Which of the following is the default configuration file for the ifup command?
What is the maximum number of partitions that Linux kernel supports for SCSI drives?
Which of the following utilities is used by the remote dump and restore programs in manipulating a magnetic tape drive through an interprocess communication connection?
You work as a System Administrator for McNeil Inc. The company has a Linux based network. You are a root user on Red Hat operating system. You have upgraded the amount of RAM in your system from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want to add more swap space to /dev/hdb2 hard drive to run the applications that require a large amount of memory. Which of the following commands should you run to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.
Which of the following Linux commands is used to assign privileges over a particular file to a designated user?
Which of the following run levels start the system in single user mode?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands will you run to list all files that have been modified within the last 60 minutes?
Which of the following commands are used to remove a package from a Linux system?
Each correct answer represents a complete solution. Choose two.
Which of the following commands can be used to overwrite an existing kernel image file?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?
You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following files is used to view the current status of RAID devices in Linux?
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?
Fill in the blank with the appropriate command.
The ________ command recursively removes files, which have not been accessed for a period of time.
Which of the following commands is used to list all contents of a superblock of a partition?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the quota setting of the user named MariA. Which of the following commands will he use to accomplish the task?
By default, which of the following commands configures the current run level?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. A user complains that his Linux computer gets rebooted occasionally. Which of the following files will provide you the required information to troubleshoot the issue?
You want to shrink a Logical Volume manager partition named /dev/disk1/lvm from 4GB to 3GB. Which of the following commands can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder? Each correct answer represents a part of the solution. Choose all that apply.
You are a newly appointed network technician at Net Perfect Inc. The company has a Linux-based network. You want to install a package named firefox on your Linux system. Which of the following commands will you use to accomplish the task?
Which of the following commands is used to enforce checking of a file system even if the file system seems to be clean?
Which of the following files contains the configuration of the kernel modules?
You are a newly appointed Red Hat Technician for uCertify Inc. The company has a Linux-based network. You want to install a package named httpd on your Linux system. Before installing the package, you want to get the list of those packages that httpd depends on. Which of the following commands will you use to accomplish the task?
Which of the following commands is used to unmount a file system from its mount point?
Which of the following rpmbuild command options is used to print debugging information of an rpm package?
Which of the following images provide support for different types of network interface cards and other network devices?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to decompress a gZipped tarball. Which of the following commands will John use to accomplish this task?
You work as a Network Administrator for McNeil Inc. You are configuring a hard disk drive of a Linux server.
Which of the following steps can prevent the server from failure due to a log file or user quota overrun?
Which of the following statements are true about rsync?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following mke2fs command parameters is used to read bad blocks from a given file?
Which of the following servers can provide files required for Red Hat Linux installation process?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure
X?
What does the third field in the process entry of the /etc/inittab file define?
Which of the following commands can be used to display the file name, owner, group, and the Access Control List (ACL) of a given file?
Which of the following traceroute command parameters displays numeric addresses instead of names of the routers?
Which of the following commands will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish?
Which of the following files contain the information on how init should set up the system in every run level?