Information Technology Reference
In-Depth Information
Therefore, answer B is incorrect.
ypcrank
is not valid. Therefore, answer D
is incorrect.
ypwhich
is used to identify the NIS server. Therefore, answer E
is incorrect.
Question 15
The correct answer is C.
user
is used for messages from user programs.
mail
is used for messages related to mail. Therefore, answer A is incorrect.
auth
is used for messages related to login authentication. Therefore, answer B is
incorrect.
kern
is used for messages related to the kernel. Therefore, answer
D is incorrect. If a source is not specified,
user
is assumed.
Question 16
The correct answer is
tables
.
Question 17
Answer D is correct. The Ethernet address is six 8-bit bytes or 48-bits long.
It can be displayed using the
ifconfig
command. Because the Ethernet
address is six, not five, 8-bit bytes long, the
netstat
command cannot be
used to display the Ethernet address of a network interface. Therefore,
answers A, B and C are incorrect.
Question 18
The correct answers are A and C. Custom JumpStart and JumpStart are
automatic installation methods. Therefore, answers B and D are incorrect.
Question 19
The correct answer is C. Although some of the name services use ASCII files
or provide both hostname and IP address resolution, DNS is the only one
used on the Internet. Therefore, answers A, B, and D are incorrect.