In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
Which of the following files should be edited to accomplish this?
Answer : A
Which of the following configuration files should be modified to disable Ctrl+Alt+Del in Linux?
Answer : A
Reference:
https://www.linuxtechi.com/disable-reboot-using-ctrl-alt-del-keys/
Joe, a user, is unable to log in to the server and contracts the systems administrator to look into the issue. The administrator examines the /etc/passwd file and discovers the following entry: joe:x:505:505::/home/joe:/bin/false
Which of the following commands should the administrator execute to resolve the problem?
Answer : A
A server is almost out of free memory and is becoming unresponsive. Which of the following sets of commands will BEST mitigate the issue?
Answer : D
A Linux administrator is using a public cloud provider to host servers for a companyג€™s website. Using the providerג€™s tools, the administrator wrote a JSON file to define how to deploy the servers. Which of the following techniques did the administrator use?
Answer : B
Reference:
https://cloud.google.com/cloud-build/docs/build-config
A Linux system is running normally when the systems administrator receives an alert that one application spawned many processes. The application is consuming a lot of memory, and it will soon cause the machine to become unresponsive. Which of the following commands will stop each application process?
Answer : B
Reference:
https://www.tecmint.com/how-to-kill-a-process-in-linux/
A systems administrator configured a new kernel module, but it stopped working after reboot. Which of the following will allow the systems administrator to check for module problems during server startup?
Answer : C
Reference:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/sec-displaying_information_about_a_module
A junior Linux administrator is installing patches using YUM. The administrator issues the following command: yum list installed
The output of the command is as follows:
Answer : C
Reference:
https://www.thegeekdiary.com/yum-command-fails-with-another-app-is-currently-holding-the-yum-lock-in-centos-rhel-7/
A systems administrator needs to retrieve specific fields from a CSV file. Which of the following tools would accomplish this task?
Answer : A
Reference:
https://stackoverflow.com/questions/19602181/how-to-extract-one-column-of-a-csv-file
Two specific users need access to a directory owned by root where backups are located. Which of the following commands would BEST ensure the specified users can access the backup files?
Answer : D
Which of the following is the purpose of the monitoring server role?
Answer : B
A junior administrator is migrating a virtual machine from a Type 1 hypervisor to a Type 2 hypervisor. To ensure portability, which of the following formats should the administrator export from the Type 1 hypervisor to ensure compatibility?
Answer : D
Reference:
https://docs.vmware.com/en/VMware-Fusion/11/com.vmware.fusion.using.doc/GUID-16E390B1-829D-4289-8442-270A474C106A.html
A junior systems administrator is upgrading a package that was installed on a Red Hat-based system. The administrator is tasked with the following:
✑ Update and install the new package.
✑ Verify the new package version is installed.
Which of the following should be done to BEST accomplish these task? (Choose two.)
Answer : AD
Reference:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/deployment_guide/ch-yum
Which of the following is the template for the grub.cfg file?
Answer : A
Reference:
https://geek-university.com/linux/grub-version-2/
A Linux administrator implemented a new HTTP server using the default configuration. None of the users on the network can access the server. If there is no problem on the network or with the usersג€™ workstations, which of the following steps will BEST analyze and resolve the issue?
Answer : C
Reference:
https://www.varonis.com/blog/netcat-commands/