Which of the following utilities is used to set ACL for files and directories?
Which of the following files contains the names and locations of system log files?
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Linux system. You have to create a user named Trinity and deny interactive login. Which of the following should you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?
Which of the following commands can be used to check the errors of the ext2 and ext3 filesystems?
Each correct answer represents a complete solution. Choose two.
Which of the following commands will you use to change the home directory of a user and move all of its contents to the new home directory?
In a Linux computer, which of the following files defines run levels for the processes to be started up during boot up?
You want to make Rick an owner of the files TRADE1.TXT and TRDREPORT.TXT. Which of the following commands will you use to accomplish this?
You work as a Network Administrator for World Perfect Inc. The company has a Linux-based network. You have configured a Linux Web server on the network. A user complains that the Web server is not responding to requests. The process list on the server shows multiple instances of the HTTPD process. You are required to stop the Web service. Which of the following commands will you use to resolve the issue?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Due to some network security reasons, John wants to shut down all network interfaces just before rebooting the Linux server. Which of the following commands will he use to accomplish the task?