An administrator is using a configuration management tool to define a system’s configuration. The defined configuration can be used to provision new systems, rebuild existing systems, or roll back systems
to their original baseline configurations.
Which of the following BEST describes what the administrator is doing?
A technician suspects a company's border firewall is down, thus blocking Internet access. The technician executes the following commands:
#ping -c 1 firewall.company.com
64 bytes from firewall.company.com (192.168.1.1): icmp_seq=1 ttl=64 time=0.061ms
#ping -c 16
16 packets transmitted, 0 received, 100% packet loss, time 14999ms
Which of the following commands should the technician use to BEST determine the source of this outage?
A systems administrator uses a remote execution engine to iterate through each IP address in a network and run a script on remote hosts. The script captures the remote system's hostname, IP address, OS distribution, and system uptime. The output of the script gets saved to the administrator's local workstation for future processing.
Which of the following is this an example of?
A user requested a USB serial device to be added to a desktop computer. The device has built-in kernel driver
support. The administrator tested the device installation and access, but the user cannot access the serial port.
Each time the user attempts to access the device, an error log is created that shows the user does not have
permission to use the serial port. Which of the following will add a user to the group that has serial port
capabilities?