Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?

A.

/usr/shadow

B.

/etc/passwd

C.

/usr/passwd

D.

/etc/shadow

Full Access
Question # 5

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to check the errors of an ext2 filesystem. Which of the following commands can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A.

e2fsck

B.

fsck

C.

fsck -N

D.

fsck.ext2

Full Access
Question # 6

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the group membership of the file foo to group bar. Which of the following commands will he use to accomplish the task?

A.

chgrp bar foo

B.

chgroup foo bar

C.

chgrp foo bar

D.

chgroup bar foo

Full Access
Question # 7

Which of the following commands will you use to display the packages that depend on the package foo?

A.

rpm --freshen foo

B.

rpm -q --triggeredby foo

C.

rpm -q --changelog foo

D.

rpm -q --whatrequires foo

Full Access
Question # 8

Which of following commands lets an Administrator to set a user's quota?

A.

edquota user

B.

edquota -p

C.

edquota

D.

edquota -u user

Full Access
Question # 9

Which of the following is GRUB Menu Configuration File?

A.

/etc/grub.conf

B.

/boot/grub/grub.conf

C.

/etc/grub/grub.conf

D.

/boot/grub.conf

Full Access
Question # 10

If /root partition is installed on /dev/hdb1, what defines /dev/hdb1?

A.

Second hard disk, second partition

B.

First hard disk, second partition

C.

Second hard disk, first partition

D.

First hard disk, first partition

Full Access
Question # 11

What is the minimum processor requirement to install Red Hat in GUI mode?

A.

346 MHz Pentium III

B.

250 MHz Pentium I

C.

400MHz Pentium II

D.

200 MHz Pentium II

Full Access
Question # 12

Which of the following scripts invokes the runlevel scripts?

A.

/etc/rc.d/rc.local

B.

/etc/rc.d/rc.sysinit

C.

/etc/rc.d/rc.serial

D.

/etc/rc.d/rc

Full Access
Question # 13

Which of the following commands is used to load and unload the kernel modules?

A.

lsmod

B.

modload

C.

modprobe

D.

modinfo

Full Access
Question # 14

Which of the following commands is used to create physical volumes in Linux?

A.

lvextend

B.

vgcreate

C.

pvcreate

D.

fdisk

Full Access
Question # 15

What is the maximum number of partitions that can be defined on a single hard disk?

A.

16

B.

5

C.

10

D.

14

Full Access
Question # 16

Which of the following commands will go through your logs for a given period of time and make a report in the areas that you wish with the detail that you wish?

A.

tmpwatch

B.

logrotate

C.

anacron

D.

logwatch

Full Access
Question # 17

To see the run levels associated with the service grub, which of the following commands must be issued?

A.

chkconfig

B.

service

C.

xinetd

D.

chkconfig --list

Full Access
Question # 18

Which of the following commands is used to set a user's quota?

A.

edquota

B.

edquota user

C.

edquota -p user

D.

edquota -u user

Full Access
Question # 19

Which of the following commands is used to compress a tar file?

A.

tar

B.

gzip

C.

compress

D.

dump

Full Access
Question # 20

In which of the following files, RHEL stores its network interface configuration information?

A.

/etc/host.conf

B.

/etc/sysconfig/network-scripts/ ifcfg-ethX

C.

/etc/network.conf

D.

/etc/sysconfig/network-script/ifcfg-ethX

Full Access
Question # 21

What does LDAP stand for?

A.

Light Directory Access Protocol

B.

Local Directory Access Protocol

C.

Lightweight Directory Access Protocol

D.

Linkweight Directory Access Protocol

Full Access
Question # 22

Which of the following commands is used to install a rpm package?

A.

rpm -Ivh packagename

B.

rpm -Uvh packagename

C.

rpm -ivh packagename

D.

rpm -i packagename

Full Access
Question # 23

Which of the following commands is used to create repomd repository to hold packages in Linux system?

A.

chroot

B.

createrepo

C.

xm

D.

setsebool

Full Access
Question # 24

Which of the following provides users shared access to files and directories?

A.

pump

B.

NFS

C.

Squid

D.

DNS

Full Access
Question # 25

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

A.

ls /proc

B.

lsmod

C.

locate

D.

cat /proc/modules

Full Access
Question # 26

Which of the following commands is used to start a preconfigured network interface?

A.

ping

B.

ifup [interface name]

C.

ifdown [interface name]

D.

ifprobe [interface name]

Full Access
Question # 27

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You have installed Kmail for sending messages. You want to install the latest version of it. Which of the following commands will you use to identify the currently installed version?

A.

rpm -q

B.

rpm -U

C.

rpm -v

D.

rpm –i

Full Access
Question # 28

Fill in the blank with the appropriate tool.

_________is a network diagnostic tool that combines the functionality of the traceroute and ping programs in a single network diagnostic tool.

A.

mtr

Full Access
Question # 29

Which of the following runlevel scripts of the /etc/init.d directory terminates all processes, removes swap space, unmounts all file systems, and either shuts down or reboots the computer?

