Unit 3 - Practice Quiz

CSC202 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary role of a software package manager?

Managing Software: Understand software management Easy
A. To monitor network traffic for security threats
B. To automate the process of installing, updating, configuring, and removing software packages
C. To write and compile source code for new applications
D. To manage user accounts and permissions

2 In the context of software management, what is a 'dependency'?

Managing Software: Understand software management Easy
A. An optional plugin that adds extra features to a program
B. A backup copy of an application
C. The end-user license agreement for a piece of software
D. A software library or package that another program requires to function correctly

3 Which command is commonly used to install a package on an RPM-based Linux distribution like CentOS or Fedora?

Managing Software: Manage RPM software packages and repositories Easy
A. dnf install package_name
B. apt-get install package_name
C. install-package package_name
D. pacman -S package_name

4 What is the standard file extension for a Red Hat Package Manager file?

Managing Software: Manage RPM software packages and repositories Easy
A. .tar.gz
B. .deb
C. .rpm
D. .exe

5 On a Debian-based system like Ubuntu, which command should you run to update the local list of available packages?

Managing Software: Manage Debian-based software packages and repositories Easy
A. sudo dnf refresh
B. sudo yum update
C. sudo apt update
D. sudo apt upgrade

6 What is the low-level tool used to manage .deb packages on Debian and its derivatives?

Managing Software: Manage Debian-based software packages and repositories Easy
A. make
B. dpkg
C. yum
D. rpm

7 In the common three-step process for compiling software from source (configure, make, make install), what is the purpose of the first step, ./configure?

Managing Software: Compile from source code Easy
A. To compile the source code into binary files
B. To copy the compiled files to their final destination
C. To check the system for required dependencies and create a Makefile
D. To download the source code from the internet

8 What does the make command do when you are building software from source?

Managing Software: Compile from source code Easy
A. It configures the build environment
B. It reads the Makefile and executes the commands to compile the program
C. It installs the program onto the system
D. It deletes the source code after compilation

9 What is a software 'repository'?

Managing Software: Acquire software Easy
A. A type of computer virus that replicates software
B. A centralized server or location where software packages are stored and maintained for distribution
C. A list of all software currently installed on a computer
D. A text file containing source code

10 What is generally the safest way to acquire and install software on a Linux system?

Managing Software: Acquire software Easy
A. Using the official package manager and repositories provided by the distribution
B. Disabling security features before installation
C. Compiling source code found on a random forum
D. Downloading and running scripts from untrusted websites

11 What is the primary security benefit of running an application in a sandbox?

Managing Software: Run software in a sandbox Easy
A. It makes the application run significantly faster
B. It automatically compresses the application to save disk space
C. It provides a better user interface for the application
D. It isolates the application, restricting its access to the host operating system and user data

12 Which of the following technologies is commonly used to implement application sandboxing?

Managing Software: Run software in a sandbox Easy
A. LVM (Logical Volume Management)
B. RAID (Redundant Array of Independent Disks)
C. Containerization (e.g., Docker, Podman)
D. DNS (Domain Name System)

13 What does the acronym RAID stand for?

Administering Storage: Understand storage Easy
A. Rapid Application Internet Deployment
B. Read-Only Archived Information Directory
C. Redundant Array of Independent Disks
D. Random Access Integrated Drive

14 What is a major difference between a Solid-State Drive (SSD) and a Hard Disk Drive (HDD)?

Administering Storage: Understand storage Easy
A. SSDs have no moving parts, while HDDs use spinning platters
B. HDDs are significantly faster than SSDs
C. SSDs are always larger in capacity than HDDs
D. SSDs can only store data temporarily

15 What is the process of creating a filesystem on a storage partition called?

Administering Storage: Deploy storage Easy
A. Partitioning
B. Mounting
C. Swapping
D. Formatting

16 Which of the following is a common, modern filesystem used by default in many Linux distributions?

Administering Storage: Deploy storage Easy
A. FAT32
B. APFS
C. ext4
D. NTFS

17 What does NAS stand for in the context of computer storage?

Administering Storage: Manage other storage options Easy
A. New Age Software
B. Network Attached Storage
C. Native Archiving System
D. Network Access Server

