New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium LPI 102-500 Dumps Questions Answers

Page: 1 / 18
Total 235 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Question 1

What command is used to add OpenSSH private keys to a running ssh-agen . instance? (Specify the command name only without any path.)

Options:

Buy Now
Question 2

Given the following user's cronlab entry:

15 14 * * 1-5 /usr/local/bin/example.sh be executed?

When will the script /usr/local/bin/example.sh be executed?

Options:

A.

At 14:15 local time. January till May.

B.

At 15:14 local time, 1st to 5th day of month.

C.

At 14:15 local time, February till June.

D.

At 14:15 local time, 1st to 5th day of month.

E.

At 14:15 local time, Monday to Friday.

Question 3

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Options:

Question 4

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including

Options:

Question 5

Which configuration file contains the default options for SSH clients?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/ssh_config

D.

/etc/ssh/client

E.

/etc/ssh/ssh_client

Question 6

What the echo $$ command?

Options:

A.

The process ID of the current shell.

B.

The process ID for the following command.

C.

The process ID of the last command executed.

D.

The process ID of the last command which has been placed in the background.

E.

The process ID of the echo command.

Question 7

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Options:

Question 8

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Question 9

Which of the following connection types, as seen in unroll connection show, may exist in Network Manager? (Choose THREE correct answers.)

Options:

A.

tcp

B.

Ethernet

C.

wifi

D.

ipv6

E.

bridge

Question 10

If neigher cron, allow nor cron, deny exist in /etc/, which of the following is true?

Options:

A.

Without additional configuration, all users may create user specific crontabs.

B.

Without additional configuration, only root may create user specific crontabs.

C.

The aon daemon will refuse to start and report missing files in the system's logfile.

D.

When a user creates a user specific crontab the system administrator must approve it explicitly.

E.

The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not.

Question 11

Which of the following statements about sytemd-journald are true? (Choose three.)

Options:

A.

It is incompatible with syslog and cannot be installed on a system using regular syslog.

B.

It only processes messages of systemd and not messages of any other tools.

C.

It can pass log messages to syslog for further processing.

D.

It maintains metadata such as _UID or _PID for each message.

E.

It supports syslog facilities such as kern, user, and auth.

Question 12

Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.)

Options:

Question 13

Which of the following steps prevents a user from obtaining an interactive login session?

Options:

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Question 14

What is the purpose of the iconv command?

Options:

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Question 15

On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are _________.

Options:

A.

-rw-r-----, -r--------

B.

-rw-r--r--, -r--r--r--

C.

-rw-r--r--, -r--------

D.

-rw-r--rw-, -r-----r--

E.

-rw-------, -r--------

Question 16

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Options:

A.

Without additional configuration, no users may have user specific crontabs.

B.

Without additional configuration, all users may have user specific crontabs.

C.

The cron daemon will refuse to start and report missing files in the system's logfile.

D.

When a user creates a user specific crontab the system administrator must approve it explicitly.

Question 17

Which of the following files assigns a user to its primary group?

Options:

A.

/etc/pgroup

B.

/etc/shadow

C.

/etc/group

D.

/etc/passwd

E.

/etc/gshadow

Question 18

Which environment variable should be set in order to change the time zone for the commands run from within the environment variable's scope? (Specify the variable name only.)

Options:

Question 19

How is the file format of /etc/crontab different from a normal crontab file? (Select TWO correct answers)

Options:

A.

The /etc/crontab file can specify a year field.

B.

A normal crontab file must be installed with the crontab command.

C.

A normal crontab file allows for environment variable substitution.

D.

The /etc/crontab file has a user field for commands.

Question 20

Which commands can you use to change a user's account aging information? (Choose THREE correct answers.)

Options:

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Question 21

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Options:

Question 22

What is true about the file /etc/localtime?

Options:

A.

It is a plain text file containing a string such as Europe/Berlin

B.

It is created and maintained by the NTP service based on the location of the system’s IP address.

C.

It is a symlink to /sys/device/clock/ltime and always contains the current local time.

D.

After changing this file, newtzconfig has to be run to make the changes effective.

E.

It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

Question 23

Which command will set the local machine's timezone to UTC?

