The Actual Exam Version included actual exam questions verified by IT Experts. We verified questions and updated frequently each month and also based on members’ feedback to keep updating with the real exam. We are offering money back immediately if questions in our Actual Exam Version do not appear in your exam. Highly recommend you take the Actual Exam Version then go to the exam as soon as possible.
QUESTION NO: 1
Which of the following would be the BEST solution for a systems administrator to access the graphical user environment of a Linux machine remotely?
QUESTION NO: 2
A technical support engineer receives a ticket from a user who is trying to create a 1KB file in the /tmp directory and is getting the following error: No space left on device. The support engineer checks the /tmp directory, and it has 20GB of free space. Which of the following BEST describes a possible cause for this error?
A. The /tmp directory is not mounted.
B. The filesystem is formatted with a 4MB block size.
C. the filesystem ran out of inodes.
D. The /tmp directory has been set with an immutable attribute.
QUESTION NO: 3
Which of the following is the BEST reason for not storing database files in the /var directory?
A. The /var filesystem is not fast enough for database files.
B. The number of files in /var is limited by the available inodes.
C. Files in /var do not have strict file permissions.
D. If log files fill up /var, it might corrupt the database.
QUESTION NO: 4 CORRECT TEXT
A junior system administrator had trouble installing and running an Apache web server on a Linux server. You have been tasked with installing the Apache web server on the Linux server and resolving the issue that prevented the junior administrator from running Apache.
Install Apache and start the service. Verify that the Apache service is running with the defaults.
Typing “help” in the terminal will show a list of relevant commands.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
CentOS Command Prompt
See explanation below
QUESTION NO: 5 DRAG DROP
The lead Linux admin has added a disk, /dev/sdd, to a VM that is running out of disk space. Place the following steps in the correct order from first (1) to last (4) to add the disk to the existing LVM.
QUESTION NO: 6
An administrator receives a warning about a filesystem filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the filesystem. Which of the following commands would BEST assist the administrator in identifying the problem?
A. lsof | grep largelogfile
B. pkill /tmp/largelogfile
C. pgrep largelogfile
D. ps –ef | grep largelogfile
QUESTION NO: 7
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?
QUESTION NO: 8
After starting a long-running script, a systems administrator needs to verify the frequency of what is filling up the /var partition and kill it because it is consuming too much space. Which of the following is the correct sequence given only a terminal is available?
3. watch df /var
3. watch df /var
3. watch df /var
3. watch df /var
QUESTION NO: 9
A Linux administrator must identify a user with high disk usage.
The administrator runs the # du –s /home/* command and gets the following output:
Based on the output, User3 has the largest amount of disk space used. To clean up the file space, the administrator needs to find out more information about the specific files that are using the most disk space. Which of the following commands will accomplish this task?
A. df –k /home/User3/files.txt
B. du –a /home/User3/*
C. du –sh /home/User/
D. find . –name /home/User3 -print
QUESTION NO: 10
A Linux server has multiple IPs. A Linux administrator needs to verify if the HTTP server port is bound to the correct IP. Which of the following commands would BEST accomplish this task?
QUESTION NO: 11
A systems administrator needs to append output of ls –lha /opt command to the contents of a test.txt file. Which of the following commands will accomplish this?
A. ls –lha /opt > test.txt
B. ls –lha /opt < test.txt C. ls –lha /opt >> test.txt
D. ls –lha /opt << test.txt
QUESTION NO: 12
A Linux administrator needs to remotely update the contents of the www.comptia.org/contacts
URL. Which of the following commands would allow the administrator to download the current contents of the URL before updating?
A. curl www.comptia.org/contacts
B. dig www.comptia.org/contacts
C. apt-get www.comptia.org/contacts
D. yum list www.comptia.org/contacts
QUESTION NO: 13
Which of the following BEST describes containers running on a Linux system?
A. Containers only need the namespaces functionality to run on a Linux system available since kernel 2.6.
B. Containers need a hypervisor to run on a Linux system. Cgroups namespaces are functionalities used for the kernel but not for running containers.
C. Containers only need the cgroups functionality for running on a Linux system. Namespaces is not a Linux kernel functionality needed for creating and managing containers.
D. Containers use the cgroups and namespaces functionalities to isolate processes and assign hardware resources to each of those isolated processes.
QUESTION NO: 14
A network has been crashing intermittently. A Linux administrator would like to write a shell script that will attempt to ping the server and email an alert if the server fails to respond. The script will later be scheduled via cron job. Which of the following scripts would BEST accomplish this task?
QUESTION NO: 15
A Linux administrator is testing connectivity to a remote host on a shared terminal. The administrator wants to allow other users to access the terminal while the command is executing. Which of the following commands should the administrator use?
A. bg ping remotehost
B. fg ping remotehost
C. ping remotehost < results
D. ping remotehost &
QUESTION NO: 16
A Linux administrator needs to switch from text mode to GUI. Which of the following runlevels will start the GUI by default?
A. Runlevel 3
B. Runlevel 4
C. Runlevel 5
D. Runlevel 6
QUESTION NO: 17
A junior systems administrator is configuring localization option environment variables. The administrator is given a checklist of tasks with the following requirements:
View current settings of the LC_ALL environment variable only.
Modify the LANG environment variable to US English Unicode.
Given this scenario, which of the following should be performed to meet these requirements?
A. echo $LC_ALL
C. cat $LC_ALL
D. export LANG = en_US.UTF-8
E. export $LANG = en_US.UTF
QUESTION NO: 18
An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set. Which of the following commands would prevent the script from being killed?
A. nohup service network restart
B. service network restart &
C. echo “service network restart” | at now
D. bg service network restart
QUESTION NO: 19
A Linux administrator is testing a new web application on a local laptop and consistently shows the following 403 errors in the laptop’s logs:
The web server starts properly, but an error is generated in the audit log. Which of the following settings should be enabled to prevent this audit message?
A. httpd_can_network_connect = 1
B. httpd_enable_scripting = 1
C. httpd_enable_homedirs = 1
D. httpd_enable_cgi = 1
QUESTION NO: 20
Which of the following BEST describes the purpose of the X11 system?
A. X11 provides graphical display capabilities
B. X11 provides command line capabilities
C. X11 provides networking capabilities
D. X11 provides telephony capabilities.
QUESTION NO: 21
An administrator is analyzing a Linux server which was recently hacked. Which of the following will the administrator use to find all unsuccessful login attempts?
QUESTION NO: 22
A junior administrator needs to unload an older video kernel module. Which of the following commands would BEST accomplish this task?
QUESTION NO: 23
An administrator is attempting to block SSH connections to 192.168.10.24 using the Linux firewall. After implementing a rule, a connection refused error is displayed when attempting to SSH to 192.168.10.24. Which of the following rules was MOST likely implemented?
A. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j REJECT
B. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j DROP
C. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j FORWARD
D. iptables –A –p tcp –d 192.168.10.24 –-dport 22 –j REFUSE
QUESTION NO: 24
A junior Linux administrator is setting up system-wide configuration settings. The goal is to ensure the PATH environment variable includes the following locations for all users who log into a Linux system:
The administrator issues the following commands at the terminal:
Respectively, the output of these commands is as follows:
Given this output, which of the following would be the BEST action for the administrator to perform to address this issue?
A. Update the /etc/profile.d file using a text editor, navigate to the PATH element, add the missing locations, and run the bash_completion.sh script to update the changes.
B. Update the /etc/profile file using a text editor, navigate to the PATH element, add the missing locations and run the . /etc/profile command to update the changes.
C. Update the /etc/profile.d file using a text editor, navigate to the PATH element, add the missing locations, and reboot to update the changes.
D. Update the /etc/profile file using a text editor navigate to the PATH element, add the missing locations, and restart the bash process to update the changes.
QUESTION NO: 25
A Linux systems administrator needs to provision multiple web servers into separate regional data centers. The systems architect has instructed the administrator to define the server infrastructure using a specific tool that consumes a text-based file. Which of the following is the BEST reason to do this?
A. To document the infrastructure so it can be included in the system security plan
B. To ensure the administrator follows the planning phase of the systems development life cycle
C. To define the infrastructure so it can be provisioned consistently with minimal manual tasks
D. To validate user requirements have been met within each regional datacenter for compliance
QUESTION NO: 26
A Linux administrator needs to set permissions on an application with the following parameters:
- The owner of the application should be able to read, write, and execute the application.
- Members of the group should be able to read and execute the application.
- Everyone else should not have access to the application.
Which of the following commands would BEST accomplish these tasks?
A. chmod 710
B. chmod 730
C. chmod 750
D. chmod 760
QUESTION NO: 27
A junior Linux administrator is trying to verify connectivity to the remote host host1 and display round-trip statistics for ten ICMP requests. Which of the following commands should the administrator execute?
A. ping –c 10 host1
B. traceroute –c 10 host1
C. netstat host1
D. pathping –c 10 host1
QUESTION NO: 28
A junior Linux administrator is updating local name resolution to support IPv6. The administrator issues the command cat /etc/hosts and receives the following output:
Which of the following actions should the administrator perform to accomplish this task?
