1.
The administrator notices malicious network traffic from the example.com domain and would like to contact the example.com administrator. Which of the following commands would display contact information for this domain?
2.
A system administrator wants to see if an RPM package is installed on a user workstation. Which of the following commands should be used?
3.
Which of the following files is commonly included with source code to automate the compilation?
4.
The following command run as root will search the system for which of the following? find / -name '.*'
5.
Which of the following is a common tool used to determine what services and ports are running on a remote Linux box?
6.
Which of the following file systems are compatible with a partition that is typed as 82?
7.
The UMASK value is set to 22 Which of the following will the default permissions be on lilename.txt when the file is created?
8.
Which Apache configuration file controls the mapping of SSL certificates?
9.
A company currently has four Linux servers and wants to install a fifth server to perform user authentication. Which of the following is a valid protocol for centralized user authentication?
10.
The UMASK value is set to 22 Which of the following will the default permissions be on lilename.txt when the file is created?