18 What is a primary advantage of using Logical Volume Management (LVM) in Linux?

Administering Storage: Manage other storage options Easy
A. It increases the physical read/write speed of the disk
B. It is the only way to create partitions
C. It provides more flexible disk space management, like easy volume resizing
D. It automatically encrypts all data written to the disk

19 Which Linux command is typically used to check the amount of free disk space on mounted filesystems?

Administering Storage: Troubleshoot storage Easy
A. df -h
B. ls -l
C. du -h
D. free

20 What is the main purpose of S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology) for hard drives?

Administering Storage: Troubleshoot storage Easy
A. To organize files more efficiently
B. To increase the speed of data transfers
C. To monitor drive health and predict potential failures
D. To encrypt the data on the drive

21 An administrator on a RHEL-based system needs to find out which installed package provides the /etc/ssh/sshd_config file. Which of the following commands will accomplish this?

Managing Software: Manage RPM software packages and repositories Medium
A. A) rpm -qf /etc/ssh/sshd_config
B. B) yum whatprovides /etc/ssh/sshd_config
C. D) dnf search /etc/ssh/sshd_config
D. C) rpm -ql sshd_config

22 A system administrator on a Debian system has just run apt update. They now want to see a list of all installed packages that have available upgrades, without actually performing the upgrade. Which command should they use?

Managing Software: Manage Debian-based software packages and repositories Medium
A. B) apt-get upgrade --simulate
B. D) apt-cache policy
C. A) apt list --upgradable
D. C) dpkg --get-selections | grep hold

23 An administrator is setting up a new Linux server and needs to prepare a new, unformatted disk /dev/sdc for use with LVM. What is the correct first step in the LVM setup process for this disk?

Administering Storage: Deploy storage Medium
A. B) Run vgcreate my_vg /dev/sdc to create a volume group directly.
B. D) Run lvcreate -n my_lv -L 10G my_vg to create a logical volume on the disk.
C. C) Run mkfs.ext4 /dev/sdc to format the disk before adding it to LVM.
D. A) Run pvcreate /dev/sdc to initialize it as a physical volume.

24 An administrator is compiling software from source on a multi-core server. The ./configure script has been run successfully. To significantly speed up the compilation process, which command should be used to utilize 8 CPU cores?

Managing Software: Compile from source code Medium
A. A) make -j 8
B. D) make && make install -j 8
C. B) make --threads=8
D. C) compile --parallel=8

25 A user reports that a filesystem mounted at /data is full. df -h shows the partition is at 100% usage. However, du -sh /data reports a total size significantly less than the partition's capacity. What is the most common cause for this discrepancy?

Administering Storage: Troubleshoot storage Medium
A. A) A running process has an open file descriptor to a large, deleted file.
B. C) The du command does not have permission to read all subdirectories.
C. D) The filesystem is thinly provisioned and has over-allocated space.
D. B) The filesystem has run out of available inodes.

26 What is the primary security benefit of running an application inside a container (like Docker) or using a sandboxing tool like Firejail?

Managing Software: Run software in a sandbox Medium
A. A) It isolates the application's processes and filesystem access from the host system.
B. C) It encrypts the application's binary code to prevent reverse engineering.
C. B) It automatically resolves all software dependencies for the application.
D. D) It guarantees the application will run faster due to kernel optimizations.

27 In the context of storage technologies, what is the key difference between Network Attached Storage (NAS) and a Storage Area Network (SAN)?

Administering Storage: Understand storage Medium
A. D) NAS provides block-level access to clients, while SAN provides file-level access.
B. A) NAS presents storage as a file-based share (e.g., NFS, SMB), while SAN presents storage as block-level devices.
C. B) NAS uses fiber optic cables exclusively, while SAN uses standard Ethernet networks.
D. C) NAS is used for backups only, while SAN is used for primary application storage.

28 A developer asks you to install a specific version of a Node.js library for their project, but they want it isolated from the system's global packages. Which of the following approaches best satisfies this requirement?

Managing Software: Acquire software Medium
A. B) Use yum install nodejs-library to install it from the system's repository.
B. C) Compile the library from source and install it into /usr/local/bin.
C. A) Use Node Version Manager (nvm) or a local node_modules directory within the project.
D. D) Download a binary RPM and install it using rpm -ivh --force.

