Which of the following commands would BEST ensure the specified users can access the backup files?
Two specific users need access to a directory owned by root where backups are located. Which of the following commands would BEST ensure the specified users can access the backup files?A . umaskB . chconC . chmodD . setfaclView AnswerAnswer: D
Ann, a junior Linux administrator, needs to copy software from her local machine to assist in developing a software application on a remote machine with the IP address 192.168.3.22. The file needs to be placed on the /tmp directory. After downloading the RPM to the local machine, which of the following commands would be BEST to use to copy the software?
Ann, a junior Linux administrator, needs to copy software from her local machine to assist in developing a software application on a remote machine with the IP address 192.168.3.22. The file needs to be placed on the /tmp directory. After downloading the RPM to the local machine, which of the...
Which of the following actions should the administrator perform to accomplish this task?
0.0.1 localhost Which of the following actions should the administrator perform to accomplish this task?A . Modify the /etc/hosts file, and add the ipv6 localhost entry to the file.B . Modify the /etc/hosts file, and add the ::1 localhost entry to the file.C . Modify the /etc/hosts file, and add...
To which of the following files should the RSA token be added to allow this access?
A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication. To which of the following files should the RSA token be added to allow this access?A . authorized_keysB . ~/.ssh/ssh_configC . id_rsa.pubD . known_hostsView AnswerAnswer: C Explanation: Reference: https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on-a-linux-server
Which of the following commands would allow the security administrator to list and check the SELinux context?
An operator finds a user is having issues with opening certain files. Which of the following commands would allow the security administrator to list and check the SELinux context?A . ls CDB . ls CaC . ls CZD . ls -1View AnswerAnswer: C Explanation: Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security-enhanced_linux/sect-security-enhanced_linux-working_with_selinux-selinux_contexts_labeling_files
Which of the following commands would BEST accomplish these tasks?
A Linux systems administrator needs to set permissions on an application with the following parameters: The owner of the application should be able to read, write, and execute the application. Members of the group should be able to read and execute the application. Everyone else should not have access to...
Which of the following files should be watched by the agents?
A system administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used. Which of the following files should be watched by the agents?A . /var/log/audit/audit.logB . /var/log/kern.logC . /var/log/monitorD . /etc/rsyslog.confView AnswerAnswer:...
Which of the following commands would BEST assists the administrator in identifying the problem?
An administrator receives a warning about a file system filling up, and then identifies a large file located at /tmp/largelogfile. The administrator deletes the file, but no space is recovered on the file system. Which of the following commands would BEST assists the administrator in identifying the problem?A . lsof...
Which of the following is the NEXT step the administrator should take to analyze the issue without losing data?
While creating a file on a volume, the Linux administrator receives the following message: No space left on device. Running the df Cm command, the administrator notes there is still 50% of usage left. Which of the following is the NEXT step the administrator should take to analyze the issue...
Which of the following BEST illustrates the steps the administrator should take?
An administrator is tasked with increasing the size of the volume /dev/vg/lv to 20GB. Which of the following BEST illustrates the steps the administrator should take?A . vgextend CL20G /dev/vg/lv; resizelv /dev/vg/lvB . parted CL20G /dev/vg/lv; remount /dev/vg/lvC . mkfs CL20G /dev/vg/lv; tune2fs /dev/vg/lvD . lvextend CL20G /dev/vg/lv; resize2fs /dev/vg/lvView...