An administrator set up a new user account called " test " . However, the user is unable to change their password. Given the following output:
Which of the following is the most likely cause of this issue?
Which of the following can be implemented with PAM to detect and block dictionary attacks?
A systems administrator is helping to secure a new web application. During the tests, the administrator obtains the following output to validate the application:
SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
ALPN, server accepted to use http/1.1
Server certificate:
subject: CN=*.newapp.comptia.org
start date: Jan 17 00:00:00 2024 GMT
expire date: Feb 16 23:59:59 2034 GMT
issuer: C=US; O=Comptia; OU=IT Security; CN=ca1.comptia.org
SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
Which of the following explains the validation results?
Following the completion of monthly server patching, a Linux administrator receives reports that a critical application is not functioning. Which of the following commands should help the administrator determine which packages were installed?
A systems administrator is decommissioning a service. Which of the following commands should the administrator use to make sure users cannot start the service again?
A systems administrator needs to integrate a new storage array into the company ' s existing storage pool. The administrator wants to ensure that the server is able to detect the new storage array. Which of the following commands should the administrator use to ensure that the new storage array is presented to the systems?
Which of the following commands should an administrator run to check for errors during startup?
Which of the following commands can be used to display current CPU utilization in real time on a Linux system?
An administrator receives reports that a web service is not responding. The administrator reviews the following outputs:
Which of the following is the reason the web service is not responding?
A Linux administrator wants to make the enable_auth variable set to 1 and available to the environment of subsequently executed commands. Which of the following should the administrator use for this task?