Which of the following are valid commands to affect your systems printing
Which of the following are valid commands to affect your systems printing
What are the first two bytes of a MD5 hash called?
What are the first two bytes of a MD5 hash called?
Which one of the following services can be run as a non-root user?
To increase system security, it is often desirable to run daemons for system services with nonroot user ids. Which one of the following services can be run as a non-root user?
You want a secure and fast DNS server that must also be quickly accessible remotely.
You want a secure and fast DNS server that must also be quickly accessible remotely. You should:
What does the following command accomplish…
What does the following command accomplish:
$ export PATH=$PATH:$APPLICATIONS
Which THREE statements about crontab are true?
Which THREE statements about crontab are true?
In order to bypass print filters using lpr, which of following switches should be used
In order to bypass print filters using lpr, which of following switches should be used:
The correct crontab entry to execute the script chklog once per hour between 3 p.m. and 5 p.m. on Monday and T
The correct crontab entry to execute the script chklog once per hour between 3 p.m. and 5 p.m. on Monday and Thursday each week is:
How to prohibit users to use Ctrl+Alt+Del to reboot the system?
You need to prohibit users to use Ctrl+Alt+Del to reboot the system. Complete the following line in /etc/inittab
ca:12345:________:/bin/echo “Reboot not allowed”