CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • EC Council
          • Certified Ethical Hacker
        • Google
          • Cloud Architect
        • ITIL
          • ITIL Foundations
        • PMI
          • CAPM
        • ISC2
          • CC
          • SSCP
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Python
          • PCEP
          • PCAP
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
        • Wireshark
          • WCNA
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • EC Council
          • Certified Ethical Hacker
        • Google
          • Cloud Architect
        • ITIL
          • ITIL Foundations
        • PMI
          • CAPM
        • ISC2
          • CC
          • SSCP
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Python
          • PCEP
          • PCAP
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
        • Wireshark
          • WCNA
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

rando

loading

1. The offline Debian package management tool.

Question 1 of 50

2. Which signal should you use to abruptly interrupt a process?

Question 2 of 50

3. shall be used in order to update all installed Debian packages.

Question 3 of 50

4. To see the booting process debug, you can use the tool.

Question 4 of 50

5. You can gather information about the CPU by looking at the content of the /proc/ file.

Question 5 of 50

6. 'ping' requires administrative permission ir oder to be executed. However, it is unproductive to allow only root to run such command. Therefore, a solution that allows all users to run this tool is the special permission.

Question 6 of 50

7. The permission illustrated by 'rwxrwsrwx' illustrates a special permission, which is:

 

Question 7 of 50

8. Which switch/option of the 'ls' tool illustrates a file's inode data?

Question 8 of 50

9. By default, all Linux systems have the sticky bit enabled on the /tmp directory.

Question 9 of 50

10. The Linux system directory hierarchy is defined by a standard named

Question 10 of 50

11. In order to see the filesystems that are mounted, you can use:

Question 11 of 50

12. There are two more traditional tools that can be used to display mounted filesystems: and

Question 12 of 50

13. You just edited and changed the content of the /etc/fstab file. What option/switch of the mount command can you use to force the system to read this file and (re)mount the mount points without rebooting the system?

Question 13 of 50

14. The difference between the ext3 and ext4 filesystems is that ext3 does not implement journalling.

Question 14 of 50

15. Format partition /dev/sda3 as ext4:

Question 15 of 50

16. Logical Volume Manager allows you to dynamically resize LVM partitions.

Question 16 of 50

17. Logical partitions in LVM are called:

Question 17 of 50

18. letter that identifies symbolic link files:

Question 18 of 50

19. Online package manager used by RedHat-based Linux distributions:

Question 19 of 50

20. To configure cron you can either edit the /etc/crontab file or run 'crontab -e', but the former is indicated.

Question 20 of 50

21. What Linux file is composed of lines similar to the following:
/dev/sda1 /mnt/mount_point ext4    defaults   0      1

Question 21 of 50

22. When you enter a command in the shell, the system will search for such tool in directories that are listed in the variable.

Question 22 of 50

23. To see the directory that stores a command, you should use:

Question 23 of 50

24. 'chmod u+x file' adds permission of execution to the owner.

Question 24 of 50

25. 'chown .john directory' defines user John as the owner of directory.

Question 25 of 50

26. Remove the sticky bit permission of the /tmp directory:

Question 26 of 50

27. $ ls /root > /dev/null

Question 27 of 50

28. special character used to send the output of a command as input of another command, binding these two tools.

Question 28 of 50

29. John works for company ABC. His boss asked him to generate a report showing the last time each user logged into the server. What tool can John use?

Question 29 of 50

30. 'dpkg -l|grep apache2'

Question 30 of 50

31. A backup process (PID 2233) has been started with priority 0. You need to make sure it runs faster and increase this process' priority. You can do that by running 'renice -n 10 2233'.

Question 31 of 50

32. The default system initializer process in modern Linux systems such as Ubuntu 18.04.

Question 32 of 50

33. You are creating a PERL script. The first line in the script file must be:

Question 33 of 50

34. To constantly monitor new entries in the /var/log/auth.log file, you can use:

Question 34 of 50

35. usermod -s /bin/false user

Question 35 of 50

36. Command to list the PCI devices:

Question 36 of 50

37. iptables -A FORWARD -p tcp --dport 22 -j ACCEPT

Question 37 of 50

38. Most modern Linux systems, such as Ubuntu 18.04, use ______________________ as the default security controller system.

Question 38 of 50

39. PAM stands for .

Question 39 of 50

40. To prevent log files from overloading the Linux partition, you may use the tool.

Question 40 of 50

41. tar tzvf tarball.tar.gz:

Question 41 of 50

42. What file may contain the following line?

0 5 * * * root /usr/sbin/backup.sh

Question 42 of 50

43. What option of the 'find' tool should you use to run a command over each file found?

Question 43 of 50

44. How many file types are there in a Linux system?

Question 44 of 50

45. What command can you use to filter for a specific column number in a line?

Question 45 of 50

46. In Debian-based systems, what dpkg option should be used to remove a package including all config and data files?

Question 46 of 50

47. You need to use the 'netstat' tool, but you realize that it is not installed in your system, which means that you have to install it. However, you do not know what package actually contains the desired tool. How can you find the package that contains it?

Question 47 of 50

48. Command to remove a specific module and other ones that were loaded along with it.

Question 48 of 50

49. In a sysV-based Linux system, the first process (also called 'the father of all processes') is the process.

Question 49 of 50

50. Command to display info about RAM memory and swap:

Question 50 of 50

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Subscription Form

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.