What are typical targets in a makefile?
What are typical targets in a makefile?
Which single command will extract data from the file abc.tar.bz2
Which single command will extract data from the file abc.tar.bz2
How would you run named inside a chroot jail as user nobody and group nogroup?
How would you run named inside a chroot jail as user nobody and group nogroup?
Where should the LILO code reside, on a system with only one installation of Linux and no other operating syst
Where should the LILO code reside, on a system with only one installation of Linux and no other
operating systems?
which of the following represents a USB mouse connected to the PC?
The Human Interface Device (HID) is being used, which of the following represents a USB mouse
connected to the PC?
Select the TWO correct alternatives regarding the kill -9 command:
Select the TWO correct alternatives regarding the kill -9 command:
How is it possible to ensure that the card using the 8139too driver is detected before the card using the ne2k
The server has two network cards. The driver for the first card is the module 8139too and the driver
for the second card is the module ne2k-pci. How is it possible to ensure that the card using the
8139too driver is detected before the card using the ne2k-pci driver?
Which of these would be the simplest way to configure BIND to return a different version number to queries?
Which of these would be the simplest way to configure BIND to return a different version number to
queries?
What is the most likely cause of this?
An administrator has placed an executable in the directory /etc/init.d, however it is not being
executed when the system boots into runlevel 2. What is the most likely cause of this?
In order to generate a pair of asymmetric keys to use during an SSH connection, please choose the correct comm
In order to generate a pair of asymmetric keys to use during an SSH connection, please choose the
correct command to use?