Which of the following should the administrator do to address this issue?

A systems administrator is implementing a new service task with systems at startup and needs to execute a script entitled test.sh with the following content: The administrator tries to run the script after making it executable with chmod +x; however, the script will not run. Which of the following should...

October 8, 2024 No Comments READ MORE +

Which of the following should the administrator do?

To harden one of the servers, an administrator needs to remove the possibility of remote administrative login via the SSH service. Which of the following should the administrator do?A . Add the line DenyUsers root to the /etc/hosts.deny file.B . Set PermitRootLogin to no in the /etc/ssh/sshd_config file.C . Add...

October 7, 2024 No Comments READ MORE +

Which of the following technologies can be used as a central repository of Linux users and groups?

Which of the following technologies can be used as a central repository of Linux users and groups?A . LDAPB . MFAC . SSOD . PAMView AnswerAnswer: A Explanation: LDAP stands for Lightweight Directory Access Protocol, which is a protocol for accessing and managing a central directory of users and groups....

October 7, 2024 No Comments READ MORE +

Which of the following commands should replace the <CONDITIONAL> string?

A user is asking the systems administrator for assistance with writing a script to verify whether a file exists. Given the following: Which of the following commands should replace the <CONDITIONAL> string?A . if [ -f "$filename" ]; thenB . if [ -d "$filename" ]; thenC . if [ -f...

October 7, 2024 No Comments READ MORE +

Which of the following commands will accomplish this task?

A systems administrator wants to test the route between IP address 10.0.2.15 and IP address 192.168.1.40. Which of the following commands will accomplish this task?A . route -e get to 192.168.1.40 from 10.0.2.15B . ip route get 192.163.1.40 from 10.0.2.15C . ip route 192.169.1.40 to 10.0.2.15D . route -n 192.168.1.40...

October 7, 2024 No Comments READ MORE +

Which of the following commands should the administrator use for this task?

A new file was added to a main Git repository. An administrator wants to synchronize a local copy with the contents of the main repository. Which of the following commands should the administrator use for this task?A . git reflogB . git pullC . git statusD . git pushView AnswerAnswer:...

October 6, 2024 No Comments READ MORE +

Which of the following technologies is the administrator using?

A systems administrator is deploying three identical, cloud-based servers. The administrator is using the following code to complete the task: Which of the following technologies is the administrator using?A . AnsibleB . PuppetC . ChefD . TerraformView AnswerAnswer: D Explanation: The code snippet is written in Terraform language, which is...

October 6, 2024 No Comments READ MORE +

Which of the following commands will accomplish this task?

0.2.25 on port 3128. Which of the following commands will accomplish this task?A . iptables -t nat -D PREROUTING -p tcp --sport 80 -j DNAT - -to-destination 192.0.2.25:3128B . iptables -t nat -A PREROUTING -p top --dport 81 -j DNAT C-to-destination 192.0.2.25:3129C . iptables -t nat -I PREROUTING -p top...

October 6, 2024 No Comments READ MORE +

Which of the following commands is the correct way to accomplish this task?

A systems administrator needs to reconfigure a Linux server to allow persistent IPv4 packet forwarding. Which of the following commands is the correct way to accomplish this task?A . echo 1 > /proc/sys/net/ipv4/ipv_forwardB . sysctl -w net.ipv4.ip_forward=1C . firewall-cmd --enable ipv4_forwardingD . systemct1 start ipv4_forwardingView AnswerAnswer: B Explanation: The command...

October 6, 2024 No Comments READ MORE +

Which of the following commands would resolve the issue and allow an SSH connection to be established without a password?

A junior administrator is trying to set up a passwordless SSH connection to one of the servers. The administrator follows the instructions and puts the key in the authorized_key file at the server, but the administrator is still asked to provide a password during the connection. Given the following output:...

October 5, 2024 No Comments READ MORE +