29 An administrator tries to install a local RPM file with dnf install myapp.rpm, but the installation fails due to a missing dependency, libexample.so.2. This dependency is available in a newly added, but disabled, repository called extra-tools. Which command will successfully install the package and its dependency?

Managing Software: Manage RPM software packages and repositories Medium
A. D) dnf config-manager --set-enabled extra-tools && rpm -ivh myapp.rpm
B. B) rpm -ivh myapp.rpm --resolve-deps
C. C) dnf install myapp.rpm && dnf install libexample
D. A) dnf --enablerepo=extra-tools install myapp.rpm

30 An administrator needs to create a 2GB file that will be used as a loop device for a virtual disk. The file should be pre-allocated and filled with zeros. Which command is most appropriate for this task?

Administering Storage: Manage other storage options Medium
A. B) fallocate -l 2G /path/to/disk.img
B. A) dd if=/dev/zero of=/path/to/disk.img bs=1M count=2048
C. C) truncate -s 2G /path/to/disk.img
D. D) mkfs -t ext4 -b 2048 /path/to/disk.img

31 A critical security update for the openssl package has been released. An administrator on an Ubuntu server wants to install only this specific update and its required dependencies, without upgrading any other packages on the system. Which command should be used?

Managing Software: Debian-based software packages and repositories Medium
A. C) apt-get install openssl
B. D) dpkg -i openssl_latest.deb
C. B) apt-get upgrade openssl
D. A) apt-get install --only-upgrade openssl

32 Which of the following best describes the concept of a 'dependency hell' in software management?

Managing Software: Understand software management Medium
A. A) A situation where multiple applications require different and conflicting versions of the same shared library.
B. B) The process of manually compiling every single dependency a program needs from source code.
C. D) When a package manager's repository server is offline and cannot be reached.
D. C) A software package that has been digitally signed by an untrusted source.

33 An administrator has a Volume Group named vg_data with 50GB of free space. They need to create a new 20GB Logical Volume named lv_apps formatted with the XFS filesystem and mount it persistently at /apps. Which sequence of commands is correct?

Administering Storage: Deploy storage Medium
A. A) lvcreate -n lv_apps -L 20G vg_data, then mkfs.xfs /dev/vg_data/lv_apps, then add to /etc/fstab and mount.
B. D) lvcreate -n lv_apps -l 100%FREE vg_data, then mkfs.xfs /dev/vg_data/lv_apps, then add to /etc/fstab and mount.
C. B) mkfs.xfs /dev/vg_data -L 20G, then lvcreate -n lv_apps /dev/vg_data, then add to /etc/fstab and mount.
D. C) lvextend -L +20G /dev/vg_data/lv_apps, then mkfs.xfs /dev/vg_data/lv_apps, then add to /etc/fstab and mount.

34 After successfully running ./configure and make, an administrator runs make install. By default, where does this command typically place the compiled binaries and associated files?

Managing Software: Compile from source code Medium
A. D) Within the user's home directory (e.g., ~/bin).
B. C) Directly into /usr/bin and /usr/lib, overwriting system packages.
C. A) In subdirectories of /usr/local (e.g., /usr/local/bin, /usr/local/lib).
D. B) In subdirectories of /opt.

35 A Linux server's root filesystem is nearly full. An administrator needs to find the largest files and directories within /var/log to identify what can be cleaned up. Which of the following commands is most effective for this specific task?

Administering Storage: Troubleshoot storage Medium
A. C) find /var/log -type f -size +100M
B. B) ls -lSh /var/log
C. D) df -ih /var/log
D. A) du -ah /var/log | sort -rh | head -n 20

36 When using a tool like AppArmor or SELinux, what is the primary mechanism used to confine an application and restrict its capabilities?

Managing Software: Run software in a sandbox Medium
A. A) Attaching a security policy or profile to the application's executable that defines allowed actions (e.g., file access, network ports).
B. B) Running the application as a special, unprivileged user with a restricted home directory.
C. D) Intercepting all system calls made by the application and requiring user approval for each one.
D. C) Encapsulating the application within a lightweight virtual machine with its own kernel.

