You want to temporarily change your primary group to another group of which you are a member.
In this process, a new shell will be created, and when you exit the shell, your previous group will be reinstated. Which of the following commands will you use to accomplish this task?
Which of the following commands is used to make a swap active after creating a new SWAP partition?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. The permissions on a file named Report are shown below:
rwxr--r—
You want to add a sticky bit to the file. Which of the following commands will you use?
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?
In Linux, which of the following prompts does the Shell display to indicate that the logged in user is Superuser?
Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?
Which of the following commands can be used to view addresses assign to each interface?
Which of the following commands can be used to burn a boot.iso file to CD?
Which command creates a database that describes kernel's modules dependencies?
You want to format a floppy disk in a Linux server. Which of the following commands will you use?
Which of the following commands is used to create physical volumes in Linux?
Which of the following run levels start the system in single user mode?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following files does mount command read to determine which options should be used when mounting the specified device?
Which of the following commands is used to see IP address, MAC address, and default gateway of a Linux system?
Which of the following is a configuration file used to configure TCP wrappers?
When you are installing RHEL on a system how much swap space should be given in partition?
Which of the following files is used to view the current status of RAID devices in Linux?
You work as a Network Administrator for Net World International. The company has a Linux-based network. You want to upgrade an RPM package and get the status during the upgrade. Which of the following commands will you use to accomplish the task?
Which of the following utilities is used to set ACL for files and directories?
John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server. John wants to give the following file permissions to the imp.c file:
l Read, Write, and Execute permissions to the owner
l Read and Write permissions to groups
l Read Only permissions to other users
Which of the following commands will John use to accomplish the task?
You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder? Each correct answer represents a part of the solution. Choose all that apply.
You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?
Which of the following statements are true about rsync?
Each correct answer represents a complete solution. Choose all that apply.
What does the third field in the process entry of the /etc/inittab file define?
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure
X?
Which of the following rpmbuild commands is used to print debugging information of an rpm package?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.
Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named RickGroup.txt. Which of the following commands will you use to accomplish the task?
Fill in the blank with the appropriate tool.
_________is a network diagnostic tool that combines the functionality of the traceroute and ping programs in a single network diagnostic tool.
In, which of the following directories all configuration files are usually stored?
Which of the following commands is used to create a new group in a Linux server?
You work as an Administrator for McNeil Inc. The company has a Linux-based network. You are logged in as a standard user on your client computer. You have started a process 1001 as a root user. You want to kill the process. Which of the following commands will you use to accomplish the task?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to decompress a gZipped tarball. Which of the following commands will John use to accomplish this task?
You have made some changes in the /etc/inittab file. Now, you want to make changes take effect without rebooting the operating system. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following mke2fs command parameters is used to read bad blocks from a given file?
What is the maximum number of partitions that Linux kernel supports for IDE drives?