What happens to the permissions on the file named "secret"?
Javier copies a file named “secret” from a folder named “restricted” to a folder named
“open”. Both folders reside on the same NTFS partition. What happens to the permissions
on the file named “secret”?
Which of the following steps is necessary to add a new device driver to a Linux machine?
Which of the following steps is necessary to add a new device driver to a Linux machine?
What should Nora first do to trouble shoot the problem?
Nora is a site administrator for a large e-commerce site. She notices that the site is
running slower and taking longer to process transactions. What should Nora first do to
trouble shoot the problem?
Which command should Ingrid execute to determine whether apache is already installed?
Ingrid is a Red Hat Linux system administrator. She is installing apache on her
Linux server. Which command should Ingrid execute to determine whether apache
is already installed?
What can Denise do to learn exactly how the process affects her system?
Denise is the system administrator of a Linux system. She notices that whenever a
specific process is running the performance of the system declines severely. What can
Denise do to learn exactly how the process affects her system?
Which command should Nadir enter to ensure that his Perl script will execute securely?
Nadir installed a Perl script in the cgi-bin directory of his Linux system that is running
apache server. NO significant modifications have been made to Apache server. He
accesses a script named test.cgi via a web browser, but the script does not execute, and
Apache server returns a 500 “Internal Server Error” message. Nadir executes the
command is-al on the cgi-bin directory of the problem server. He learns that the
permissions on test.cgi are 700, and that the file is owned by root. Which command
should Nadir enter to ensure that his Perl script will execute securely?
Which file should Stephen edit to set the virtual servers attributes?
Stephen has been assigned to install two apache web servers. He only has hardware for
one server. So he decides to create a virtual server to host the second site that he will
host. Which file should Stephen edit to set the virtual servers attributes?
Which of the following services is an example of a Mail Transfer Agent (MTA)?
Which of the following services is an example of a Mail Transfer Agent (MTA)?
What should Jim configure his mail server?
Jim is configuring his new mail server but he can’t remember the well-known port for
SMTP. What should Jim configure his mail server?
What is the name of process that Frank implemented?
Frank is a system administrator for a large network. His company has a large DNS
structure that he does not want to reveal to outsiders. He alters the SMTP headers
of all messages so that his users appear to be sending mails from a different address.
What is the name of process that Frank implemented?