What is the order in which the bash configuration files are read, assuming that all the files exist in their correct location and are readable?

Bash is invoked as an interactive login shell.What is the order in which the bash configuration files are read, assuming that all the files exist in their correct location and are readable?When Bash is invoked as an interactive login shell, or as a non-interactive shell with the –login option, it first reads and executes commands … Read more

Match the rpm options with their functions:

Match the rpm options with their functions:F| FreshenThis will upgrade packages, but only ones for which an earlier : Which means3 should be b iInstalls new packageU upgrades or installs the package : Which means 2 should be a e removes Question: Match the rpm options with their functions: Options: 1-d, 2-a, 3-b, 4-c 1-d, … Read more

What is the purpose of setting ONPARENT = no in an Interface configuration file located in /etc/sysconfig/network-scripts?

What is the purpose of setting ONPARENT = no in an Interface configuration file located in /etc/sysconfig/network-scripts?The ONBOOT directive tells the network initialization scripts not to start a given interface.If you need to stop a virtual interface from starting when the network interfaces are initialized, you need to set ONPARENT instead of ONBOOT to no.References: … Read more

What is the effect of the command?

Your Oracle Linux server has a network interface eth0 but the ifcfg-eth0 file is missing from the /etc/sysconfig/network-scripts directly.To set the IP address for the interface, you run this command as root: [[email protected]]# ifconfig eth0 192.168.0.1 upWhat is the effect of the command? Question: What is the effect of the command? Options: The IP address … Read more

Which statement is FALSE concerning the use of OpenSSH utilities?

Which statement is FALSE concerning the use of OpenSSH utilities? (Choose the best answer.) Question: Which statement is FALSE concerning the use of OpenSSH utilities? Options: scp always requires a passphrase to be used scp permits copies between two remote hosts ssh may be used to execute a single command on a remote host instead … Read more

Which statements is true concerning Oracle Linux configuration files for users and groups?

Which statements is true concerning Oracle Linux configuration files for users and groups?/etc/shadow file stores actual password in encrypted (one-way hashed) format for user’s account with additional properties related to user password i.e. it stores secure user account information Question: Which statements is true concerning Oracle Linux configuration files for users and groups? Options: The … Read more

Which program cannot be used to add another partition on this device?

Examine the partition table:Disk /dev/sdd: 107 MBSector size (logical/physical): 512B/512B Partition Table: msdosNumber StartEndSizeTypeFileSystemFlags 11049KB79.7MB78.6MBPrimaryWhich program cannot be used to add another partition on this device?kpartx – Create device maps from partition tablesIncorrect:Not A: fdisk (in the first form of invocation) is a menu driven program for creation and manipulation of partition tables.Not B: cfdisk … Read more

Which statement is true about the listed rules?

Examine some rules from the /etc/rsyslog.conf file:*.info;mail.debug;authpriv.none;cron.none/var/log/messages uucp, news.notice/var/log/spoolerWhich statement is true about the listed rules? Question: Which statement is true about the listed rules? Options: Only messages with a priority of info from all facilities are sent to /var/log/messages. Only messages with a priority of notice from the news facility are sent to /var/log/spooler. … Read more

Which two statements are true concerning OpenSSH configuration files?

Which two statements are true concerning OpenSSH configuration files? (Choose two.)OpenSSH commands to access the jopam account without supplying a password Question: Which two statements are true concerning OpenSSH configuration files? Options: The /etc/ssh/ssh_config file is the global configuration file for the sshd server daemon If user harhest has an ssh configuration file called /home/harhest/.ssh/config, … Read more

Match the following symbolic notations of the file permissions with their numeric values:

Match the following symbolic notations of the file permissions with their numeric values: Question: Match the following symbolic notations of the file permissions with their numeric values: Options: 1-d, 2-f, 3-b, 4-e, 5-c, 6-a 1-b, 2-f, 3-d, 4-a, 5-c, 6-e 1-f, 2-a, 3-c, 4-b, 5-e, 6-d 1-b, 2-d, 3-f, 4-a, 5-e, 6-c Correct Answer The … Read more