Topic 1: Volume A
John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. Due to some network security reasons, John wants to shut down all
network interfaces just before rebooting the Linux server. Which of the following commands
will he use to accomplish the task?
A.
init 3
B.
init 6
C.
init 0
D.
shutdown -r now
E.
reboot -i
reboot -i
You work as a Network Administrator for McNeil Inc. The company has a Linux-based
network. You are a root user on the Linux system. You have to create a user named Trinity
and deny interactive login. Which of the following should you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
A.
vi /etc/passwd
B.
vi /etc/shadow
C.
useradd Trinity
D.
passwd Trinity
E.
Trinity:x:505:505::/home/Trinity:/sbin/nonlogin
vi /etc/passwd
vi /etc/shadow
useradd Trinity
passwd Trinity
Trinity:x:505:505::/home/Trinity:/sbin/nonlogin
Which of the following commands will you run to list all files that have been modified within
the last 60 minutes?
A.
find /etc -name *.txt
B.
find start -dir -min -60
C.
find start -dir -cmin -60
D.
find start -cmin -60
find start -dir -cmin -60
John works as a Network Administrator for Perfect Solutions Inc. The company has a
Linux-based network. John is working as a root user on the Linux operating system. He
wants to change the group membership of the file foo to group bar. Which of the following
commands will he use to accomplish the task?
A.
chgrp bar foo
B.
chgroup foo bar
C.
chgrp foo bar
D.
chgroup bar foo
chgrp bar foo
What command will you use to find the current runlevel of an active Linux session?
A.
runlevel
B.
init
C.
rlevel
D.
ls /etc/runlevel
runlevel
Page 7 out of 61 Pages |
Previous |