Linux LX104

¡Supera tus tareas y exámenes ahora con Quizwiz!

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

/etc/cups/

given the following line for /etc/nsswitch.conf: hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4 By default which file will be queried first for hostname lookup?

/etc/hosts

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

/etc/nologin

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

/etc/skel

What is the lowest numbered unprivileged TCP port?

1024

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

14

Which port is the default server port for the https protocol?

443

What is the assigned port number for the HTTP service? (Specify the port number using digits.)

80

After issuing: function myfunction { echo $1 $2 ; } in Bash, which output does: myfunction A B C Produce? A. A B B. A B C C. A C D. B C E. C B A

A

Given the following routing table Kernal IP routing table Destination Gateway Genmask FLags MEtric Ref Use Iface 192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 wlan0 why does the command route add default gw 192.168.1.1 fail? A. because there is no route to 192.168.1.1 B. Becuase only one route can exists at a time C. BEcause there is already a default route D. BEcuase default routes can not be set manually E. because default routes must be set with ifconfig

A

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12? A. *.* /dev/tty12 B. /var/log/messages | /dev/tty12 C. | /dev/tty12 D. syslog tty12 E. mail.* /dev/tty12

A

What is the purpose of the dig command? A. It can be used as a tool for querying DNS servers B. It can be used for searching through indexed file content C. It can be used to look for open ports on a system D. It can be used to ping all known hosts on the current subnet

A

What is the purpose of the sticky keys feature in X? A. To assist users who has difficulty holding down multiple keys at once B. To prevent repeated input of a single character if the key is held down C. To ignore brief keystrokes according to a specified time limit D. To repeat the input of a single character

A

What is the purpose of the xhost program? A. Grants or revoke access to a X11 session B. Install all packages and video drivers required to run X11 on a host C. Start the X11 server and annoucned its availability within the local network D. Send informational messages to all users logged into a host using X11 E. Display the MOTD and other important information when a user logs in via X11

A

What output will the following command sequence produce? echo '1 2 3 4 5 6' | while read a b c; do echo result: $c $b $a; done A. result: 3 4 5 6 2 1 B. result: 1 2 3 4 5 6 C. result: 6 5 4 D. result: 6 5 4 3 2 1 E. result: 3 2 1

A

Which configuration file would be edited to change the default options for outbound SSH sessions? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/client D. /etc/ssh/ssh_config E. /etc/ssh/ssh_client

A

Which of the following commands creates a function in bash that outputs the sum of two numbers? A. function sumitup { echo $(($1 + $2 )) } B. command sumitup { echo $(($1 +$2)) ; } C. function sumitup { echo $1 + $2 } D. method sumitup {echo $1+ $2 ' } E. command sumitup { echo $1 + $2 ; }

A

Which of the following commands prints the exit value of the most recently executed program in bash? A. echo $? B. echo $# C echo $exit D. echo $status E. echo $&

A

Which of the following commands puts the output of the command date into shell variable mydate? A. mydate="$(date)" B. mydate="exec date" C. mydate="$((date))" D. mydate="date" E. mydate="$(date)"

A

Which of the following is a valid IPv6 address? A. 2001:db8:3241::1 B. 2001::db8:4581::1 C. 2001:db8:0g41::1 D. 2001%db8%9990%%1 E. 2001.db8.819f..1

A

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services? A. tcpd B. inted C. fingerd D. mountd E. xinetd

A

What is true regarding the command userdel --force --remove bob (choose two) A. THe user bob is removed from the system's user database B> THe uer bob's home directory is removed C. THe locate database is updated to drop files owned by bob D. All files owned by bob are removed from all mounted filesystems E. In case bob was the last member of a group, that should is deleted

A, B

When issuing the command ifconfig eth0 192.168.1.20/24 up, which of the following happens? (choose two) A. The address 192.168.1.20 is associated with the interface eth0 B. A network route to 192.168.1.0 with the netmask 255.255.255.0 pointing directly to eth0 is created C. 192.168.1.1 is probed for router functionality and, in case of success, it is added to the list of default routers D. The addresses from 192.168.1.24 are activated on the interface eth0 E. if eth0 was configured with a previous IP address, it is retained in addition to adding the new address

