You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory named Sales on a file server. David, a Sales Manager, has to use this directory to keep sales reports. David reports that he is unable to save his reports in the directory.
When you list the directory using the LS command, you get the following result:
drwxr-xr-x 2 root root 2048 Jan 2 2006 Sales What is the most likely cause?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Debian Linuxbased network. He is working on the bash shell in which he creates a variable VAR1. After some calculations, he opens a new ksh shell. Now, he wants to set VAR1 as an environmental variable so that he can retrieve VAR1 into the ksh shell. Which of the following commands will John run to accomplish the task?
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.
You are working as a root user on the Linux operating system. Some employees have been recently appointed in your company. You have to add these users in your network. Which of the following tools should you use to accomplish this task?
Each correct answer represents a complete solution. Choose two.
Which of the following commands is used to securely copy files from one host to another over the network?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. You want to run two programs, foo and bar. You also want to ensure that bar is executed if and only if foo has executed successfully. Which of the following command sequences will John use to accomplish the task?
Fill in the blank with appropriate word. The------------ command copies files between hosts on a network. It uses ssh for data transfer, and uses the same authentication and provides the same security as ssh. It will ask for passwords or passphrases if they are needed for authentication.
Which of the following commands can be used by a user to display the list of contents existing in his current user account?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a multi-platform instant messaging client, based on a library named libpurple?
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to remove a file from a print queue. Which of the following commands will you use to accomplish this?
Which of the following commands is used to change file access permissions in Linux?
Which of the following commands will you use to list all local and remote printers attached to your computer?
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to see all directories and files, including hidden files of your home directory in long listing format. Which of the following command-line utilities would you use to accomplish this task?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named
RickGroup.txt. Which of the following commands will you use to accomplish the task?
Which of the following network diagnostic tools is NOT used in the Linux operating system?
Which of the following statements are true about file permissions?
Each correct answer represents a complete solution. Choose three.
Mark works as a Network Administrator for company.com Inc. The company has a Linux-based network. A printer is configured on the network. Mark wants to see the content of a print queue.
Which of the following commands will he use to accomplish the task?
You work as a Network Administrator for Maverick Inc. The company has a Linux-based network.
You are working on a Linux computer. You want to see the environment variables that are set on your computer. Which of the following commands will you use?
Which of the following commands will you run to do case-sensitive search for files named
foobar.png?
You run the wc -c file1.txt command. If this command displays any error message, you want to store the error message in the error.txt file. Which of the following commands will you use to accomplish the task?
Which of the following is NOT the feature of SELinux in the Red Hat enterprise Linux?
Which of the following commands will you execute to fix other writable files in your home directory?
Which of the following is a utility that can function as an independent spell checker?
Which of the following commands is used to create a partition on a new hard disk of a Linux computer?
Which of the following SHELL commands displays currently logged-in users and their tasks?
You work as a Network Administrator for Net World International. You have installed a Linux server on the company's network. Users report that they are unable to write on a file system. You verify that there is no free space available on the hard disk drive. You mount another hard disk drive to resolve the issue. How will you prevent the issue from happening again?
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to view all files with a size of over 50 megabytes on your system. Which of the following commands should you use to accomplish the task?
Which of the following commands can be used to convert all lowercase letters of a text file to uppercase?
You want to check whether the cc process is running on a computer. Which of the following commands can you use to accomplish the task? Each correct answer represents a complete solution.
Choose all that apply.
Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.
The ___________ command is used to remove the print jobs that have been queued for printing by using a secure connection.
You work as a Network Administrator for Tech World Inc. The company has a Linux-based network.
The permissions on a file named Report are shown below:
rwxr--r--
You want to add a sticky bit to the file. Which of the following commands will you use?
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.
You are a root user on the Red Hat operating system. You want view all files on the system that have the .xml filename extension. Which of the following commands should you use to accomplish the task?
Which of the following commands is used to set down the interface and flush all its addresses?
Which ftp client command allows you to upload multiple files simultaneously using the "*" wildcard?
Which of the following commands is used to view failed login attempts on a user account?
Which of the following is NOT true about the inode table in the Linux operating system?
You are required to define a cron job that executes at 5:30 PM every Friday. Which of the following time specifications can be set to accomplish the task?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator for Perfect World Inc. The company has a Linux-based network. You have configured a Linux server to connect to the Internet. Before connecting it to the
Internet, you want to check all the files on which SUID has been set. Which of the following commands will you choose to list all such programs?
Which of the following are the Graphical Mail clients in Red Hat Enterprise Linux?
Each correct answer represents a complete solution. Choose two.
Which of the following directories cannot be placed out of the root filesystem?
Each correct answer represents a complete solution. Choose all that apply.