37 Which of the following RAID levels provides redundancy through disk mirroring but does not offer any performance improvement for write operations?

Administering Storage: Understand storage Medium
A. B) RAID 0
B. C) RAID 5
C. A) RAID 1
D. D) RAID 10

38 A system administrator needs to install software that is not available in their distribution's official repositories. The vendor provides the software as an AppImage file. What is the correct procedure to run this software?

Managing Software: Acquire software Medium
A. D) Mount the AppImage file as a loop device and copy the contents to /opt.
B. C) Extract the contents of the AppImage file using tar and run the binary inside.
C. B) Use apt install ./software.AppImage to register it with the package manager.
D. A) Make the AppImage file executable (chmod +x) and then run it directly (./software.AppImage).

39 What is the primary use case for creating a swap partition or a swap file on a Linux system?

Administering Storage: Manage other storage options Medium
A. B) To create a temporary filesystem that resides entirely in RAM for high-speed file operations.
B. D) To act as a cache for the package manager to speed up software installation.
C. C) To store a backup copy of the master boot record (MBR) for system recovery.
D. A) To provide virtual memory, allowing the system to move inactive memory pages from RAM to disk when physical memory is low.

40 What is the role of a package repository in a Linux distribution's software management system?

Managing Software: Understand software management Medium
A. C) The source code archive for a single application before it is compiled.
B. A) A centralized server that stores and manages a collection of software packages, metadata, and cryptographic keys for a distribution.
C. D) A version control system like Git used to manage changes to system configuration files.
D. B) A local database file on a client system that tracks all currently installed software and their versions.

41 A system administrator runs dnf update on a critical RHEL 8 server, but the transaction fails due to a file conflict between an updated package foo-2.0 and a manually installed file from another package bar-1.0. The error is /usr/bin/foobar conflicts with file from package bar-1.0-1.x86_64. The administrator cannot remove bar-1.0 as it's a legacy dependency. Which dnf command is the most appropriate and safest way to proceed with the update while resolving the conflict?

Managing Software: Manage RPM software packages and repositories Hard
A. rpm -e --nodeps bar-1.0 && dnf update && dnf install bar-1.0
B. dnf update --setopt=tsflags=noscripts
C. dnf update --skip-broken
D. dnf update --allowerasing

42 You are managing a Debian server with repositories for stable, testing, and backports. You need to install the latest version of nginx from testing (1.20) but keep all other packages from stable (which has nginx 1.18). However, you also want to ensure that any security updates for nginx from stable-security (e.g., 1.18.0-1+deb11u1) are given higher priority than the version from testing if they are released. Which of the following /etc/apt/preferences.d/nginx-pin configurations correctly achieves this complex pinning strategy?

Managing Software: Manage Debian-based software packages and repositories Hard
A. Package: *
Pin: release a=stable
Pin-Priority: 500

Package: nginx
Pin: release a=testing
Pin-Priority: 900

Package: nginx
Pin: release a=stable-security
Pin-Priority: 1000
B. Package: nginx
Pin: version 1.20
Pin-Priority: 990

Package:

Pin: release a=stable
Pin-Priority: 500
C. Package: nginx
Pin: release a=testing
Pin-Priority: 900

Package: nginx
Pin: release l=Debian-Security
Pin-Priority: 1001
D. Package: nginx
Pin: release a=testing
Pin-Priority: 990

Package:

Pin: release a=stable
Pin-Priority: 900

Package: *
Pin: origin security.debian.org
Pin-Priority: 1001

43 You are compiling a complex piece of software on a hardened system where standard library paths are not used. The configure script fails, unable to find the libcrypto library, which is located in /opt/custom/ssl/lib64, with its headers in /opt/custom/ssl/include. You have already set export LD_LIBRARY_PATH=/opt/custom/ssl/lib64. Why is the configure script still failing, and what is the most robust solution?