A, B

Which of the following resources can be directly limited for a given user using ulimit? (choose 3) A. maximum number of seconds of CPU time spent B. Maximum number of open file descriptors C. Maximum number of processes available D. Maximum number of concurrent login sessions E. Maximum seconds of login duration per session

A, B, C

Which ommands can be used to change a user's account aging information? (choose three) A. usermod B. passwd C. chattr D. chage E. chsh

A, B, D

Which of the following are commonly used Mail Transfer Agent (MTA) applications? Choose three A. Postfix B. Procmail C. Sendmail D. Exim E. SMTPd

A, C, D

Which of the following fields can be found in the /etc/group file? (choose three) A. The list of users that belong to the group B. The home directory of the group C. The name of the group D. The description of the group E. The password of the group

A, C, E

Which of the following are commonly used Mail Transfer Agent (MTA) applications? Choose three A. Postfix B. Procmail C. Sendmail D. Exim E. SMTPd

A, C< D

What of the following can be done by the command ifconfig? (choose two) A. Set a network interface activet or inactive B. Specify the kernal module to be used with a network interface C. Allow regular users to change the network configuration of a network interface D> CHange the netmark used on a network interface E. SPecify which network services are available on a network interface

A, D

Which of the following commands are used to manage the environment and shell variables within a shell process? (Choose TWO) A. export B. init C. reset D. set E. tset

A, D

Which of the following are valid IPv4 network masks? (choose 2) A. 255.255.0.0 B. 255.255.255.65 C. 255.255.0.255 D 0.0.0.01 E. 255.255.255.248

A, E

Which of the following are tasks handled by a display manager like XDM or KDM? (choose two) A. start and prepare the desktop environment for the user B. Configure additional devices like new monitors or projectors when they are attached. C. Handle the login of the user D. lock the screen when the user was inactive for a configurable amount of time E. Create an X11 configuration file for the current graphic devices and monitors

A,C

Which of the following commands can modify or set the pasword expiration for a user? (choose two) A. chage B. chexpiration C. shadowconfig D. passwd E. userconf

A,D

Instead of using specific host names or IP addresses, which string can be used in /etc/hosts.allow entries to cover any remote host no matter of its name or address? (Specify the relevant string only without any additional options or arguments.)

ALL

How is a display manager started? A. It is started by a user using the command startx. B. It is started like any other system service by the init system. C. It is started by inetd when a remote hosts connects to the X11 port. D. It is started automatically when a X11 user logs in to the system console.

B

What is NTP? A. A more secure protocol replacement for FTP. B. A protocol for synchronizing time on computers. C. A routing aid for finding next hops on a network. D. A simple tunnelling protocol for computers behind firewalls.

B

What is the main difference between the batch and at commands? A. The batch command will run multiple times. The at command will run only once B. The commands of a batch job run sequentially one after another while the commands in at jobs may run parallel C. The at command reads commands from standard input. the batch command requires a command line argument D. The at command emails results to the user. the batch command logs results to syslog

B

What is true regarding the statement beginning with #! that is found in the first line of a script? A. It prevents the script from being executed until the ! is removed B. It specifies the path and the arguments of the interpreter used to run the script C. It is a comment that is ignored by the script D. It specifies the character encoding of the script

B

What is true regarding the time in a Linux system? A. The BIOS clock of a computer indicates the current local time and time zone. B. Each application must convert the Unix time to the current time zone which is usually done by using standard libraries C. When the system is on the network, each query for the current time leads to a new network connection to a time server D. When the system time changes, running processes must be restarted in order to get the correct time

B

What output will the command seq 10 produce? A. A continuous stream of numbers increasing in increments of 10 until stopped. B. The numbers 1 through 10 with one number per line. C. The numbers 0 through 9 with one number per line. D. The number 10 to standard output.

