Which of the following actions are considered good security practices when hardening a Linux server? (Select two).
A systems administrator is deploying a web server using the following code:
pgsql
name "Web Server"
description "The role contains nodes, which act as a web server"
run_list "recipe[ntp]"
default_attributes "ntp" => {
"ntpdate" => {
"disable" => true
}
}
Which of the following technologies is the administrator using to create this web server?
Which of the following can be used as a secure way to access a remote termi-nal?
Users have been unable to reach www.comptia.org from a Linux server. A systems administrator is troubleshooting the issue and does the following:
Based on the information above, which of the following is causing the issue?
A Linux administrator modified the SSH configuration file. Which of the following commands should be used to apply the configuration changes?
A Linux user reported the following error after trying to connect to the system remotely:
ssh: connect to host 10.0.1.10 port 22: Resource temporarily unavailable
The Linux systems administrator executed the following commands in the Linux system while trying to diagnose this issue:
Which of the following commands will resolve this issue?
A systems administrator wants to delete app . conf from a Git repository. Which of the following commands will delete the file?
A Linux engineer needs to create a custom script, cleanup.sh, to run at boot as part of the system services. Which of the following processes would accomplish this task?
After starting an Apache web server, the administrator receives the following error:
Apr 23 localhost.localdomain httpd 4618] : (98) Address already in use: AH00072: make_sock: could not bind to address [: :]80
Which of the following commands should the administrator use to further trou-bleshoot this issue?
Which of the following is a benefit of a service mesh?