Chapter 4
Linux Troubleshooting and Diagnostics

THE FOLLOWING COMPTIA LINUX+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • images  4.1 Given a scenario, analyze system properties and remediate accordingly
    • Network monitoring and configuration
      • Latency
        • Bandwidth
        • Throughput
      • Routing
      • Saturation
      • Packet drop
      • Timeouts
      • Name resolution
      • Localhostvs. Unix socket
      • Adapters
        • RDMA drivers
      • Interface configurations
      • Commands
        • nmap
        • netstat
        • iftop
        • route
        • iperf
        • tcpdump
        • ipset
      • Wireshark
        • tshark
      • netcat
      • traceroute
      • mtr
      • arp
      • nslookup
      • dig
      • host
      • whois
      • ping
      • nmcli
      • ip
      • tracepath
    • Storage monitoring and configuration
      • iostat
      • ioping
      • I/O scheduling
        • cfq
        • noop
        • deadline
      • du
      • df
      • LVM tools
      • fsck
      • partprobe
    • CPU monitoring and configuration
      • /proc/cpuinfo
      • uptime
      • loadaverage
      • sar
      • sysctl
    • Memory monitoring and configuration
      • swapon
      • swapoff
      • mkswap
      • vmstat
      • Out of memory killer
      • free
      • /proc/meminfo
      • Buffer cache output
    • Lost root password
      • Single user mode
  • images  4.2 Given a scenario, analyze system processes in order to optimize performance
    • Process management
    • Process states
      • Zombie
        • Uninterruptible sleep
        • Interruptible sleep
        • Running
    • Priorities
    • Kill signals
    • Commands
      • nice
      • renice
      • top
      • ps
      • lsof
      • pgrep
      • pkill
    • PIDs
  • images  4.3 Given a scenario, analyze and troubleshoot user issues
    • Permissions
      • File
      • Directory
    • Access
      • Local
      • Remote
    • Authentication
      • Local
      • External
      • Policy violations
    • File creation
      • Quotas
      • Storage
      • Inode exhaustion
      • Immutable files
    • Insufficient privileges for authorization
      • SELinux violations
    • Environment and shell issues
  • images  4.4 Given a scenario, analyze and troubleshoot application and hardware issues
    • SELinux context violations
    • Storage
      • Degraded storage
      • Missing devices
      • Missing volumes
      • Missing mount point
      • Performance issues
      • Resource exhaustion
      • Adapters
        • SCSI
        • RAID
        • SATA
        • HBA
          • /sys/class/scsi_host/host#/scan
      • Storage integrity
        • Bad blocks
    • Firewall
      • Restrictive ACLs
      • Blocked ports
      • Blocked protocols
    • Permission
      • Ownership
      • Executables
      • Inheritance
      • Service accounts
      • Group memberships
    • Dependencies
      • Patching
      • Update issues
      • Versioning
      • Libraries
      • Environment variables
      • GCC compatibility
      • Repositories
    • Troubleshooting additional hardware issues
      • Memory
      • Printers
      • Video
        • GPU drivers
      • Communication ports
      • USB
      • Keyboard mapping
      • Hardware or software compatibility issues
      • Commands
        • dmidecode
        • lshw
  1. You are troubleshooting a storage problem, and a Serial ATA (SATA) disk or mount point may be missing. Which of the following identifiers is used by SATA disks?

    1. /dev/hdX
    2. /dev/sataX
    3. /dev/sdX
    4. /disk/sataX
  2. You are examining a problem report where a USB disk is no longer available. Which command is used to obtain a list of USB devices?

    1. usb-list
    2. lsusb
    3. ls-usb
    4. ls --usb
  3. You have lost the password for a server and need to boot into single user mode. Which option given at boot time within the GRUB configuration will start the system in single user mode to enable password recovery and/or reset?

    1. single-user
    2. su
    3. single
    4. root
  4. Which of the following is a good first troubleshooting step when a hard disk is not detected by the Linux kernel?

    1. Unplug the disk.
    2. Check the system BIOS.
    3. Restart the web server service.
    4. Run the disk-detect command.
  5. The system that you’re working with recently had a hard drive failure, resulting in degraded storage. A new hard drive has been installed and had Linux restored from backup to the drive. However, the system will not boot and instead shows a grub > prompt. Within the grub > prompt, which command will show the current partitions as seen by GRUB?

    1. ls
    2. showPart
    3. partitionlist
    4. ps
  6. A legacy PATA disk is used to boot the system. You recently added an internal DVD drive to the computer, and now the system will no longer boot. What is the most likely cause?

