Information Technology Reference
In-Depth Information
Therefore, answer B is incorrect. ypcrank is not valid. Therefore, answer D
is incorrect. ypwhich is used to identify the NIS server. Therefore, answer E
is incorrect.
Question 15
The correct answer is C. user is used for messages from user programs. mail
is used for messages related to mail. Therefore, answer A is incorrect. auth
is used for messages related to login authentication. Therefore, answer B is
incorrect. kern is used for messages related to the kernel. Therefore, answer
D is incorrect. If a source is not specified, user is assumed.
Question 16
The correct answer is tables .
Question 17
Answer D is correct. The Ethernet address is six 8-bit bytes or 48-bits long.
It can be displayed using the ifconfig command. Because the Ethernet
address is six, not five, 8-bit bytes long, the netstat command cannot be
used to display the Ethernet address of a network interface. Therefore,
answers A, B and C are incorrect.
Question 18
The correct answers are A and C. Custom JumpStart and JumpStart are
automatic installation methods. Therefore, answers B and D are incorrect.
Question 19
The correct answer is C. Although some of the name services use ASCII files
or provide both hostname and IP address resolution, DNS is the only one
used on the Internet. Therefore, answers A, B, and D are incorrect.
Search WWH ::




Custom Search