Home
Current Affairs January 2024

What is the correct answer?

4

Which command is used to enable/disable password for a particular user?

A. usermod

B. userenable

C. userdisable

D. change

Correct Answer :

A. usermod


The usermod command is used to enable and disable password for a particular user.

Related Questions

What is the correct answer?

4

Which of the following command is used to check a Linux command is a built-in shell command or external command?

A. cmdtype

B. type

C. ctype

D. commandtype

What is the correct answer?

4

Which of the following keyword is used to specify the time of 4pm in at command for scheduling tasks?

A. breaktime

B. freetime

C. midnight

D. teatime

What is the correct answer?

4

There are the following statements that are given below which of them are correct about the host command in the Linux operating system?

A. This command is used to display domain name for specified IP address.

B. This command is used to display an IP address for the specified domain name.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about environment variables in Linux operating system?
a) The environment variables are used to store some values that can be used by the application.
b) The environment variables are used to customize the behavior of the applications.
c) The environment variables can impact the performance of the system.
d) The environment variable used a % symbol for variables.
Options:

A. A and B

B. C and D

C. A, B, and C

D. B, C, and D

What is the correct answer?

4

There are the following commands that are given, which of them are correct about the nohup command in the Linux system?
a) The nohup stands for No Hang-up.
b) The nohup stands for Notify Hang-up.
c) The nohup command is used to keeps the processes running, even the terminal gets close by the user.
d) This command is used to prevent the processes from the SIGHUP signals.
Options:

A. A and C

B. B and C

C. B, C, and D

D. A, C, and D

What is the correct answer?

4

Which of the following is known as match operator in AWK?

A. =

B. !

C. ~

D. ==

What is the correct answer?

4

How to change the normal user to root user using the terminal in the Linux operating system?

A. Using sudo command

B. Using su command

C. Using super command

D. None of the above

What is the correct answer?

4

Which exact command is used to list the files and directories along with hidden files?

A. ls -l

B. ls -k

C. ls -a

D. ls -n

What is the correct answer?

4

Which of the following directory contains the scripts related to service used in the Linux operating system?

A. /etc/services/

B. /etc/scripts/

C. /etc/init.d/

D. /etc/services/scripts/

What is the correct answer?

4

A Linux operating system supports?
a) Multitasking
b) Multiprogramming
c) Multiuser
d) Multithreading
Options:

A. A and C

B. A, C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following directories contains configuration files?
a) /opt
b) /var
c) /boot
d) /etc
Options:

A. A and B

B. C and D

C. A, B, and D

D. A, B, C, and D

What is the correct answer?

4

Which option is used in the regular expression to remove a complete line from the output of a file using sed command?
a) zcat
b) zmore
c) zless
d) zgip
Options:

A. d

B. del

C. delete

D. rem

What is the correct answer?

4

Which of the following commands are used to kill a running process in the Linux system?
a) kill
b) killall
c) pkill
d) xkill
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

There are the following statements that are given below which of them are correct about the tracepath command in the Linux operating system?
a) It is also used for network troubleshooting.
b) This command requires root privileges.
c) By default, it is installed in the Linux system
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

Which exact command is used to change the size of MTU?

A. ifconfig mtu

B. ifconfig mtu

C. ifconfig mtu

D. ifconfig -m

What is the correct answer?

4

Which exact command is used to remove a directory with its sub-directories?

A. rmdir -a

B. rmdir -p

C. rmdir -s

D. rmdir -k

What is the correct answer?

4

Which command is used to cut a file from one location and paste to the other location?

A. cut

B. ct

C. move

D. mv

What is the correct answer?

4

Who was developed the vi editor?

A. Bill joy

B. James gosling

C. Andy Bechtolseim

D. Scott G. McNealy

What is the correct answer?

4

Which of the following commands are used to switch from command mode to insert mode in the vi editor?
a) i
b) a
c) o
d) O
Options

A. A and B

B. A and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which directory contains grub configuration file?

A. /lib

B. /usr

C. /boot

D. /etc

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the Linux File System?
a) File System is a layer in the Linux operating system, which is used to control the management of storage data.
b) It provides the arrangement of files in the disk storage.
c) It is used to manage information about files like name, size, creation, and modification time.
d) Linux File System is the software that runs only on Intel architecture.
Options:

A. A and B

B. C and D

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

Which of the following statements are the correct about XXXsort command?
a) This command is used to sort the content of a file in alphabetical order.
b) This command is used to sort the content of a file based on the column.
c) This command is used for numeric sorting bases on the column.
d) None of the Above.
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

What is the correct answer?

4

How to check the version of the ls command?

A. ls -v

B. ls --v

C. ls -version

D. ls --version

What is the correct answer?

4

Which of the following information can be displayed using the netstat command?
a) Information about programs related to open socket.
b) Information about routing tables.
c) Statistics about all ports
d) All of the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

Which of the following statements are the correct about XXXsed command?
a) The sed command is used to display modified data on the console screen, actual data in the file remain the same.
b) The sed command is used to modify the data of a file permanently.
c) The regular expressions are used to display modified data of a file in the sed command.
d) The sed command does not use regular expressions.
Options:

A. A and C

B. A and D

C. B and C

D. B and D

What is the correct answer?

4

There are the following statements are given below, which of them are the correct about the ps command in the Linux system?
a) This command is used to display information about processes running in the system.
b) This command displays the memory occupied by a system call.
c) This command displays the process id of the running processes.
d) This command displays the name of the running processes.
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which exact command is used to down interface eth0 in the Linux operating system?

A. ifconfig down eth0

B. ifdown eth0

C. down eth0

D. ifconfig -d eth0

What is the correct answer?

4

Which of the following command is used to print the number of lines that exist in the specified file?

A. awk 'END { print NL }'

B. awk 'END { print N }'

C. awk 'END { print NR }'

D. awk 'END { print NN }'

What is the correct answer?

4

How can we differentiate between file and directory from the output of ls command?

A. Directories are mentioned in capital letters in the output of ls command.

B. The d character is used before permissions in the output of ls command.

C. Both of the above

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of the following security mechanism are used in the Linux operating system?
a) Authentication
b) Authorization
c) Cryptography
d) All the above
Options:

A. A and B

B. B and C

C. A and C

D. D