Question

In: Computer Science

36. A junior Linux administrator is performing version control on a Git repository. The administrator is...

36. A junior Linux administrator is performing version control on a Git repository. The administrator is given a list of tasks to complete:
• List the currently installed Git release.
• Show the status reporting on the clone.
Which of the following commands would allow the administrator to complete these tasks? (Select TWO).
A. git clone --progress
B. git clone --recursive
C. git --help
D. git clone --dissociate
E. git --version
F. git clone –shared


37. A company wants to provide internal identity verification services for networked devices. Which of the following should be installed?
A. SSH
B. VPN
C. CA
D. DCHP
E. DNS


38. A system administrator wants to disable the Linux Watchdog Timer Driver for security purposes. Which of the following will accomplish this task?
A. Add blacklist watchdog to the /etc/modprobe.d/blacklist file.
B. Rename the /etc/modprobe.d/watchdog file to watchdog.off instead.
C. Remove the watchdog=1 from the /usr/modules/watchdog.conf file.
D. Add watchdog=0 to the /etc/modprobe.conf file.


39. Ann, a user has created a new directory and noticed that permissions on the new directory are as follows:
drwx------. 1 ann ann 0 Jun 11 08:20 work
Which of the following should the administrator do to restore default permissions for newly created directories?
A. Change unmask value in /etc/profile.
B. Run chmod command to update permissions.
C. Modify directory ownership to ann:ann with chown.
D. Execute chattr command to restore default access.


40. A security administrator wants to display a warning banner before a user logs in. Which of the following files must be edited to make this happen?
A. /etc/services
B. /etc/issue
C. /etc/hosts
D. /etc/mood

Solutions

Expert Solution

36.

A. git --clone progress

E. git --version

git --clone progress is the command that shows the status reporting on the clone. git --version is the command that lists the currently installed git release.

37.

A. SSH

SSH provide internal identify verification for the network devices. Initially we need to configure the SSH for the devices. After configuration, each time the SSH is verified with the key to confirm the identity to provide access

38.

A. Add blacklist watchdog to the /etc/modprobe.d/blacklist file.

For disabling the Linux watchdog timer, one need to add the blacklist watchdog to the blacklist in the /etc/modprobe.d file. This

39.

B. Run chmod command to update the permissions

Once the new directory is created using the initial unmask value. Changing the unmask value will not change the permissions for the earlier created directories. The user will have to change the permissions using the chmod command.


Related Solutions

bash-3.2$ git init Initialized empty Git repository in /Users/terry/Documents/Udel/teaching/275/275-Spring2018/gitPlay/.git/ bash-3.2$ git add *.txt bash-3.2$ git commit...
bash-3.2$ git init Initialized empty Git repository in /Users/terry/Documents/Udel/teaching/275/275-Spring2018/gitPlay/.git/ bash-3.2$ git add *.txt bash-3.2$ git commit -m "all" [master (root-commit) f7a22b3] all 4 files changed, 27 insertions(+) create mode 100644 dog.txt create mode 100644 gitquiz.txt create mode 100644 spam.txt create mode 100644 spam2.txt $ <edit spam.txt> bash-3.2$ git add spam.txt bash-3.2$ git commit -m "mod" [master 8885fb1] mod 1 file changed, 2 insertions(+) bash-3.2$ git branch feature bash-3.2$ git checkout feature Switched to branch 'feature' bash-3.2$ cat >> spam2.txt a...
bash-3.2$ git init Initialized empty Git repository in /Users/terry/Documents/Udel/teaching/275/275-Spring2018/gitPlay/.git/ bash-3.2$ git add *.txt bash-3.2$ git commit...
bash-3.2$ git init Initialized empty Git repository in /Users/terry/Documents/Udel/teaching/275/275-Spring2018/gitPlay/.git/ bash-3.2$ git add *.txt bash-3.2$ git commit -m "all" [master (root-commit) f7a22b3] all 4 files changed, 27 insertions(+) create mode 100644 dog.txt create mode 100644 gitquiz.txt create mode 100644 spam.txt create mode 100644 spam2.txt $ <edit spam.txt> bash-3.2$ git add spam.txt bash-3.2$ git commit -m "mod" [master 8885fb1] mod 1 file changed, 2 insertions(+) bash-3.2$ git branch feature bash-3.2$ git checkout feature Switched to branch 'feature' bash-3.2$ cat >> spam2.txt a...
Linux Directories, File Properties, and the File System in C Understanding Unix/Linux Programming Your version of...
Linux Directories, File Properties, and the File System in C Understanding Unix/Linux Programming Your version of mv command The mv command is more than just a wrapper around the rename system call. Write a version of mv that accepts two argument. The first argument must be the name of a file, and the second argument may be the name of a file or the name of a directory. If the destination is the name of a directory, then mv moves...
What are control structures in Linux/Unix?
What are control structures in Linux/Unix?
How do software companies use Git-based repositories like GitHub, GitLab, and other packages that handle version...
How do software companies use Git-based repositories like GitHub, GitLab, and other packages that handle version control?
This program is a simple version of the linux shell using execvp by forking using C...
This program is a simple version of the linux shell using execvp by forking using C Currently this program of the shell assumes user enters no spaces before and no extra spaces between strings. Using exec, an executable binary file (eg: a.out) can be converted into a process. An example of using exec is implementing a shell program or a command interpreter. A shell program takes user commands and executes them. int execvp(const char *file, char *const argv[]); Same as...
You are converting your network to an IP addressing scheme. You assign a junior administrator the...
You are converting your network to an IP addressing scheme. You assign a junior administrator the task of assigning addresses to your network hosts from the IP address range 202.17.68.0-202.17.68.255. He states that he used every one of the 256 addresses in the range. Which devices on the network will be unable to communicate with other network devices? Routers are protocol dependent at which OSI model layer? You are the network administrator for a large, global internetwork. You must update...
Systems Programming in Linux using C Remake the version of the ls -ialR command in C.....
Systems Programming in Linux using C Remake the version of the ls -ialR command in C.. In this version of ls, you must also consider symbolic file types. Make sure you have file header comments and function header comments. Also, write inline comments whenever necessary.
Systems Programming - File Operations Create your version of the tail command in Linux using C...
Systems Programming - File Operations Create your version of the tail command in Linux using C The lseek system call allows you to move the current position anywhere in a file. The call lseek(fd, 0, SEEK_END) moves the current position to the end of the file. The tail command displays the last ten liens of a file. Try it. tail has to move, not to the end of the file, but to a spot ten lines before the end of...
Linux Directories, File Properties, and the File System in C Code your version of mv command...
Linux Directories, File Properties, and the File System in C Code your version of mv command in C The mv command is more than just a wrapper around the rename system call. Write a version of mv that accepts two argument. The first argument must be the name of a file, and the second argument may be the name of a file or the name of a directory. If the destination is the name of a directory, then mv moves...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT