Which of the following commands would BEST ensure the specified users can access the backup files?
Two specific users need access to a directory owned by root where backups are located. Which of the following commands would BEST ensure the specified users can access the backup files?A . umask B. chcon C. chmod D. setfaclView AnswerAnswer: D
Which of the following commands should the administrator execute to correct the issue?
A systems administrator suspects a process with a PID of 2864 is consuming resources at an alarming rate. The administrator uses the command renice -n -5 -p2864, but it does not solve the issue. Which of the following commands should the administrator execute to correct the issue?A . nice -n...
Which of the following configuration settings needs to be changed?
A Linux administrator is adding a static IP address to a network interface on a Linux system. The administrator modifies the ifcfg- eth0 configuration file with the following settings: After the administrator restarts the Linux server, the system is not connected to the network. Which of the following configuration settings...
Which of the following files should be watched by the agents?
A system administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used. Which of the following files should be watched by the agents?A . /var/log/audit/audit.log B. /var/log/kern.log C. /var/log/monitor D. /etc/rsyslog.confView AnswerAnswer:...
Which of the following would allow the administrator to accomplish this?
A Linux systems administrator installed a new web server, which failed while attempting to start. The administrator suspects that SELinux is causing an issue and wants to temporarily put the system into permissive mode. Which of the following would allow the administrator to accomplish this?A . echo SELINUX=PERMISSIVE >> /etc/sysconfig/selinux...
Which of the following commands would prevent the script from being killed?
An administrator needs to change the IP address on a server remotely. After updating the configuration files, a network restart is needed. However, the administrator fears that when the network connection drops, the network restart script will be killed before the new IP address has been set. Which of the...
Which of the following commands will help achieve this task?
A company wants to ensure that all newly created files can be modified only by their owners and that all new directory content can be changed only by the creator of the directory. Which of the following commands will help achieve this task?A . umask 0022 B. umask 0012 C....
Which of the following statements BEST represents what the term “agentless” means regarding orchestration?
Which of the following statements BEST represents what the term “agentless” means regarding orchestration?A . Installation of a tool is not required on the remote system to perform orchestration tasks B. It facilitates version control when using infrastructure as code during orchestration C. It automatically removes malware from the remote...
Given this scenario, which of the following steps will address this issue?
A junior Linux administrator is optimizing a system in which an application needs to take priority 0 when running the process. The administrator runs the ps command and receives the following output: Given this scenario, which of the following steps will address this issue?A . Issue the command ronice Cn...
Which of the following explains what is wrong with the script?
An analyst is trying to determine which public IP addresses are managed by Company A, but the script is not working correctly. Which of the following explains what is wrong with the script?A . $(cat ip-list.txt) should be changed to `cat ip-list.txt` in the for statement. B. The for should...