لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Employees in the finance department are having trouble accessing the file /opt/work/file. All IT employees can read and write the file. Systems administrator reviews the following output: Which of the following commands would permanently fix the access issue while limiting access to IT and finance department employees?
A. chattr +i file
B. chown it:finance file
C. chmod 666 file
D. setfacl -m g:finance:rw file
عرض الإجابة
اجابة صحيحة: C
السؤال #2
An administrator transferred a key for SSH authentication to a home directory on a remote server. The key file was moved to .ssh/authorized_keys location in order to establish SSH connection without a password. However, the SSH command still asked for the password. Given the following output: Which of the following commands would resolve the issue?
A. restorecon
B. ssh_keygen -t rsa -o
C. chown root:root
D. chmod 600
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which of the following technologies provides load balancing, encryption, and observability in containerized environments?
A. Virtual private network
B. Sidecar pod
C. Overlay network
D. Service mesh
عرض الإجابة
اجابة صحيحة: A
السؤال #4
After installing a new version of a package, a systems administrator notices a new version of the corresponding, service file was Installed In order to use the new version of the, service file, which of the following commands must be Issued FIRST?
A. systemctl status
B. systemctl stop
C. systemctl reinstall
D. systemctl daemon-reload
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A Linux administrator rebooted a server. Users then reported some of their files were missing. After doing some troubleshooting, the administrator found one of the filesystems was missing. The filesystem was not listed in /etc/f stab and might have been mounted manually by someone prior to reboot. Which of the following would prevent this issue from reoccurring in the future?
A. Sync the mount units
B. Mount the filesystem manually
C. Create a mount unit and enable it to be started at boot
D. Remount all the missing filesystems
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A cloud engineer needs to launch a container named web-01 in background mode. Which of the following commands will accomplish this task''
A. docker builder -f —name web-01 httpd
B. docker load --name web-01 httpd
C. docker ps -a --name web-01 httpd
D. docker run -d --name web-01 httpd
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A systems administrator needs to verify whether the built container has the app.go file in its root directory. Which of the following can the administrator use to verify the root directory has this file?
A. docker image inspect
B. docker container inspect
C. docker exec ls
D. docker ps
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A Linux administrator needs to ensure that Java 7 and Java 8 are both locally available for developers to use when deploying containers. Currently only Java 8 is available. Which of the following commands should the administrator run to ensure both versions are available?
A. docker image load java:7
B. docker image pull java:7
C. docker image import java:7
D. docker image build java:7
عرض الإجابة
اجابة صحيحة: A
السؤال #9
A Linux administrator is installing a web server and needs to check whether web traffic has already been allowed through the firewall. Which of the following commands should the administrator use to accomplish this task?
A. firewalld query-service-http
B. firewall-cmd --check-service http
C. firewall-cmd --query-service http
D. firewalld --check-service http
عرض الإجابة
اجابة صحيحة: C
السؤال #10
After listing the properties of a system account, a systems administrator wants to remove the expiration date of a user account. Which of the following commands will accomplish this task?
A. chgrp system accountname
B. passwd –s accountname
C. chmod -G system account name
D. chage -E -1 accountname
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A systems administrator is tasked with creating a cloud-based server with a public IP address. Which of the following technologies did the systems administrator use to complete this task?
A. Puppet
B. Git
C. Ansible
D. Terraform
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A developer reported an incident involving the application configuration file /etc/httpd/conf/httpd.conf that is missing from the server. Which of the following identifies the RPM package that installed the configuration file?
A. rpm -qf /etc/httpd/conf/httpd
B. rpm -ql /etc/httpd/conf/httpd
C. rpm —query /etc/httpd/conf/httpd
D. rpm -q /etc/httpd/conf/httpd
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Joe, a user, is unable to log in to the Linux system. Given the following output: Which of the following commands would resolve the issue?
A. usermod -s /bin/bash joe
B. pam_tally2 -u joe -r
C. passwd -u joe
D. chage -E 90 joe
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A database administrator requested the installation of a custom database on one of the servers. Which of the following should the Linux administrator configure so the requested packages can be installed?
A. /etc/yum
B. /etc/ssh/sshd
C. /etc/yum
D. /etc/resolv
عرض الإجابة
اجابة صحيحة: B
السؤال #15
To harden one of the servers, an administrator needs to remove the possibility of remote administrative login via the SSH service. Which of the following should the administrator do?
A. Add the line DenyUsers root to the /etc/hosts
B. Set PermitRootLogin to no in the /etc/ssh/sshd_config file
C. Add the line account required pam_nologi
D. so to the /etc/pam
E. Set PubKeyAuthentication to no in the /etc/ssh/ssh_config file
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A systems administrator frequently connects to a remote host via SSH and a non-standard port. The systems administrator would like to avoid passing the port parameter on the command line every time. Which of the following files can be used to set a different port value for that host?
A. /etc/ssh/sshd_config
B. /etc/ssh/moduli
C. ~/
D. ~/
عرض الإجابة
اجابة صحيحة: D
السؤال #17
A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following commands will allow the technician to execute those services and continue deploying other microservices within the same terminal section?
A. gedit & disown
B. kill 9 %1
C. fg %1
D. bg %1 job name
عرض الإجابة
اجابة صحيحة: B
السؤال #18
A Linux administrator wants to set the SUID of a file named dev_team.text with 744 access rights. Which of the following commands will achieve this goal?
A. chmod 4744 dev_team
B. chmod 744 --setuid dev_team
C. chmod -c 744 dev_team
D. chmod -v 4744 --suid dev_team
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which of the following directories is the mount point in a UEFI system?
A. /sys/efi
B. /boot/efi
C. /efi
D. /etc/efi
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A cloud engineer is asked to copy the file deployment.yaml from a container to the host where the container is running. Which of the following commands can accomplish this task?
A. docker cp container_id/deployment
B. docker cp container_id:/deployment
C. docker cp deployment
D. docker cp container_id/deployment
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A Linux administrator needs to create a new cloud.cpio archive containing all the files from the current directory. Which of the following commands can help to accomplish this task?
A. ls | cpio -iv > cloud
B. ls | cpio -iv < cloud
C. ls | cpio -ov > cloud
D. ls cpio -ov < cloud
عرض الإجابة
اجابة صحيحة: C
السؤال #22
What is the main objective when using Application Control?
A. To filter out specific content
B. To assist the firewall blade with handling traffic
C. To see what users are doing
D. Ensure security and privacy of information
عرض الإجابة
اجابة صحيحة: A
السؤال #23
A systems administrator configured firewall rules using firewalld. However, after the system is rebooted, the firewall rules are not present: The systems administrator makes additional checks: Which of the following is the reason the firewall rules are not active?
A. iptables is conflicting with firewalld
B. The wrong system target is activated
C. FIREWALL_ARGS has no value assigned
D. The firewalld service is not enabled
عرض الإجابة
اجابة صحيحة: C
السؤال #24
When trying to log in remotely to a server, a user receives the following message: The server administrator is investigating the issue on the server and receives the following outputs: Which of the following is causing the issue?
A. The wrong permissions are on the user’s home directory
B. The account was locked out due to three failed logins
C. The user entered the wrong password
D. The user has the wrong shell assigned to the account
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: