John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as the root user on the Linux operating system. He wants to delete all files whose names end with a number. Which of the following commands will John use to accomplish the task?
Which of the following commands can you use to see only the last ten lines of a file?
Each correct answer represents a complete solution. Choose all that apply.
Which shell script is the first startup script run when a login shell is started in Linux?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.
You run the following command on the terminal: find -name "*.conf" -exec cp {} {} .orig \ ;
What will this command do?
You run the ps -aux command on the terminal. You get the following output:
You notice that the process id 24224 is showing the status message S on the stat column. What does this indicate?
You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program's output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?
Which of the following is NOT the feature of SELinux in the Red Hat enterprise Linux?
Which of the following files does the /var directory NOT contain?
Which of the following key-combinations is used to redo a change undone by a u command in vim?
Which of the following is a utility that can function as an independent spell checker?
Which of the following utilities will resume suspended jobs from the current environment if job control is enabled?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to save the output to the ProStat.txt file. Which of the following commands will you use to accomplish the task?
Which of the following commands are used to start and stop a service, and to ensure persistence across reboots? Each correct answer represents a complete solution. Choose all that apply.
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.
You are working as a root user on Red Hat operating system. You are currently running a program named My_program. You are getting some error messages while executing the program. You want to redirect these error messages to a file named file2 rather than being displayed on the screen.
Which of the following tools should you use to accomplish the task?
Mark works as a Network Administrator for company.com Inc. The company has a Linux-based network. A printer is configured on the network. Mark wants to see the content of a print queue.
Which of the following commands will he use to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network.
There are six files in a directory on your laptop. You want to find out the file types of all the files at a time. Which of the following commands will you use?
You want to terminate your X session. Which of the following key combinations will you use to accomplish this?
You work as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.
You are currently working on vim. You opened a file in four windows in a single vim screen. You want to jump from one window to another. Which of the following key-combinations should you use to accomplish the task?
Which of the following commands is used to count the number of bytes in a file?
John works as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.
John wants to view a PDF document on his Linux system. Which of the following commands should John use to accomplish the task?
Fill in the blank with appropriate word. The------------ command copies files between hosts on a network. It uses ssh for data transfer, and uses the same authentication and provides the same security as ssh. It will ask for passwords or passphrases if they are needed for authentication.
Which of the following commands is used to securely copy files from one host to another over the network?