Which of the following commands is used to securely copy files from one host to another over the network?
Which of the following commands is used to securely copy files from one host to another over the
network?
__________ is a public domain collection of tools to allow Unix systems to manipulate MS-DOS files: read, writ
Fill in the blank with the appropriate tool. __________ is a public domain collection of tools to
allow Unix systems to manipulate MS-DOS files: read, write, and move around files on an MSDOS file system.
Which of the following commands will you use to list all local and remote printers attached to your computer?
Which of the following commands will you use to list all local and remote printers attached to your
computer?
Which of the following files is the default configuration file of XDM (X Window Display Manager)?
Which of the following files is the default configuration file of XDM (X Window Display Manager)?
Which of the following commands is used to append the list of files in the /tmp directory to an existing file
Which of the following commands is used to append the list of files in the /tmp directory to an
existing file named deletelater.txt?
Which of the following commands will you use?
You work as a Technician for Net World Inc. The company has a Linux-based network. You have
configured a file server on the company’s etwork. You want to summarize disk usage of each file
in a particular directory on the file server. Which of the following commands will you use?
Which of the following commands should you use to read the file in real time?
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. You are a root user on the Red Hat operating system. You want to keep an eye on the
system log file /var/adm/messages. Which of the following commands should you use to read the
file in real time?
Which of the following keys should you use to accomplish the task?
You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based
network. You are working as a root user on the Linux operating system. You have created a file in
the vim text editor. You want to save this file and exit it. Which of the following keys should you
use to accomplish the task?
Which of the following commands is used to change file access permissions in Linux?
Which of the following commands is used to change file access permissions in Linux?
Which of the following actions will you perform to accomplish the task?
You work as a Network Administrator for Rick International. The company has a Linux-based
network. A process is running on a server. It is using a lot of processing power. You want the
process to use less resources. Which of the following actions will you perform to accomplish the
task?