1.
The legacy program, provided by CUPS for sending files to the printer queues on the command line is:
2.
Which of the following commands can deconfigure a network interface?
3.
Which command manipulates the TTL (Time to Live) field in the IP protocol in order to get ICMP responses from gateways along the path to a host?
4.
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?
5.
When generating new authentication keys with SSH for a user, where should the private key be kept?
6.
Why is the xhost program considered dangerous to use?
7.
What is the conventional purpose of Linux UIDs that are lower than 100?
8.
What is the main difference between the batch and at commands?
9.
The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5
10.
On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem?