|13.||A process is using 98 percent of the CPU time. How do you identify the process and determine whether you should kill it?|
|14.||What are the differences between a FIFO and a socket?|
|15.||Develop a strategy for coming up with a password that an intruder would not be likely to guess but that you will be able to remember.|
|16.||Develop a backup strategy that is executed by cron and includes the following components:
In the worst case how many restores would you have to perform to recover a file that was dumped using the preceding schedule?
|17.||How would you restrict ...|