A. Modify the /etc/hosts file, and add the ipv6 localhost entry to the file.
B. Modify the /etc/hosts file, and add the ::1 localhost entry to the file.
C. Modify the /etc/hosts file, and add the ipv4 localhost entry to the file.
D. Modify the /etc/hosts file, and add the 0.0.0.0 localhost entry to the file.
QUESTION NO: 29
A Linux systems administrator needs to copy the contents of a directory named “working” on the local working system to a folder /var/www/html on a server named “corporate-web”. Which of the following commands will allow the administrator to copy all the contents to the web server?
A. scp –r working/* webuser@corporate-web:/var/www/html
B. tar working/* webuser@corporate-web:/var/www/html
C. cp –r working/* webuser@corporate-web:/var/www/html
D. mv working webuser@corporate-web:/var/www/html
QUESTION NO: 30
A systems administrator has received reports of intermittent network connectivity to a particular website. Which of the following is the BEST command to use to characterize the location and type of failure over the course of several minutes?
A. mtr www.comptia.org
B. tracert www.comptia.org
C. ping www.comptia.org
D. netstat www.comptia.org
QUESTION NO: 31
A Linux administrator has configured a Linux system to be used as a router. The administrator confirms that two network adapters are properly installed and functioning correctly. In addition, the output of the iptables –L command appears to contain a complete firewall configuration. Which of the following commands does the administrator need to issue for the router to be fully functional?
A. echo “1″ > /proc/sys/net/ipv4/ip_forward
B. echo “0″ > /proc/sys/net/ipv4/tcp_abort_on_overflow
C. echo “0″ > /proc/sys/net/ipv4/max_connections
D. echo “1″ > /proc/sys/net/ipv4/ip_default_ttl
QUESTION NO: 32
A systems administration team has decided to treat their systems as immutable instances. They keep the desired state of each of their systems in version control and apply automation whenever they provision a new instance. If there is an issue with one of their servers, instead of troubleshooting the issue, they terminate the instance and rebuild it using automation. Which of the following is this an example of?
C. Infrastructure as code
D. Agentless deployment
QUESTION NO: 33
A systems administrator wants to deploy several applications to the same server quickly. Each application should be abstracted from the host with its own dependencies and libraries and utilize a minimal footprint. Which of the following would be BEST in this scenario?
A. Virtual machines
B. Type 2 hypervisor
C. Chroot jails
QUESTION NO: 34
An operator finds a user is having issues with opening certain files. Which of the following commands would allow the security administrator to list and check the SELinux context?
A. ls –D
B. ls –a
C. ls –Z
D. ls -l
QUESTION NO: 35
A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?
A. echo “blacklist bluetooth” > /etc/modprobe.d/blacklist-bluetooth
B. echo “kill bluetooth” > /etc/modprobe.d/kill-bluetooth
C. echo “modprobe bluetooth” > /etc/modprobe.d/modprobe-bluetooth
D. echo “rmmod bluetooth” > /etc/modprobe.d/rmmod-bluetooth
QUESTION NO: 36
A junior Linux administrator is installing a new application with CPU architecture requirements that have the following specifications:
- x64 bit
- 3.0GHz speed
- Minimum quad core
The administrator wants to leverage existing equipment but is unsure whether the requirements of these systems are adequate. The administrator issues the following command cat /proc/cpuinfo. The output of the command is as follows:
Which of the following is the recommended course of action the administrator should take based on this output?
A. Install the application, as the system meets the application requirements
B. Procure new equipment that matches the recommended specifications
C. Recompile the Linux kernel to support the installation.
D. Reconfigure lib modules to support the new application.
QUESTION NO: 37
A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication. To which of the following files should the RSA token be added to allow this access?
QUESTION NO: 38
A Linux server needs to be accessed, but the root password is not available. Which of the following would BEST allow an administrator to regain access and set a new known password at the same time?
A. Boot into single-user mode and reset the password via the passwd command.
B. Boot into single-user mode and reset the password by editing the /etc/passwd file.
C. Boot into single-user mode and reset the password by editing the /etc/shadow file.
D. Boot into single-user mode and reset the password via the chage command.
QUESTION NO: 39
A Linux administrator wants to fetch a Git repository from a remote Git server. Which of the following is the BEST command to perform this task?
A. git checkout
B. git clone
C. git merge
D. git config
QUESTION NO: 40
An administrator needs to create a shared directory in which all users are able to read, write, and execute its content but none of the regular users are able to delete any content. Which of the following permissions should be applied to this shared directory?