You want to uninstall an rpm package foo without verifying its dependencies. Which of the following commands will you use?
A. rpm --erase --allmatches
B. rpm -e --allmatches
C. rpm -e --noscript
D. rpm -e --nodeps
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You
have assigned a permission set of 440 on a folder. Which of the following permissions are added to the
folder? Each correct answer represents a part of the solution.
Choose all that apply.
A. No permission to others.
B. Read permission to the owner.
C. Read and Execute permissions to the group.
D. Read, Write, and Execute permissions to the owner and the group.
E. Read permission to the group.
F. Read and Execute permissions to the owner.
In Linux, which of the following prompts does the Shell display to indicate that the logged in user is Superuser?
A. $
B. #
C. :
D. and
In which of the following files, RHEL stores its network interface configuration information?
A. /etc/host.conf
B. /etc/sysconfig/network-scripts/ ifcfg-ethX
C. /etc/network.conf
D. /etc/sysconfig/network-script/ifcfg-ethX
Which of the following commands can be used to check the status of RAID devices?
A. fsck
B. mkfs
C. mdadm
D. fdisk
What is the maximum number of partitions that Linux kernel supports for SCSI drives?
A. 60
B. 63
C. 15
D. 30
In, which of the following directories all configuration files are usually stored?
A. /boot
B. /var
C. /etc
D. /bin
Which of the following utilities can be used to mount removable devices when they are detected via HAL?
A. umount
B. gnome-mount
C. gmount
D. mount
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You
have assigned a permission set of 440 on a folder. Which of the following permissions are added to the
folder?
Each correct answer represents a part of the solution. Choose all that apply.
A. Read permission to the owner.
B. Read and Execute permissions to the group.
C. Read, Write, and Execute permissions to the owner and the group.
D. Read and Execute permissions to the owner.
E. Read permission to the group.
F. No permission to others.
Which of the following shutdown command parameters is used to skip the fsck command process after rebooting the Linux operating system?
A. -k
B. -a
C. -f
D. -t