Managing Software: Compile from source code Hard
A. The LD_LIBRARY_PATH is only used at runtime, not compile time. The solution is to use configure --with-ssl-dir=/opt/custom/ssl.
B. The LD_LIBRARY_PATH variable is incorrect; it should be LD_PRELOAD. The solution is to use export LD_PRELOAD=/opt/custom/ssl/lib64/libcrypto.so.
C. LD_LIBRARY_PATH is for runtime linking. The configure script needs compile-time flags. The solution is to set environment variables: LDFLAGS="-L/opt/custom/ssl/lib64" CPPFLAGS="-I/opt/custom/ssl/include" ./configure.
D. LD_LIBRARY_PATH is correct but the linker cache is stale. The solution is to run ldconfig before ./configure.

44 A database server with an XFS filesystem on /dev/sdb1 experiences a power failure. Upon reboot, the system hangs during the mount process for /dev/sdb1. dmesg shows messages indicating a corrupt log: XFS (sdb1): Log recovery failed. You cannot afford to lose data by reformatting. Which command sequence represents the safest and most appropriate first attempt at recovery?

Administering Storage: Troubleshoot storage Hard
A. mount -o ro,norecovery /dev/sdb1; rsync /data /backup; umount /dev/sdb1; xfs_repair /dev/sdb1
B. xfs_repair -L /dev/sdb1
C. xfs_repair -n /dev/sdb1; xfs_repair /dev/sdb1
D. xfs_logprint /dev/sdb1; xfs_admin -z /dev/sdb1; mount /dev/sdb1

45 You are sandboxing a legacy network service using systemd's sandboxing features. The service needs to bind to port 2049 on the loopback interface (127.0.0.1) and have read-only access to /etc and read-write access to its state directory in /var/lib/legacy-svc. All other filesystem access, network capabilities (beyond loopback), and privileges must be denied. Which combination of directives in the [Service] section of the systemd unit file achieves the most secure configuration meeting these requirements?

Managing Software: Run software in a sandbox Hard
A. RootDirectory=/var/lib/legacy-svc
CapabilityBoundingSet=CAP_NET_BIND_SERVICE
PrivateTmp=yes
B. ProtectSystem=strict
PrivateDevices=yes
NetworkNamespacePath=/proc/self/ns/net
ReadWritePaths=/var/lib/legacy-svc
C. ProtectSystem=full
PrivateNetwork=yes
InaccessiblePaths=/
ReadWritePaths=/var/lib/legacy-svc
ReadOnlyPaths=/etc
D. ProtectSystem=strict
PrivateNetwork=yes
ReadWritePaths=/var/lib/legacy-svc
BindReadOnlyPaths=/etc

46 An administrator needs to create a 100GiB thin-provisioned LVM logical volume named lv_thin within the volume group vg_data, backed by a 20GiB thin pool named thin_pool. They then need to format it with ext4. What is the correct sequence of commands to accomplish this?

Administering Storage: Deploy storage Hard
A. lvcreate -L 20G -T vg_data/thin_pool
lvextend -L +80G vg_data/thin_pool
lvcreate -V 100G -n lv_thin vg_data/thin_pool
mkfs.ext4 /dev/vg_data/lv_thin
B. lvcreate -L 100G --thin vg_data/thin_pool
mkfs.ext4 /dev/vg_data/thin_pool
C. lvcreate -L 20G -T vg_data/thin_pool
lvcreate -V 100G -T vg_data/thin_pool -n lv_thin
mkfs.ext4 /dev/vg_data/lv_thin
D. lvcreate -L 20G --name thin_pool vg_data
lvcreate --virtualsize 100G --thinpool thin_pool --name lv_thin vg_data
mkfs.ext4 /dev/mapper/vg_data-lv_thin

47 You are managing a ZFS pool zpool1 with a dataset zpool1/data containing critical information. You need to create a point-in-time, read-only copy for backup verification and simultaneously create a writable clone of that copy for development testing, without duplicating the data blocks on disk initially. Which set of commands correctly and most efficiently accomplishes this?

Administering Storage: Manage other storage options Hard
A. zfs snapshot zpool1/data@backup
zfs send zpool1/data@backup | zfs receive zpool1/dev_clone
B. zfs clone zpool1/data zpool1/backup
zfs clone zpool1/backup zpool1/dev_clone
C. zfs snapshot -r zpool1/data@backup
zfs promote zpool1/data@backup
D. zfs snapshot zpool1/data@backup
zfs clone zpool1/data@backup zpool1/dev_clone

48 A user downloads a binary app.tar.gz, a signature file app.tar.gz.asc, and the developer's public key dev.key. The user has never interacted with this developer before. What is the correct and most secure sequence of gpg commands to verify the integrity and authenticity of the downloaded binary?

