Which TWO archiving formats are used to create an initramfs image?
Which TWO archiving formats are used to create an initramfs image?
what is the first make command that should be run which will delete any current configuration and all generate
After unpacking the source code for a Linux kernel, what is the first make command that should be
run which will delete any current configuration and all generated files? This command will ensure
that no inappropriate files were left in the kernel archive by the maintainer.
Which script, in the linux/scripts directory, can be used to add up grades or updated code to the 2.6.xx kerne
Which script, in the linux/scripts directory, can be used to add up grades or updated code to the
2.6.xx kernel source code?
What tool can you use to print shared library dependencies?
What tool can you use to print shared library dependencies?
Which of the following commands will copy one disk partition /dev/sda3 to /dev/sdb3?
Which of the following commands will copy one disk partition /dev/sda3 to /dev/sdb3?
what file is used by configure to create a final Makefile?
After unpacking source code, what file is used by configure to create a final Makefile?
What is the most likely reason?
User Joseph has successfully extracted and compiled a program from source code. Installing the
binaries produces errors. What is the most likely reason?
What command should you run before recompiling the code into binary form?
You have finished updating and resolving dependencies for some source code. What command
should you run before recompiling the code into binary form?
How can you manually add an entry to your system’s ARP cache?
How can you manually add an entry to your system’s ARP cache?
which of the following commands would gather the data requested by the client?
You find that a host (192.168.1.4) being used on one of your client’s networks has been
compromised with a backdoor program listening on port 31337. Your client requests a list of
originating IP addresses connecting to that port. Using a Linux workstation as traffic analyzer,
which of the following commands would gather the data requested by the client?