Which of the following rules was MOST likely implemented?
An administrator is attempting to block SSH connections to 192.168.10.24 using the Linux firewall. After implementing a rule, a connection refused error is displayed when attempting to SSH to 192.168.10.24. Which of the following rules was MOST likely implemented?A . iptables CA Cp tcp Cd 192.168.10.24 Cdropt 22 Cj REJECTB...
Which of the following files should be edited to accomplish this?
In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms. Which of the following files should be edited to accomplish this?A . /etc/ssh/sshd_configB . /etc/ssh/ssh_configC . ~/.ssh/ssh_configD . /etc/ssh/known_hostsView AnswerAnswer: A
Which of the following files should the administrator use to verify this information?
A Linux administrator tries to ping a hostname in a network but receives the message: hostname not found. The administrator is sure the name exists on the network and wants to verify if the DNS server is correctly configured on the client. Which of the following files should the administrator...
Which of the following will provide a list of all flash, external, internal, and SSD drives?
Which of the following will provide a list of all flash, external, internal, and SSD drives?A . lspciB . lsmodC . lsblkD . lsusbView AnswerAnswer: C Explanation: Reference: https://www.linux.com/learn/intro-to-linux/2017/3/how-format-storage-devices-linux
Which of the following commands should the administrator use?
A Linux administrator is testing connectivity to a remote host on a shared terminal. The administrator wants to allow other users to access the terminal while the command is executing. Which of the following commands should the administrator use?A . bg ping remotehostB . fg ping remotehostC . ping remotehost...
Which of the following command lines will perform this task?
The Apache web server was recently installed on a Debian/Ubuntu server. The web server fails and a review of log messages on another partition reveals the installation was not completed properly due to lack of disk space. After clearing the files, the systems administrator has requested the installation to be...
Which of the following sets of commands should the administrator execute to accurately configure the correct time settings?
A systems administrator is configuring options on a newly installed Linux VM that will be deployed to the Pacific time zone. Which of the following sets of commands should the administrator execute to accurately configure the correct time settings?A . cd /etcln Cs /usr/share/zoneinfo/US/Pacific localtimeB . cd /usr/localln Cs /usr/share/zoneinfo/US/Pacific...
Which of the following commands should the administrator execute to resolve the problem?
Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry: joe:x:505:505::/home/joe:/bin/false Which of the following commands should the administrator execute to resolve the problem?A . usermod Cs /bin/bash...
Which of the following files can be used to configure the network interface named eth0?
A user needs to modify the IP address of a laptop. Which of the following files can be used to configure the network interface named eth0?A . /etc/sysconfig/network/interfaces.cnfB . /system/config/interfacesC . /etc/sysconfig/network-scripts/ifcfg-eth0D . /system/networking/ifconfigE . /etc/interfaces/eth0.confView AnswerAnswer: C Explanation: Reference: https://opensource.com/life/16/6/how-configure-networking-linux
Remount /home.
Remount /home.View AnswerAnswer: A Explanation: Reference: https://www.howtoforge.com/community/threads/quotacheck-cannot-find-filesystem-tocheck.25954/