Which of the following commands will set the local machine's timezone to UTC?
A. cat UTC > /etc/timezone
B. ln -s /usr/share/zoneinfo/UTC /etc/localtime
C. date --timezone=UTC
D. mv /usr/timezone/UTC /etc
Which of the following commands is used to display user resource limits?
A. uname
B. limit -a
C. usrlmt
D. ulimit
To prevent a specific user from scheduling tasks with at, which of the following should the administrator do?
A. Add the specific user to /etc/at.allow file.
B. Add the specific user to [deny] section in the /etc/atd.conf file.
C. Add the specific user to /etc/at.deny file.
D. Add the specific user to nojobs group.
E. Run the following: atd --deny [user].
Which of the following is pool.ntp.org?
A. A deprecated feature for maintaining system time in the Linux kernel.
B. A website which provides binary and source packages for the OpenNTPD project.
C. A virtual cluster of various timeservers.
D. A community website used to discuss the localization of Linux.
Which of the following commands allows an administrator to make a shell variable visible to subshells?
A. export $VARIABLE
B. export VARIABLE
C. set $VARIABLE
D. set VARIABLE
E. env VARIABLE
Which of the following words is used to restrict the records that are returned from a SELECT query based on supplied criteria for the values in the records?
A. LIMIT
B. FROM
C. WHERE
D. IF
On a dual boot system, every time the system is booted back into Linux the time has been set backward by two hours. Which of the following commands will correct the problem so it will not occur again?
A. ntpdate pool.ntp.org
B. date -d 'two hours'
C. hwclock --hctosys --localtime
D. time hwclock
Which of the following commands manipulates the TTL (Time to Live) field in the IP protocol in order to get ICMP responses from gateways along the path to a host?
A. dig
B. host
C. ping
D. tcpdump
E. traceroute
When generating new authentication keys with SSH for a user, where should the private key be kept?
A. On any trusted system from which the user will login.
B. On a CD-ROM or USB stick.
C. Printed and kept in a secure place.
D. Only on the computer where the key was created.
E. SSH does not use private keys.
To slave the NTP daemon to an external source, an administrator needs to modify the ______ variable in the /etc/ntp.conf file.
An administrator is logged in as root. What command should the administrator run to find out what groups user bruno belongs to?
Please specify the top directory containing the configuration files for the CUPS printing system. (Provide the full path to the directory)
What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Provide only the name of the program without any path information)
The _________ command is used to assign an IP address to a device. (Please specify the command with or without path information)
With IPv6, how many bits have been used for the host identifier portion of an address? (Please enter the number and not a word)