Which of the following commands is used to verify the installed zip rpm against the RPM database?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are configuring a UPS for a Linux server. You want to configure the computer as follows:
. The server should automatically shut down after ten minutes of power failure.
. The server should inform the administrator that the shut down process has started.
Which of the following files will help you to configure these settings?
Which of the following commands is used to create a user account for a new user?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quotA. Which of the following commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
You work as a system administrator for Tech Perfect Inc. The company has a Linux-based network. You are a root user on the Linux operating system. A user, Jetson, wants to view the speed and the duplex for his Ethernet card. His ethernet card is activated on interface eth0. Which of the following commands can you use to accomplish this task?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have received an error on your Linux server stating that the superblock is damaged. Which of the following commands will you use to resolve the issue?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You want to run the yum command entirely from the cache and not let it download or update any headers unless absolutely necessary. Which of the following yum command parameters will you use to accomplish the task?
Which of the following commands is used to create repomd repository to hold packages in Linux system?
In Linux, which of the following prompts does the Shell display to indicate that the logged in user is Superuser?
Which of the following commands creates a new logical volume in a volume group?
You want to find out what quota a user 'john' is using. Which of the following commands will you use to accomplish the task?
Which of the following graphical tools can be used to create and modify Kickstart files?
Which of the following commands can be used to check the errors of the ext2 and ext3 filesystems?
Each correct answer represents a complete solution. Choose two.
Which of the following commands can be used to upgrade a package only if an earlier version of that package is already installed? Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands will you run to list all files that have been modified within the last 60 minutes?
Which of the following commands displays a module name or filename and associated information, such as the authors name, license, description, module version, dependencies, parameters, etc?
After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure
X?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
Which of the following commands can be used to modify kernel parameters at runtime?
Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?
Which of the following rpmbuild commands is used to print debugging information of an rpm package?
Which of the following commands is used to create a file system on a hard disk?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
Which of the following SHELL commands displays currently logged-in users and their tasks?
What is the maximum number of partitions that Linux kernel supports for SCSI drives?
While installing the Linux operating system on a computer, you have to ensure that you have selected the root file system as _____.
Which of the following commands is used to scan and repair file systems on a hard disk of a Linux computer?
Which of the following commands will you use to display the packages that depend on the package foo?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the quota setting of the user named MariA. Which of the following commands will he use to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following commands is used to compare the contents of two files for differences?
Which of the following commands must be used to see the runlevels associated with a service grub?