Topic 1: Volume A
You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based
network.
You have configured a database server in the network. Users complain that the server has
become remarkably slow. However, the previous day, the server was performing well. You
know that some of the processes may be the cause of the issue. You run the PS command
on the server. In the result set, which information will you look at that suggests the
problematic process?
A.
A high load average
B.
A high process ID
C.
A low load average
D.
A low CPU time
E.
A high CPU time
A high CPU time
Which of the following commands will you use to display the packages that depend on the
package foo?
A.
rpm --freshen foo
B.
rpm -q --triggeredby foo
C.
rpm -q --changelog foo
D.
rpm -q --whatrequires foo
rpm -q --whatrequires foo
You work as a Network Administrator for Tech World Inc. The company has a Linux-based
network. The permissions on a file named Report are shown below:
rwxr-r— You want to add a sticky bit to the file. Which of the following commands will you
use?
A.
chmod 2744 report
B.
chmod 1744 report
C.
chmod 7744 report
D.
chmod 4744 report
chmod 1744 report
After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
A.
/usr/shadow
B.
/etc/passwd
C.
/usr/passwd
D.
/etc/shadow
/etc/shadow
Alicia works as a System Administrator for SoftTech Inc. The company uses the Linux
operating system. She wants to install Apache on the company's server. Which of the
following commands will she use to check whether or not Apache is already installed on the
server?
A.
rpm -U apache
B.
rpm -q apache
C.
C. rpm --checksig
D.
rpm -i apache
rpm -q apache
Page 2 out of 61 Pages |
Previous |