B

Which command makes the shell variable named VARIABLE visible to subshells? A. export $VARIABLE B. export VARIABLE C. set $VARIABLE D. set VARIABLE E. env VARIABLE

B

Which command will set the local machine's timezone to UTC? A. cat UTC > /etc/timezone B. ln -s /usr/shares/zoneinfo/UTC /etc/localtime C. date --timezone=UTC D. mv /usr/time

B

Which environmental variable will override all LC_* variables? A. LANG B. LC_ALL C. LC_COLLATE D. LOCALE

B

Which of the following configuration files should be modified to globally set shell variables for all users? A. /etc/barshrc B. /etc/profile C. ~/.bash_profile D. /etc/.bashrc

B

Which of the following files holds the configuration for journald when running systemd? A. /etc/systemd/jounralctl.conf B. /etc/systemd/journald.conf C. /etc/systemd/systemd-jounrald.conf D. /etc/systemd/systemd-journalctl.conf E. /usr/lib/systemd/jounralctl.conf

B

Which of the following is observed and corrected by a NTP client? A. The skew in time between the system clock and the hardware clock B. The skew in time between the system clock and the reference clock C. Changes in the time zone of the current computer's location D. Adjustments neeeded to support daylight savings time

B

Which of the following statements is true regarding the /etc/shadow file? A. /etc/shadow may not be readable or writable by user root B. Only root is allowed to read and write /etc/shadow C. all users have full read and write access to /etc/shadow D. all users have full read access to /etc/shadow

B

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query? A. dnsq B. dig C. hostname D. dnslookup E. zoneinfo

B

Why should a NTP client maintain connections to several NTP servers? A. To receive NTP information every second as each server transmists NTP pings every five seconds only B. To improve the precision of the time by comparing responses from several servers C. To not overload the remote server in case the local NTP time cache is not enabled D. To not lose contact with all NTP servers in case the client changes networks

B

What is true regarding public and private SSH keys? (choose two) A. Several different public keys may be generated for the same private key B. the private key must never be revealed to anyone C. For each user account, there is exactly one key pair that can be used to log into that account D. TO maintain th eprivate key's confidentiality, the SSH key pair must be created by its owner E. To allow remote logins, the user's private key must be copied to the remote server

B, D

Which of the following are operators used for comparisons by the test command? (choose TWO) A. equals B. = C. -is D. -eq E. null

B, D

Which of the following files, when existing, affect the behavior of the bash shell? (choose TWO) A. ~/.bashconf B. ~/.bashrc C. ~/.bashdefaults D. ~/.bash_etc E. ~/.bash_profile

B, E

Which of the following keywords can be used in the file /etc/resolv.conf? (choose two) A. substitute B. nameserver C. search D. lookup E. Method

B,C

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (choose 3) A. 127.0.0.0/8 B. 10.0.0.0./8 C. 169.255.0.0./16 D. 172.16.0.0./12 E. 19.268.0.0./16

B. D. E

For accessibility assistance, which of the following programs is an on-screen keyboard? A. xkb B. atkb C. GOK D. xOSK

C

In order to discover the link layer adress of the device that owns a specific IPv4 or IPv6 address, which mechanism is used? A. BOth IPv4 and IPv6 uses ARP B. Both IPv4 and IPv6 uses Neighbor Discovery C. IPv4 uses ARP while IPv6 uses Neighbor Discovery D. IP4 uses Neighbor DIscovery while IPv6 uses ARP E. Both IPv4 and IPv6 can use either ARP or Neighbhor Discovery depending on the network

C

To prevent a specific user from scheduling tasks with at, what should the administrator do? A. Add the specific user to /etc/at.allow file. B. Add the specific user to [deny] section in the /etc/atd.conf file. C. Add the specific user to /etc/at.deny file. D. Add the specific user to nojobs group. E. Run the following: atd --deny [user].

C

What is not contained in the locale setting of the operating system? A. currency smbol B. language C. timezone D. thousands separator

C

What is true about the ntpdate command? A. It is the primary management command for the NTP time server. B. It updates the local system's date (i.e. day, month and year) but not he time (i.e. hours, minutes, seconds) C. It queries one or more NTP time servers and adjusts the system time accordingly D. It sends the local system to one of many remote NTP time servers for redistribution E. It can be used by any user to set the user clock independently of the system clock

C

When the command echo $? outputs 1, which of the following statements are true? A. It is the process ID of the echo command. B. It is the process ID of the current shell. C. It is the exit value of the command executed immediately before echo. D. It is the exit value of the echo command.

C

Which Bash option prevents a user from accidentally overwriting a file with a ">"? A. set -o safe B. set -o noglob C. set -o noclobber D. set -o append E. set -o nooverwrite

C

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes? A. core B. edquota C. ulimit D. quota

C

Which configuration file does sudo read when determingin if a user is permitted to run applications with root privs? A. /etc/security.confg B. /etc/supasswd C. /etc/sudoers D. /etc/sudo.conf

C

Which of the following SQL statements will select the fields name and address from the contacts table? A. SELECT (name,address) FROM contacts; B. Select (name,address) FROM contacts; C. SELECT name, address FROM contacts; D. SELECT name address FROM contacts;

C

Which of the following actions prevents a specific user from scheduling tasks using at or batch? A. Add the specific user to the /etc/at.allow file B. Add the specific user to the [deny[ section in the etc/atd.conf file C. Add the specific user to the /etc/at.deny file D. Add the specific user to the nojobs group E. Run atd --deny followed by the name of the specific user

C

Which of the following commands shows the current color depth of the X server? A. xcd B. xcdepth C. xwininfo D. xcolordepth E. cat /etc/xll

C

Which of the following commands will convert files from one character encoding to another? A. convert B. enc2utf C. iconv D. transcode

C

Which of the following statements is valid in the file /etc/nsswitch.conf? A. multi on B. 192.168.168.4 dns-server C. Hosts: files dns D. include /etc/nsswitch.d/

C

Why should a regular user edit his personal crontab by using the command crontab instead of just editing his crontab file manually? A. Because user specific crontab entries are stored in a common database and must be extracted before editing. B. Because crontab starts the cron daemon in case it is not running due to no other crontab entries existing. C. Because user specific crontab entries are stored in a special directory which is maintained by the cron daemon and not writable for regular users. D. Because crontab collects information about all users crontabs and recommends similar commands used by other users of the system.

C

Depending on the host's configuration, which of the following files can be used to turn on and off network services running on a host? (Choose TWO correct answers.) A. /etc/profile B. /etc/services C. /etc/inetd.conf D. /etc/xinetd.conf E. /etc/host.conf

C, D

Which of the following details can be found in an entry of a user specific crontab (choose two) A. The verbal description of the job. B. The syslog facility to where the output of the job should be sent C. The time when the cron job should run. D. The command that should be started by the cron job. E. The name of the user which should run the job

C,D

Each entry in a crontab must end with what character? A. Tab B. Space C. Backslash D. Newline

D

How many bits make up an IPv6 address? A. 32 B. 48 C. 64 D. 128 E. 256

D

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate? A. The local routing information may be corrupted and must be re-validated using a routing protocol. B. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout. C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default. D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

D

What is true about the file /etc/localtime? A. It is a plain text file containing a string such as Europe/Berlin B. It is created and maintained by the NTP service based on the geolocation of the system's IP address C> It is a symlink to /sys/device/clock/ltime and always contains the current local time D> It is either a symlink to or a copy of a timezone information file such as usr/share/zoneinfo/Europe/Berlin

D

What is true regarding the file ~/.forward? A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes C> using ~/.forward, root may configure any email address whereas all other users may configure only their addresses D> When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other receipients

D

What of the following statements is true regarding a display manager? A. A display manager handles remote X11 logins only and has no purpose on a system that is not attached to a network B. The display manager is configured in the X11 configuration file xorg.conf C. There is only one display manager X11DM that must be started on all systems running X11 D. After system startup, the display manager handles the login of a user E. WIthout a display manager, no graphical programs can be run

