Which of the following is the BEST tool to measure system performance baseline over a period of time?
Which of the following is the BEST tool to measure system performance baseline over a period of
time?
Which of the following encryption algorithms are natively supported for the /etc/shadow file?
Which of the following encryption algorithms are natively supported for the /etc/shadow file?
Which of the following is the FIRST step the new administrator should do to reset the root password?
A new administrator is asked to reconfigure a Linux machine. The prior administrator did not give the root password to the current administrator. Which of the following is the FIRST step the new administrator should do to reset the root password?
Which of the following is the BEST way to minimize the downtime?
The DNS administrator needs to change the IP address of the primary Webserver. Any downtime would have a major impact. Which of the following is the BEST way to minimize the downtime?
where should the system be placed on the network?
When a new Snort system is installed, where should the system be placed on the network?
How can a Linux user use vi to edit the first 30 lines of a 60-line file and replace all occurrences of test t
How can a Linux user use vi to edit the first 30 lines of a 60-line file and replace all occurrences of test to TEST?
what part of the installation should be planned and documented?
Before performing a new Linux server installation, what part of the installation should be planned and documented?
Which of the following is MOST likely to be the problem?
After properly installing both the sound card and modules, the technician attempted to play an
MP3 file, but no sound was heard. Which of the following is MOST likely to be the problem?
How can the Apache working directory be set to /home/user/html from the command line?
How can the Apache working directory be set to /home/user/html from the command line?
How should a Linux administrator prevent the root user from logging in remotely via SSH (Secure Shell)?
How should a Linux administrator prevent the root user from logging in remotely via SSH (Secure Shell)?