    1. The BIOS has identified the DVD drive as the first disk, and therefore the system can no longer find the Linux partition(s).
    2. The hard drive became corrupt when the DVD drive was installed.
    3. The hot swap option has not been enabled in the BIOS.
    4. The DVD drive is not detected by the computer and needs to be enabled first in the BIOS and then in Linux prior to installation.
  7. You have connected a USB disk to the system and need to find out its connection point within the system. Which of the following is the best method for accomplishing this task?

    1. Rebooting the system
    2. Viewing the contents of /var/log/usb.log
    3. Connecting the drive to a USB port that you know the number of
    4. Running dmesg and looking for the disk
  8. How many SCSI devices are supported per bus?

    1. 7 to 15
    2. 2 to 4
    3. 12
    4. 4
  9. Which command is used to update the links and cache for shared libraries on the system?

    1. ldcache
    2. cache-update
    3. link-update
    4. ldconfig
  10. Which command and option are used to update a Debian system to the latest software?

    1. apt-update
    2. apt-get upgrade
    3. dpkg -U
    4. apt-cache clean
  11. Which option given to a yum command will install a package?

    1. update
    2. configure
    3. install
    4. get
  12. Which of the following commands adds /usr/local/lib to the LD_LIBRARY_PATH when using the bash shell?

    1. set PATH=/usr/local/lib
    2. export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/local/lib
    3. LD_LIBRARY_PATH=/usr/local/lib
    4. connectpath LD_LIBRARY_PATH=/usr/local/lib
  13. Within which directory will you find the repositories used by Yum?

    1. /etc/yum.conf
    2. /etc/repos
    3. /etc/yum.conf.d
    4. /etc/yum.repos.d
  14. Which command is used to determine the libraries on which a given command depends?

    1. ldconfig
    2. librarylist
    3. listdeps
    4. ldd
  15. Which of the following is true of Linux swap space?

    1. Swap is used to hold temporary database tables.
    2. Swap is used as additional memory when there is insufficient RAM.
    3. Swap is used by the mail server for security.
    4. Swap is used to scrub data from the network temporarily.
  16. Which of the following is not typically used to store libraries?

    1. /lib
    2. /etc/lib
    3. /usr/lib
    4. /usr/local/lib
  17. You are attempting to install a new package on a Debian system from a repository. The package does not seem to exist. Which of the following commands updates the package cache for a Debian system?

    1. apt-get cache-update
    2. apt-cache update
    3. apt-get update
    4. apt-get upgrade
  18. Within which file are details of the current package repositories stored on a Debian system?

    1. /etc/apt.list
    2. /etc/sources.list
    3. /etc/apt/sources.list
    4. /etc/apt.d/sources.list
  19. Which of the following commands initializes a physical disk partition for use with LVM?

    1. lvmcreate
    2. pvcreate
    3. fvcreate
    4. lvinit
  20. Which command is used to create a logical volume with LVM?

    1. pvcreate
    2. lvmcreate
    3. lvcreate
    4. volcreate
  21. What is the logical order for creation of an LVM logical volume?

    1. Physical volume creation, volume group creation, logical volume creation
    2. Physical volume creation, logical volume creation, volume group creation
    3. Logical volume creation, physical volume creation, volume group creation
    4. LVM creation, format, partition
  22. Which option for yum performs a search of the package cache?

    1. seek
    2. query
    3. --search
    4. search
  23. Which command option for rpm can be used to show the version of the kernel?

    1. rpm kernel
    2. rpm -q kernel
    3. rpm search kernel
    4. rpm --list kern
  24. Which option in /etc/yum.conf is used to ensure that the kernel is not updated when the system is updated?

    1. exclude=kernel*
    2. exclude-kernel
    3. updatekernel=false
    4. include-except=kernel
  25. Which partition type should be created for a Linux system, non-swap partition?

    1. 82
    2. 83
    3. 84
    4. L
  26. Which command searches for and provides information on a given package on a Debian system, including whether the package is currently installed?

    1. dpkg -i
    2. dpkg -s
    3. apt-cache
    4. apt-info
  27. Which command is used to search for physical volumes for use with LVM?

    1. lvmcreate
    2. pvcreate
    3. lvmdiskscan
    4. lvmscan
  28. Which of the following installs a previously downloaded Debian package?

    1. dpkg -i <package name>
    2. apt-install <package name>
    3. apt-slash <package name>
    4. dpkg -U <package name>
  29. You are troubleshooting an issue reported by a user and suspect it may be related to their environment variables. What command should the user run in order to view the current settings for their environment when using bash?

    1. environment
    2. env
    3. listenv
    4. echoenv
  30. You need to write a script that gathers all the process IDs for all instances of Apache running on the system. Which of the following commands will accomplish this task?

    1. ps auwx | grep apache
    2. pgrep apache
    3. processlist apache
    4. ls -p apache
  31. Users are reporting that various programs are crashing on the server. Examining logs, you see that certain processes are reporting out-of-memory conditions. Which command can you use to see the overall memory usage, including available swap space?

    1. tree
    2. pgrep
    3. uptime
    4. free
  32. Which command can be used to determine the current load average along with information on the amount of time since the last boot of the system?

    1. uptime
    2. sysinfo
    3. bash
    4. ls -u
  33. You need to start a long-running process that requires a terminal and foreground processing. However, you cannot leave your terminal window open due to security restrictions. Which command will enable you to start the process and return at a later time to continue the session?

    1. fg
    2. bg
    3. kill
    4. screen
  34. Which command can be run to determine the default priority for processes spawned by the current user?

    1. prio
    2. nice
    3. renice
    4. defpriority
  35. You have backgrounded several tasks using &. Which command can be used to view the current list of running tasks that have been backgrounded?

    1. procs
    2. plist
    3. jobs
    4. free
  36. Which command can be used to kill any process by using its name?

    1. killproc
    2. killname
    3. killall
    4. kill -f
  37. You are troubleshooting an issue with disk usage and suspect that the partition is out of inodes. Which of the following commands shows the usage of inodes across all filesystems?

    1. df -i
    2. ls -i
    3. du -i
    4. dm -i
  38. When running an fsck on an ext3 filesystem, the process is taking longer than expected and requiring input from the administrator to fix issues. What option could be added to fsck next time so that the command will automatically attempt to fix errors without intervention?

    1. -o
    2. -V
    3. -y
    4. -f
  39. You are using a storage area network (SAN) that keeps causing errors on your Linux system due to an improper kernel module created by the SAN vendor. When the SAN sends updates, it causes the filesystem to be mounted as read-only. Which command and option can you use to change the behavior of the filesystem to account for the SAN bug?

    1. mount --continue
    2. tune2fs -e continue
    3. mkfs --no-remount
    4. mount -o remount
  40. Which command is used to format a swap partition?

    1. fdisk
    2. mkswap
    3. formatswap
    4. format -s
  41. The system is running out of disk space within the home directory partition, and quotas have not been enabled. Which command can you use to determine the directories that might contain large files?

    1. du
    2. df
    3. ls
    4. locate
  42. Which option is set on a filesystem in order to enable user-level quotas?

    1. quotaon
    2. enquota=user
    3. usrquota
    4. userquota
  43. Which option to quotacheck is used to create the files for the first time?

    1. -f
    2. -u
    3. -m
    4. -c
  44. In the context of an if conditional within a bash script, which of the following tests will determine whether a file exists and can be read by the user executing the test?

    1. -e
    2. -s
    3. -a
    4. -r
  45. When configuring local user access, LightDM typically allows guest login by default. Which configuration option within SeatDefaults changes this to disallow guests?

    1. guest-login=false
    2. guest=false
    3. allowg=false
    4. allow-guest=false
  46. Which of the following commands allows a host named cwa to connect to the X server?

    1. xconnect cwa
    2. xterm +cwa
    3. xhost +cwa
    4. xf cwa
  47. To which shell can a user account be set if they are not allowed to log in interactively to the computer?

    1. /bin/bash
    2. /bin/tcsh
    3. /bin/zsh
    4. /bin/false
  48. When troubleshooting disk usage, which of the following commands is used to determine the amount of disk space used by systemd journal logfiles?

    1. journalctl --disk
    2. journalctl -du
    3. journalctl --disk-usage
    4. journalctl -ls
  49. You are having difficulty with an interface on the server, and it is currently down. Assuming that there is not a hardware failure on the device itself, which command and option can you use to display information about the interface?

    1. ifconfig -a
    2. ifup
    3. netstat -n
    4. ifconfig
  50. Which of the following is not used as a private address for internal, non-Internet, use?

    1. 172.16.4.2
    2. 192.168.40.3
    3. 10.74.5.244
    4. 143.236.32.231
  51. Which of the following commands adds a default gateway of 192.168.1.1 for interface eth0?

    1. route add default gateway 192.168.1.1 eth0
    2. eth0 --dg 192.168.1.1
    3. route add default gw 192.168.1.1 eth0
    4. route define eth0 192.168.1.1
  52. Which option for the host command will query for the authoritative nameservers for a given domain?

    1. -t ns
    2. -t all
    3. -ns
    4. -named
  53. Which option for the ping command enables you to choose the interface from which the ICMP packets will be generated?

    1. -i
    2. -I
    3. -t
    4. -a
  54. Which of the following commands queries for the mail servers for the domain example.com?

    1. dig example.com mx
    2. dig example.com
    3. host -t smtp example.com
    4. dig example.com smtp
  55. Which option to the traceroute command will use TCP SYN packets for the path trace?

    1. -T
    2. -t
    3. -s
    4. -i
  56. Which command can be used to listen for netlink messages on a network?

    1. ip monitor
    2. netlink -a
    3. ip netlink
    4. route
  57. Which of the following dig commands sends the query for example.com directly to the server at 192.168.2.5 rather than to a locally configured resolver?

    1. dig example.com @192.168.2.5
    2. dig -t 192.168.2.5 example.com
    3. dig -s 192.168.2.5 example.com
    4. dig server=192.168.2.5 example.com
  58. Which of the following commands will enumerate the hosts database?

    1. getent hosts
    2. gethosts
    3. nslookup
    4. host
  59. Which of the following configuration lines will set the DNS server to 192.168.1.4 using /etc/resolv.conf?

    1. dns 192.168.1.4
    2. dns-server 192.168.1.4
    3. nameserver 192.168.1.4
    4. name-server 192.168.1.4
  60. Which of the following commands adds a route to the server for the network 192.168.51.0/24 through its gateway of 192.168.51.1?

    1. route add -net 192.168.51.0 netmask 255.255.255.0 gw 192.168.51.1
    2. route add -net 192.168.51/24 gw 192.168.1.51
    3. route -net 192.168.51.0/24 192.168.51.1
    4. route add 192.168.51.1 -n 192.168.51.0//255.255.255.0
  61. Which of the following commands shows network services or sockets that are currently listening along with sockets that are not listening?

    1. netstat -a
    2. netlink -a
    3. sockets -f
    4. opensock -l
  62. Which of the following represents a correct configuration line for /etc/hosts?

    1. 192.168.1.4 cwa.braingia.org cwa
    2. cwa.braingia.org cwa 192.168.1.4
    3. cwa.braingia.org 192.168.1.8 alias cwa
    4. alias cwa.braingia.org cwa 192.168.1.4
  63. Which of the following commands configures the eth0 device with an IP address of 192.168.1.1 in a /24 network?

    1. ifconfig eth0 192.168.1.1/24
    2. ifconfig eth0 192.168.1.1/255.255.255.0
    3. ifconfig eth0 192.168.1.1 netmask 255.255.255.0
    4. ifconfig 192.168.1.1 netmask 255.255.255.0 eth0
  64. Which of the following commands will change the default gateway to 192.168.1.1 using eth0?

    1. ip route default gw 192.168.1.1
    2. ip route change default via 192.168.1.1 dev eth0
    3. ip route default gw update 192.168.1.1
    4. ip route update default 192.168.1.1 eth0
  65. When troubleshooting an issue where SSH connections are timing out, you think the firewall is blocking SSH connections. Which of the following ports is used for Secure Shell communication?

    1. TCP/23
    2. TCP/25
    3. TCP/22
    4. TCP/2200
  66. Which options for netcat will create a server listening on port 8080?

    1. netcat -p 8080
    2. nc -l -p 8080
    3. nc -p 8080
    4. nc -s 8080
  67. Which of the following commands displays the Start of Authority information for the domain example.com?

    1. dig example.com soa
    2. dig example.com authority
    3. dig example.com -auth
    4. dig -t auth example.com
  68. Assume that you want to enable local client services to go to hosts on the network without needing to fully qualify the name by adding the domain for either example.com or example.org. Which option in /etc/resolv.conf will provide this functionality?

    1. search
    2. domain
    3. local-domain
    4. local-order
  69. Which of the following commands prevents traffic from reaching the host 192.168.1.3?

    1. route add -host 192.168.1.3 reject
    2. route -nullroute 192.168.1.3
    3. route add -null 192.168.1.3
    4. route add -block 192.168.1.3
  70. Which of the following describes a primary difference between traceroute and tracepath?

    1. The traceroute command requires root privileges.
    2. The tracepath command provides the MTU for each hop, whereas traceroute does not.
    3. The tracepath command cannot be used for tracing a path on an external network.
    4. The traceroute command is not compatible with IPv6.
  71. Which of the following commands will emulate the ping command in Microsoft Windows, where the ping is sent for four packets and then the command exits?

    1. ping -n 4
    2. ping -t 4
    3. ping -p 4
    4. ping -c 4
  72. You are troubleshooting a DNS problem using the dig command and receive a “status: NXDOMAIN” message. Which of the following best describes what NXDOMAIN means?

    1. NXDOMAIN means you have received a non-authoritative answer for the query.
    2. NXDOMAIN means the domain or host is not found.
    3. NXDOMAIN indicates a successful query.
    4. NXDOMAIN signifies that a new domain record has been added.
  73. Which of the following commands should be executed after running ip route change?

    1. ip route flush cache
    2. ip route reload
    3. ip route cache reload
    4. ip route restart
  74. Which option should be used to send a DNS query for an SPF record with dig?

    1. -t txt
    2. -t spf
    3. -t mx
    4. -t mailspf
  75. When troubleshooting a connectivity issue, you have found that you can reach a server via the Web but cannot ping it. Which of the following best describes a possible cause for this scenario?

    1. TCP traffic has been blocked at the firewall.
    2. The DNS lookup is failing.
    3. ICMP traffic has been blocked.
    4. There is a reject route in place.
  76. When viewing the available routes using the route command, one route contains the flags UG and the others contain U. What does the letter G signify in the route table?

    1. The G signifies that the route is good.
    2. The G signifies that the route is unavailable.
    3. The G signifies that this is a gateway.
    4. The G signifies that the route is an aggregate.
  77. Which of the following commands requests a zone transfer of example.org from the server at 192.168.1.4?

    1. dig example.org @192.168.1.4 axfr
    2. dig example.org @192.168.1.4
    3. dig example.org @192.168.1.4 xfer
    4. dig example.org #192.168.1.4 xfer
  78. You need to temporarily prevent users from logging in to the system using SSH or other means. Which of the following describes one method for accomplishing this task?

    1. touch /etc/nologin
    2. Disable sshd.
    3. Remove /etc/login.
    4. Add a shadow file.
  79. Which of the following commands searches the entire filesystem for files with the setuid bit set?

    1. find ./ -perm suid
    2. find / -perm 4000
    3. find / -type suid
    4. find / -type f -perm setuid
  80. Which of the following commands scans the IP address 192.168.1.154 for open ports?

    1. nmap 192.168.1.154
    2. lsof 192.168.1.154
    3. netstat 192.168.1.154
    4. netmap 192.168.1.154
  81. Which of the following configuration options sets a hard limit of 25 processes for a user called suehring in /etc/security/limits.conf?

    1. suehring hard proc 25
    2. suehring hard nproc 25
    3. suehring proc 25 hard-limit
    4. proc 25 suehring hard
  82. Which of the following commands displays the currently open ports and the process that is using the port?

    1. netstat -a
    2. lsof -i
    3. ps auwx
    4. netlist
  83. You are using nmap to scan a host for open ports. However, the server is blocking ICMP echo requests. Which option to nmap can you set in order to continue the scan?

    1. -P0
    2. -no-ping
    3. -s0
    4. -ping-0
  84. Which option within /etc/security/limits.conf is used to control the number of times a given account can log in simultaneously?

    1. nlogins
    2. loginmax
    3. maxlogins
    4. loginlimit
  85. Which option to nmap sets the scan to use TCP SYN packets for finding open ports?

    1. -sS
    2. -sT
    3. -sY
    4. -type SYN
  86. Which of the following commands searches a server for files with the setgid bit enabled?

    1. find / -perm 4000
    2. find ./ -perm setgid
    3. grep setgid *
    4. find / -perm 2000
  87. When using iostat to assess performance, which option displays information on a per-partition basis for block devices?

    1. -a
    2. -c
    3. -d
    4. -p
  88. Which of the following commands displays blocks in and blocks out as related to I/O?

    1. iorpt
    2. iptraf
    3. vmswap
    4. vmstat
  89. Which of the following commands can be used to display a list of currently logged-in users along with the current load average and time since last reboot?

    1. uptime
    2. w
    3. swap
    4. sysinfo
  90. Which of the following describes a method for changing the sort order when using the top command such that the highest memory utilizers will be shown at the top of the list?

    1. Within top, type o and then select mem.
    2. Within top, press Shift+F, scroll to %MEM, press S to select, and then press Q to quit.
    3. Within top, press S and then select %MEM.
    4. Within top, press Shift+S, select %MEM, then press Q to quit.
  91. Which of the following monitoring tools can use SNMP and scripts to collect data for performance-related graphing such as throughput and bandwidth?

    1. ptop
    2. pstree
    3. Cacti
    4. Grafr
  92. Which swapon option silently skips swap partitions that do not exist?

    1. -u
    2. -e
    3. -i
    4. -o
  93. Which option to the fsck command causes it to run the check even if the filesystem is apparently marked as clean?

    1. -f
    2. -m
    3. -a
    4. -c
  94. Which of the following commands deactivates swap space?

    1. swapoff
    2. swap -off
    3. unmountswap
    4. uswap
  95. Which of the following swapon options displays information on the size of swap space along with its used space?

    1. --list
    2. -a
    3. --show
    4. -h
  96. Which of the following commands displays information about a given physical volume in an LVM setup?

    1. pvdisp
    2. pvlist
    3. pvdisplay
    4. pvl
  97. Which of the following commands looks for LVM physical volumes and volume groups involved in an LVM configuration?

    1. vgscan
    2. lvmscan
    3. lvlist
    4. pvlist
  98. Which of the following commands is used to display a list of physical volumes involved in LVM?

    1. pvdisp
    2. pvlist
    3. pvscan
    4. pvmm
  99. When using the ip command, which protocol family is used as the default if not otherwise specified?

    1. tcpip
    2. ip
    3. inet
    4. arp
  100. You are using the route command to view routes. However, name resolution is taking a long time and causing delay in the response from the route command. Which option to route can be added to cause it to not perform name resolution?

    1. -d
    2. -e
    3. -f
    4. -n
  101. You have replaced a device on the network but used the IP from another active device. Which command can be run to remove the MAC address entry from your computer so that it performs the address resolution again?

    1. arp -d
    2. netstat -rn
    3. hostname
    4. dig
  102. When looking to parse the output of the ip command, which option can be set to remove newlines such that the output could be piped to the grep command?

    1. -n
    2. -o
    3. -l
    4. -f
  103. Which option to the arp command creates a new entry for a given IP address to MAC address pair?

    1. -s
    2. -c
    3. -d
    4. --add
  104. Which option to tcpdump displays a list of available interfaces on which tcpdump can operate?

    1. -a
    2. -d
    3. -D
    4. -i
  105. Which option to nmap will cause it to always perform name resolution?

    1. -n
    2. -R
    3. -b
    4. -a
  106. Which of the following commands provides a live traceroute of the route between two hosts, updating the information for each hop in near real-time?

    1. traceroute --live
    2. mtr
    3. route -update
    4. liveroute
  107. You are using a local RAID array and investigating a performance issue. When using mdadm in monitor mode, which option sets the polling interval?

    1. --delay
    2. --internal
    3. --interval
    4. --poll
  108. When viewing the results of a traceroute, you see !H. To what does !H refer?

    1. Network unreachable
    2. Host available
    3. Host unreachable
    4. High length
  109. Assuming that policy routing has been enabled in the kernel, which option to the ping command can be used to mark the outgoing request appropriately in order to indicate that the packet should be processed according to a particular policy?

    1. -m
    2. -a
    3. -p
    4. -k
  110. When troubleshooting a possible issue with bad blocks on a disk, which option to fsck will report statistics such as CPU time used on completion of the fsck operation?

    1. -s
    2. -r
    3. -l
    4. -f
  111. Which of the following files provides information on memory utilization including free memory, buffers, cache usage, and several additional items?

    1. /proc/cpuinfo
    2. /proc/memtime
    3. /proc/memuse
    4. /proc/meminfo
  112. Which scan mode for nmap provides an Xmas scan?

    1. -sT
    2. -sS
    3. -sP
    4. -sX
  113. Which option to tcpdump sets the snapshot length of packets to capture?

    1. -s
    2. -l
    3. -d
    4. -c
  114. On which port does the ping command operate for ICMP echo requests?

    1. 53
    2. 1337
    3. 33433
    4. No port is used for ICMP.
  115. When running the df command, you need to change the scale such that the report shows terabytes instead of bytes. Which option will accomplish this task?

    1. -ST
    2. -BT
    3. -j
    4. -T
  116. Which option to mke2fs is used to check for bad blocks during filesystem creation?

    1. -a
    2. -b
    3. -c
    4. -d
  117. Which option to the ping command shows latency rather than round-trip time?

    1. -L
    2. -i
    3. -U
    4. -d
  118. Which of the following commands is used to measure network throughput?

    1. tp
    2. iperf
    3. ith
    4. ithrough
  119. You would like to monitor interrupt usage in real time on a Linux server in order to troubleshoot communication ports usage. Which of the following commands can be used for this purpose?

    1. int
    2. moni
    3. itop
    4. imon
  120. You are configuring an RDMA interface. Which of the following commands displays information about InfiniBand devices?

    1. ibmon
    2. ibstat
    3. rdmon
    4. rdstat
  121. You need to increase the performance of process ID 4382 by changing its priority. Which of the following commands will accomplish this task?

    1. renice -5 -p 4382
    2. renice 5 -p 4382
    3. renice 100 4382
    4. renice 4382 +5
  122. Which option to netstat is used to disable DNS or hostname lookups?

    1. -b
    2. -h
    3. -q
    4. -n
  123. You would like to find all of the process IDs associated with the sshd process on an Ubuntu system. Which of the following commands accomplishes this task?

    1. ps -sshd
    2. pidof sshd
    3. pids sshd
    4. ps --a=sshd
  124. Which kill signal sends a hangup to a given process?

    1. 1
    2. 5
    3. 24
    4. 30
  125. Which command is used to configure kernel parameters for a new GPU driver added to the system?

    1. gpuctl
    2. gpuload
    3. sysconfig
    4. sysctl
  126. You would like to change the byte-to-inode ratio on a new filesystem in order to prevent inode exhaustion. Which option to mke2fs accomplishes this task?

    1. -b
    2. -r
    3. -i
    4. -u
  127. Which directory contains information on FibreChannel HBA ports?

    1. /sys/fc/ports
    2. /sys/class/hba
    3. /sys/class/fc_host
    4. /sys/class/fc/ports
  128. Which type of module interface for PAM is used to set a policy such as the time of day that a user can log in?

    1. auth
    2. account
    3. password
    4. policy
  129. You need to create a restrictive access control list (ACL) on a server. Which policy should be the default for the INPUT chain within the firewall?

    1. deny
    2. permit
    3. accept
    4. discard
  130. Which option to the ls command displays the ownership, including user and group owners of a given file or directory?

    1. -o
    2. -a
    3. -l
    4. -d
  131. When creating a daemon process that will be used on the local server, which of the following communication methods should be used?

    1. Localhost/network
    2. Socket
    3. Message-passing
    4. RDP
  132. When using the free command to determine memory usage, which column shows the memory used by the kernel for things like kernel buffers?

    1. used
    2. shared
    3. buffers
    4. cache
  133. Which of the following commands provides a command-line interface into NetworkManager?

    1. nmc
    2. dmc
    3. nmcli
    4. netman
  134. Which command displays network usage in a top-like interface?

    1. iftop
    2. iptop
    3. ptop
    4. netcap
  135. You suspect saturation is affecting network performance with your Linux server. Which command can be used to help determine the amount of traffic being passed through a given interface?

    1. netp
    2. sat
    3. iptraf
    4. ipsat
  136. You are looking to optimize the I/O scheduler for your Linux server. Which I/O scheduling algorithm is the default?

    1. deadline
    2. noop
    3. cfq
    4. iqueue
  137. You would like to efficiently manage firewall rules such that you can define a group of IP addresses to which a single rule can be applied. Which command enables you to create a group of IP addresses?

    1. ipgroup
    2. iptables -group
    3. addrgroup
    4. ipset
  138. You are receiving reports of timeouts from users attempting to SSH between servers. Which command should be used to help troubleshoot these reports?

    1. tcptraceroute
    2. ping
    3. telnet
    4. ps
  139. Which command can be used to capture network traffic in pcap format for later analysis by a tool like Wireshark?

    1. tcpcap
    2. pdump
    3. tshark
    4. pcapr
  140. You need to determine the owner of an IP address. You have attempted to use nslookup to determine the hostname, but there was no PTR record for the IP. Which command can be used to determine who owns the IP address?

    1. iplookup
    2. ipowner
    3. whois
    4. bg
  141. Which command can be used to help diagnose latency issues with a disk?

    1. diskstat
    2. statd
    3. fdisk
    4. ioping
  142. Which command can be used to trigger the kernel to update the partition table?

    1. ifdisk
    2. partup
    3. partprobe
    4. uppart
  143. Which of the following commands can be used to display historical performance data across several different parameters?

    1. sar
    2. kernperf
    3. pkern
    4. perfshow
  144. Which option to sysctl displays all of the available parameters?

    1. -a
    2. -b
    3. -c
    4. -d
  145. When examining output from the state column of the ps command, there is a process with a state of D. What state is that process currently in?

    1. Debug
    2. Interruptible sleep
    3. Uninterruptible sleep
    4. Dead
  146. Within which file is keyboard mapping set on a Debian or Ubuntu system?

    1. /etc/kbd.conf
    2. /etc/default/keyboard
    3. /etc/default/kbd.conf
    4. /etc/keymap
  147. You are troubleshooting printer access on a Linux system. On which port does the CUPS printing daemon listen by default?

    1. 25
    2. 342
    3. 631
    4. 316
  148. You need to change ownership of files within a directory to have that ownership inherit all subdirectories and files. Which option to the chown command accomplishes this task?

    1. -o
    2. -R
    3. -r
    4. -f
  149. Which utility can be used to find SELinux context violations?

    1. sestat
    2. secv
    3. convio
    4. ausearch
  150. You have added a new RAID adapter to the system. Which command can be used to ensure that the adapter was detected by the kernel?

    1. showraid
    2. lsadapt
    3. dmesg
    4. raidlist
  151. Which option is used to send a signal to a process when using pkill?

    1. -<SIGNAL>
    2. -s
    3. -i
    4. -h
  152. You are troubleshooting a directory permission issue. The directory and all subdirectories are owned by root. Within the top-level directory there is another directory that has 755 permissions on it. However, a non-root user cannot obtain a directory listing of that subdirectory. Which of the following might be the issue?

    1. Directory permissions inherit, so the top-level directory must be set to disallow execute for the “other” permission.
    2. Directory permissions need to be 777 on the subdirectory.
    3. The write permission is needed for the subdirectory.
    4. The other permission needs to be 7 for the subdirectory.
  153. What is the default request size for ioping?

    1. 4 bytes
    2. 4 KB
    3. 512 KB
    4. 1024 KB
  154. Within which file can you determine the current I/O scheduler algorithm?

    1. /sys/block/<device>/queue/scheduler
    2. /sys/block/<device>/iosch
    3. /etc/iostat.cfg
    4. /etc/default/ioscheduler
  155. Which option to iftop prevents hostname lookups from occurring?

    1. -d
    2. -a
    3. -t
    4. -n
  156. Which command can be used within the nslookup CLI to change the server to which the query will be sent?

    1. dest
    2. server
    3. srv
    4. auth
  157. What are the minimum permissions needed for a user to write into a directory for which they are not the owner and are not in a group that owns the directory?

    1. Write
    2. Read/Write/Execute
    3. Read/Execute
    4. Write/Execute
  158. Which of the following protocols provides a means for authentication to occur external to the Linux system?

    1. SSL
    2. SSH
    3. LDAP
    4. AD
  159. When creating a file, a user is receiving an error. The file is very large. What command can the user execute in order to determine the file size limitation?

    1. limit
    2. ulimit
    3. filelimit
    4. flimit
  160. What permissions are required for a bash script to be executable by everyone?

    1. 755
    2. 644
    3. 777
    4. 222
  161. Which command can be used to set file attributes such as making a file immutable?

    1. chr
    2. fattr
    3. chattr
    4. fop
  162. Which range of UIDs is typically used by service accounts?

    1. 1 to 999
    2. 1 to 100
    3. 32,768 to 65,535
    4. 1,000 to 1,999
  163. Which of the following commands retrieves the current group membership list for a user?

    1. groupmem
    2. groups
    3. lsgr
    4. getgr
  164. You have added a swap disk to a Linux server and have executed mkswap. However, on examination of the output from the free command, the swap space is not being used. Which command do you need to execute?

    1. swapon
    2. swap-en
    3. actswap
    4. swpact
  165. Which option to ioping sets the size of the request?

    1. -m
    2. -n
    3. -f
    4. -s
  166. Which message type(s) should be queried when looking for SELinux access denials or violations?

    1. AVC
    2. DEN
    3. AVC,USER_AVC
    4. STOP,VIOL
  167. Which command can be used to obtain extended hardware information, including information about the motherboard?

    1. mbhw
    2. lsmb
    3. dmidecode
    4. lsallhw
  168. You have found that a SATA disk within a RAID array has gone bad. Which option to mdadm removes the disk from the RAID array, placing it into a degraded state?

    1. rm
    2. fail
    3. rem
    4. del
  169. Which option to whois suppresses the legal disclaimer information from certain registries?

    1. -L
    2. -q
    3. -H
    4. -s
  170. Which option to iftop sets the interface on which iftop will listen?

    1. -m
    2. -i
    3. -l
    4. -a
  171. To which file can you echo “- - -” in order to cause a scan of a SCSI host adapter for new disks?

    1. /sys/bus/scsi/hostscan
    2. /sys/class/scsi_host/hostN/scan
    3. /sys/class/<host>/scan
    4. /etc/scsiadm
  172. When performing local authentication, which file provides encrypted password information?

    1. /etc/passwd
    2. /etc/shadow
    3. /etc/encrpass
    4. /etc/passen
  173. Which option is used to display information about current file attributes?

    1. lsfile
    2. lsattr
    3. showfile
    4. exattr
  174. The out-of-memory killer has been killing some processes on the system. Which columns within ps output are helpful for determining current memory usage for a given process?

    1. size and rss
    2. mem and swap
    3. free and cache
    4. phy and vir
  175. Which signal number corresponds to SIGKILL?

    1. 1
    2. 5
    3. 9
    4. 12
  176. Which of the following classes is the default class type queried by the host command?

    1. EX
    2. HS
    3. FO
    4. IN
  177. Which option to the netstat command displays the current routing table?

    1. -r
    2. -t
    3. -a
    4. -l
  178. Which option to the du command provides summary output?

    1. -o
    2. -h
    3. -s
    4. -u
  179. Which of the following commands can be used to find zombie processes?

    1. ps -Z
    2. ps | grep Z
    3. ps | grep zombie
    4. ps -a -z
  180. Which command can be used to list all of the detected hardware within a system?

    1. lshw
    2. showhw
    3. lspic
    4. slist
  181. Which option to the ioping command sets the number of requests to send?

    1. -r
    2. -c
    3. -n
    4. -a
  182. Which process state indicates that the process is currently running?

    1. C
    2. R
    3. T
    4. V
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.20.224.107