1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
14

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command

is appropriate to search the log le for activity of the user charlie?
a. sudo cat /var/log/vsftpd.log
b. grep "charlie" /var/log/vsftpd.log
c. sudo grep "charlie" /var/log/vsftpd.log
d. cat /var/log/vsftpd.log
Computers and Technology
1 answer:
kirill115 [55]3 years ago
5 0

Answer:

c. sudo grep "charlie" /var/log/vsftpd.log

Explanation:

  • sudo is used to access /var/log files since it requires superuser access
  • grep command is used to search for a string of characters in a specified file
  • "charlie" is the string searched in the log files
  • /var/log/ is where the log files are in linux systems
You might be interested in
Ferestre de navigare
Stells [14]
LOLOLOLOLOLLOLOLOLOLOLOOOLOLOLOOLOLLOLOLOLOLOLO

7 0
3 years ago
Using digital modulation techniques such as ASK, FSK, or PSK results in a passband that appears at a higher frequency than the b
Aleksandr-060686 [28]

Answer:

The answer is "True".

Explanation:

Digital modulation is also known as a method, which uses common synchronization names and various types of signals to manipulate a carrier wave.

  • The analog method measures the radio signals in amplitude and frequency.
  • It provides more general usage in the firmware, that's why the answer to this question is true.
6 0
3 years ago
Why do computers need system software?
Marina86 [1]
<span>Computers don't need system software. System software is used to automate many tasks so the user can achieve more. Actually, one of the ideas of computer programming is to avoid needless repetition. The system software will prepare the computer for the user.</span>
5 0
3 years ago
A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to
Katen [24]

Answer:

A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) _____local___________ printer, and Computer2 considers the printer to be a(n) _____network___________ printer.

Explanation:

Any printer installed directly to Computer 1 is a local printer.  If this printer is then shared with computers 2 and 3 in a particular networked environment, it becomes a shared printer.  For these other computers 2 and 3, the shared printer is a network printer, because it is not locally installed in each of them.  There may be some features which network computers cannot use on a shared printer, especially if the printer can scan documents.

4 0
3 years ago
A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.
Archy [21]

Answer:

The technician will want to add ACL for ports 20 and 21

Explanation:

The FTP protocol by default will attempt to use 21 for TCP access and 20 for data access.  By enabling an Access Control List (ACL) on ports 20 and 21, the technician can prevent FTP traffic from leaving the network on the default ports.

Cheers.

8 0
3 years ago
Other questions:
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems,
    13·1 answer
  • 4. 15 Exact change (College level not sure why it says middle school)
    11·1 answer
  • What is a benefit of the rise in citizen journalism? Multiple answer choice below
    13·1 answer
  • Write a Java program that prints out a 4x4 square (like the one below)
    11·1 answer
  • Fill in the blank with the correct response.<br> A submenu in a text editor is indicated by a <br> .
    8·1 answer
  • A financially stable person is able to:
    8·1 answer
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
  • Zoe wants to post something controversial online, but then she remembers that employers may look at her social media when she st
    10·1 answer
  • Assume the user types in 7 for x and 2 for y. What is output by the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!