You work as the Network administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want look for files whose last modified timestamp is exactly five days ago. Which of the following commands should you use to accomplish this task?
Fill in the blank with the required permission to complete the statement below. In order to make a script executable in a Linux computer, you must assign the___________ permission to the script file.
Which of the following commands can you use to see only the last ten lines of a file?
Each correct answer represents a complete solution. Choose all that apply.
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as the root user on the Linux operating system. He wants to delete all files whose names end with a number. Which of the following commands will John use to accomplish the task?
John works as the Network Technician for Tech Perfect Inc. The company has a Linux-based network.
John wants to view a PDF document on his Linux system. Which of the following commands should John use to accomplish the task?
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as the root user on the Linux operating system. He wants to copy all files with the .dat extension from /home/john to /home/maria while preserving the file attributes, such as timestamps, mode, and ownership. Which of the following commands will he use to accomplish the task?
Which of the following commands can be used by a user to display the list of contents existing in his current user account?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following commands is used to mount file systems?
Which of the following commands is used to append the list of files in the /tmp directory to an existing file named deletelater.txt?
You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based Network. You are working as a root user on the Red Hat operating system. You want to find out the disk space usage of a remote host named York. For this, you have to remotely login to York and run the command to determine how much disk space has been used on per filesystem basis. Which of the following command syntaxes should you use to securely access the data from the remote host?