Which of the following information is stored in /etc/shadowfor each user?
Which of the following information is stored in /etc/shadowfor each user?A . The timestamp of the user’s last loginB . The user’s private SSH keysC . The hashed password of the userD . The numerical user ID (UID)E . The path to the user’s home directoryView AnswerAnswer: C
Which of the following errors does that indicate?
On a Linux workstation, the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?A . The local routing information may be corrupted and must be re-validated using a routing protocol.B . One of the routers in the routing table...
Which of the following statements about systemd-journald are true? (Choose three.)
Which of the following statements about systemd-journald are true? (Choose three.)A . It is incompatible with syslog and cannot be installed on a system using regular syslog.B . It only processes messages of systemd and not messages of any other tools.C . It can pass log messages to syslog for...
Which of the following nmcli subcommands exist? (Choose two.)
Which of the following nmcli subcommands exist? (Choose two.)A . nmcli ethernetB . nmcli deviceC . nmcli wifiD . nmcli addressE . nmcli connectionView AnswerAnswer: BE
Which of the following commands lists all queued print jobs?
Which of the following commands lists all queued print jobs?A . lpdB . lprC . lpD . lsqE . lpqView AnswerAnswer: E
What can be specified with useradd? (Choose two.)
What can be specified with useradd? (Choose two.)A . Commands the user can run using sudo.B . The absolute path to the user’s home directory.C . Which printers are available for the new user.D . The SSH keys used to login to the new account.E . The numeric user ID...
Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)
Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)A . ifconfB . ifdownC . ifpauseD . ifstartE . ifupView AnswerAnswer: BE
Which of the following commands is used to rotate, compress, and mail system logs?
Which of the following commands is used to rotate, compress, and mail system logs?A . logrotateB . striplogC . syslogd C-rotateD . rotatelogE . loggerView AnswerAnswer: A
Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)
Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)A . YearB . MinuteC . UsernameD . Effective group IDE . CommandView AnswerAnswer: BD
Why is the correct configuration of a system’s time zone important?
Why is the correct configuration of a system’s time zone important?A . Because the timezone is included in checksum calculations and timezone changes invalidate existing checksums.B . Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.C...