A.

halt

B.

autofs

C.

apmd

D.

crond

Full Access
Question # 30

Which of the following commands can be used to view the information about the transmitted or received packets from a network interface?

A.

ip link show [interface name]

B.

ip -s link show [interface name]

C.

ifconfig

D.

ping

Full Access
Question # 31

The ____ command is used to view the TCP/IP configuration on a Windows 9x computer.

A.

IFCONFIG

B.

WINIPCONFIG

C.

CHKDSK

D.

IPCONFIG

Full Access
Question # 32

Which of the following files are used to activate disk quotas on a file system?

Each correct answer represents a complete solution. Choose all that apply.

A.

quotA.group

B.

quotA.user

C.

quotaon

D.

.quotaon

Full Access
Question # 33

Which of the following commands can be used to check the errors of the ext2 and ext3 filesystems?

Each correct answer represents a complete solution. Choose two.

A.

fsck --ext2

B.

fsck.ext3

C.

fsck --ext3

D.

e2fsck

Full Access
Question # 34

Which of the following commands is used to list all contents of a superblock of a partition?

A.

tune2fs -l

B.

tune2fs -j

C.

tune2fs -f

D.

tune2fs –c

Full Access
Question # 35

Which of the following statements are true about kernel modules?

Each correct answer represents a complete solution. Choose all that apply.

A.

Kernel modules do not support executable loaders.

B.

The kernel module contains extra kernel codes that may be loaded after the loading of the base kernel.

Only a minimal resident kernel is loaded into memory at boot time.

C.

Kernel modules do not support the device drivers, network drivers, and file system drivers.

D.

Whenever a user requests a feature that is not present in the resident kernel, a kernel module is dynamically loaded into memory.

Full Access
Question # 36

Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?

A.

fsck -P

B.

fsck -A

C.

fsck -f

D.

fsck -y

Full Access
Question # 37

By default, which of the following commands configures the current run level?

A.

service

B.

chkconfig

C.

ntsysv

D.

pstree

Full Access
Question # 38

Which of the following commands will you use to change the home directory of a user and move all of its contents to the new home directory?

A.

usermod -g

B.

usermod -o -u

C.

usermod -d -m

D.

usermod -u

Full Access
Question # 39

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

smbmount

B.

smbfsmount

C.

mount smb

D.

mount -t smbfs

Full Access
Question # 40

You work as a Network Administrator for Tech World Inc. The company has a Linux-based network. You have installed a video card in your Linux workstation. Which of the following will you require in order to configure

X?

A.

etc/videoconf

B.

root/videoconf

C.

root/x11/xf86config

D.

etc/x11/xf86config

Full Access
Question # 41

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root user on the Linux operating system. He wants to add a soft limit quota warning for the users, in which, after exceeding the quota value, a user will receive e-mail warnings about being over quota. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

A.

repquota

B.

quotaon

C.

warnquota

D.

edquota

E.

quotaoff

Full Access
Question # 42

You work as a Network Administrator for Secure World Inc. The company has a Linux-based network. You want to run a command with the changed root directory. Which of the following commands will you use?

A.

route

B.

ls

C.

chroot

D.

chdir

Full Access
Question # 43

Which of the following statements is true about the sticky bit?

A.

It marks files for archive.

B.

It changes the modification time of files.

C.

It is a special type of permission that enables only read permission for all users, including the owner of the files and the root user.

D.

It allows only the owner or root to delete or rename files.

Full Access
Question # 44

Which of the following commands is used to compress files?

A.

GZIP

B.

TAR

C.

WINZIP

D.

GUNZIP

Full Access
Question # 45

In Linux, which of the following is the correct way to view a disk's current partition configuration?

A.

Run the fdisk command, and then type c at the command prompt.

B.

Run the fdisk command, and then type f at the command prompt.

C.

Run the fdisk command, and then type v at the command prompt.

D.

Run the fdisk command, and then type p at the command prompt.

Full Access
Question # 46

Which of the following commands helps an administrator to switch a Linux server to different run levels without rebooting the server?

A.

mount

B.

init

C.

su

D.

cngrl

Full Access
Question # 47

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?

A.

killall

B.

getpid

C.

ps

D.

kill

Full Access
Question # 48

You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You have assigned a permission set of 440 on a folder. Which of the following permissions are added to the folder?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Read permission to the owner.

B.

Read and Execute permissions to the group.

C.

Read, Write, and Execute permissions to the owner and the group.

D.

Read and Execute permissions to the owner.

E.

Read permission to the group.

F.

No permission to others.

Full Access
Question # 49

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You are configuring a server that will be used as a Web server. You want to use disk striping with parity on the server. You also want to configure it with a hot spare disk. What is the minimum number of disks that you will require for this configuration?

A.

2

B.

4

C.

5

D.

3

Full Access
Question # 50

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. You want to run the yum command entirely from the cache and not let it download or update any headers unless absolutely necessary. Which of the following yum command parameters will you use to accomplish the task?

A.

-y

B.

-R

C.

-c

D.

-C

Full Access