A Linux administrator for a financial services company receives an automated alert indicating that the web server's average CPU utilization over the last hour has reached 85%, significantly exceeding the established baseline of 40%. This is the first such alert for this server. According to the company's troubleshooting policy, what should be the administrator's first step?
Immediately reboot the server to restore normal performance.
Submit a request to add more CPU cores to the server.
Adjust the monitoring baseline to a new threshold of 90% utilization.
Use top to identify the processes causing the high CPU usage.
The correct answer is to use a command-line tool like top or ps to identify which processes are consuming the most CPU resources. When performance metrics exceed an established baseline, the first step is always to investigate the cause of the deviation. Identifying the specific process(es) responsible for the high CPU usage allows the administrator to determine if the cause is a malfunctioning application, a runaway script, or unexpected heavy traffic, guiding further troubleshooting steps. Rebooting the server might temporarily clear the issue but does not identify the root cause. Adjusting the baseline would mean accepting poor performance as the new normal. Adding more CPU resources without investigation is a premature and potentially costly solution that doesn't address the underlying problem.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the `top` command in Linux?
Open an interactive chat with Bash
What are some alternatives to the `top` command for monitoring CPU usage?
Open an interactive chat with Bash
Why is it important to identify the root cause of high CPU usage before taking corrective action?
Open an interactive chat with Bash
CompTIA Linux+ XK0-006 (V8)
Troubleshooting
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access