Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free RedHat RH133 Practice Exam with Questions & Answers | Set: 10

Questions 91

What is the maximum number of partitions that Linux kernel supports for IDE drives?

Options:
A.

50

B.

15

C.

74

D.

63

RedHat RH133 Premium Access
Questions 92

John works as a Network Administrator for We-are-Secure Inc. The company uses a Linux server. John wants to give the following file permissions to the imp.c file:

Read, Write, and Execute permissions to the owner

Read and Write permissions to groups

Read Only permissions to other users

Which of the following commands will John use to accomplish the task?

Options:
A.

chmod 712

B.

chmod 777

C.

chmod 765

D.

chmod 764

Questions 93

Which of the following commands will you use to list all local and remote printers attached to your computer?

Options:
A.

lpstat -t

B.

lpq

C.

lpr

D.

lpstat –d

Questions 94

Which of the following files is used to initialize a computer-wide environment on a Linux computer?

Options:
A.

/etc/group

B.

/etc/profile

C.

/etc/syslog.conf

D.

/etc/startup

Questions 95

You work as a Network Administrator for Perfect World Inc. The company has a Linux-based network. You have configured a Linux server to connect to the Internet. Before connecting it to the Internet, you want to check all the files on which SUID has been set. Which of the following commands will you choose to list all such programs?

Options:
A.

find /-perm -2000

B.

ls -l

C.

find /-perm -4000

D.

ls -suid

Questions 96

Which of the following commands displays information for all filesystems that have quota enabled?

Options:
A.

quotaon

B.

quota

C.

quota -v

D.

quotaoff

Questions 97

Which of the following commands can be used to check badblocks?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

mkswap -c

B.

fsck -c

C.

mke2fs -I

D.

fsck -p

Questions 98

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. The company is using the host-based access control to avoid unwanted access of the malicious users. John wants to add a new user, which can use X applications from the remote computer. Which of the following commands will John use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

John will run the xhost command.

B.

John will execute the startx command.

C.

John will add a new user in the file /etc/Xn.hosts.

D.

John will add a new user in the file /etc/Xadd.hosts.

Questions 99

You work as a Network Administrator for McRoberts Inc. The company has a Linux-based network.

You have created a script named lf.cgi. You want to provide the following permissions on it: rwsr-sr--

Which of the following commands will you execute?

Options:
A.

chmod 2754

B.

chmod 6754

C.

chmod 4754

D.

chmod 7754

Questions 100

Which of the following commands is used to create a new group in a Linux server?

Options:
A.

MOUNT

B.

ADDGROUP

C.

USERADD

D.

GROUPADD