Which TWO statements about TSIG are true?
To securely use dynamic DNS updates, the use of TSIG is recommended. Which TWO statements about TSIG are true?A . TSIG is used for zone data encryptionB . TSIG is a signal to start a zone updateC . TSIG is used in zone filesD . TSIG is used only in...
In order to find all library dependencies of /usr/bin/foo, which of the following statement is true?
In order to find all library dependencies of /usr/bin/foo, which of the following statement is true?A . Running ldconfig against /usr/bin/foo will show the required librariesB . Running ldd against /usr/bin/foo will show the required librariesC . It's necessary to compile the program again to check the library dependencies of...
In order to generate a pair of asymmetric keys to use during an SSH connection, please choose the correct command to use?
In order to generate a pair of asymmetric keys to use during an SSH connection, please choose the correct command to use?A . ssh-keygen -t dsaB . ssh-agentC . sshdD . ssh-agent -t dsaE . ssh-keyscan -t dsaView AnswerAnswer: A
With which command can the reserved blocks on /dev/hda1 be displayed? (Enter the command with all parameters and/or options)
With which command can the reserved blocks on /dev/hda1 be displayed? (Enter the command with all parameters and/or options)View AnswerAnswer: tune2fs -l /dev/hda1
You want to change the file that contains the message which is used at the login prompt when users log in locally. Please enter the file including the path.
You want to change the file that contains the message which is used at the login prompt when users log in locally. Please enter the file including the path.View AnswerAnswer: /etc/issue
Which of the following entries are NOT valid in /etc/raidtab?
Which of the following entries are NOT valid in /etc/raidtab?A . superblock-persistentB . chunk-sizeC . nr-spare-disksD . nr-raid-disksView AnswerAnswer: A
If the current directory is /root and the kernel source is located in /usr/src/linux, which of the following commands should be used to apply the patch /tmp/foopatch?
If the current directory is /root and the kernel source is located in /usr/src/linux, which of the following commands should be used to apply the patch /tmp/foopatch?A . cat /tmp/foopatch | patch -p0B . cd/usr/src/linux; cat/tmp/foopatch | patch -p0C . cd/usr/src/linux; cat/tmp/foopatch | patchD . cd/usr/src/linux; patch -p1 </tmp/foopatchE ....
kernel?
What command should be used to find out what PCI devices can be seen, without querying the kernel?A . lspci -vB . lspci -sC . lspci -xD . lspci -bE . lspci -pView AnswerAnswer: D
According to the configuration below, what is the e-mail address of the administrator for this domain?
According to the configuration below, what is the e-mail address of the administrator for this domain? $TTL 86400 $ORIGIN lpi.org @ IN SOA test.lpi.org hostmaster.lpi.org ( 2005010101 10800 604800 86400 )View AnswerAnswer: [email protected]
Which TWO archiving formats are used to create an initramfs image?
Which TWO archiving formats are used to create an initramfs image?A . gzipB . tarC . rarD . cpioE . bzip2View AnswerAnswer: AD