As root you configured a file system using AutoFS with default settings. In the first session, you changed to a directory under AutoFS control. In a second session, you changed to /etc. Now the idle time for the session expires. Which two statements are true about the status of the file system mounted in the first session?
Examine this command and output:
# cat deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
spec:
selector:
matchLabels:
app: nginx
replicas: 2
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.14.2
ports:
- containerPort: 80
Now examine this command which executes successfully:
$ kubectl create -f deployment.yaml
Which two statements are true?
Examine these commands executed by root:
# mkdir -p /jail /jail/bin /jail/lib64
# cp $(which bash) /jail/bin/
# ldd $(which bash)
linux-vdso.so.1 (0x00007ffd574f5000)
libtinfo.so.6 => /lib64/libtinfo.so.6 (0x00007fb458c2c000)
libdl.so.2 => /lib64/libdl.so.2 (0x00007fb458a28000)
libc.so.6 => /lib64/libc.so.6 (0x00007fb458666000)
/lib64/ld-linux-x86-64.so.2 (0x00007fb459177000)
# cp /lib64/libtinfo.so.6 /jail/lib64/
# cp /lib64/libdl.so.2 /jail/lib64/
# cp /lib64/libc.so.6 /jail/lib64/
# cp /lib64/ld-linux-x86-64.so.2 /jail/lib64/
# chroot /jail
What is the output from the cd, pwd, and ls commands?
Examine this segment of /etc/rsyslog.conf:
# Log all kernel messages to the console.
# Logging much else clutters up the screen.
#kern.* /dev/console
# Log anything (except mail) of level info or higher.
# Don’t log private authentication messages!
*.info;mail.none;authpriv.none;cron.none /var/log/messages
# The authpriv file has restricted access.
authpriv.* /var/log/secure
# Log all the mail messages in one place.
mail.* -/var/log/maillog
# Log cron stuff
cron.* /var/log/cron
# Everybody gets emergency messages
*.emerg :omusrmsg:*
Now examine this log output:
less
Nov 9 20:32:16 server02 sudo[4570]: pam_unix(sudo:session): session opened for user opc (uid=0)
Nov 9 20:32:17 server02 sudo[4570]: pam_unix(sudo:session): session closed
Nov 9 20:32:24 server02 unix_chkpwd[4661]: password check failed for user
Nov 9 20:32:24 server02 su[4581]: pam_unix(su:auth): authentication failed; logname= uid=1000 euid=0 tty=pts/0 ruser=opc rhost= user=root
Which setting enabled the reporting of this log file output?
Examine this output:
Last metadata expiration check: 4:30:21 ago on Mon 26 Oct 2020 03:09:52 PM GMT
Installed Packages
Name : gzip
Version : 1.9
Release : 9.el8
Architecture : x86_64
Size : 412 k
Source : gzip-1.9-9.el8.src.rpm
Repository : @System
From repo : anaconda
Summary : The GNU data compression program
URL : http://www.gzip.org/
License : GPLv3+ and GFDL
Description : The gzip package contains the popular GNU gzip data compression
program. Gzipped files have a .gz extension.
Gzip should be installed on your system, because it is a very
commonly used data compression program.
Which command generated it?
Examine these commands, which execute successfully:
# firewall-cmd --zone=public --add-service=cockpit --permanent
# firewall-cmd --zone=public --add-port=1313/tcp --permanent
# firewall-cmd --reload
Which are true upon execution?
The ss command was invoked with options to:
limit output to all listening and non-listening TCP ports
display ports instead of the protocols that typically use those ports
display all available internal TCP information
display only connections whose source or destination port is 80
Which two results are produced by the command?