Question 51
A system administrator has set up third-party log aggregation agents across several cloud instances. The systems administrator wants to create a dashboard of failed SSH attempts and the usernames used.
Which of the following files should be watched by the agents?
Which of the following files should be watched by the agents?
Question 52
Joe, a user, creates a short shell script, shortscript.sh, and saves it in his home directory with default permissions and paths. He then attempts to run the script by typing ./shortscript.sh, but the command fails to execute.
Which of the following commands would have allowed the script to run?
Which of the following commands would have allowed the script to run?
Question 53
An administrator receives the following message on a remote server: Cannot open display. Which of the following should the administrator have used to log in to the server?
Question 54
A Linux administrator recently reprovisioned a new corporate web server to replace a legacy one. To minimize the impact on the company's users, the administrator modified the network and DNS settings of the new server to be the same as the legacy server.
When attempting to log in to the new server remotely over SSH, the following error message is displayed:
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
Which of the following should the administrator do to resolve the issue?
When attempting to log in to the new server remotely over SSH, the following error message is displayed:
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
Which of the following should the administrator do to resolve the issue?
Question 55
During the final step of staging new Linux hardware, GRUB2 is installed to the system drive. Which of the following BEST describes the role of GRUB2 in a new Linux installation?