لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Joe, a user, is unable to log in to the Linux system. Given the following output: Which of the following commands would resolve the issue? The commandpam_tally2 -u joe -rwill resolve the issue of Joe being unable to log in to the Linux system. Thepam_tally2command is a tool for managing the login counter for the PAM (Pluggable Authentication Modules) system. PAM is a framework for managing authentication and authorization on Linux systems. PAM allows the administrator to define the rules and policies for a
A. sermod -s /bin/bash joe
B. am_tally2 -u joe -r
C. asswd -u joe
D. hage -E 90 joe
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A cloud engineer needs to launch a container named web-01 in background mode. Which of the following commands will accomplish this task?
A. docker builder -f --name web-01 httpd
B. docker load --name web-01 httpd
C. docker ps -a --name web-01 httpd
D. docker run -d --name web-01 httpd
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A systems administrator is tasked with preventing logins from accounts other than root, while the file /etc/nologin exists. Which of the following PAM modules will accomplish this task?
A. pam_login
B. pam_access
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A Linux administrator was asked to run a container with the httpd server inside. This containershould be exposed at port 443 of a Linux host machine while it internally listens on port 8443. Whichof the following commands will accomplish this task?
A. podman run -d -p 443:8443 httpd
B. podman run -d -p 8443:443 httpd C
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A Linux administrator has physically added a new RAID adapter to a system. Which of the following commands should the Linux administrator run to confirm that the device has been recognized? (Select TWO). The following commands can help you confirm that the new RAID adapter has been recognized by the Linux system: dmesg: This command displays the kernel messages, which can show the information about the newly detected hardware device. You can usedmesg | grep -i raidto filter the output for RAID-related messa
A. mmod
B. s -11 /etc
C. shw ---class disk
D. vdisplay
E. mdir /dev
F. mesg
عرض الإجابة
اجابة صحيحة: CF
السؤال #6
A cloud engineer needs to change the secure remote login port from 22 to 49000. Which of the following files should the engineer modify to change the port number to the desired value?
A. /etc/host
B. /etc/hostname C
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A new file was added to a main Git repository. An administrator wants to synchronize a local copy with the contents of the main repository. Which of the following commands should the administrator use for this task?
A. git reflog
B. git pull C
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A systems administrator is checking the system logs. The administrator wants to look at the last 20 lines of a log. Which of the following will execute the command? A.tail -v 20
B. tail -n 20 C
عرض الإجابة
اجابة صحيحة: B
السؤال #9
A Linux administrator is tasked with creating resources using containerization. When deciding how to create this type of deployment, the administrator identifies some key features, including portability, high availability, and scalability in production. Which of the following should the Linux administrator choose for the new design?
A. Docker
B. On-premises systems
C. Cloud-based systems
D. Kubernetes
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Several users reported that they were unable to write data to the /oracle1 directory. The following output has been provided: Which of the following commands should the administrator use to diagnose the issue?
A. df -i /oracle1
B. fdisk -1 /dev/sdb1 C
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A systems administrator is compiling a report containing information about processes that are listening on the network ports of a Linux server. Which of the following commands will allow the administrator to obtain the needed information?
A. ss -plnt
B. tcpdump -nL
C. netstat -pn
D. lsof -lt
عرض الإجابة
اجابة صحيحة: C
السؤال #12
The security team has identified a web service that is running with elevated privileges A Linux administrator is working to change the systemd service file to meet security compliance standards. Given the following output: Which of the following remediation steps will prevent the web service from running as a privileged user?
A. Removing the ExecStarWusr/sbin/webserver -D SOPTIONS from the service file
B. Updating the Environment File line in the [Service] section to/home/webservice/config
C. Adding the User-webservice to the [Service] section of the service file
D. Changing the:nulti-user
عرض الإجابة
اجابة صحيحة: A
السؤال #13
An administrator attempts to rename a file on a server but receives the following error. The administrator then runs a few commands and obtains the following output: Which of the following commands should the administrator run NEXT to allow the file to be renamed by any user?
A. chgrp reet files
B. chacl -R 644 files C
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which of the following files holds the system configuration for journal when running systemd?
A. /etc/systemd/journald
B. /etc/systemd/systemd-journalctl
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?
