Instruction:
0 of 10 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Select the statement about the file permissions and chmod that are correct.
(Select all acceptable answers.)
The output of crontab -l contains the following job definitions:
MAILTO=candidate@testdome.org,admin@testdome.org 0 0,12 1 */4 * df -h / @hourly du -h / >> /var/log/disk_usage 0 6 1-12 * * /usr/bin/testdome_candidates
Select the statements about the job definitions and schedules that are correct.
(Select all acceptable answers.)
Consider the following code sample:
#!/bin/sh
message=”Test message 1″
function send_email ()
{echo $message | mail -s “Test” “username@domain.com”}
message=”Test message 2″
send_email &
pid=$!
message=”Test message 3″
send_email &
message+”Test message 4″
send_email
wait $pid
echo “All test emails sent”
Select the statements that are correct. (Select all acceptable answers.)
A startup has been running its public-facing web site on a single web server. Seeing a recent surge in popularity and web requests, the company decided to add two more web servers and a load balancer in front of all the web servers. All web servers have the same hardware specifications.
The nature of the web application requires long lived sessions. All requests for the same session need to be directed to the same server. During internal testing, the testers complained about lost sessions and servers unable to handle requests because they ran out of connections.
Select the steps that need to be taken to solve the issues mentioned above:
(Select all acceptable answers.)
A company wants to run its website on its own server.
Which tasks can be covered by web server software like IIS or Apache?
(Select all acceptable answers.)
For some time, on a public server managed by you, users have been experiencing server downtimes, requests taking too long, and failed requests. The management suspects something malicious. Server logs show a significant increase in the number of requests originating from multiple sources.
Which type of cyber attack is the most probable reason for this?
While doing some administrative task on your system, your network admin runs the following command:
$ nslookup
Server:dns.testdome
Address: 192.0.2.200
> set querytype=ns
> example.com
Server: dns.testdome
Address: 192.0.2.200
Non-authoritative answer:
example.com nameserver = a.iana-servers.net
example.com nameserver = b.iana-servers.net
Which of the following statements are correct with respect to the above commands?
(Select all acceptable answers.)
The following zone file describes a hypothetical DNS zone:
$ORIGIN testdome.com
$TTL 1h
testdome.com.IN SOA dns.testdome.com admin.testdome.com (20007120710 1d 2h 4w 1h)
@ IN NS dns
@ IN MX 10 mail.testdome.com
testdome.com. IN A 192.0.2.1
IN AAA 2001:db8: 10: :1
dns IN A 192.0.2.2
IN AAA 2001:db8:10: :2
www IN CNAME testdome.com.
wwwadmin IN CNAME www
mail IN A 192.0.2.3
Select the statements about the contents of the DNS zone that are correct.
Select all acceptable answers.
Select the commands that, when executed, would decompress and unpack the file file.tar.gz.
(Select all acceptable answers.)
Consider the following config.txt file:
# Configuation file for application deployment
IP address of the Primary Server: IP_ADDRESS
IP address of the Database Server: IP_ADDRESS
IP address of the Jenkins Server: IP_ADDRESS
and Bash script:
#!/usr/bin/env bash
sed -i’.backup’ ‘1,3 s/IP_ADDRESS/127.0.0.1/g’ config.txt
Select the statement about the execution and results of the Bash script that are correct.
(Select all acceptable answers.)