You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based
Network. You are working as a root user on the Red Hat operating system. You want to find out
the disk space usage of a remote host named York. For this, you have to remotely login to York
and run the command to determine how much disk space has been used on per filesystem basis.
Which of the following command syntaxes should you use to securely access the data from the
remote host?
A.
ssh ‘df -h’
B.
York ssh ‘df -h’
C.
ssh York ‘df -h’
D.
ssh ‘df -h’ York
Explanation:
You will use the ssh command to remotely login to the host York and then remotely execute the
command ‘df -h’ to check the disk space usage on the remote system.