New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

102-500 Leak Questions

Page: 4 / 18
Total 235 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Question 13

Which of the following steps prevents a user from obtaining an interactive login session?

Options:

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Question 14

What is the purpose of the iconv command?

Options:

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Question 15

On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are _________.

Options:

A.

-rw-r-----, -r--------

B.

-rw-r--r--, -r--r--r--

C.

-rw-r--r--, -r--------

D.

-rw-r--rw-, -r-----r--

E.

-rw-------, -r--------

Question 16

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Options:

A.

Without additional configuration, no users may have user specific crontabs.

B.

Without additional configuration, all users may have user specific crontabs.

C.

The cron daemon will refuse to start and report missing files in the system's logfile.

D.

When a user creates a user specific crontab the system administrator must approve it explicitly.

Page: 4 / 18
Total 235 questions