O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Advanced Exercises

13.A process is using 98 percent of the CPU time. How do you identify the process and determine whether you should kill it?
14.What are the differences between a FIFO and a socket?
15.Develop a strategy for coming up with a password that an intruder would not be likely to guess but that you will be able to remember.
16.Develop a backup strategy that is executed by cron and includes the following components:
  1. A level 0 backup is done once per month.

  2. A level 2 dump is performed one day per week.

  3. A level 5 dump is performed every day that neither a level 0 nor a level 2 dump is performed.

In the worst case how many restores would you have to perform to recover a file that was dumped using the preceding schedule?

17.How would you restrict ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required