- Give an example of set of shell commands that will give you the number of files in a directory
- How do you tell what process has a TCP port open in Linux
- On a Red Hat Linux Variant how do you control whether a service starts when the system boots
- How do you tell the amount of free disk space left on a volume
- Give an example of a set of shell commands to tell how many times “bob†has logged on to the system this month
- Give an example of a recursively copying a directory from one location to another.
- How do you modify the IP and Net mask of a system running a Red Hat Variant of Linux
- Give an example of a set of shell commands that will give you the number of “httpd†processes running on a Linux box.
- On CentOS or Fedora based system using the package management application, how do you tell what package provided the file “libnss_ldap.soâ€
- What is the difference between VTP client, server, and transparent
- What is the maximum length of CAT6
- How does one set up a layer two link to share VLANs
- How does one implement redundant links at Layer 2
- What is the difference between a hub, switch, and a router? What are the security advantages of switch vs. hub?
- Show an example of using telnet to learn the headers of an http server.
- In what OSI layer does PPP exist
- What's the difference between TCP and UDP
- Given a DNS server that has just started (with an empty cache) and host contacting this DNS server (using it's OS setting) to learn an address for google.com, list the steps the DNS server will take to learn it with IP addresses (each step will have multiple possible IP addresses â€" you need choose only one per step).
- Why are layer 2 loops bad, and what protocol was designed to prevent them
- Given a radius server at 10.0.0.2 and a shared key of ‘abc123′ show the IOS commands necessary to authenticate switch users against the radius server, while still allowing the use of local username / password pairs
About Java and it's related concepts..
Comments
Post a Comment