To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Some new sample questions:
Question:
A systems administrator is working on an SFTP server configuration. Which of the following commands will best enable the connectivity to that service from the 10.10.0.0/24 network?
A. sudo ufw allow from 10.10.0.0/24 to any port 22
B. sudo ufw allow in on eth0 to any port 22
C. sudo ufw allow from 10.10.0.0/24
D. sudo ufw allow 0:22/tcp from 10.10.0.0
Question:
A hardened physical Linux system allows regular, unprivileged users to remotely connect to the server using SSH only. No sudo tool has been installed. Which of the following should the Linux administrator use to perform administrative tasks on this host? (Select two).
A. Create an SSH key and copy it to the remote server to allow passwordless log-in.
B. Access the server’s physical console and use the root user’s password to log in.
C. Install the telnet server on this system to be able to use a root account.
D. Use the su command and enter the root user’s password.
E. Install the sudo command using the unprivileged user’s account.
F. Add the user to the wheel group.
Question:
An administrator needs to stop a foreground process in between its execution in a terminal. Which of the following should the administrator use?
A. Ctrl+D
B. Ctrl+F
C. Ctrl+Z
D. Ctrl+C
……..
Some new sample questions:
Question:
A DevOps engineer wants to work on a snapshot of the infrastructure as code configuration. Which of the following commands should the engineer use to accomplish this task?
A. git pull
B. git push
C. git branch
D. git tag
Question:
Users report that they cannot access some files located in the /opt/finapp directory after a power outage caused an unexpected server restart. A Linux administrator examines the following filesystem details and system logs:
# mount | grep finapp
/dev/mapper/rhel-opt_finapp on /opt/finapp type xfs (rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota)
# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
sda 8:0 0 931.5G 0 disk
sda1 8:1 0 1G 0 part /boot
sda2 8:2 0 930.5G 0 part
rhel-root 253:0 0 30.5G 0 lvm /
rhel-opt_finapp 253:1 0 900G 0 lvm /opt/finapp
# grep opt_finapp /var/log/messages
XFS (opt_finapp): Corruption detected in inode 3645, extent tree
Which of the following commands should the administrator run in an attempt to fix the filesystem?
A. fdisk /dev/mapper/rhel-opt_finapp
B. xfs_repair /dev/mapper/rhel-opt_finapp
C. lvcreate -L900G -n opt_finapp rhel
D. fsck.ext4 /dev/mapper/rhel-opt_finapp
Question:
The journald entries have filled a Linux machine’s /var volume. Which of the following is the best command for a systems administrator to use to free up the disk space occupied by these entries?
A. journalctl –rotate journalctl –vacuum-time=1s
B. systemctl stop systemd-journald systemctl start systemd-journald
C. rm -rf /var/log/journal systemctl restart systemd-journald
D. pkill -HUP systemd-journald systemctl restart systemd-journald
Question:
A Linux systems administrator needs to add additional code to code that resides within a repository without changing the original code. Once completed, the additional code will be merged into the main branch. Which of the following commands should the administrator use first?
A. git push
B. git rebase
C. git tag
D. git clone
………..
Some new questions:
Q
A security team discovers that a web server has been running with elevated privileges and identifies it as a security violation. Which of the following items needs to be added to the webserver.service file to remediate the issue?
A. In the [Service] section of the webserver.service file, add User=comptia.
B. In the [Unit] section of the webserver.service file, add AllowIsolate=true.
C. In the [Install] section of the webserver.service file, add WantedBy=single.target.
D. Add After=network.target to the [Install] section of the webserver.service file.
Q
A systems administrator is tasked with configuring a repository on an RPM-based Linux system. Which of the following need to be reviewed and modified? (Select two).
A. /etc/yum.conf
B. /etc/apt/sources.list.d
C. /etc/pam.d
D. /etc/apt.conf
E. /etc/yum.repos.d
F. /etc/ssh/ssh_config
Q
A Linux administrator created a virtual clone of a physical server and would like to remove any existing entries related to SSH keys from outside entities on the virtual clone. Which of the following files should the administrator remove? (Select two).
A. ~/.ssh/authorized_keys
B. ~/.ssh/known_hosts
C. /etc/ssh/ssh_config
D. ~/.ssh/config
E. /etc/ssh/sshd_config
F. /etc/ssh/ssh_host_rsa_key.pub
Q
A Linux systems administrator is trying to execute a particular shell script on a server. The administrator reviews the following outputs:
shell
$ ./startup.sh
bash: ./startup.sh: Permission denied
$ ls -l startup.sh
-rw-rw-r– 1 companyabc companyabc 18 October 15:35 startup.sh
Which of the following commands should the administrator use to allow the script to run?
A. chown root startup.sh
B. chmod 750 startup.sh
C. chmod -x startup.sh
D. chmod 400 startup.sh
………….