow Joe to write to the file? (Choose two.)

A.

chmod g+x accounting

B.

chmod 777 taxes

C.

chgrp taxes accounting

D.

chgrp accounting taxes

E.

chmod 774 accounting

F.

chmod u+x accounting

Full Access
Question # 13

A user has been locked out of an account due to too many failed password attempts. Which of the following commands will unlock the user’s account?

A.

pam_tally2 --user=user --reset

B.

passwd -u user -G root

C.

usermod -u user -G root

D.

chage -1 user=user --reset

Full Access
Question # 14

An administrator needs to deploy 100 identical CentOS workstations via PXE boot. Which of the following should the administrator use to minimize the amount of interaction with the consoles needed?

A.

Kickstart script

B.

Ghost image on a distribution server

C.

Hard disk duplicator

D.

Hard disk duplicator

E.

Ubiquity script

Full Access
Question # 15

A Linux administrator is adding a static IP address to a network interface on a Linux system. The administrator modifies the ifcfg- eth0 configuration file with the following settings:

After the administrator restarts the Linux server, the system is not connected to the network. Which of the following configuration settings needs to be changed?

A.

Set BOOTPROTO to BOOTP and USERCTL to yes.

B.

Set BOOTPROTO to NONE and ONBOOT to yes.

C.

Set USERCTL to yes and ONBOOT to no.

D.

Set NETMASK to 255.255.0.0 and ONBOOT to yes.

Full Access
Question # 16

Find the file named core and remove it from the system.

INSTRUCTIONS

Type “help” to display a list of available commands.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 17

A Linux administrator is using a public cloud provider to host servers for a company’s website. Using the provider’s tools, the administrator wrote a JSON file to define how to deploy the servers. Which of the following techniques did the administrator use?

A.

Infrastructure as code

B.

Build automation

C.

Platform as a service

D.

Automated configuration

Full Access
Question # 18

A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?

B.

tracert www.comptia.org

D.

netstat www.comptia.org

Full Access
Question # 19

An administrator is uncomfortable allowing users to log in as root. Which of the following ensures that root logins are disallowed?

A.

usermod -L root

B.

usermod -G root

C.

usermod -B root

D.

usermod -U root

Full Access
Question # 20

A Linux server needs to be accessed, but the root password is not available.

Which of the following would BEST allow an administrator to regain access and set a new known password at the same time?

A.

Boot into a single-user mode and reset the password via the passwd command.

B.

Boot into a single-user mode and reset the password by editing the /etc/passwd file.

C.

Boot into a single-user mode and reset the password by editing the /etc/shadow file.

D.

Boot into a single-user mode and reset the password via the chage command.

Full Access
Question # 21

A Linux administrator needs to take stock of USB devices attached to the system.

Which of the following commands would be BEST to complete this task?

A.

lspci

B.

lsusb

C.

cat /proc/USB

D.

modprobe -–usb

Full Access
Question # 22

A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?

A.

free, fack, partprobe

B.

lsof, lvcreate, mdadm

C.

df, du, rmmod

D.

fdisk, mkswap, swapon -a

Full Access
Question # 23

An administrator needs to mount the shared NFS file system testhost:/testvolume to mount point /mnt/testvol and make the mount persistent after reboot.

Which of the following BEST demonstrates the commands necessary to accomplish this task?

A.

B.

B.

C.

Full Access
Question # 24

A Linux administrator has installed a web application firewall in front of a web server running on HTTP port 8080 and successfully started the HTTP server. However, after opening the application URL in an Internet browser, the administrator discovered that the application does not work. The administrator performed the following diagnostic steps:

Output of sysctl -a command:

Output of iptables -L command:

Output of netstat –nltop | grep "8080":

Which of the following is the NEXT step the administrator should perform to permanently fix the issue at the kernel level?

A.

sysctl -w net.ipv4.ip_forward=1 then run sysctl -w /etc/sysctl.conf to enable the

change

B.

Edit /etc/sysctl.conf file and add net.ipv4.ip_forward = 1 then run sysctl -p /etc/

sysctl.conf to enable the change

C.

