Which of the following key-combinations are used to view a file in two windows in a single vim screen?
Which of the following key-combinations are used to view a file in two windows in a single vim
screen?
Each correct answer represents a complete solution. Choose two.
What will this command do?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based
network.
You run the following command on the terminal: find -name “*.conf” -exec cp {} {} .orig \ ;
What will this command do?
Which of the following utilities will resume suspended jobs from the current environment if job control is ena
Which of the following utilities will resume suspended jobs from the current environment if job
control is enabled?
Which of the following commands will you use to accomplish the task?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. Rick, a Sales Manager, has a permission issue on a file. You want to know the names of
groups of which Rick is a member. You want to store the information in a text file named
RickGroup.txt. Which of the following commands will you use to accomplish the task?
Which of the following environmental variables represents the PID value of the last child process?
Which of the following environmental variables represents the PID value of the last child process?
Which of the following commands can you use to assign a line number to every line of the install.log file?
Which of the following commands can you use to assign a line number to every line of the
install.log file? Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands should you use to accomplish the task?
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.
You are a root user on the Red Hat operating system. You want to see first five lines of the file
/etc/passwd. Which of the following commands should you use to accomplish the task?
It will ask for passwords or passphrases if they are needed for authentication.
Fill in the blank with appropriate word. The———— command copies files between hosts on a
network. It uses ssh for data transfer, and uses the same authentication and provides the same
security as ssh. It will ask for passwords or passphrases if they are needed for authentication.
Which of the following commands should you use to accomplish this task?
You work as the Network administrator for McNeil Inc. The company has a Linux-based network.
You are a root user on the Red Hat operating system. You want look for files whose last modified
timestamp is exactly five days ago. Which of the following commands should you use to
accomplish this task?
Which of the following statements are true about open source software?
Which of the following statements are true about open source software?
Each correct answer represents a complete solution. Choose two.