Which of the following commands is used to start or stop a standalone service immediately?
You want to verify the PGP signature of all headers and signatures associated with an RPM package. Which of the following commands will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following files lists the file systems to be mounted automatically at startup?
You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
You have recently been appointed as a Network Administrator for Rick International Inc. The company has a Linux-based network. You have to print an important file named secure.txt urgently. You therefore want to know what printers are currently configured on your computer and how you can connect to them. Which of the following commands will you use to accomplish the task?
Which of the following files contain messages and errors from security-related system?
Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?
You work as a Network Administrator for Tech Perfect Inc. You want to configure quotas for everyone on the /home directory. What will you add to the options in /etc/fstab?
Each correct answer represents a complete solution. Choose two.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. The company is using the host-based access control to avoid unwanted access of the malicious users. John wants to add a new user, which can use X applications from the remote computer. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements is true about Linux kernel?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for McNeil Inc. You are configuring a hard disk drive of a Linux server.
Which of the following steps can prevent the server from failure due to a log file or user quota overrun?
Which of the following commands can be used to power off a Linux computer?
Each correct answer represents a complete solution. Choose all that apply.
You are novice user of Linux. You forgot your password. Which of the following commands will you use to change your password?
Which of the following commands is used to create a new group in a Linux server?
Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?
Which of the following statements are true about rsync?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?
Which of the following mkswap command options can be used to allow the creation of a swap area that is larger than the file or partition area on which it resides?
You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?
Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?
Which of the following statements about Logical Volume Management (LVM) is true?
Each correct answer represents a complete solution. Choose all that apply.
After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
Which of the following statements are true about rsync? Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?
The ____ command is used to view the TCP/IP configuration on a Windows 9x computer.
In order to access any other devices, such as a floppy drive, the relevant device node must be created. Which of the following commands will you use to make device nodes manually?
Which of the following commands is used to start a preconfigured network interface?
Which of the following commands can be used to delete all jobs queued in a printer?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You are configuring a new computer that will work as a file server. You have decided to use ten hard disk drives in a RAID-5 array. Each hard disk has 40GB capacity. How much space will be available for file storage?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently run the yum clean packages command. What does this command do?
Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?
In, which of the following directories all configuration files are usually stored?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You are required to boot a server in single-user mode. Which of the following runlevels will you choose to accomplish the task?
Which of the following commands is used to change file access permissions in Linux?
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are configuring a UPS for a Linux server. You want to configure the computer as follows:
The server should automatically shut down after ten minutes of power failure.
The server should inform the administrator that the shut down process has started.
Which of the following files will help you to configure these settings?
Which of the following SHELL commands displays currently logged-in users and their tasks?
Which of the following commands is used to compare the contents of two files for differences?
Which of the following files should be edited to modify kernel module configuration settings?
Which of the following tools can be used to manage Red Hat Virtualization environment?
Which of the following runlevel values is used to halt the Linux operating system?
Which of the following commands will you run to list all files that have been modified within the last 60 minutes?
Which of the following commands displays information for all filesystems that have quota enabled?
Which of the following statements are true about kernel modules?
Each correct answer represents a complete solution. Choose all that apply.
You want only the root access in a Linux computer for maintenance purposes. Which of the following runlevels will you use to boot the computer?
Which of the following files contains the names and locations of system log files?
You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder? Each correct answer represents a part of the solution. Choose all that apply.
Which of the following files is used to initialize a computer-wide environment on a Linux computer?
Which of the following commands can be used to overwrite an existing kernel image file?
Which of the following commands is used to list all contents of a superblock of a partition?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Mac World Inc. The company has a Linux-based network. Your Linux computer turns off because of power outage. The UPS was unable to provide backup power. Which of the following utilities will run automatically during the next boot to scan the hard disk for the possibility of file system damage?
Which of the following commands is used to create a user account for a new user?
You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?
Fill in the blank with the appropriate command.
The ________ command recursively removes files, which have not been accessed for a period of time.
Which of the following commands creates a new logical volume in a volume group?
You work as a Network Administrator for Perfect Solutions Inc. You are required to configure a hard disk for a Linux workstation. You are using the FDISK utility to configure it. Which of the following options will you use to show all the existing partitions of the hard disk?
You work as a Network Administrator for Rick Inc. The company has a Linux-based network. You are configuring a Linux server. Which of the following bootloaders does not require to be rewritten after the configuration of the kernel has been changed?
Which of the following commands or command flags can be used to list the installed services and their associated runlevels?
Which of the following commands is used to make a swap active after creating a new SWAP partition?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.
You have configured a database server in the network. Users complain that the server has become remarkably slow. However, the previous day, the server was performing well. You know that some of the processes may be the cause of the issue. You run the PS command on the server. In the result set, which information will you look at that suggests the problematic process?
Which of the following commands is used to modify the kernel parameters at runtime?
In which of the following files, RHEL stores its network interface configuration information?
Which of the following tools is used to view and/or change the speed and duplex settings for the network card?
Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?
Which of the following files contain the information on how init should set up the system in every run level?
Which of the following Linux commands can be used to set an expiration date for a user ' s password?
Which of the following commands can be used to view addresses assign to each interface?
While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.
Which of the following commands is used to create repomd repository to hold packages in Linux system?
When you are installing RHEL on a system how much swap space should be given in partition?