The user space log daemon is called …?

Correct Answer for the Question – The user space log daemon is called …? is given below The user space log daemon is called …? klog klogd syslog syslogd Correct Answer The Correct Answer for this Question is syslogd Explanation The Question – The user space log daemon is called …? has been answered correctly and … Read more

Which of the following commands can be used to view kernel messages?

Correct Answer for the Question – Which of the following commands can be used to view kernel messages? is given below Which of the following commands can be used to view kernel messages? less dmesg less /var/log/boot.log cat /proc/kernel |less cat /proc/dmesg Correct Answer The Correct Answer for this Question is less /var/log/boot.log Explanation The Question … Read more

Which of the following options will speed up traceroute for distant network queries?

Correct Answer for the Question – Which of the following options will speed up traceroute for distant network queries? is given below Which of the following options will speed up traceroute for distant network queries? #NAME? #NAME? #NAME? #NAME? Correct Answer The Correct Answer for this Question is #NAME? Explanation The Question – Which of the … Read more

Which directory will you find the delivered mail for the user foo?

Correct Answer for the Question – Which directory will you find the delivered mail for the user foo? is given below Which directory will you find the delivered mail for the user foo? /var/spool/mail /home/foo/mail /var/mail/spool /var/users/mail Correct Answer The Correct Answer for this Question is /var/spool/mail Explanation The Question – Which directory will you find … Read more

Which of following switches should be used:

Correct Answer for the Question – Which of following switches should be used: is given below Which of following switches should be used: lpr -o nofilter lpr -l lpr -o raw lpr -r Correct Answer The Correct Answer for this Question is lpr -l Explanation The Question – Which of following switches should be used: has … Read more

What are the addresses falling into the range of 224.0.0.0 through 254.0.0.0?

Correct Answer for the Question – What are the addresses falling into the range of 224.0.0.0 through 254.0.0.0? is given below What are the addresses falling into the range of 224.0.0.0 through 254.0.0.0? Class C network Class B network This is an experimental address range This is a broadcast range Correct Answer The Correct Answer for … Read more

What single command will accomplish this?

Correct Answer for the Question – What single command will accomplish this? is given below What single command will accomplish this? ifconfig route netstat None of the choices Correct Answer The Correct Answer for this Question is ifconfig Explanation The Question – What single command will accomplish this? has been answered correctly and answers for the … Read more

What are the first two bytes of a MD5 hash called?

Correct Answer for the Question – What are the first two bytes of a MD5 hash called? is given below What are the first two bytes of a MD5 hash called? salt magic magic bytes encrypted bytes Correct Answer The Correct Answer for this Question is salt Explanation The Question – What are the first two … Read more