What does the IOS command "end" do? O a. it goes directly to privilege mode O b. it quits the CLI O c.it ends the previous command O d. it goes directly to user mode
Q: Which command below would display the permissions on a file ? a. diff b. cat c. perm d. ls -I
A: diff is a command-line utility that allows you to compare two files line by line. cat command allows…
Q: which of the following commands is used to run a following command as a privileged user ? a) runas…
A: To run a command as a privileged user means that a command that cannot be used by a normal user can…
Q: Which of the following core requirement for the Reference Monitor (RM) is NOT true: O a.…
A: The Reference Monitor system is a secure, always used and fully testable module which controls all…
Q: QUESTION 48 Which of the following umask settings will result in new files receiving the default…
A: Answer (a):- 0177
Q: 4. Which of the following statement/s is/are false? I) When you save th data source, it is saved as…
A: Lets see the solution.
Q: Which option to the dpkg command can be used to list the files that comprise apackage?a. –lb. –Lc.…
A: “dpkg” command: The “dpkg” is a tool which is a package manager for Debian/Debian-based systems.…
Q: Which keystrokes do you use to move top command to the background? | Run ps command. List all the…
A: The keystroke use to move top command to the background is bg
Q: Which of the following commands will display all files and directories within the /var/log directory…
A: Answer:-(c) find/var/log-user root
Q: The lspci command can be used to isolate problems with X Windows. True or False?
A: “Ispci” command: The “Ispci” command is used to see the Linux detected PCI devices. The “Ispci”…
Q: Which option enables you to define which fields the ps command returns? How many different standard…
A: Introduction: PS command: This command is mainly used to display the current operating process. In…
Q: SECTION B below. Write Linux commands to complete the actions below bin tmp usr var etc home opt bin…
A: Our bounded restrictions are to answer the first three subparts only. - The question is to…
Q: Which file holds the methods to be used and the order in which they will be applied forhost name…
A: The /etc/resolve.conf configuration file has information that will allow a computer to convert the…
Q: Which command will show you all of your current session variables?
A: Here is the description about the session variables.
Q: Which IOS command can be used to prevent all unencrypted passwords from displaying in plain text…
A: Given Question: Which IOS command can be used to prevent all unencrypted passwords from displaying…
Q: Linux scripts or the executable program need to change the privilege before they could be run. Use…
A: Step 1:- chmod command is used in Linux. Linux is an open-source operating system this means in this…
Q: Write a complete bash script that asks for a user name and uses the read command to accept the user…
A: To write: To write a bash script that asks for a username and a command to accept it by using who…
Q: 1 line linux command to Add an entry in /etc/syslog.conf to forward all messages of severity…
A: There is Certain step as follows: Step 1: forwarding Syslog Messages From Linux Device. Step 2:…
Q: You must use the -e switch with the ps command to view daemon processes because they are not…
A: According to your question Linux offers us a service called ps for viewing information related to…
Q: In which of the following modes, the command "ip address 10.10.10.10 255.0.0.0" can be executed? O…
A: In Interface mode the command ip address 10.10.10.10 255.0.0.0 can be executed. so the correct…
Q: Which lines do you need to change in the Bourne Again Shell script command_menu to turn it into a TC…
A: # Link filedescriptor 10 with stdin exec 10<&0 # stdin replaced with a file supplied as a…
Q: n Linux Create a simple backup script to create a backup of the directory “Script2”. This script…
A: Shell script #!/bin/bash source=/home/script2dest=/home/backup echo "start copying files..." for…
Q: In this task you are to issue the show running-configuration command from the LANA# prompt. The…
A: Running-config: The newer release of the admin panel from which the unit run is the executing…
Q: Which attribute is displayed by the attrib command for a file that is backed up and unchanged? • v •…
A: The main purpose of attrib command is to remove and set the attributes of the file
Q: If I write the below command, what does it do? ec2-run ami-e3a5408a -n 20-g appserver
A: Question is Asking for the result of command.
Q: Based on the output of the Is -l command below. Find which type of file is it and what is the name…
A: It is a ordinary file and owner name is judith
Q: Which statement can you put in your ~/.tcshrc file to prevent accidentally overwriting a file when…
A: Solution: Tcsh shell variables are the enhancement of unix C Shell system.They consume less time…
Q: Within the NTDS folder, which file stores the main Active Directory database? Group of answer…
A: Within the NTDS folder, the “Ntds.dit”file stores the main Active Directory database .Hence, option…
Q: In JSLinux ,which of the following UNIX command can be used in absolute mode that grant the…
A: The correct answer is chmod 611 Read.txt i.e., option c. Chmod 611 (chmod a+rwx,u-x,g-rw,o-rw)…
Q: Which option to the gpg command generates private and public keys ? a) --key-gen b) --key c)…
A: gpg --full-gen-key command to generate your key pair. We can basically use --gen-key to generate…
Q: Q12. The file /etc/resolv.conf configures access to a DNS server. True/false. Q13. Cardctl is…
A: these questions are based on commands and dns server in computer science.
Q: Which of the following commands are used to create Sub directory- Mid inside parent…
A: Explanation: to do that we first need to create course directory then go to course and then create…
Q: user user_123 lacks CREATE SESSION privilege; logon denied How you enable the user user_123 to log…
A: ORA-01045 means that the user who tried to connect to the database has no privilege to connect to.…
Q: Imagine that you have configured the enable secret command, followed by the enable password command,…
A: We use the enable password command to set a local password to control access to various privilege…
Q: To which directory will the test ZFS volume from the previous question be mounted bythe ZFS…
A: Directory testing ZFS volume Zettabyte File System is a high performance file system and volume…
Q: Which of the following displays a list of all system privileges available in Oracle 12c?a.…
A: SYSTEM_PRIVILEGE_MAP: This command will display a list of all the system privileges available in…
Q: Which one of the following commands can be used to secure the privilege exec mode by using the…
A: Which of the following commands can be used to secure the privilege exec mode by using the plaintext…
Q: Which of the following commands can be used to start a UNIX SysV daemon called lalain runlevels 1,…
A: “chkconfig” command can be used to start a particular daemon in the required run levels. “chkconfig…
Q: command is used to save the running config to the startup config in Cisco rout
A: copy running-config startup-config command - used to save the current running configuration to the…
Q: You need to find a specific text file on your system by its metadata. Which of the following…
A: Step 1: The answer is given in the below step
Q: use to change to the /usr directory using a relative pathname?
A: Absolute pathname gives path of the directories from the root to the required file or directory.…
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Answer is in step 2.
Q: You are required to write a Spring Boot + SpringMVC based application that handles a sample request…
A: Building: You will build an application that has a static home page and that will also accept HTTP…
Q: Which windows command can be used to check the content of the rooting table.
A: A routing table is a table that is used by router to determine the path where data packets traveling…
Q: What does the du /var command do?a. shows the users connected to the /var directoryb. shows the size…
A: In Linux/Unix operating system, to get the disk usage information du command is used. It is also…
Q: Which command is used to changes your current working directory Dd1 to dir1(Use Relative path)?
A: Given:
Step by step
Solved in 2 steps
- Which command can be used to alter the primary group associated with a given usertemporarily?a. usermodb. chggrpc. gpasswdd. newgrpYou have modified the /etc/aliases file to include a new e-mail alias. However, when yousend e-mail to the alias, it can not be delivered. What should you do?a. Add the line to the /etc/aliases.db file instead.b. Run the newaliases command.c. Restart the Postfix daemon.d. Log out of the system and then log back into the system and resend the e-mail.Use the man or info pages to find a description of the –D option to the useradd command.What does this option do? What file does it edit? Use this option with the useraddcommand to set the date that all new user accounts will be disabled to March 5,2055. What command did you use?
- Which command could you use to see a list of all environment and user-defined shellvariables as well as their current values?a. ls /varb. envc. setd. echoWhich of the following command can be used to remove the test DPM package, includingany test configuration files?a. dpkg remove testb. apt-get remove testc. dpkg purge testd. apt-get purge testWhen a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in File Explorer and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem? Second? a. Check the C:\User\Belinda Lim\Documents folder. b. Check the C:\Users\Belinda Lim\Documents folder. c. Use the chkdsk command. d. Use the sfc command.
- You have set up a user group named Accounting and have put all employees in the Accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the Accounting department allowed to access this folder. What is the best way to configure the new share? a. Assign Megan read/write permissions to the Payroll folder, and explain to your boss that it is not a best practice to give only one employee access to an important folder. b. Assign Megan read/write permissions to the Payroll folder. c. Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder. d. Ask your boss to allow you to put the folder outside of the Financial folder so you can assign a new user group read/write permissions to this folder that will not conflict with the Accounting user group.which of the following commands is used to run a following command as a privileged user ? a) runas b) su c) sudo d) xinetdWrite a BASH command that removes the LOCALHOST variable.