Topic 1: Volume A
John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. He is working as a root user on the Linux operating system. He
wants to add a soft limit quota warning for the users, in which, after exceeding the quota
value, a user will receive e-mail warnings about being over quotA. Which of the following
commands will John use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
A.
quotaon
B.
warnquota
C.
edquota
D.
quotaoff
E.
repquota
warnquota
edquota
Which of the following files contains the names and locations of system log files?
A.
/usr/syslog.conf
B.
/usr/lilo.conf
C.
/etc/lilo.conf
D.
/etc/syslog.conf
/etc/syslog.conf
Which of the following commands can be used to upgrade a package only if an earlier
version of that package is already installed? Each correct answer represents a complete
solution. Choose all that apply.
A.
rpm -U
B.
rpm --freshen
C.
rpm -F
D.
rpm --upgrade
rpm --freshen
rpm -F
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linuxbased
network. You have received an error on your Linux server stating that the superblock
is damaged. Which of the following commands will you use to resolve the issue?
A.
e2fsck
B.
mount
C.
fsck
D.
mkfs
e2fsck
Which of the following commands can be used to view the information about the
transmitted or received packets from a network interface?
A.
ip link show [interface name]
B.
ifconfig
C.
ip -s link show [interface name]
D.
ping
ip -s link show [interface name]
Page 6 out of 61 Pages |
Previous |