by

ansible.cfg should be present in _______________.

(1)/etc/configurations

(2)/etc/ansible

(3)/etc/hosts

(4)/ansible/

1 Answer

0 votes
by
Answer:-(2)/etc/ansible

Related questions

+1 vote
    ansible.cfg should be present in _______________. (1)/etc/configurations (2)/etc/ansible (3)/etc/hosts (4)/ansible/...
asked Oct 13, 2020 in Technology by JackTerrance
0 votes
    ansible.cfg should be present in (i)/ansible/ (ii)/etc/hosts (iii)/etc/ansible (iv)/etc/configurations...
asked Jan 24, 2023 in Technology by JackTerrance
0 votes
    What is the difference between Ansible and Puppet?...
asked Jul 29, 2021 in Education by JackTerrance
0 votes
    What is Ansible Vault?...
asked Jul 29, 2021 by JackTerrance
0 votes
    Ansible can deploy virtualization and cloud environments, including ____________________. (1)All the options (2)Open Stack ( ... platform (4)Amazon Web Services (5)Cloud Stack...
asked Jul 4, 2021 in Education by JackTerrance
0 votes
    Using which module can you see the list of all the Ansible variables? (1)copy (2)setup (3)ping (4)fetch...
asked Jul 4, 2021 in Education by JackTerrance
0 votes
    What does the @SpringBootApplication annotation do internally?...
asked Jul 5, 2021 in Education by JackTerrance
0 votes
    The handler runs only once even if you run the Playbook many times. (1)True (2)False...
asked Jul 5, 2021 in Education by JackTerrance
0 votes
    Which configuration management software is Agentless? (1)Chef (2)Ansible (3)Puppet (4)CFEngine...
asked Jul 4, 2021 in Education by JackTerrance
0 votes
    Build-time dependencies must be present when an application is runs in an environment Select the correct answer from above options...
asked Dec 31, 2021 in Education by JackTerrance
0 votes
    _______________ returns TRUE then X can be termed as a matrix data object. (a) is. matrix(X ) (b) is ... and Debugging of R Programming Select the correct answer from above options...
asked Feb 15, 2022 in Education by JackTerrance
0 votes
    Spywares can be used to steal _______________ from the attacker's browser. (a) browsing history (b) company details ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    _______________ needs to be turned off in order to prevent from this attack. (a) Email scripting (b) Email ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In the circuit given below, bulb X uses 48 W when lit, bulb Y uses 22 W when lit and bulb Z uses 14. ... Questions for GATE EC Exam, Network Theory MCQ (Multiple Choice Questions)...
asked Oct 17, 2021 in Education by JackTerrance
...