Question
a.
netstat
b.
route
c.
trace
d.
ipchains
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What can he used to set up a firewall on a Linux system?
Similar Questions
Discover Related MCQs
Q. Which program is used to automatically install Red Mat Linux on identical hardware?
View solution
Q. What service is not monitored by inetd ?
View solution
Q. Who founded the FSF?
View solution
Q. What shell's wild-card is used to match a single character?
View solution
Q. What command is used to copy a file?
View solution
Q. What command is used to display your current working directory?
View solution
Q. What command is used with vi editor to move the cursor to the left?
View solution
Q. What command do you use to add routes to a Linux router?
View solution
Q. Which of the following command is used to mount NFS filesystems?
View solution
Q. To build a modularized kernel, the kernel-headers and kernel-source packages must first be installed. Where will you find the kernel-headers and kernel-source?
View solution
Q. After you have compiled your kernel, what do you have to edit to boot your new kernel image?
View solution
Q. To create an installation boot floppy disk from Linux (or another Unix) machine, what command could you use?
View solution
Q. You just added a new user, kara, to the system. What group is kara added to by default?
View solution
Q. What are the appropriate Hex codes for setting Linux swap and Linux native partition types in fdisk?
View solution
Q. What command do you use to delete a file?
View solution
Q. Which of the following command lists the last 10 lines of a file?
View solution
Q. What command is used to terminate a process?
View solution
Q. What command is used with vi editor to delete three words?
View solution
Q. What command is used to assign only read permission to all three categories of the file'letter'?
View solution
Q. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!