1.
How can a Linux user use vi to edit the first 30 lines of a 60-line file and replace all occurrences of test to TEST?
2.
When a new Snort system is installed, where should the system be placed on the network?
3.
The DNS administrator needs to change the IP address of the primary Webserver. Any downtime would have a major impact. Which of the following is the BEST way to minimize the downtime?
4.
A new administrator is asked to reconfigure a Linux machine. The prior administrator did not give the root password to the current administrator. Which of the following is the FIRST step the new administrator should do to reset the root password?

 
5.
Which of the following encryption algorithms are natively supported for the /etc/shadow file?
6.
How would a user send /etc/aliases as the text of an email to another user on the same system?
7.
Which of the following RAID configurations is BEST for a streaming-video server where reliability is NOT important?
8.
Which of the following strings indicates that the input of the program called printData should be redirected from the file called yData?
9.
Which of the following environment variables specifies the location where user files are stored by default?
10.
A Linux print server must limit access to its printers. Only the database server must be allowed to print. Which method is considered best practice?