Give an example of set of shell commands that will give you the number of files in a directory
How do you tell what process has a TCP port open in Linux
On a Red Hat Linux Variant how do you control whether a service starts when the system boots
How do you tell the amount of free disk space left on a volume
Give an example of a set of shell commands to tell how many times “bob†has logged on to the system this month
Give an example of a recursively copying a directory from one location to another.
How do you modify the IP and Net mask of a system running a Red Hat Variant of Linux
Give an example of a set of shell commands that will give you the number of “httpd†processes running on a Linux box.
On CentOS or Fedora based system using the package management application, how do you tell what package provided the file “libnss_ldap.soâ€Â
What is the difference between VTP client, server, and transparent
What is the maximum length of CAT6
How does one set up a layer two link to share VLANs
How does one implement redundant links at Layer 2
What is the difference between a hub, switch, and a router? What are the security advantages of switch vs. hub?
Show an example of using telnet to learn the headers of an http server.
In what OSI layer does PPP exist
What’s the difference between TCP and UDP
Given a DNS server that has just started (with an empty cache) and host contacting this DNS server (using it’s OS setting) to learn an address for google.com, list the steps the DNS server will take to learn it with IP addresses (each step will have multiple possible IP addresses – you need choose only one per step).
Why are layer 2 loops bad, and what protocol was designed to prevent them
Given a radius server at 10.0.0.2 and a shared key of ‘abc123′ show the IOS commands necessary to authenticate switch users against the radius server, while still allowing the use of local username / password pairs
No comments:
Post a Comment
comment on this post
Note: Only a member of this blog may post a comment.