A. systemctl stop sshd
B. systemctl mask sshd
C. systemctl reload sshd
D. systemctl start sshd
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which of the following commands will display the operating system?
A. uname -n
B. uname -s C
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A Linux administrator needs to analyze a failing application that is running inside a container. Which of the following commands allows the Linux administrator to enter the running container and analyze the logs that are stored inside?
A. docker run -ti app /bin/sh
B. podman exec -ti app /bin/sh C
عرض الإجابة
اجابة صحيحة: B
السؤال #18
At what point is the Internal Certificate Authority (ICA) created?
A. During the primary Security Management Server installation process
B. Upon creation of a certificate
C. When an administrator decides to create one
D. When an administrator initially logs into SmartConsole
عرض الإجابة
اجابة صحيحة: A
السؤال #19
An administrator needs to make some changes in the IaC declaration templates. Which of the following commands would maintain version control?
A. git clone https://github
B. git clone https://qithub
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A systems administrator needs to clone the partition /dev/sdc1 to /dev/sdd1. Which of the following commands will accomplish this task?
A. tar -cvzf /dev/sdd1 /dev/sdc1
B. rsync /dev/sdc1 /dev/sdd1 C
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A systems administrator is troubleshooting a connectivity issue pertaining to access to a system named db.example.com. The system IP address should be 192.168.20.88. The administrator issues the dig command and receives the following output:The administrator runs grep db.example.com /etc/hosts and receives the following output:Given this scenario, which of the following should the administrator do to address this issue?
A. Modify the /etc/hosts file and change the db
B. Modify the /etc/network file and change the db
C. Modify the /etc/network file and change the db
D. Modify the /etc/hosts file and change the db
عرض الإجابة
اجابة صحيحة: A
السؤال #22
A Linux administrator is troubleshooting an issue in which an application service failed to start on a Linux server. The administrator runs a few commands and gets the following outputs: Based on the above outputs, which of the following is the MOST likely action the administrator should take to resolve this issue?
A. Enable the logsearch
B. Increase the TimeoutStartUSec configuration for the logsearch
عرض الإجابة
اجابة صحيحة: B
السؤال #23
A user is attempting to log in to a Linux server that has Kerberos SSO enabled. Which of the following commands should the user run to authenticate and then show the ticket grants? (Select TWO). The following commands can help the user to authenticate and show the ticket grants using Kerberos SSO on a Linux server: kinit: This command obtains and caches an initial ticket-granting ticket (TGT) for the user from the Kerberos key distribution center (KDC).The user needs to enter their password or use a keytab file to authenticate1. klist: This command lists the cached tickets, including the TGT and any service tickets, for the user.It also shows the expiration time and flags for each ticket2. For example, the user can run the following commands to log in and view their tickets: $ kinit username@REALM Password for username@REALM: $ klist Ticket cache: FILE:/tmp/krb5cc_1000 Default principal: username@REALM Valid starting Expires Service principal 04/06/2023 16:06:59 04/07/2023 02:06:59 krbtgt/REALM@REALM renew until 04/13/2023 16:06:59 kinit(1) - Linux man page, section ''Description''. klist(1) - Linux man page, section ''Description''.
A. init
B. list
C. exec
D. ioad
E. kexec
F. ealm
عرض الإجابة
اجابة صحيحة: AB
السؤال #24
A systems administrator has been tasked with disabling the nginx service from the environment to prevent it from being automatically and manually started. Which of the following commands will accomplish this task?
A. systemctl cancel nginx
B. systemctl disable nginx C
عرض الإجابة
اجابة صحيحة: C
السؤال #25
A systems administrator configured firewall rules using firewalld. However, after the system is rebooted, the firewall rules are not present:The systems administrator makes additional checks:Which of the following is the reason the firewall rules are not active?
A. iptables is conflicting with firewalld
B. The wrong system target is activated
C. FIREWALL_ARGS has no value assigned
D. The firewalld service is not enabled
عرض الإجابة
اجابة صحيحة: D
السؤال #26
After installing some RPM packages, a systems administrator discovers the last package that was installed was not needed. Which of the following commands can be used to remove the package?
