Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following describes the method of consolidating system events to a single location?

A.

Log aggregation

B.

Health checks

C.

Webhooks

D.

Threshold monitoring

The development team asks a Linux administrator to help diagnose a connectivity issue that is occurring with a newly developed software. The Linux administrator reviews the following output:

$ wget -vvv https://api.newapp.comptia.org/v2/health

Resolving proxy.comptia.org (proxy.comptia.org)... connected.

ERROR: The certificate of ' api.newapp.comptia.org ' is not trusted.

ERROR: The certificate of ' api.newapp.comptia.org ' does not have a known issuer.

Which of the following actions is the best way to resolve the issue?

A.

Verify the remote certificate is trustworthy, and add it to the local trusted certificates repository.

B.

Replace the remote certificate with a new self-signed CA and application certificate.

C.

Replace the expired CA certificate to permanently resolve the problem.

D.

Add option --no-check-certificate to wget command to permanently resolve the problem.

Which of the following is the best use of AI within a Linux environment?

A.

Giving full control of the Linux server to the AI engine

B.

Uploading company internal messaging for user validation

C.

Outsourcing proprietary source code development to the LLM

D.

Generating an nginx configuration file that can be used for testing

A Linux administrator needs to add a new HTTP service on the server. Which of the following commands allows other systems to communicate with the service after the system is restarted?

A.

firewall-cmd --add-service=http --reload

B.

firewall-cmd --add-port=http --complete-reload

C.

firewall-cmd --add-service=http --permanent

D.

firewall-cmd --add-service=http

A systems administrator receives reports from users who are having issues while trying to modify newly created files in a shared directory. The administrator sees the following outputs:

Which of the following provides the best resolution to this issue?

A.

Adding a setuid bit to the user in the shared folder

B.

Manually changing the group of the newly created files

C.

Changing all directory contents to be writable and readable for everyone

D.

Adding a setgid bit to the group in the shared folder

A Linux administrator needs to compare two files and provide the output in the following format:

2,3d1

< Line 2

< Line 3

4a3

Line 5

Which of the following commands should the administrator use to perform the task?

A.

comm

B.

awk

C.

file

D.

diff

An administrator is trying to terminate a process that is not responding. Which of the following commands should the administrator use in order to force the termination of the process?

A.

kill PID

B.

kill -1 PID

C.

kill -9 PID

D.

kill -15 PID

A Linux user needs to download the latest Debian image from a Docker repository. Which of the following commands makes this task possible?

A.

docker image init debian

B.

docker image pull debian

C.

docker image import debian

D.

docker image save debian

Which of the following can be implemented with PAM to detect and block dictionary attacks?

A.

pam_tally2

B.

pam_limits

C.

pam_unix

D.

pam_ldap

An administrator receives the following output while attempting to unmount a filesystem:

umount /data1: target is busy.

Which of the following commands should the administrator run next to determine why the filesystem is busy?

A.

ps -f /data1

B.

du -sh /data1

C.

top -d /data1

D.

lsof | grep /data1