The Actual Exam Version included actual exam questions verified by IT Experts. We verified questions and updated frequently each month and also based on members’ feedback to keep updating with the real exam. We are offering money back immediately if questions in our Actual Exam Version do not appear in your exam. Highly recommend you take the Actual Exam Version then go to the exam as soon as possible.
QUESTION NO: 41
A systems administrator has finished building a new feature for the monitoring software in a separate Git branch. Which of the following is the BEST method for adding the new feature to the software’s master branch?
A. Merge the changes from the feature branch to the master branch.
B. Save the changes to the master branch automatically with each Git commit.
C. Clone the feature branch into the master branch.
D. Pull the changes from the feature branch into the master branch.
QUESTION NO: 42
Which of the following will provide a list of all flash, external, internal, and SSD drives?
QUESTION NO: 43
Which of the following configuration management tools is considered agentless?
QUESTION NO: 44
An administrator reviews the following configuration file provided by a DevOps engineer:
Which of the following would the application parsing this file MOST likely have to support?
QUESTION NO: 45
Which of the following is a difference between YAML and JSON?
A. Users can comment in YAML but not in JSON
B. JSON only uses curly brackets, while YAML only uses square brackets
C. JSON is used in web development, while YAML is used solely in back-end systems.
D. YAML has been deprecated for JSON.
QUESTION NO: 46
A junior administrator of a physical server receives log messages indicating the out-of-memory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file. Which of the following should the administrator use to reduce the output of memory messages?
A. free : swapoff / swapfile ; swapon -a
B. mkswap /swapfile; swapon –a
C. fallocate –l 2G /swapfile && swapon –a
D. echo “1″ > /proc/meninfo ; swapon / swapfile
QUESTION NO: 47
A junior Linux administrator is optimizing a system in which an application needs to take priority 0 when running the process. The administrator runs the ps command and receives the following output:
Given this scenario, which of the following steps will address this issue?
A. Issue the command renice –n 0 –p 8481
B. Issue the command renice –p 8481
C. Issue the command renice –p 0 -n 8481
D. Issue the command renice –n 8481
QUESTION NO: 48
An administrator needs to mount the shared NFS file system testhost:/testvolume to mount point /mnt/testvol and make the mount persistent after reboot. Which of the following BEST demonstrates the commands necessary to accomplish this task?
QUESTION NO: 49
A systems administrator has deployed a Linux server based on an Anaconda process with all packages and custom configurations necessary to install a web server role. Which of the following could be used to install more Linux servers with the same characteristics?
QUESTION NO: 50
A Linux administrator is using a Linux system as a router. During the tests, the administrator discovers that IP packets are not being sent between the configured interfaces. Which of the following commands enables this feature for IPv4 networks?
A. cat /proc/sys/net/ipv4/ip_route > 1
B. echo “1″ > /proc/sys/net/ipv4/ip_forward
C. echo “1″ > /proc/sys/net/ipv4/ip_route
D. echo “1″ > /proc/sys/net/ipv4/ip_net
QUESTION NO: 51
A systems administrator wants to know the current status of a series of dd jobs that were started in the background three hours ago. Which of the following commands will achieve this task?
A. sudo killall –HUP dd
B. sudo killall dd
C. sudo killall –TERM dd
D. sudo killall -USR1 dd
QUESTION NO: 52
A Linux administrator needs the “tech” account to have the option to run elevated commands as root. Which of the following commands would BEST meet this goal?
A. $ su – tech –c “/bin/bash”
B. # usermod –aG wheel tech
C. # sudo –i tech
D. # groupadd –u tech –g root
QUESTION NO: 53
Which of the following is the purpose of the vmlinux file on a Linux system?
A. To prevent a Linux kernel panic
B. To start a Linux virtual machine
C. To provide the executable kernel for the system
D. To enable resource access to the network
QUESTION NO: 54
Ann, a junior systems administrator, is required to add a line to the /etc/yum.conf file. However, she receives the following error message when she tries to add the line:
Ann performs some diagnostics to attempt to find the root cause:
Which of the following commands should Ann execute to write content to /etc/yum?
A. chmod 755 /etc/yum.conf
B. setfacl –m m:rw /etc/yum.conf
C. chattr –i /etc/yum.conf
D. setenforce 0
QUESTION NO: 55
A Linux administrator needs to take stock of USB devices attached to the system.
Which of the following commands would be BEST to complete this task?
C. cat /proc/USB
D. modprobe -–usb
QUESTION NO: 56
Given the output below:
Which of the following commands can be used to remove MyPhoto.jpg from the current directory?
A. unlink ./MyPhoto.jpg
B. del Pictures/photo.jpg
C. rm –rf ./Pictures
D. rm –f MyPhoto.jpg
E. ln –rm ./Pictures/photo.jpg
QUESTION NO: 57
Which of the following server roles would assign a host IP address?
QUESTION NO: 58
Which of the following commands would show the default printer on a Linux system?
QUESTION NO: 59
A systems administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used. Which of the following files should be watched by the agents?
QUESTION NO: 60
A systems administrator must clean up all application files in the directory /var/log/app. However, the company’s security policy requires the files to be kept on the backup server for one year. The Linux server has only the tar and bzip2 packages installed. Which of the following commands will package and compress the files?
