Which of the following commands would disable the use of Bluetooth?

A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?A . echo “blacklist bluetooth” > /etc/modprobe.d/blacklist-bluetooth B. echo “kill bluetooth” > /etc/modprobe.d/kill-bluetooth C. echo “modprobe bluetooth” > /etc/modprobe.d/modprbe-bluetooth D. echo “rmod bluetooth” > /etc/modprobe.d/rmmod-bluetoothView AnswerAnswer:...

September 27, 2022 No Comments READ MORE +

Which of the following should the administrator do to restore default permissions for newly created directories?

Ann, a user, has created a new directory and noticed that permissions on the new directory are as follows: drwx------. 1 ann ann 0 Jun 11 08:20 work Which of the following should the administrator do to restore default permissions for newly created directories?A . Change umask value in /etc/profile....

September 27, 2022 No Comments READ MORE +

Which of the following permissions should be applied to this shared directory?

An administrator needs to create a shared directory in which all users are able, write, and execute its content but none of the regular users are able to delete any content. Which of the following permissions should be applied to this shared directory?A . rwxrwxrwt B. rwxrwxrws C. rwxrwxrwx D....

September 27, 2022 No Comments READ MORE +

To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID configuration?

A four-drive Linux NAS has been improperly configured. Each drive has a capacity of 6TB, for a total storage capacity of 24TB. To reconfigure this unit to be not pluggable for drive replacement and provide total storage of 11TB to 12TB, which of the following would be the correct RAID...

September 27, 2022 No Comments READ MORE +

Which of the following should the administrator use to reduce the output of memory messages?

A junior administrator of a physical server receives log messages indicating the out-of-memory killer has been active. All memory slots are in use on the motherboard, but additional disk space is available. Space has been allocated for a swap file. Which of the following should the administrator use to reduce...

September 27, 2022 No Comments READ MORE +

Which of the following files should contain the public key to gain remote access to the server?

A junior Linux administrator needs to access production servers using a secure SSH protocol. Which of the following files should contain the public key to gain remote access to the server?A . ~/ssh/authorized-keys B. /etc/authorized_keys C. /etc/sshd/ssh.conf D. ~/.ssh/authorized_keysView AnswerAnswer: D Explanation: Reference: https://www.linode.com/docs/security/securing-your-server/

September 27, 2022 No Comments READ MORE +

Which of the following commands would BEST meet this goal?

A Linux administrator needs the “tech” account to have the option to run elevated commands as root. Which of the following commands would BEST meet this goal?A . $ su C tech Cc “/bin/bash” B. # usermod CaG wheel tech C. # sudo CI tech D. # groupadd Cu tech...

September 27, 2022 No Comments READ MORE +

Which of the following would be BEST in this scenario?

A systems administrator wants to deploy several applications to the same server quickly. Each application should be abstracted from the host with its own dependencies and libraries and utilize a minimal footprint. Which of the following would be BEST in this scenario?A . Virtual machines B. Type 2 hypervisor C....

September 27, 2022 No Comments READ MORE +

Which of the following firewall rules would allow access to this site?

A Linux administrator built a GitLab server. Later that day, a software engineer tried to access the server to upload the repository during the final step of installation. The software engineer could not access the website. Which of the following firewall rules would allow access to this site?A . iptables...

September 27, 2022 No Comments READ MORE +

Given this scenario and the output, which of the following should the administrator do to address this issue?

A junior Linux administrator is installing patches using YUM. The administrator issues the following command: yum list installed The output of the command is as follows: Given this scenario and the output, which of the following should the administrator do to address this issue?A . renice Cn 9 Cp 5180...

September 26, 2022 No Comments READ MORE +