Options:

A.

cat UTC > /etc/timezone

B.

ln -s /usr/share/zoneinfo/UTC /etc/localtime

C.

date --timezone=UTC

D.

mv /usr/timezone/UTC /etc

Question 24

What is the conventional purpose of Linux UIDs that are lower than 100?

Options:

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Question 25

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Question 26

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Options:

Question 27

How is a display manager started?

Options:

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Question 28

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Question 29

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Question 30

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Question 31

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Question 32

Why is the xhost program considered dangerous to use?

Options:

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Question 33

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Question 34

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Question 35

Which of the following commands shows the current color depth of the X Server?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Question 36

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Question 37

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this?

Options:

A.

cupsreject -c -r hello HPLaserjet4

B.

cupsreject -p -m hello HPLaserjet4

C.

cupsdisable -c -r hello HPLaserjet4

D.

cupsdisable -p -m hello HPLaserjet4

Question 38

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)

Options:

Question 39

Which of the following is observed and corrected by a NTP client?

Options:

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Question 40

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

Options:

Question 41

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Options:

Question 42

Why is the correct configuration of a system's time zone important?

Options:

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Question 43

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

Options:

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Question 44

What is the purpose of the command mailq?

Options:

A.

It fetches new emails from a remote server using POP3 or IMAP.

B.

It is a multi-user mailing list manager.

C.

It is a proprietary tool contained only in the qmail MTA.

D.

It queries the mail queue of the local MTA.

E.

It is a command-line based tool for reading and writing emails.

Question 45

Which of the following are syslog facilities? (Choose TWO correct answers.)

Options:

A.

local5

B.

mail

C.

advanced

D.

postmaster

E.

remote

Question 46

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Options:

Question 47

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)

Options:

Question 48

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Question 49

What is the difference between the commands test -e path and test -f path?

Options:

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Question 50

Which command allows you to make a shell variable visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Question 51

What output will the following command produce?

seq 1 5 20

Options:

A.

1

6

1

1

1

6

B.

1

5

10

15

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Question 52

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Options:

Question 53

Which of the following commands puts the output of the command date into the shell variable mydate?

Options:

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Question 54

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Question 55

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Options:

A.

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.

COUNT(SELECT order_type FROM orders);

D.

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.

SELECT AUTO_COUNT FROM orders COUNT order_type;

Question 56

Which of the following is the best way to list all defined shell variables?

Options:

A.

env

B.

set

C.

env -a

D.

echo $ENV

Question 57

What is the purpose of the file /etc/profile?

Options:

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Question 58

What output will the command seq 10 produce?

Options:

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Question 59

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

Options:

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Question 60

When the command echo $ outputs 1, which of the following statements is true?

Options:

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the exit value of the command executed immediately before echo.

D.

It is the exit value of the echo command.

Question 61

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

Options:

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Question 62

Which of the following is true about IPv6?

Options:

A.

With IPv6, the TCP port numbers of most services have changed.

B.

IPv6 no longer supports broadcast addresses.

C.

IPv4 addresses can be used without any change with IPv6.

D.

IPv6 no longer supports multicast addresses.

E.

For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.

Question 63

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Options:

Question 64

What is true regarding a default route?

Options:

A.

The default route is always used first. When the default route is not available more specific routes are tried.

B.

When a default route is set, all other routes are disabled until the default route is deleted.

C.

The default route is only used if there is not a more specific route to a destination host or network.

D.

Without a default route, no network communication even in directly attached networks is possible.

Question 65

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Options:

Question 66

Given the following routing table:

How would an outgoing packet to the destination 192.168.2.150 be handled?

Options:

A.

It would be passed to the default router 192.168.178.1 on wlan0.

B.

It would be directly transmitted on the device eth0.

C.

It would be passed to the default router 255.255.255.0 on eth0.

D.

It would be directly transmitted on the device wlan0.

E.

It would be passed to the router 192.168.1.1 on eth0.

Question 67

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Options:

Question 68

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Options:

Question 69

Which of the following programs can be used to determine the routing path to a given destination?

Options:

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Question 70

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Options:

Page: 1 / 18
Total 235 questions