LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN: 9781337569798
Author: ECKERT
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
error_outline
This textbook solution is under construction.
Students have asked these similar questions
Indicate which entry you could add to /etc/rsyslog.conf to:a. Log all critical messages from the kernel to /var/log/alertb. Log all messages from the user processes to /var/log/userlogc. Log all debug messages, as well as more serious messages, from the printingdaemon to /var/log/printerd. Log all messages except notices from the mail daemon to /var/log/mailmane. Log all alerts and critical error messages to /var/log/seriousf. Log all warnings and errors from the kernel and the printing daemon to /var/log/shared
Which of the following about paths are true?
Group of answer choices
The separator character in your path can vary depending on the operating system.
A relative path is always equivalent to an absolute path.
Your current absolute path (working directory) can be printed in a command line via the "pwd" command.
You can get to home directory from anywhere by typing "~" as your path when using the command cd.
Write a script to create a group called ”Eng1” and create 10 users with user name ”student1”-”student10” in ”Eng1” group. For each user, create a script that prints out ”Hello ${username}, welcome to "Eng1” and put the script in user’s home directory.
Show command that were used with screenshots
Linux, centOS7, VirtualBox
Knowledge Booster
Similar questions
- Can you help me modify the command PowerShell below? 1. You are asked to check that the computers with addresses greater than 128 respond to pings. ----Modify the command to only check computers with addresses higher than 192.168.0.128. Get-Content "IPAddressList.txt" | ForEach-Object -process { ping $_ -n 1 }.arrow_forwardMust be done in Ubuntu linux commands: 1) Demonstrate how to start a job in the background and then bring it to the foreground. Also show how to send a job from the foreground to the background. 2) Demonstrate how to configure the 'syslogd' messages such that all messages of exactly info are directed to the file /var/log/info-log. 3) Show examples of getting hardware related information from what’s available in the /proc directoryarrow_forwardQUESTION 31 Which of the following cmdlets can you use to check if the Windows event log is running? a. Get-Service b. Get-Member c. Get-NetIPConfiguration d. Get-Helparrow_forward
- When you run the ps command, how are daemon processes recognized?a. The terminal is listed as tty0.b. There is a question mark in the TTY column.c. There is an asterisk in the STIME column.d. There is a “d” for daemon in the terminal identification column.arrow_forwardOn servers with Linux operating system, access logs are kept under which of the following directories by default?A) /var/log/B) /var/log/auth/C)/log/D)/log/auth/ Which of the following would an attacker prefer to run operating system-level code with MSSQL?A) MSSQL cannot run code at the operating system level.B) MSSQL agentC) xp_cmdshellD) There are no options. As a network administrator, you want to reduce the attack surface on your systems. Which of the following helps?A) Creating shared folderB) Make sure that only the necessary services are activeC) To record access activitiesD) monitor network traffic Which of the following products can an institution prefer to use if its antivirus software is up-to-date on the computers in its network?A) FirewallB) DLPC) Web ProxyD) NAC When John enters the mobile banking app on his smartphone, he sees his account balance is decreasing. What would it be better for John to do first to fix this situation?A) Closing and reopening the mobile…arrow_forwardWrite a script and save it as /opt/book/chapter10/exercise2. This script performs thefollowing functions d. Counts backwards from 10 to 1e. Displays the current numberf. Pauses for 1 second between numbersRun the script in terminal using the command: bash /root/Desktop/exercise2arrow_forward
- Which process will always have a PID of 1 and a PPID of 0?a. the kernel itselfb. psc. initd. toparrow_forwardWhich of the following commands can be used to start a UNIX SysV daemon called lalain runlevels 1, 2, and 3?a. chkconfig --level 123 lala onb. update-rc.d lala defaultsc. systemctl enable lala 123d. service enable lala 123arrow_forwardAn attacker detects that commands such as "cd,ls,rm" do not work when they provide an SSH connection to a server with a compromised Linux operating system. Which of the following is the first command the attacker should run?A)bash_historyB)'echo $PATH'C)cat etc/passwd'D)'cat /etc/os-release'arrow_forward
- 1. ping is a command-line tool used in Windows and Unix/Linux to allow you to find out details about other servers over the network/internet. Explore the command, use it, and give a detailed description of all its features. Give some screenshot examples of its use. Go beyond the basic command and use its arguments. You can black out any personal information.arrow_forwardWhich tool is helpful for finding entries that match a specified pattern in Linux system logs? options: sudo rsyslog PuTTY greparrow_forwardunix Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd /usr cd ../.. cd ./../.. All of the above What is the effect of rm command? Group of answer choices Remove all files in the specified pathname. Remove all directories and files in the specified pathname Delete all files specified in the pathname with appropriate permission Invalid UNIX commandarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L