If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?
A. ip bridge
B. netbr
C. brstat
D. brctl
Answer: D
Computer Science & Information Technology
You might also like to view...
The ____ command isolates the foreground from the background.
A. Remove Foreground B. Remove Background C. Isolate Foreground D. Isolate Background
Computer Science & Information Technology
What does pressing Tab in the last cell of a table do?
A) Moves to the next line in the cell B) Adds a new row C) Inserts a new column D) Saves the table
Computer Science & Information Technology
________ is software that manages information about customers, including contact information, purchases, and needs
A) CRM B) SCM C) SFA D) BPR
Computer Science & Information Technology
A ________ is an individual who gains unauthorized access to computer systems for the purpose of corrupting or stealing data
Fill in the blank(s) with correct word
Computer Science & Information Technology