Which of the following commands should the administrator use to accomplish this task?
A Linux administrator needs to obtain a list of all volumes that are part of a volume group. Which of the following commands should the administrator use to accomplish this task?A . vgsB . lvsC . fdisk -1D . pvsView AnswerAnswer: B Explanation: The lvs command can be used to...
Which of the following commands will accomplish this task?
A Linux administrator needs to redirect all HTTP traffic temporarily to the new proxy server 192.0.2.25 on port 3128. Which of the following commands will accomplish this task?A . iptables -t nat -D PREROUTING -p tcp --sport 80 -j DNAT - -to-destination 192.0.2.25:3128B . iptables -t nat -A PREROUTING -p...
Which of the following should the Linux administrator configure so the requested packages can be installed?
A database administrator requested the installation of a custom database on one of the servers. Which of the following should the Linux administrator configure so the requested packages can be installed?A . /etc/yum.confB . /etc/ssh/sshd.confC . /etc/yum.repos.d/db.repoD . /etc/resolv.confView AnswerAnswer: C Explanation: The Linux administrator should configure /etc/yum.repos.d/db.repo so that...
Which of the following will execute the command?
A systems administrator is checking the system logs. The administrator wants to look at the last 20 lines of a log. Which of the following will execute the command?A . tail -v 20B . tail -n 20C . tail -c 20D . tail -l 20View AnswerAnswer: B Explanation: The command...
In which of the following locations should the administrator place the public keys for the server?
A systems administrator is tasked with setting up key-based SSH authentication. In which of the following locations should the administrator place the public keys for the server?A . ~/.sshd/authkeysB . ~/.ssh/keysC . ~/.ssh/authorized_keysD . ~/.ssh/keyauthView AnswerAnswer: C Explanation: The administrator should place the public keys for the server in the...
To which of the following configuration files will the required changes need to be made?
Based on an organization’s new cybersecurity policies, an administrator has been instructed to ensure that, by default, all new users and groups that are created fall within the specified values below. To which of the following configuration files will the required changes need to be made?A . /etc/login.defsB . /etc/security/limits.confC...
Which of the following commands will accomplish this task?
After listing the properties of a system account, a systems administrator wants to remove the expiration date of a user account. Which of the following commands will accomplish this task?A . chgrp system accountnameB . passwd Cs accountnameC . chmod -G system account nameD . chage -E -1 accountnameView AnswerAnswer:...
Which of the following commands will allow the users access to the files?
Users in the human resources department are trying to access files in a newly created directory. Which of the following commands will allow the users access to the files?A . chattrB . chgrpC . chageD . chconView AnswerAnswer: B Explanation: The chgrp command is used to change the group ownership...
Which of the following commands will allow the user to upload the public key to a remote server and enable passwordless login?
A user generated a pair of private-public keys on a workstation. Which of the following commands will allow the user to upload the public key to a remote server and enable passwordless login?A . scp ~/.ssh/id_rsa user@server:~/B . rsync ~ /.ssh/ user@server:~/C . ssh-add user serverD . ssh-copy-id user@serverView AnswerAnswer:...
Which of the following commands will extract the files?
A Linux administrator recently downloaded a software package that is currently in a compressed file. Which of the following commands will extract the files?A . unzip -vB . bzip2 -zC . gzipD . funzipView AnswerAnswer: C Explanation: The command gzip can extract files that are compressed with the gzip format,...