In: Computer Science
36. A junior Linux administrator is performing version control
on a Git repository. The administrator is given a list of tasks to
complete:
• List the currently installed Git release.
• Show the status reporting on the clone.
Which of the following commands would allow the administrator to
complete these tasks? (Select TWO).
A. git clone --progress
B. git clone --recursive
C. git --help
D. git clone --dissociate
E. git --version
F. git clone –shared
37. A company wants to provide internal identity verification
services for networked devices. Which of the following should be
installed?
A. SSH
B. VPN
C. CA
D. DCHP
E. DNS
38. A system administrator wants to disable the Linux Watchdog
Timer Driver for security purposes. Which of the following will
accomplish this task?
A. Add blacklist watchdog to the /etc/modprobe.d/blacklist
file.
B. Rename the /etc/modprobe.d/watchdog file to watchdog.off
instead.
C. Remove the watchdog=1 from the /usr/modules/watchdog.conf
file.
D. Add watchdog=0 to the /etc/modprobe.conf file.
39. Ann, a user has created a new directory and noticed that
permissions on the new directory are as follows:
drwx------. 1 ann ann 0 Jun 11 08:20 work
Which of the following should the administrator do to restore
default permissions for newly created directories?
A. Change unmask value in /etc/profile.
B. Run chmod command to update permissions.
C. Modify directory ownership to ann:ann with chown.
D. Execute chattr command to restore default access.
40. A security administrator wants to display a warning banner
before a user logs in. Which of the following files must be edited
to make this happen?
A. /etc/services
B. /etc/issue
C. /etc/hosts
D. /etc/mood
36.
A. git --clone progress
E. git --version
git --clone progress is the command that shows the status reporting on the clone. git --version is the command that lists the currently installed git release.
37.
A. SSH
SSH provide internal identify verification for the network devices. Initially we need to configure the SSH for the devices. After configuration, each time the SSH is verified with the key to confirm the identity to provide access
38.
A. Add blacklist watchdog to the /etc/modprobe.d/blacklist file.
For disabling the Linux watchdog timer, one need to add the blacklist watchdog to the blacklist in the /etc/modprobe.d file. This
39.
B. Run chmod command to update the permissions
Once the new directory is created using the initial unmask value. Changing the unmask value will not change the permissions for the earlier created directories. The user will have to change the permissions using the chmod command.