adplus-dvertising
frame-decoration

Question

How does cron work on Linux or Unix systems for scheduling tasks?

a.

It uses a central configuration file in /etc/crontab for all tasks.

b.

It relies on individual configuration files in /etc/cron.hourly, /etc/cron.daily, etc.

c.

It requires manual execution of scripts at scheduled intervals.

d.

It uses a web-based interface for scheduling tasks.

Answer: (b).It relies on individual configuration files in /etc/cron.hourly, /etc/cron.daily, etc. Explanation:On Linux or Unix systems, cron works by relying on individual configuration files in directories such as /etc/cron.hourly, /etc/cron.daily, etc..

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. How does cron work on Linux or Unix systems for scheduling tasks?

Similar Questions

Discover Related MCQs

Q. What is the purpose of using a "call home" script in scheduled tasks?

Q. What is the primary function of Responder in the context of SMB services?

Q. What protocol is used by SMB for file-sharing, authentication, authorization, and print services?

Q. What is the primary purpose of SecureAuth’s Impacket toolset?

Q. Which Impacket tool replicates the functionality of PsExec in Python?

Q. What is the objective of pass-the-hash attacks in penetration testing?

Q. How can mitm6 be used in a DNS attack?

Q. What does LSASS.exe stand for in the context of pass-the-hash attacks?

Q. Which port is commonly associated with Windows Remote Desktop Protocol (RDP)?

Q. In the context of Apple's Remote Desktop (ARD), how do penetration testers often use ARD?

Q. What is the primary advantage of VNC as a remote desktop tool in penetration testing?

Q. How does DNS attack tool mitm6 exploit a Windows DNS server?

Q. What is a potential disadvantage of using fileless malware in penetration testing?

Q. How can a penetration tester schedule a task on a Windows system using the command line?

Q. What is one common method of exploiting SSH vulnerabilities?

Q. How can long-term access to systems be achieved by exploiting SSH keys?

Q. What is the primary focus of testing network segmentation in the context of penetration testing?

Q. What is a method used by tools allowing VLAN hopping?

Q. What is the purpose of tools like TruffleHog in the context of penetration testing?

Q. Where are unintentionally exposed secret keys frequently found?