Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following states can NetworkManager show regarding the system's network connectivity? (Choose TWO correct answers.)

A.

up

B.

portal

C.

full

D.

login-required

E.

firewalled

On a system using systemd-joumaid, which of the following commands add the message Howdy to the system log? (Choose TWO correct answers.)

append Howdy

A.

logger Howdy

B.

systemd-cat echo Howdy

C.

echo Howdy > /dev/journal

D.

joucnalctl add Howdy

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

A.

*

B.

-

C.

$

D.

#

E.

x

What is true about the following command?

Nmcli device wifi connect WIFIoI

A.

NetworkManager opens a new public hotspol with the SSID wifioi

B.

NetworkManager creates an unconfigured new virtual network interface named wifioi.

C.

NetworkManager creates a new wifi connection wifioi and activates it

D.

NetworkManager returns an error in case the connection wifioi does not exist

E.

NetworkManager reports an error because wifioi is an invalid wifi device

Which is the default percentage of reserved space for the root user on new ext4 filesystems?

A.

10%

B.

3%

C.

15%

D.

0%

E.

5%

After editing the TCP wrapper configuration to grant specific hosts access to a service when do these changes become effective?

A.

The new configuration becomes effective after restarting the respective service

B.

The new configuration becomes effective at the next system reboot

C.

The new configuration becomes effective when the last established connection to the service is closed

D.

The new configuration becomes effective after restarting the tcpd service

E.

The new configuration becomes effective immediately for all new connections

Which command uninstalls a package but keeps its configuration files in case the package is re-installed?

A.

dpkg –s pkgname

B.

dpkg –L pkgname

C.

dpkg –P pkgname

D.

dpkg –v pkgname

E.

dpkg –r pkgname

Which of the following commands changes the number of days before the ext3 filesystem on /dev/sda1 has to run through a full filesystem check while booting?

A.

tune2fs -d 200 /dev/sda1

B.

tune2fs -c 200 /dev/sda1

C.

tune2fs -i 200 /dev/sda1

D.

tune2fs -n 200 /dev/sda1

E.

tune2fs --days 200 /dev/sda1

What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?

A.

The command is SetUID and it will be executed with the effective rights of the owner.

B.

The command will be executed with the effective rights of the group instead of the owner.

C.

The execute flag is not set for the owner. Therefore, the SetUID flag is ignored.

D.

The command will be executed with the effective rights of the owner and group.

Which of the following commands can be used to locate programs and their corresponding man pages and configuration files?

A.

dirname

B.

which

C.

basename

D.

query

E.

whereis