⟩ Explain Technical staffs tend to be particularly responsive to A. Referent power. B. Formal power. C. Functional power. D. Expert power. E. Ad hoc power
D. Expert power.
D. Expert power.
Explain Which of the following commands would transfer a local file called password.txt to a remote machine called tiger via SCP , logging in as admin, and storing the file in /tmp? A. scp password.txt admin@tiger/tmp B. scp password.txt tiger@admin/tmp C. scp password.txt admin tiger /tmp D. ssh admin@tiger/tmp
How to Make Successfully Resolve to server1.example.com where DNS Server is 192.168.0.254
Explain Software RAID, such as the Linux MD driver, are dependent on CPU as opposed to hardware RAID, which is implemented on the interface controller itself. A. True B. False
Suppose There are two different networks 192.168.0.0/24 and 192.168.1.0/24. Where 192.168.0.254 and 192.168.1.254 IP Address are assigned on Server. Verify your network settings by pinging 192.168.1.0/24 Networks Host.
Can you explain In order to find out whether a certain type of hardware is supported by Red Hat Linux, where can you look? A. The Red Hat Hardware Compatibility List (HCL) B. /etc/devices C. The kernel boot messages D. The Red Hat installation disk
Explain Samba is used for A. Sharing resources from a Linux machine to a Windows machine B. Accessing resources from a Windows machine, for example mounting an SMB share on a Linux machine C. Perform password administration. D. Configure NFS shares.
How to Create one partitions having size 100MB and mount it on /data
Explain What is the prefdm file used for? A. To specify the preferred X display manager to use B. To setup preferences for GNOME C. To do performance analysis of system CPU usage D. To perform profiling of C code
Explain What is the DirectoryIndex Apache configuration directive used for? A. Printing indexes of directories when they do not have an index.html file B. The default page to show when the user requests an index of a directory C. Directories to ignore D. Directories that have access restrictions
Explain What is the difference between the DROP and REJECT targets in iptables? A. REJECT will send an error packet back to the source system, whereas DROP will not B. DROP will send an error packet back to the source system, whereas REJECT will not C. They are equivalent D. DROP is invalid, DENY must be used