Add iptables rule iptables -A INPUT -m state --state NEW -p tcp --dport 8080 -j then

restart httpd daemon

D.

Add iptables rule iptables -A FORWARD-m state --state NEW -p tcp --dport 8080 –j

ACCEPT then restart httpd daemon

Full Access
Question # 25

A junior Linux administrator is installing a new application with CPU architecture requirements that have the following specifications:

x64 bit

3.0GHz speed

Minimum quad core

The administrator wants to leverage existing equipment but is unsure whether the requirements of these systems are adequate. The administrator issues the following command cat/proc/cpuinfo. The output of the command is as follows:

Which of the following is the recommended course of action the administrator should take based on this output?

A.

Install the application, as the system meets the application requirements

B.

Procure new equipment that matches the recommended specifications

C.

Recompile the Linux kernel to support the installation.

D.

Reconfigure lib modules to support the new application.

Full Access
Question # 26

In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.

Which of the following files should be edited to accomplish this?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh_config

C.

~/.ssh/ssh_config

D.

/etc/ssh/known_hosts

Full Access
Question # 27

A Linux administrator needs to switch from text mode to GUI. Which of the following runlevels will start the GUI by default?

A.

Runlevel 3

B.

Runlevel 4

C.

Runlevel 5

D.

Runlevel 6

Full Access
Question # 28

An administrator is logged into a server remotely and wants to determine if the system is a VM. Which of the following commands would assist with this?

A.

dmesg

B.

ps

C.

top

D.

vmstat

Full Access
Question # 29

A Linux administrator needs to back up the folder /usr/domain, and the output must be a gzip compressed tar. Which of the following commands should be used?

A.

tar –cv domain.tar.gz /usr/domain

B.

tar –cvf /usr/domain domain.tar.gz

C.

tar –czvf domain.tar.gz /usr/domain

D.

tar –cxzv /usr/domain domain.tar.gz

Full Access
Question # 30

A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts URL.

Which of the following commands would allow the administrator to download the current contents of the URL before updating?

Full Access
Question # 31

A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication. to which of the following files should the RSA token be added to allow this access?

A.

authorized_keys

B.

~/.ssh/ssh_config

C.

id_rsa.pub

D.

known_hosts

Full Access
Question # 32

Given the output below:

Which of the following commands can be used to remove MyPhoto.jpg from the current directory?

A.

unlink ./MyPhoto.jpg

B.

del Pictures/photo.jpg

C.

rm –rf ./Pictures

D.

rm –f MyPhoto.jpg

E.

ln –rm ./Pictures/photo.jpg

Full Access
Question # 33

A security team informs the Linux administrator that a specific server is acting as an open relay.

To which of the following is the security team referring?

A.

The server is running the SSH service and is open to the Internet, allowing outside sources to log into the server without source IP address filtering.

B.

The server is acting as an unmanaged router, open to the Internet, and is allowing outside Internet traffic into the network with no filtering.

C.

The server is acting as a web proxy and allowing outside unauthenticated sources to connect to the server, effectively hiding the source’s IP address for malicious activities.

D.

The server has an email service configured to allow outside sources to send email to other external parties on the Internet without validation.

Full Access
Question # 34

A systems administrator has scheduled a system update for a server. The update includes a resynchronization

of the package database and updates to the current packages and the system distribution packages. Which of

the following commands contains the proper order of this update?

A.

apt-get upgrade, apt-get dist-upgrade, apt-get update

B.

apt-get update, apt-get upgrade, apt-get dist-upgrade

C.

apt-get dist-upgrade, apt-get upgrade, apt-get update

D.

apt-get update, apt-get dist-upgrade, apt-get upgrade

Full Access
Question # 35

A Linux administrator is getting an error message indicating a device does not have any space left on it. However, the administrator runs the following commands and receives the output below:

Which of the following is the MOST likely cause of the issue?

A.

The resized command needs to be run on the filessystem.

B.

Files need to be removed in order to free up file handles.

C.

The skfs,ext3 command needs to be run to change the inode size.

D.

The block size needs to be adjusted to >4KIB blocks

Full Access
Question # 36

Which of the following can be used to check the status of wireless devices that are connected to the system?

