which of the following files contains group information?
In Linux, which of the following files contains group information?
Which of the following statements about Logical Volume Management (LVM) is true?
Which of the following statements about Logical Volume Management (LVM) is true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following files contains the configuration of the kernel modules?
Which of the following files contains the configuration of the kernel modules?
Which of the following commands will he use to accomplish the task?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He wants to change the
quota setting of the user named MariA. Which of the following commands will he use to
accomplish the task?
Which of the following tools is used to print the super block and block group descriptor information for an ex
Which of the following tools is used to print the super block and block group descriptor information
for an ext2 or ext3 file system?
Which of the following commands is used to modify a user account?
Which of the following commands is used to modify a user account?
Which of the following commands can be used to power off a Linux computer?
Which of the following commands can be used to power off a Linux computer?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands should you use to read the file in real time?
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. You are a root user on the Red Hat operating system. You want to keep an eye on the
system log file /var/adm/messages. Which of the following commands should you use to read the
file in real time?
Which of the following RAID levels provides block level striping?
Which of the following RAID levels provides block level striping?
Which of the following commands is used to enforce checking of a file system even if the file system seems to
Which of the following commands is used to enforce checking of a file system even if the file
system seems to be clean?