Which of the following information is stored in /etc/shadowfor each user?

Which of the following information is stored in /etc/shadowfor each user?A . The timestamp of the user’s last loginB . The user’s private SSH keysC . The hashed password of the userD . The numerical user ID (UID)E . The path to the user’s home directoryView AnswerAnswer: C

February 24, 2020 No Comments READ MORE +

Which of the following errors does that indicate?

On a Linux workstation, the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?A . The local routing information may be corrupted and must be re-validated using a routing protocol.B . One of the routers in the routing table...

February 23, 2020 No Comments READ MORE +

Which of the following statements about systemd-journald are true? (Choose three.)

Which of the following statements about systemd-journald are true? (Choose three.)A . It is incompatible with syslog and cannot be installed on a system using regular syslog.B . It only processes messages of systemd and not messages of any other tools.C . It can pass log messages to syslog for...

February 22, 2020 No Comments READ MORE +

Which of the following nmcli subcommands exist? (Choose two.)

Which of the following nmcli subcommands exist? (Choose two.)A . nmcli ethernetB . nmcli deviceC . nmcli wifiD . nmcli addressE . nmcli connectionView AnswerAnswer: BE

February 22, 2020 No Comments READ MORE +

Which of the following commands lists all queued print jobs?

Which of the following commands lists all queued print jobs?A . lpdB . lprC . lpD . lsqE . lpqView AnswerAnswer: E

February 21, 2020 No Comments READ MORE +

What can be specified with useradd? (Choose two.)

What can be specified with useradd? (Choose two.)A . Commands the user can run using sudo.B . The absolute path to the user’s home directory.C . Which printers are available for the new user.D . The SSH keys used to login to the new account.E . The numeric user ID...

February 20, 2020 No Comments READ MORE +

Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)

Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)A . ifconfB . ifdownC . ifpauseD . ifstartE . ifupView AnswerAnswer: BE

February 20, 2020 No Comments READ MORE +

Which of the following commands is used to rotate, compress, and mail system logs?

Which of the following commands is used to rotate, compress, and mail system logs?A . logrotateB . striplogC . syslogd C-rotateD . rotatelogE . loggerView AnswerAnswer: A

February 19, 2020 No Comments READ MORE +

Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)A . YearB . MinuteC . UsernameD . Effective group IDE . CommandView AnswerAnswer: BD

February 19, 2020 3 Comments READ MORE +

Why is the correct configuration of a system’s time zone important?

Why is the correct configuration of a system’s time zone important?A . Because the timezone is included in checksum calculations and timezone changes invalidate existing checksums.B . Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.C...

February 19, 2020 No Comments READ MORE +