Which of the following commands does the administrator need to issue for the router to be fully functional?
A Linux administrator has configured a Linux system to be used as a router. The administrator confirms that two network adapters are properly installed and functioning correctly. In addition, the output of the iptables CL command appears to contain a complete firewall configuration. Which of the following commands does the...
Which of the following would the application parsing this file MOST likely have to support?
An administrator reviews the following configuration file provided by a DevOps engineer: Which of the following would the application parsing this file MOST likely have to support?A . YAMLB . AJAXC . JSOND . SOAPView AnswerAnswer: C
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?A . UEFIB . PXEC . NFSD . GRUBView AnswerAnswer: A Explanation: Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/installation_guide/ch-boot-x86
Which of the following commands would disable the use of Bluetooth?
A new corporate policy states that Bluetooth should be disabled on all company laptops. Which of the following commands would disable the use of Bluetooth?A . echo “blacklist bluetooth” > /etc/modprobe.d/blacklist-bluetoothB . echo “kill bluetooth” > /etc/modprobe.d/kill-bluetoothC . echo “modprobe bluetooth” > /etc/modprobe.d/modprbe-bluetoothD . echo “rmod bluetooth” > /etc/modprobe.d/rmmod-bluetoothView AnswerAnswer:...
Which of the following would be BEST in this scenario?
A systems administrator wants to deploy several applications to the same server quickly. Each application should be abstracted from the host with its own dependencies and libraries and utilize a minimal footprint. Which of the following would be BEST in this scenario?A . Virtual machinesB . Type 2 hypervisorC ....
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?A . UEFIB . PXEC . NFSD . GRUBView AnswerAnswer: A Explanation: Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/installation_guide/ch-boot-x86
Which of the following commands would BEST accomplish this task?
A junior administrator needs to unload an older video kernel module. Which of the following commands would BEST accomplish this task?A . modprobeB . insmodC . rmmodD . chmodView AnswerAnswer: A Explanation: Reference: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Kernel_Administration_Guide/sec-Unloading_a_Module.html
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?A . UEFIB . PXEC . NFSD . GRUBView AnswerAnswer: A Explanation: Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/installation_guide/ch-boot-x86
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?
Which of the following can be used to boot a DVD from a remote device to initialize a Linux system setup on bare metal hardware as if it is a local DVD?A . UEFIB . PXEC . NFSD . GRUBView AnswerAnswer: A Explanation: Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/installation_guide/ch-boot-x86
Which of the following commands would allow the security administrator to list and check the SELinux context?
An operator finds a user is having issues with opening certain files. Which of the following commands would allow the security administrator to list and check the SELinux context?A . ls CDB . ls CaC . ls CZD . ls -1View AnswerAnswer: C Explanation: Reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security-enhanced_linux/sect-security-enhanced_linux-working_with_selinux-selinux_contexts_labeling_files