A.

lsusb

B.

iwconfig

C.

netstat

D.

ifconfig

Full Access
Question # 37

A systems administrator needs to write a script that performs unattended package upgrades. Which of the folowing flags should be used with either yum or apt to meet this goal?

A.

-u

B.

-q

C.

-y

D.

-d

Full Access
Question # 38

A systems administrator a retting an HTTPO server on a Lnux server and configuring as a proxy server The administrator runs the following commands to venfy that the service is running:

However, the arjminrstraior is getting a 503 error when browsing to portal.company. internal. After reviewing the logs, the following error information is discovered:

Which of the following commands BEST resolves the issue?

A.

sentforce 0

B.

susearch -m USER_LOGIN -sv no

C.

grep http /var/log/audit/audit,log| audit2why

D.

setsebool -p httpd_can_network_connect 1

Full Access
Question # 39

A server administrator notices that one of the servers cannot connect to its gateway, which has the IP

10.10.10.1.

Which of the following commands should the administrator execute to determine the default gateway of the

server?

A.

route -n

B.

ip a default-gw

C.

ifconfig

D.

nslookup

Full Access
Question # 40

An administrator is installing a Linux VM on a personal hypervisor. The administrator wants to have the VM’s IP address on the same network as the hypervisor host so the VM has the same network properties as the physical interface of the host. To which of the following should the administrator set the network properties?

A.

Host-only network

B.

NAT network

C.

Bridge network

D.

Overlay network

Full Access
Question # 41

A corporate server security policy states, “Ensure password hashes are not readable by non-administrative

users.” The administrator should check the permissions on which of the following files to ensure the server

satisfies this policy?

A.

/etc/shadow

B.

/etc/passwd

C.

/etc/group

D.

/etc/security/limits.conf

Full Access
Question # 42

An administrator receives a USB drive and wants to make an exact copy of the disk before starting to work on it. One of the partitions on the USB drive was mounted as /dev/sdc1.

Which of the following commands should the administrator use?

A.

dd if=/dev/sdc of=~/usb_copy.img bs=512

B.

dd if=/dev/sdc1 of=~/usb_copy.img count=1024

C.

dd if=/dev/sdc1 of=~/usb_copy.img bs=1024

D.

dd of=/dev/sdc if=~/usb_copy.img bs=1M

Full Access
Question # 43

Which of the following techniques would BEST allow a client computer to connect to a server that is not normally accessible because the server’s application port is blocked by a firewall?

A.

X11 forwarding

B.

TCP wrappers

C.

RDP

D.

SSH port forwarding

Full Access
Question # 44

Due to security policies, a restriction was implemented that forbids direct access to the database server. The

junior administrator needs to connect using SSH tunneling. Which of the following commands allows the junior

administrator to connect from a desktop?

A.

ssh –L dbserver.local:5432:localhost:95432 postgres@dbserver.local

B.

ssh –L 5432:localhost dbserver.local:5432 postgres

C.

ssh –L 95432:localhost postgres@dbserver.local

D.

ssh –L 9432:localhost:5432 postgres@dbserver.local

Full Access
Question # 45

Which of the following servers provides encrypted tunnel SOCKS services?

A.

SNMP

B.

VPN

C.

CA

D.

SSH

Full Access
Question # 46

A Linux team is using Git to version a set of custom scripts. A team member has made an update to a script

and published the changes to the repository.

Which of the following is the BEST way to retrieve the latest changes to the administrator's local working copy?

A.

git fetch

B.

git merge

C.

git commit

D.

git pull

Full Access
Question # 47

A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate.

The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?

A.

nice -n 5 -p 2864

B.

nice -n -5 -p 2864

C.

renice -n 10 -p 2864

D.

renice -n -10 -p 2864

Full Access
Question # 48

A Linux administrator has downloaded the network-tools-12.1-17.i386.rpm package for installation to a local system. The administrator issues the rpm -ivh nerwork-cools-12.1-17.i386.rpm command to

install the package. After attempting to use the newly installed package, the administrator realizes the package for the system’s architecture was not installed correctly.

Which of the following commands should the administrator use to remove the package from the system?

A.

rpm -e network-tools

B.

rpm -U network-tools-12.1-17.i386.rpm

C.

rpm -ivh network-tools-12.1-17.i686.rpm

D.

rpm -r network-tools

Full Access
Question # 49

A junior Linux administrator needs to ensure a service will start on system boot. Which of the following commands should be used to accomplish this task?

A.

chkconfig on

B.

systemctl bootup

C.

service enable

D.

crontab install

Full Access
Question # 50

A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys. Which of the following MOST securely achieves this task?

A.

Use curl to copy each user’s public key file to the respective system

B.

Use cp to copy each user’s public key file to the respective system

C.

Use ssh-copy-id to copy each user’s public key file to the respective system

D.

Use ssh-copy-id to copy each user’s private key file to the respective system

Full Access
Question # 51

An engineer is working on a production application deployment that requires changing a web application property file called server.property that is managed by the Git version control system. A cloned copy of the remote repository in which the server.property file exists is on the local desktop computer. The engineer makes appropriate changes to the files, saves it as server.property, and executes git commit –m “changed the property file” server.property. Which of the following commands did the engineer fail to perform?

A.

git init server.property

B.

git merge server.property

C.

git add server.property

D.

git push server.property

Full Access
Question # 52

A Linux administrator must identify a user with high disk usage. The administrator runs the # du –s /home/* command and gets the following output:

Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space.

Which of the following commands will accomplish this task?

A.

df –k /home/User/files.txt

B.

du –a /home/User3/*

C.

du –sh /home/User/

D.

find . –name /home/User3 -print

Full Access
Question # 53

Ann, a junior systems administrator, is required to add a line to the /etc/yum.conf file. However, she receives the following error message when she tries to add the line:

Ann performs some diagnostics to attempt to find the root cause:

Which of the following commands should Ann execute to write content to /etc/yum?

A.

chmod 755 /etc/yum.conf

B.

setfacl –m m:rw /etc/yum.conf

C.

chattr –I /etc/yum.conf

D.

setenforce 0

Full Access
Question # 54

During the final step of staging new Linux hardware, GRUB2 is installed to the system drive. Which of the

following BEST describes the role of GRUB2 in a new Linux installation?

A.

It provides a menu for creating administrator task shortcuts.

B.

It provides a menu for running special shell scripts.

C.

It provides a method to partition a hard drive.

D.

It provides a method to pass parameters to the Linux kernel on startup.

Full Access
Question # 55

An issue was discovered on a testing branch of a Git repository. A file was inadvertently modified and needs to be reverted to the master branch version. Which of the following is the BEST option to resolve the issue?

A.

git branch -b master file

B.

git merge master testing

C.

git stash branch master

D.

git checkout master -- file

Full Access
Question # 56

A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?

A.

echo “blacklist bluetooth” > /etc/modprobe.d/blacklist-bluetooth

B.

echo “kill bluetooth” > /etc/modprobe.d/kill-bluetooth

C.

echo “modprobe bluetooth” > /etc/modprobe.d/modprbe-bluetooth

D.

echo “rmod bluetooth” > /etc/modprobe.d/rmmod-bluetooth

Full Access
Question # 57

A Linux administrator is setting up a testing environment and needs to connect to a separate testing server using the production server name. The administrator needs to override the hostname that the DNS is returning in order to use the test environment. Which of the following commands should be run on each of the testing systems to BEST meet this goal?

A.

# hostnamectl set-hostname “192.168.1.100 production.company.com”

B.

# grep –i IP “${ip addr show} production.company.com” > /etc/resolv.conf

C.

# ip addr add 192.168.1.100/24 dev eth0 && rndc reload production.company.com

D.

# echo “192.168.1.100 production.company.com” >> /etc/hosts

Full Access
Question # 58

Which of the following statements BEST represents what the term “agentless” means regarding orchestration?

A.

Installation of a tool is not required on the remote system to perform orchestration tasks

B.

It facilitates version control when using infrastructure as code during orchestration

C.

It automatically removes malware from the remote system during orchestration

D.

A tool can only be accessed remotely to perform orchestration tasks

Full Access