1.
If the /etc/shadow file does not exist when pwconv is run, which of the following will occur?
2.
Shadow passwords are disabled on a Linux server. Which of the following appears after a user's name in the /etc/passwd file when a user account is disabled?
3.
What command should be run in order to add /usr/local/program1/bin to the path and make it active in the current shell?
4.
When a user begins to use a shell, the only information showing is the prompt. Which of the following can be used to determine which commands are available?
5.
Which of the following commands can be used to confirm that the FTP server is listening?
6.
Which of the following protocols is used by NIS?
7.
Which of the following commands would ensure that the Linux server would send packets destined for 192.168.100.0/25 to 192.168.200.5?
8.
A Linux user wants to access the X interface on a remote server. How can this be made secure?
9.
Which of the following commands can be used to create a link to the file /home/joe/help in /tmp/help.old?
10.
DMA (Direct Memory Access) is required for which of the following items?