Which of the following commands is used to create a logical volume in a volume group in Linux?
Which of the following commands is used to create a logical volume in a volume group in Linux?
What does the third field in the process entry of the /etc/inittab file define?
What does the third field in the process entry of the /etc/inittab file define?
Which of the following commands will he use to create a report of the disk quota of all users?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. Which of the following
commands will he use to create a report of the disk quota of all users?
Which of the following commands will you use to accomplish the task?
You work as an Administrator for McNeil Inc. The company has a Linux-based network. You are
logged in as a standard user on your client computer. You have started a process 1001 as a root
user. You want to kill the process. Which of the following commands will you use to accomplish
the task?
Which of the following commands will you use to make device nodes manually?
In order to access any other devices, such as a floppy drive, the relevant device node must be
created. Which of the following commands will you use to make device nodes manually?
Which of the following commands is used to format a floppy disk in the second floppy disk drive?
Which of the following commands is used to format a floppy disk in the second floppy disk drive?
What will he do to accomplish the task?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. John is working as a root user on the Linux operating system. He wants to run xdm
automatically when the
Linux operating system reboots. What will he do to accomplish the task?
Which of the following commands is used to check the disk quota for each filesystem and to mail a warning mess
Which of the following commands is used to check the disk quota for each filesystem and to mail a
warning message to a user who has reached his/her softlimit?
Which of the following yum command parameters will you use to accomplish the task?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based
network. You are working as a root user on the Linux operating system. You want to run the yum
command entirely from the cache and not let it download or update any headers unless absolutely
necessary. Which of the following yum command parameters will you use to accomplish the task?