Managing Software: Acquire software Hard
A. gpg --verify dev.key app.tar.gz.asc
gpg --decrypt app.tar.gz.asc
B. gpg --import dev.key
gpg --edit-key <key_id>
> trust
> 5
> quit
gpg --verify app.tar.gz.asc app.tar.gz
C. gpg --sign-key dev.key
gpg --verify app.tar.gz.asc app.tar.gz
D. gpg --import dev.key
gpg --verify app.tar.gz.asc app.tar.gz

49 A system is being designed for a high-performance video editing workload, which involves sequential reads and writes of very large files (50-200 GB each) and requires protection against a single disk failure. The system has four 8TB NVMe drives available. To maximize sequential throughput and provide redundancy, which of the following storage configurations is optimal?

Administering Storage: Understand storage Hard
A. A ZFS pool configured as a single RAID-Z1 vdev.
B. An XFS filesystem on an LVM-managed RAID 5 array.
C. An XFS filesystem on a Linux software RAID 0 array, with nightly backups.
D. A Btrfs filesystem on a RAID 10 array.

50 You are creating a custom RPM package. You need a script to run before the transaction begins, to check for a specific kernel module. If the module is not loaded, the entire transaction (including this package and any others being installed with it) should fail. Where in the RPM .spec file should this script be placed?

Managing Software: Manage RPM software packages and repositories Hard
A. %verifyscript
B. %pre
C. %triggerin
D. %pretrans

51 A server's root ext4 filesystem (/dev/sda2) is full. After deleting 10GB of log files, df -h still shows 100% usage. lsof | grep deleted reveals that a running daemon, app-daemon, still has an open file descriptor to a large, now-deleted log file. The daemon cannot be restarted due to a critical ongoing process. What is the most effective command to reclaim the disk space without restarting the daemon?

Administering Storage: Troubleshoot storage Hard
A. lsof -p 2}' | xargs kill -9
B. sync; echo 3 > /proc/sys/vm/drop_caches
C. kill -HUP $(pidof app-daemon)
D. truncate -s 0 /proc/$(pidof app-daemon)/fd/<file_descriptor_number>

52 A system update via apt upgrade fails with a message about a package libfoo1 being held back. Running apt install libfoo1 reveals a complex dependency issue: libfoo1 requires libbar2 (>= 2.1), but an essential application critical-app depends specifically on libbar2 (= 2.0). Uninstalling critical-app is not an option. What is the most appropriate first step to diagnose the exact dependency chain causing the conflict?

Managing Software: Manage Debian-based software packages and repositories Hard
A. aptitude
B. apt-cache policy libfoo1 libbar2
C. apt-get -f install
D. dpkg --get-selections | grep hold

53 You are using firejail to sandbox a graphical application that needs to access a user's ~/Pictures directory but nothing else in their home directory. It also needs access to the X11 server and D-Bus. Which firejail command provides the most restrictive sandbox that still allows the application to function correctly?

Managing Software: Run software in a sandbox Hard
A. firejail --private=~/Pictures <app>
B. firejail --noprofile --net=none --x11 --whitelist=~/Pictures <app>
C. firejail --private --whitelist=~/Pictures <app>
D. firejail --blacklist=~/.config --blacklist=~/.local <app>

54 You are setting up an iSCSI target on a server and an initiator on a client. The discovery via iscsiadm -m discovery -t sendtargets -p <target_ip> works perfectly. However, the login iscsiadm -m node -l fails with iscsiadm: initiator reported error (8 - connection timed out). A firewall check shows the port (3260) is open. The initiator and target are on the same subnet. What is the most likely cause of this specific failure mode?

Administering Storage: Deploy storage Hard
A. The underlying storage LUN on the target has not been properly exported or is offline.
B. The initiator name in /etc/iscsi/initiatorname.iscsi on the client does not match any ACL on the iSCSI target.
C. The client and server have a mutual CHAP secret mismatch.
D. The target portal IP address is configured incorrectly in the target's configuration daemon.

