What command is used to set or change permission attributes of files (such as read, write, execute)?
A. chacl
B. chmod
C. chown
D. setattr
When working on a Linux system with firewalld enabled, how can other systems be allowed to access the HTTPS port on the system in the default firewall zone so that the access is granted immediately and persists across reboots?
A. firewallctl --add-port=https --reload
B. iptables --add-service=https --permanent
C. firewalld --add-service=https
D. firewall-cmd --add-service=https --permanent --reload
A company's IT associate has been asked to switch to single-user mode on a running Linux server in order to perform some troubleshooting. Of the options below, which is the best way of doing this?
A. su single
B. init singleuser
C. Isu 1
D. linit 1
When using rsync to mirror a local directory to a remote server, what is the significance of the --delete option?
A. Files absent from the remote directory will be restored from the local directory.
B. Files present in the local directory, but not present in the remote directory, will be deleted.
C. Files absent from the local directory will be restored from the remote directory.
D. Files present in the remote directory, but not present in the local directory, will be deleted.
Which of the following authentication method types would include using a password in combination with a hardware token?
A. Multi-Factor Authentication
B. Multi-Staged Security
C. Hardware Encryption Authentication
D. Multi-Step Analysis
What command do you use to view the structure of system directory hierarchies?
A. tree
B. fee | ls /etc
C. ls -t
D. ls tree
An IT team needs to synchronize large amounts of data between two nodes on the company's local network. This data changes daily and it is not feasible to copy the entire directory tree each time. Which is the best option to securely copy files in the most timely and efficient manner?
A. rsync
B. scp
C. fsync
D. netcp
When using vi or vim to edit a file, how do you exit without saving?
A. :q!
B. ZZ
C. :wq!
D. :exit
Which of the following is a commonly used open source software used to connect to SSL/TLS VPN services?
A. OpenVPN
B. GNUVPN
C. NordVPN
D. VPNConnect
Which of the following is considered a best practice for hardening SSHD?
A. Using portknocking to protect ssh access for root
B. Completely disabling ssh access
C. Disabling ssh access for root
D. Renaming root to a random name