John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-basednetwork. He is working as a root user on the Linux operating system. He wants to add a soft limitquota warning for the users, in which, after exceeding the quota value, a user will receive […]
Which of the following commands will you run to list all files that have been modified within the last60 minutes?
You work as a System Administrator for McNeil Inc. The company has a Linux based network.You are a root user on Red Hat operating system. You have upgraded the amount of RAM in yoursystem from 256 MB to 512 MB, but there is only 512 MB of swap space. Therefore, you want toadd more swap space […]
You work as a Linux Technician for Tech Perfect Inc. The company has a Linux-based network.You have configured a database server in the network. Users complain that the server hasbecome remarkably slow. However, the previous day, the server was performing well. You knowthat some of the […]
You want only the root access in a Linux computer for maintenance purposes. Which of thefollowing runlevels will you use to boot the computer?
Which of the following commands can be used to compress a file?Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for Rick Inc. The company has a Linux-based network. Youare configuring a Linux server. Which of the following bootloaders does not require to be rewrittenafter the configuration of the kernel has been changed?
Which of the following fsck commands will you use to check all filesystems listed in /etc/fstab?
After enabling shadowed passwords in a Linux server, where does Linux keep the passwords?
You work as a Software Engineer for McNiel Inc. The company has a Linux-based network. Thecompany has 150 Engineers. The root user has configured quota limits for each user. You want toview quota limits for your system. Which of the following commands will you use to accomplish thistask?