55 After successfully compiling and installing an application from source using the standard ./configure && make && sudo make install procedure, you discover that the system's package manager (e.g., dnf or apt) is now unaware of the installed files. This could lead to conflicts later. What tool could have been used in place of sudo make install to integrate the build into the system's package manager, and what is its primary mechanism?

Managing Software: Compile from source code Hard
A. alien, which converts an existing package from one format to another (e.g., .rpm to .deb).
B. stow, which uses symbolic links to manage files installed in a separate prefix.
C. checkinstall, which runs the make install process but intercepts the file installation to build a native package (.deb or .rpm).
D. make package, which is a standard Makefile target that creates a native package if the developer included it.

56 When configuring an ext4 filesystem for a server that hosts millions of very small (<4KB) files, which mkfs.ext4 option would have the most significant positive impact on storage efficiency by reducing metadata overhead?

Administering Storage: Understand storage Hard
A. mkfs.ext4 -i 1024 /dev/sdX1
B. mkfs.ext4 -O large_file /dev/sdX1
C. mkfs.ext4 -b 1024 /dev/sdX1
D. mkfs.ext4 -O inline_data /dev/sdX1

57 You are managing a Btrfs filesystem and have created several snapshots of a subvolume. Over time, many files have been deleted from the active subvolume, but df shows that no space has been freed. What is the reason for this, and what is the proper way to reclaim the space?

Administering Storage: Manage other storage options Hard
A. You need to run btrfs balance start /mountpoint to force the filesystem to re-evaluate free space.
B. The autodefrag mount option must be enabled to reclaim space from deleted files in a CoW filesystem.
C. The Btrfs cleaner kernel thread is stuck; a reboot is required to reclaim space.
D. The deleted data blocks are still referenced by the old snapshots. The space will be freed only after all snapshots referencing those blocks are deleted.

58 What is the primary difference in how a statically linked binary and a dynamically linked binary handle external library dependencies, and what is a major security implication of this difference?

Managing Software: Understand software management Hard
A. Statically linked binaries are placed in /usr/local/bin while dynamically linked binaries are in /usr/bin. This affects the system's PATH and can be exploited.
B. Dynamic linking uses the LD_PRELOAD environment variable to load libraries, which is a security risk. Statically linked binaries do not use this variable.
C. Static linking includes all library code in the final executable, making it larger but self-contained. A security flaw in a library requires recompiling the application. Dynamic linking references shared system libraries at runtime.
D. Static linking is faster because it resolves symbols at compile time. A security flaw in a static library cannot be patched. Dynamic linking is slower but more secure.

59 At boot, a system with LVM on top of software RAID 1 drops to an initramfs emergency shell. The error message indicates that a volume group (vg_root) cannot be found. Running cat /proc/mdstat shows the RAID array (/dev/md0) is active and clean. Running pvscan shows no results. What is the most likely cause and the correct command to run from the emergency shell to resolve it?

Administering Storage: Troubleshoot storage Hard
A. The LVM cache is out of sync. The solution is vgscan --mknodes followed by vgchange -ay.
B. The LVM physical volume metadata on the RAID array is corrupt. The solution is pvcreate --restorefile /etc/lvm/backup/vg_root /dev/md0.
C. The initramfs is missing the LVM tools. The solution is to reboot with a rescue disk and rebuild the initramfs using dracut -f.
D. The RAID array was assembled after LVM tried to scan for devices. The solution is to manually trigger a scan with lvm vgscan and then lvm vgchange -ay.

60 A company policy requires that all third-party software be run as a Flatpak application. A developer needs to use a proprietary GUI application that is only distributed as a .deb package. What is the most viable and self-contained method for the developer to use this application while adhering to the Flatpak-only policy?

Managing Software: Acquire software Hard
A. Extract the .deb file using ar and tar, and manually place the binaries and libraries in /usr/local, then create a .desktop file.
B. Install the .deb package inside a Docker container and run the GUI application by forwarding the X11 socket to the container.
C. Create a custom Flatpak manifest (.json or .yaml file) that details how to fetch the .deb file, extract its contents, and package them into a Flatpak application using flatpak-builder.
D. Use the alien tool to convert the .deb package to an .rpm and install it with rpm -i.