Which of the following commands displays information for all filesystems that have quota enabled?
Which of the following statements is true about Linux kernel?
Each correct answer represents a complete solution. Choose all that apply.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quota. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?
When installing RHEL in the graphical interface, which of the following switches can be used to specify a resolution?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to run the cc process at runlevel three. If the order of execution of cc command is 43, which of the following commands will John use to accomplish his task?
Which of the following commands will you run to list all files that have been modified within the last 60 minutes?
You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?
After creating the swap area, which of the following commands will you need to run to start using it?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?
You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands is used to mount file systems?
Which of the following commands can be used to overwrite an existing kernel image file?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to print a file named print.txt. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?
During the boot process of a Linux computer, which of the following daemons is called after the kernel is loaded?
Which of the following commands is used to check /etc/fstab file in Linux?
Which of the following is an operating system ancestor of Linux?
Which command creates a database that describes kernel's modules dependencies?
In which of the following files, RHEL stores its network interface configuration information?
Which of the following command is used to list the current routing table in Linux?
Which of the following is the only domain in Xen environment from which an administrator can send command to the Hypervisor?
Which of the following commands is used to compress a tar file?
Which of the following commands can be used to determine the system's current mode?
While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.
Which of the following directories can be installed on a separate filesystem in Linux?
What is the maximum number of partitions that can be defined on a single hard disk?
Which of the following Linux commands can be used to set an expiration date for a user's password?
Which of the following commands displays the version number of the running Linux kernel?
Which of the following is a configuration file used to configure TCP wrappers?
Which of the following graphical tools can be used to create and modify Kickstart files?
Which of the following commands is used to compare the contents of two files for differences?
Which of the following commands is used to create filesystem in Linux?
Different options are used with the ethtool command to perform different tasks, such as to change the speed of Ethernet card, to change duplex settings of Ethernet card, etc. Drag and drop the appropriate option before its respective function.
Which of the following run-levels causes an X-based login to appear when the system is booted?
You work as a Network Administrator for McNeil Inc. You are configuring a hard disk drive of a Linux server.
Which of the following steps can prevent the server from failure due to a log file or user quota overrun?
Which of the following commands can be used to upgrade a package only if an earlier version of that package is already installed?
Each correct answer represents a complete solution. Choose all that apply.
Fill in the blank with the appropriate command's option.
________option is used with chage command to change the number of days of warning before a password change is required.
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?
Drag and drop the appropriate file name before the respective information it contains.
Which of the following images provide support for different types of network interface cards and other network devices?
What is the maximum number of partitions that Linux kernel supports for IDE drives?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.weare-secure.com. He enters the following command on the Linux terminal: chmod 741 secure.c Considering the above scenario, which of the following statements are true?
Each correct answer represents a complete solution. Choose all that apply.
You are using RHEL 5 on your system. You want to know, what kernel version is currently running in RHEL 5. Which of the following commands will you use to accomplish this task?
Each correct answer represents a complete solution. Choose two.
Which of the following commands will you use to list all local and remote printers attached to your computer?
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure
X?
You want to repeat the last command you entered in the bash shell. Which of the following commands will you use?
Which of the following files must be edited to alter the run level?
Which of the following commands issues a warning to logged-in users before the shutdown process begins in a Linux server?