What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B. It provides the server's identity information to connecting SSH clients.
C. It is the root key by which all user SSH keys must be signed.
D. It authenticates any user that logs into a remote machine from the key's host.
E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Which command is used in a Linux environment to create a new directory? (Specify ONLY the command without any path or parameters.)
A. mkdir, /usr/bin/mkdir
Which commands can be used to change a user's account aging information? (Choose THREE correct answers.)
A. usermod
B. passwd
C. chattr
D. chage
E. chsh
What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)
A. route del default
B. ifconfig unset default
C. netstat -r default
D. ip route del default
E. sysctl ipv4.default_gw=0
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?
A. core
B. edquota
C. ulimit
D. quota
After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)
A. newaliases, sendmail -bi
What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)
A. Entries for all possible devices get created on boot even if those devicesare not connected.
B. Additional rules for udev can be created by adding them to /etc/udev/rules.d/.
C. When using udev, it is not possible to create block or character devices in /dev/ using mknod.
D. The /dev/ directory is a filesystem of type tmpfs andis mounted by udev during system startup.
E. The content of /dev/ is stored in /etc/udev/dev and is restored during system startup.
What output will the following command sequence produce?
echo '1 2 3 4 5 6' | while read a b c; do
echo result: $c $b $a;
done
A. result: 3 4 5 6 2 1
B. result: 1 2 3 4 5 6
C. result: 6 5 4
D. result: 6 5 4 3 2 1
E. result: 3 2 1
What is the purpose of the nsswitch.conf file?
A. It is used to configure where the C library looks for system information such as host names and user passwords.
B. It is used to configure network protocol port numbers such as for HTTP or SMTP.
C. It is used to configure LDAP authentication services for the local system.
D. It is used to configure which network services will be turned on during the next system boot.
What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)
A. To create RAID 9 arrays.
B. To dynamically change the size of logical volumes.
C. To encrypt logical volumes.
D. To create snapshots.
E. To dynamically create or delete logical volumes.