Which of the following command syntaxes should you use to securely access the data from the remote host?

You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based
Network. You are working as a root user on the Red Hat operating system. You want to find out
the disk space usage of a remote host named York. For this, you have to remotely login to York
and run the command to determine how much disk space has been used on per filesystem basis.
Which of the following command syntaxes should you use to securely access the data from the
remote host?

You work as the Network Administrator for Tech Perfect Inc. The company has a Linux-based
Network. You are working as a root user on the Red Hat operating system. You want to find out
the disk space usage of a remote host named York. For this, you have to remotely login to York
and run the command to determine how much disk space has been used on per filesystem basis.
Which of the following command syntaxes should you use to securely access the data from the
remote host?

A.
ssh ‘df -h’

B.
York ssh ‘df -h’

C.
ssh York ‘df -h’

D.
ssh ‘df -h’ York

Explanation:

You will use the ssh command to remotely login to the host York and then remotely execute the

command ‘df -h’ to check the disk space usage on the remote system.



Leave a Reply 0

Your email address will not be published. Required fields are marked *