A. dnf remove packagename
B. apt-get remove packagename C
عرض الإجابة
اجابة صحيحة: A
السؤال #27
An administrator is provisioning an Apache web server. When the administrator visits the server website, the browser displays a message indicating the website cannot be reached. Which of the following commands should the administrator use to verify whether the service Is running? systemctl status httpd is the correct option to check if the Apache web server (httpd) is running. The systemctl status command provides detailed information about the service, including whether it is active and running.
A. ystemctl status httpd
B. ystemctl mask httpd
C. ystemctl reload httpd
D. ystemctl restart httpd
عرض الإجابة
اجابة صحيحة: A
السؤال #28
A systems administrator is deploying three identical, cloud-based servers. The administrator is using the following code to complete the task: Which of the following technologies is the administrator using? A.Ansible
B. Puppet C
عرض الإجابة
اجابة صحيحة: D
السؤال #29
When trying to log in remotely to a server, a user receives the following message: The server administrator is investigating the issue on the server and receives the following outputs: Which of the following is causing the issue?
A. The wrong permissions are on the user’s home directory
B. The account was locked out due to three failed logins
عرض الإجابة
اجابة صحيحة: D
السؤال #30
A systems administrator wants to back up the directory /data and all its contents to /backup/data on a remote server named remote. Which of the following commands will achieve the desired effect?
A. scp -p /data remote:/backup/data B
عرض الإجابة
اجابة صحيحة: C
السؤال #31
An administrator accidentally deleted the /boot/vmlinuz file and must resolve the issue before the server is rebooted. Which of the following commands should the administrator use to identify the correct version of this file?
A. rpm -qa | grep kernel; uname -a
B. yum -y update; shutdown -r now C
عرض الإجابة
اجابة صحيحة: A
السؤال #32
The journald entries have filled a Linux machine's /var volume. Which of the following is the best command for a systems administrator to use to free up the disk space occupied by these entries? systemctl stop systemd-journald systemctl start systemd-journald is the best approach among the given options. Stopping and starting the systemd-journald service can help in managing the disk space used by journal logs without manually deleting log files or using more aggressive cleanup methods. This method ensures
A. ournalctl ---rotatejournalctl --vacuum-time=ls
B. ystemctl stop systemd-journald systemctl start systemd-journald
C. m -rf /var/log/journal systemctl restart systemd-journald
D. kill -HUP systemd-journald systemctl restart systemd-journald
عرض الإجابة
اجابة صحيحة: B
السؤال #33
A systems administrator is troubleshooting connectivity issues and trying to find out why a Linux server is not able to reach other servers on the same subnet it is connected to. When listing link parameters, the following is presented: Based on the output above, which of following is the MOST probable cause of the issue?
A. The address ac:00:11:22:33:cd is not a valid Ethernet address
B. The Ethernet broadcast address should be ac:00:11:22:33:ff instead
عرض الإجابة
اجابة صحيحة: D
السؤال #34
A Linux administrator is tasked with creating resources using containerization. When deciding how to create this type of deployment, the administrator identifies some key features, including portability, high availability, and scalability in production. Which of the following should the Linux administrator choose for the new design? A.Docker
B. On-premises systems C
عرض الإجابة
اجابة صحيحة: D
السؤال #35
A systems administrator created a web server for the company and is required to add a tag for the API so end users can connect. Which of the following would the administrator do to complete this requirement?
A. hostnamectl status --no-ask-password
B. hostnamectl set-hostname "$(perl -le "print" "A" x 86)" C
عرض الإجابة
اجابة صحيحة: C
السؤال #36
A Linux administrator is troubleshooting SSH connection issues from one of the workstations. When users attempt to log in from the workstation to a server with the IP address 104.21.75.76, they receive the following message: The administrator reviews the information below: Which of the following is causing the connectivity issue?
A. The workstation has the wrong IP settings
B. The sshd service is disabled
عرض الإجابة
اجابة صحيحة: B
السؤال #37
In order to copy data from another VLAN, a systems administrator wants to temporarily assign IP address 10.0.6.5/24 to the newly added network interface enpls0f1. Which of the following commands should the administrator run to achieve the goal?
A. ip addr add 10
B. echo "IPV4_ADDRESS=10
C. ifconfig 10
D. nmcli conn add ipv4
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: