Topic 2, Linux Installation and Package Management
Which of the following commands can be used to download the RPM package kernel without installing it?
A.
yum download --no-install kernel
B.
yumdownloader kernel
C.
rpm --download --package kernel
D.
rpmdownload kernel
yumdownloader kernel
Which function key is used to start Safe Mode in Windows NT?
A.
F10
B.
F8
C.
F6
D.
Windows NT does not support Safe Mode
Windows NT does not support Safe Mode
The dpkg-____ command will ask configuration questions for a specified package, just as if the package were being installed for the first time.
Answer: reconfigure
What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)
A.
To create RAID 9 arrays.
B.
To dynamically change the size of logical volumes.
C.
To encrypt logical volumes.
D.
To create snapshots.
E.
To dynamically create or delete logical volumes.
To dynamically change the size of logical volumes.
To create snapshots.
To dynamically create or delete logical volumes.
Which of the following characters can be combined with a separator string in order to read from the current input source until the separator string, which is on a separate line and without any trailing spaces, is reached?
A.
<<
B.
<|
C.
!<
D.
&<
<<
Explanation:
QUESTIONNO: 16
Which of the following commands will NOT update the modify timestamp on the file
/tmp/myfile.txt?
A. file /tmp/myfile.txt
B. echo "Hello" >/tmp/myfile.txt
C. sed -ie "s/1/2/" /tmp/myfile.txt
D. echo -n "Hello" >>/tmp/myfile.txt
E. touch/tmp/myfile.txt
Answer: A
Which of the following commands kills the process with the PID 123 but allows the process to "clean up" before exiting?
A.
kill -PIPE 123
B.
kill -KILL 123
C.
kill -STOP 123
D.
kill -TERM 123
kill -TERM 123
What is the default nice level when a process is started using the nice command?
A.
-10
B.
10
C.
20
D.
0
10
What is the maximum niceness value that a regular user can assign to a process with the nice command when executing a new process?
A.
9
B.
19
C.
49
D.
99
19
You are trying to make a hard link to an ordinary file but ln returns an error. Which of the following could cause this?
A.
The source file is hidden.
B.
The source file is read-only.
C.
The source file is a shell script.
D.
You do not own the source file.
E.
The source and the target are on different filesystems.
The source and the target are on different filesystems.
Which of the following commands can be used to create a USB storage media from a disk image?
A.
gdisk
B.
dd
C.
cc
D.
fdisk
E.
mount
dd
Page 6 out of 25 Pages |
Previous |