Question 76

A systems administrator wants to check the log of changes made to a Git repository. Which of the following commands can be used for this task?
  • Question 77

    In order to comply with new security policies, an administrator needs to prevent the SSH server from using insecure algorithms.
    Which of the following files should be edited to accomplish this?
  • Question 78

    Which of the following will boot from a network-hosted ISO image at power on?
  • Question 79

    A Linux administrator needs to run a command in the background of a terminal, Which of the following commands will BEST accomplish this task?
  • Question 80

    Which of the following is true about Type 2 hypervisors?