Topic 1, Volume A
You located a file created in /home successfully by using the slocate command. You found that
the slocate command could locate that file even after deletion. What could be the possible
solution to stop listing deleted files? (Choose all that apply.)
A. Run updatedb to update the database.
B. Run slocate -u to update the database.
C. Use the locate command instead of slocate.
D. Delete the /var/lib/slocate/slocate.db file because it buffers all search results.
E. Reboot the system so that it wil update the kernel memory because the kernel stores all
results in the memory.
Answer(s): A, B
As an administrator, you mounted the /exports/projects NFS exported directory from a server on
a LAN using the default NFS settings. You find the performance to be low. Which NFS mount
options can you use to increase the performance?
A. set rsize=8192 and wsize=8192.
B. set rsize=32768 and wsize=32768.
C. set wsize=8192 and keep the read packet size at the default.
D. set rsize=8192 and keep the write packet size at the default.
E. set rsize=32768 and keep the write packet size at the default.
F. set wsize=32768 and keep the read packet size at the default.
Two users, bob on station1 and smith on station2, generated a public/private key pair using ssh-
keygen to enable password-less secure shel login between them. What would be their next
step to accomplish the task?
A. Copy the private key of bob to station2:~smith and vice versa.
B. Copy the key pair of bob to station2:~smith/.ssh as public and private keys.
C. Copy the private key of bob to station2:~smith/.ssh/authorized_keys and vice versa.
D. Copy the public key of bob to station1:~smith/.ssh/authorized_keys and vice versa.
E. Copy the public key of bob to station2:~smith/.ssh/authorized_keys and vice versa.
View the Exhibit.
As a Linux administrator, you have to let the users smith and scott manage files and directories
in the /software directory on their own, with full permissions between each other's files. What are