Which tool in Linux allows for centralized authentication, often used in corporate environments?

  • LDAP (Lightweight Directory Access Protocol)
  • SSH (Secure Shell)
  • Cron
  • Samba
LDAP (Lightweight Directory Access Protocol) is the tool in Linux that allows for centralized authentication, often used in corporate environments. It provides a way to maintain a directory of users and their access privileges, making it easier to manage user accounts across multiple systems.

You are troubleshooting a server issue and want to continuously monitor the appended output of a log file as new content is written to it. Which command would you use?

  • tail -f
  • cat
  • less
  • grep
To continuously monitor the appended output of a log file, you would use the tail -f command. The -f option allows you to "follow" the file and see new content as it is added to the end. This is useful for real-time log monitoring.

You've encountered a script where a loop is expected to run five times, but it runs indefinitely. Which common debugging approach would you use to inspect the condition causing the loop to behave this way?

  • Insert echo statements
  • Set a timeout
  • Use set -x
  • Add more loops
To inspect the condition causing an infinite loop, you can insert echo statements within the loop to print relevant variables or check the loop counter. This allows you to understand what's happening at each iteration and identify the source of the issue. Debugging with echo statements is a common and effective approach for troubleshooting loops.

You're setting up a Linux server in an enterprise where user credentials are managed centrally. To ensure that Linux users can log in using their central credentials, which service or protocol should the Linux server support?

  • LDAP
  • RADIUS
  • Kerberos
  • TACACS+
To allow Linux users to log in using central credentials, you should support LDAP (Lightweight Directory Access Protocol). LDAP is a widely used protocol for centralizing user authentication and directory services, making it a suitable choice in enterprise environments.

You are tasked with setting up a virtualized environment on a Linux server, but you need to ensure that the virtual machines have near-native performance. Which combination of tools would best serve this purpose?

  • KVM and QEMU
  • VirtualBox and VMware
  • Xen and Docker
  • LXC and libvirt
The combination of KVM (Kernel-based Virtual Machine) and QEMU (Quick Emulator) is well-suited for creating a virtualized environment with near-native performance on a Linux server. KVM leverages hardware virtualization extensions to achieve high performance, while QEMU provides emulation for non-native architectures. This combination is commonly used for efficient virtualization.

In the context of network troubleshooting, what does the traceroute command help determine?

  • Network route and hops
  • Network latency and speed
  • Network security status
  • Network bandwidth utilization
The traceroute command helps determine the network route and hops between the local system and a destination. It shows the IP addresses of routers or devices through which data packets pass on their way to the destination, helping identify network connectivity issues or delays.

How can you generate a new pair of public and private keys for SSH authentication?

  • ssh-keygen
  • ssh-copy-id
  • ssh-add
  • ssh-agent
To generate a new pair of public and private keys for SSH authentication, you can use the ssh-keygen command. This command allows you to create key pairs, specify key types, and set options like key strength. After generating the keys, you can use them for secure SSH authentication.

Which command in Bash is used for multi-way branching?

  • case
  • if
  • for
  • while
In Bash scripting, the case command is used for multi-way branching. It is often used when you need to evaluate a variable or expression and take different actions based on its value. It's a powerful tool for creating conditional logic in scripts.

In the context of user authentication, what is a "salt" used for?

  • Adding randomness to a password before hashing
  • Encrypting user passwords
  • Verifying the user's identity
  • Generating secure tokens
In user authentication, a "salt" is used to add randomness to a password before hashing. This helps protect against common attacks like rainbow table attacks and ensures that even the same password will have different hash values due to the unique salt.

In Docker, a _________ is a lightweight, stand-alone, executable software package that includes everything needed to run a piece of software.

  • Container
  • Image
  • Virtual Machine
  • Repository
In Docker, an "image" is a lightweight, stand-alone, executable software package that includes everything needed to run a piece of software. Docker containers are created from these images, allowing you to run applications in an isolated environment.