You are working with the vi editor and writing a textfile. Which of the following commands will you use if you want to move the cursor 3 characters to the right?
Which of the following commands will you run to do case-sensitive search for files named
foobar.png?
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to know how many words are present in the file named file1.txt. You type the following command on the terminal: wc file1.txt.
The command displays the following output:
40 245 1800 file1.txt
How many words are present in the file file1.txt?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You want to view the status of the current processes running on a Linux computer. You also want to append this information into the StatPro.txt file without deleting its content. Which of the following commands will you use to accomplish the task?
Fill in the blank with the appropriate permission to complete the statement below.
__________ is Linux access permission flag bit that allows users to run an executable file with the permissions of the executable's owner.
You work as the Network Administrator for Perfect solutions Inc. The company has a Linux-based Network. You are working as a root user. You want to know what the day will be on 20 July 2010.
Which of the following commands should you use to accomplish this task?
You have made a program secure.c to display which ports are open and what types of services are running on these ports. You want to write the program's output to standard output and simultaneously copy it into a specified file. Which of the following commands will you use to accomplish the task?
Which of the following key-combinations is used to redo a change undone by a u command in vim?
Which of the following commands displays the inode number of a file in the Linux operating system?
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. Rick, a Sales Manager, has a permission issue on a file. You want to know the names of groups of which Rick is a member. You want to store the information in a text file named
RickGroup.txt. Which of the following commands will you use to accomplish the task?