A. tar –zcvf applicationfiles.tar.bz2 /var/log/app/*
B. tar –jcvf applicationfiles.tar.bz2 /var/log/app/*
C. tar –cvf applicationfiles.tar.bz2 /var/log/app/*
D. tar –xvf applicationfiles.tar.bz2 /var/log/app/*
QUESTION NO: 61
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms. Which of the following files should be edited to accomplish this?
QUESTION NO: 62
Which of the following configuration files should be modified to disable Ctrl+Alt+Del in Linux?
QUESTION NO: 63
Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry:
Which of the following commands should the administrator execute to resolve the problem?
A. usermod –s /bin/bash joe
B. passwd –u joe
C. useradd –s /bin/bash joe
D. chage –E -l joe
QUESTION NO: 64
A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?
A. free, fack, partprobe
B. lsof, lvcreate, mdadm
C. df, du, rmmod
D. fdisk, mkswap, swapon -a
QUESTION NO: 65
A Linux administrator is using a public cloud provider to host servers for a company’s website.
Using the provider’s tools, the administrator wrote a JSON file to define how to deploy the servers. Which of the following techniques did the administrator use?
A. Infrastructure as code
B. Build automation
C. Platform as a service
D. Automated configuration
QUESTION NO: 66
A Linux system is running normally when the systems administrator receives an alert that one application spawned many processes. The application is consuming a lot of memory, and it will soon cause the machine to become unresponsive. Which of the following commands will stop each application process?
A. kill `pidof application`
B. killall application
C. kill -9 `ps –aux | grep application`
D. pkill -9 application
QUESTION NO: 67
A systems administrator configured a new kernel module, but it stopped working after reboot. Which of the following will allow the systems administrator to check for module problems during server startup?
QUESTION NO: 68
A junior Linux administrator is installing patches using YUM. The administrator issues the following command:
yum list installed
The output of the command is as follows:
Given this scenario and the output, which of the following should the administrator do to address this issue?
A. renice –n 9 –p 5180
B. killall yum
C. ps –ef | grep yum
D. top | grep yum
QUESTION NO: 69
A systems administrator needs to retrieve specific fields from a CSV file. Which of the following tools would accomplish this task?
QUESTION NO: 70
Two specific users need access to a directory owned by root where backups are located. Which of the following commands would BEST ensure the specified users can access the backup files?
QUESTION NO: 71
Which of the following is the purpose of the monitoring server role?
A. To aggregate web traffic to watch which websites employees are visiting
B. To collect status and performance information about the servers in an environment
C. To provide user authentication services to a network
D. To provide real-time analysis of potential threats to the organization
QUESTION NO: 72
A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?
QUESTION NO: 73
A junior systems administrator is upgrading a package that was installed on a Red Hat-based system. The administrator is tasked with the following:
Update and install the new package.
Verify the new package version is installed.
Which of the following should be done to BEST accomplish these task? (Choose two.)
A. yum install B. yum upgrade
C. rpm –e D. rpm –qa
E. apt-get F. apt-get upgrade
QUESTION NO: 74
Which of the following is the template for the grub.cfg file?
QUESTION NO: 75
A Linux administrator implemented a new HTTP server using the default configuration. None of the users on the network can access the server. If there is no problem on the network or with the users’ workstations, which of the following steps will BEST analyze and resolve the issue?
A. Run netstat to ensure the port is correctly bound, and configure the firewall to allow access on ports 80 and 443
B. Run route to ensure the port is correctly bound, and configure the firewall to allow access on ports 80 and 443
C. Run netcat to ensure the port is correctly bound, and configure a static route to the web to allow access on ports 80 and 443
D. Run route to ensure the port is correctly bound, and configure SELinux to allow access on ports 80 and 443
QUESTION NO: 76
A Linux storage administrator wants to create a logical volume group. Which of the following commands is required to start the process?
QUESTION NO: 77
A Linux administrator built a GitLab server. Later that day, a software engineer tried to access the server to upload the repository during the final step of installation. The software engineer could not access the website. Which of the following firewall rules would allow access to this site?
A. iptables –A INPUT –p tcp –m multiport –dports 80,443 –m conntrack –cstate NEW, ESTABLISHED –j ACCEPT
B. iptables –A INPUT –p tcp –m multiport –dports 80,443 –m conntrack –cstate ESTABLISHED –j ACCEPT
C. iptables –A INPUT –p tcp –m multiport –dports 80,443 –m conntrack –cstate RELATED,
ESTABLISHED –j ACCEPT
D. iptables –A INPUT –p tcp –m multiport –dports 80,443 –m conntrack –cstate NEW, ESTABLISHED –j REJECT
QUESTION NO: 78
While creating a file on a volume, the Linux administrator receives the following message: No space left on device. Running the df –m command, the administrator notes there is still 50% of usage left. Which of the following is the NEXT step the administrator should take to analyze the issue without losing data?
A. Run the df –i command and notice the inode exhaustion
B. Run the df –h command and notice the space exhaustion
C. Run the df –B command and notice the block size
D. Run the df –k command and notice the storage exhaustion
QUESTION NO: 79
A user attempts to use the mount -a command but gets the following error:
mount: mount point /mnt/test does not exist
Which of the following commands best describes the action the Linux administrator should take NEXT?
A. mount –a /mnt/test
B. mkdir –p /mnt/test
C. mdadm –p /mnt/test
D. mkfs /mnt/test
E. touch /mnt/test
QUESTION NO: 80
Which of the following is modified to reconfigure the boot environment?