D

Which file, when using Sendmail or a compatible MTA system, will allow a user to redirect all of their mail to another address and is configurable by the user themselves? A. /etc/alias B. /etc/mail/forwarders C. ~/.alias D. ~/.forward

D

Which of the following commands is used to rotate, compress, and mail system logs? A. rotatelog B. strilog C. syslogd --rotate D. logrotate E. logger

D

Which of the following commands lists all queued print jobs? A. lpd B. lpr C. lp D. lpq

D

Which of the following commands pauses the CUPS printer LaserPrinter? A. cupsreject LaserPrinter B. cupsreject -d LaserPrinter C. cupsdisable -d LaserPrinter D. cupsdisable LaserPrinter

D

Which of the following commands should be added to /etc/bash_profile in order to change the language for an internationalized program to Portuguese (pt)? A. export LANGUAGE="pt" B. export MESSAGE="pt" C. export UI_MESSAGES="pt" D. export LC_MESSAGES="pt" E. export ALL_MESSAGES="pt"

D

Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays? A. 0 * * * 30 myscript B. 30 * * * 6 myscript C. 30 0 * * 0 myscript D. 30 0-23 * * 0 myscript E. 0 0-23 * * 30 myscript

D

Which of the following files assigns a user to its primary group? A. /etc/pgroup B. /etc/shadow C. /etc/group D. /etc/passwd E. /etc/gshadow

D

Which of the following is a legacy program provided by CUPS for sending files to the printer queus on the command line A. lpd B. lpp C. lpq D. lpr

D

Which of the following statements is a correct entry in the file /etc/hosts file? A. localhost 127.0.01 localhost.localdomain B. localhost.localdomain localhost 127.0.0.1 C. localhost localhost.localdomain 127.0.0.1 D> 127.0.01 localhost.localdomain localhost E> localhost.localdomain 127.0.01 localhost

D

Which of the following statements is valid in the file /etc/resolv/conf A. order hosts, bind B. 192.168.168.4 dns-server C. hosts: files, dns D. domain example.com

D

Which of the following is true regarding the mail queue of a mail server? (choose two) A. The messages in the queue must be readable by all users as the queue may contain messages for several users. B. According to the Filesystem hierarchy Standard (FHS), the queue is located at /var/mail/spool C. There is exactly one mail queue per user which holds all new messages for that user before they are moved to other folders by the user's mail client. D. The queue holds all messages that are processed by the mail server but have not yet been completely delivered. E. The content of the mail queue can be queried by the command mailq

D, E

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

DISPLAY

How does the ping command work by default? A. It sends a UDP packet to port 0 of the remote host and waits to receive a UDP error response in return. B. It sends an ARP request to a remote host and waits to receive an ARP response in return. C. It sends a TCP SYN packet to a remote host and waits to receive an TCP ACK response in return. D. It sends a broadcast packet to all hosts on the net and waits to receive, among others, a response from the target system. E. It sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return.

E

How to shadow passwords improve the password security in comparison to standard passwd passwords? A. Shadow passwords are stored in plain text and can be checked for weak passwords B. Every Shadow Password is valid for 45 days and must be changed afterwards C. THe system's host key is used to strongly encrypt all shadow passwords D. Shadow passwords are always combined with a public key that has to match the user's private key E. Regular users do not have access to password hashes of shadow passwods

E

On a machine running several X servers, how are the different instances of the X11 server identified? A. By a fixed UUID that is defined in the X11 configuration file. B. By a unique IPv6 address from the fe80::/64 subnet. C. By the name of the user that runs the X server like x11:bob. D. By a device name like /dev/X11/xservers/1. E. By a display name like:1.

E

What happens if the password of a user in the /etc/shadow file is prepended with the ! character? A. When logging in, the user automatically gets root privileges in addition to his regular privileges B. THe password is inverted which allows the user to log in with any password other than the current password C. The user is disabeld and all login methods, including but not limited to password based logins are disabled. D. Upon the next log in, the user is forced to change his password. E. The password becomes invalid which disables password based logins although other login methods remain usable.

E

Which of the following commands can be used to associate open TCP ports with the processes that opened the ports? A. ptrace B. strace C. debug D. nessus E. lsof

E

Which of the following files is consulted when programs like netstat try to match port numbers to names? A. /etc/networks B. /etc/portmapper C. /etc/protocols D. /etc/resolv.conf E. /etc/services

E

Which of the following programs can be used to determine the routing path to a given destination? A. dig B. netstat C. ping D. route E. traceroute

E

With syslog, what is a facility? A. Facilities are different connection interfaces to syslog. Each facility has its own device in /dev/syslog/. B. From syslog's point of view, each Unix process that issues messages is a facility. C. Facilities describe the severity of a log message such as emerg or info. D. When using remote logging, the hostname of the server that generated a message is called facility. E. Facilities describe categories or groups of messages such as mail or auth.

E

what is true about UIDs and GIDs? A. UIDs and GIDs share a common number space. Each time a new user or group is created, the next free ID is assigned B. The First four digits of each UID are the GID of the primary group of that user C. The GID of a group is always the sum of the UIDs of its members D. The number space is split up. UIDs usually reside in the range from 0 to 32767 while GIDs reside in the range from 32768 to 65535 E. There are distinct number spaces for UIDs and GIDs, i.e. the same number may be used as both a UID and GID

E

Which configuration file would be edited to change the default options for outbound SSH sessions? A. /etc/ssh/sshd_config B. /etc/ssh/ssh C. /etc/ssh/client D. /etc/ssh/ssh_config E. /etc/ssh/ssh_client

FD

What is true about groups in a Linux system? (choose two) A. Each user may be a member of several groups. However only one group is the user's primary group B. Groups may have a password that allows users to join that group temporarily C. Each user can only be a member of one group at a time D. Group memberships are optional such that there may be users that do not belong to any group E. Groups can be nested meaning that one group can be a member of another grou[

a, b

In an xinetd configurtion file, which attribute specifies the network address that will be used to provide the service?

bind, interface

In which file, if present must all users by listed that are allowed to use the cron scheduling system?

etc/cron.allow

What is the name of the file that defines the sources (like DNS or local configuration files) and the order in which they are consulted when resolving hostnames?

etc/nsswitch.conf

What word will complete an if statement in bash such as the following: if [ -x "$file" ]; then echo $file _____

fi

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

files

Which command is used to add an empty group to the system?

groupadd,

Which command is used to sync the hardware clock to the system clock?

hwclock

Which command is used to manually assign an IP address to a network interface?

ifconfig

What argue to the -type option of find will match files that are symbolic links?

l

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this? A. debug B. lsof C. nessus D. strace E. traceroute

lsof

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)

mailq

Which command, depending on its options can display the open network connections, the routing tables, as well as network interface statistics

netstat

What word is missing from the following SQL statement? __________ count(*) from tablename; (Please specify the missing word using lower-case letters only.)

select

What word is missing from the following SQL statement? update tablename ____ fieldname='value' where id=909; (Please specify the missing word using lower-case letters only.)

set

Which command is used to add openSSH private keys to a running ssh-agent instance?

ssh-add

What word is missing from the following SQL statement? insert into tablename _____ (909, 'text')(Please specify the missing word using lower-case letters only.)

values

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

xdm

What is the default name of the configuration file for the Xorg X11 server?

xorg.conf


Conjuntos de estudio relacionados

Introduction to Computer Hardware and Software

View Set

NSG 242 Chapter 31: Health Supervision

View Set

Unit 4 Chapter 3: Measuring Earthquake Magnitude

View Set

GI AND ABDOMINAL WALL REVIEW QUESTIONS

View Set

org mgmntExam Study Guide Number 3

View Set

Homework 8: Money and Monetary Policy

View Set

RN Concept-Based Assessment Level 2 Online Practice B

View Set

Capitales de Sudamérica, España y Guinea Ecuatorial

View Set