If a Linux system is running as a virtual machine, it may be using a bridge for the virtual network adapter within the virtual machine to the physical network adapter. Which of the following commands can be used to view or modify the bridge configuration used by the Linux kernel for your network adapter?

A. ip bridge
B. netbr
C. brstat
D. brctl


Answer: D

Computer Science & Information Technology

You might also like to view...

The ____ command isolates the foreground from the background.

A. Remove Foreground B. Remove Background C. Isolate Foreground D. Isolate Background

Computer Science & Information Technology

What does pressing Tab in the last cell of a table do?

A) Moves to the next line in the cell B) Adds a new row C) Inserts a new column D) Saves the table

Computer Science & Information Technology

________ is software that manages information about customers, including contact information, purchases, and needs

A) CRM B) SCM C) SFA D) BPR

Computer Science & Information Technology

A ________ is an individual who gains unauthorized access to computer systems for the purpose of corrupting or stealing data

Fill in the blank(s) with correct word

Computer Science & Information Technology