Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESESol-102

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Sol-102

Descripción:
preguntas último exámen

Autor:
juananpc
(Otros tests del mismo autor)

Fecha de Creación:
28/01/2020

Categoría:
Informática

Número preguntas: 59
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Given the following excerpt of the sudo configuration: jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk Which of the following statements are true? (Choose three.) Jane can run /bin/id only after specifying her password. Jane can run /sbin/fdisk after specifying root's password. Jane can run /sbin/fdisk after specifying her password. Jane can run /bin/kill without specifying a password. Jane can run /bin/id without specifying her password.
Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.).
Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/maillog and sends all critical events to the remote server logger.example.com? mail.*/var/log/maillogmail,crit@logger.example.org mail.*/var/log/maillogmail.critsyslog://logger.example.org mail/var/log/maillogmail.crit@logger.example.org mail.*/var/log/maillogmail.crit@logger.example.org mail */var/log/maillogmail crit@logger.example.org.
What is true about the file /etc/localtime? It is a plain text file containing a string such as Europe/Berlin It is created and maintained by the NTP service based on the location of the system's IP address. It is a symlink to /sys/device/clock/ltime and always contains the current local time. After changing this file, newtzconfig has to be run to make the changes effective. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.
Which of the following commands configure network interfaces based on the system's existing distribution-specific configuration files? (Choose two.) ifconf ifdown ifpause ifstart ifup.
Which command allows you to make a shell variable visible to subshells? export $VARIABLE export VARIABLE set $VARIABLE set VARIABLE env VARIABLE.
What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the directory.).
Which of the following statements is true regarding systemd timer units? Timer units can only be defined within a service unit's file. The command executed by the timer is specified in the timer unit's [Cmd] section. A dedicated system service, systemd-cron, handles the execution of timer units. Timer units only exist in the system scope and are not available for users. Each systemd timer unit controls a specific systemd service unit.
Which of the following protocols is related to the term open relay? SMTP POP3 NTP IMAP LDAP.
Which of the following commands shows all active systemd timers? systemctl-timer show timectl list systemctl -t systemctl list-timers timeq.
What output will the command seq 10 produce? A continuous stream of numbers increasing in increments of 10 until stopped. The numbers 1 through 10 with one number per line. The numbers 0 through 9 with one number per line. The number 10 to standard output.
Which of the following comparison operators for test work on elements in the file system? (Choose two.) -z -eq -d -f -lt.
Which of the following tasks can the date command accomplish? (Choose two.) Set the system's date and time. Set the system's date but not the time. Calculate the time span between two dates. Print a calendar for a month or a year. Display time in a specific format.
What is a purpose of an SSH host key? It must be sent by any SSH client in addition to a user key in order to identify the client's host. It provides the server's identity information to connecting SSH clients. It is the root key by which all user SSH keys must be signed. It authenticates any user that logs into a remote machine from the key's host. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Which of the following commands lists all queued print jobs? lpd lpr lp lsq lpq.
A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file).
With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.).
Which of the following commands can identify the PID od a process which opened a TCP port? ptrace strace debug lsof nessus.
The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.).
What output is produced by the following command sequence? echo '1 2 3 4 5 6' | while read a b c; do echo result $c $b $a; done result: 6 5 4 result: 1 2 3 4 5 6 result: 3 4 5 6 2 1 result: 6 5 4 3 2 1 result: 3 2 1.
Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH? ssh-add ssh-agent ssh-keygen sshd.
Which of the following files assigns a user to its primary group? /etc/pgroup /etc/shadow /etc/group /etc/passwd /etc/gshadow.
Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization? iburst quickstart fast fsync flood.
Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.).
After issuing: function myfunction { echo $1 $2 ; } in Bash, which output does: myfunction A B C Produce? A B A B C A C B C C B A.
Which of the following statements about sytemd-journald are true? (Choose three.) It is incompatible with syslog and cannot be installed on a system using regular syslog. It only processes messages of systemd and not messages of any other tools. It can pass log messages to syslog for further processing. It maintains metadata such as _UID or _PID for each message. It supports syslog facilities such as kern, user, and auth.
Which of the following commands can be used to limit the amount of memory a user may use? umask usermod ulimit passwd chage.
What is the purpose of a screen reader? It reads text displayed on the screen to blind or visually impaired people. It reads the parameters of the attached monitors and creates an appropriate X11 configuration. It displays lines and markers to help people use speed reading techniques. It manages and displays files that contain e-books.
Which of the following commands is used to rotate, compress, and mail system logs? rotatelog striplog syslogd --rotate logrotate logger.
Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)? export LANGUAGE="pt" export LC_MESSAGES="pt" export UI_MESSAGES="pt" export MESSAGE="pt" export ALL_MESSAGES="pt".
On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem? date -d '+ 1 day' hwclock --systohc --localtime ntpdate pool.ntp.org time hwclock.
Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.).
Which of the following steps prevents a user from obtaining an interactive login session? Run the command chsh -s /bin/false with the user name. Set the UID for the user to 0. Remove the user from the group staff. Add the user to /etc/noaccess. Create a .nologin file in the user's home directory.
What is the purpose of the iconv command? It converts bitmap images from one format to another such as PNG to JPEG. It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS). It displays additional meta information from icon files ending in .ico. It changes the mode of an inode in the ext4 file system. It converts files from one character encoding to another.
When the command echo $$ outputs 12942, what is the meaning of 12942? It is the process ID of the echo command. It is the process ID of the current shell. It is the process ID of the last command executed. It is the process ID of the last command which has been placed in the background.
When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this? debug lsof nessus strace traceroute.
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.) 127.0.0.0/8 10.0.0.0/8 169.255.0.0/16 172.16.0.0/12 192.168.0.0/16.
Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.) Year Minute Username Effective group ID Command.
Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.).
Which of the following features are provided by SPICE? (Choose two.) Connecting local USB devices to remote applications. Accessing graphical applications on a remote host. Replacing Xorg as local X11 server. Downloading and locally installing applications from a remote machine. Uploading and running a binary program on a remote machine.
Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query? dnsq dig hostname dnslookup zoneinfo.
What command displays all aliases defined in the current shell? (Specify the command without any path information).
Which of the following statements is true if the UID of a regular user is identical to the GID of a group? UID have precedence over GIDs, therefore the user is available while the group doesn't. The user as well as the group are not available to avoid ambiguity due to the ID conflict. UIDs and GIDs are independent of each other, therefore the user as well as the group are still available. The user is the only member of the group, even if the group configuration contains other members. GIDs have precedence over UIDs, therefore the group is available while the user isn't.
Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.).
Which configuration file would be edited to change the default options for outbound SSH sessions? /etc/ssh/sshd_config /etc/ssh/ssh /etc/ssh/client /etc/ssh/ssh_config /etc/ssh/ssh_client.
How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26? 6 14 30 62 126.
Which of the following is a valid IPv6 address? 2001:db8:3241::1 2001::db8:4581::1 2001:db8:0g41::1 2001%db8%9990%%1 2001.db8.819f..1.
Which of the following commands displays all environment and shell variables? getargs lsenv ls env lsshell.
Which of the following changes may occur as a consequence of using the command ip? (Choose three.) Network interfaces may become active or inactive. New name servers may be added to the resolver configuration. The system's host name may change. IP addresses may change. The routing table may change.
Which of the following statements is valid in the file /etc/nsswitch.conf? multi on 192.168.168.4 dns-server hosts: files dns include /etc/nsswitch.d/.
After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.).
The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section? It is placed in curly brackets as in Section SectionName { ... }. It is placed between a line containing Section "SectionName" and a line containing EndSection. It is placed between the tags <Section name="SectionName"> and </Section> It is placed after the row [SectionName]. It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.
On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate? The local routing information may be corrupted and must be re-validated using a routing protocol. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.
Why is the correct configuration of a system's time zone important? Because the conversion of Unix timestamps to local time relies on the time zone configuration. Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone. Because NTP chooses servers nearby based on the configured time zone.
Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.).
Which of the following configuration files should be modified to set default shell variables for all users? /etc/bashrc /etc/profile ~/.bash_profile /etc/.bashrc.
What can be specified with useradd? (Choose two.) Commands the user can run using sudo. The absolute path to the user's home directory. Which printers are available for the new user. The SSH keys used to login to the new account. The numeric user ID (UID) of the user.
Which of the following connection types, as seen in nmcli connection show, may exist in NetworkManager? (Choose three.) tcp ethernet wifi ipv6 bridge.
On a machine running several X servers, how do programs identify the different instances of the X11 server? By a fixed UUID that is defined in the X11 configuration file. By a display name like: 1. By the name of the user that runs the X server like x11:bob. By a device name like /dev/X11/xservers/1. By a unique IPv6 address from the fe80::/64 subnet.
Denunciar test Consentimiento Condiciones de uso