New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

LPI 102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 Exam Practice Test

Page: 1 / 24
Total 235 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Question 1

What is pool.ntp.org?

Options:

A.

A deprecated feature for maintaining system time in the Linux kernel

B.

A website which provides binary and source packages for the OpenNTPD project

C.

A virtual cluster of various timeservers

D.

A community website used to discuss the localization of Linux

Question 2

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)

Options:

Question 3

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Options:

Question 4

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Question 5

Which file inside the CUPS configuration directory contains the definition of the printers?

Options:

A.

cups-devices.conf

B.

snmp.conf

C.

printcap.conf

D.

printers.conf

E.

cupsd.conf

Question 6

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

Options:

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Question 7

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

Options:

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Question 8

Which of the following are syslog facilities? (Choose TWO correct answers.)

Options:

A.

local5

B.

mail

C.

advanced

D.

postmaster

E.

remote

Question 9

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Options:

Question 10

What is true regarding the file ~/.forward?

Options:

A.

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Question 11

Which of the following is observed and corrected by a NTP client?

Options:

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Question 12

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.)

Options:

A.

--from=

B.

--since=

C.

--until=

D.

--upto=

E.

--date=

Question 13

When the command echo $$ outputs 12942, what is the meaning of 12942?

Options:

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the process ID of the last command executed.

D.

It is the process ID of the last command which has been placed in the background.

Question 14

Which command allows you to make a shell variable visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Question 15

What keyword is missing from this code sample of a shell script?

____ i in *.txt; do

echo $i

done

Options:

A.

for

B.

loop

C.

until

D.

while

Question 16

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Question 17

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Options:

Question 18

What benefit does an alias in bash provide?

Options:

A.

It provides faster lookups for commands in the system directory.

B.

It creates a local copy of a file from another directory.

C.

It hides what command you are running from others.

D.

It allows a string to be substituted for the first word of a simple command.

Question 19

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Options:

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Question 20

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

Options:

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Question 21

What is the difference between the commands test -e path and test -f path?

Options:

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Question 22

Which of the following SQL statements will select the fields name and address from the contacts table?

Options:

A.

SELECT (name, address) FROM contacts;

B.

SELECT (name address) FROM contacts;

C.

SELECT name, address FROM contacts;

D.

SELECT name address FROM contacts;

Question 23

When the command echo $ outputs 1, which of the following statements is true?

Options:

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the exit value of the command executed immediately before echo.

D.

It is the exit value of the echo command.

Question 24

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Question 25

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Options:

Question 26

Which of the following commands shows all active systemd timers?

Options:

A.

systemctl-timer show

B.

timectl list

C.

systemctl –t

D.

systemctl list-timers

E.

timeq

Question 27

Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.)

Options:

Question 28

On a machine running serval X servers. how do programs identify the different instances of theX11 server?

Options:

A.

By a fixed UUID that is defined in the X11 configuration file.

B.

By a display name like :1.

C.

By the name of the user that turns the X server like x11: bob.

D.

By a device name like /dov/x11/xeorvore/1.

E.

By a unique IPv6 address from the fc80: /64 subnet.

Question 29

Which environment variable is used by an X11 client to determine the X Server to connect to? (Specify ONLY the variable name without any preceding commands or values.)

Options:

Question 30

What is true about the Hop Limit field in the IPv6 header?

Options:

A.

The field is not changed during the transport of a package.

B.

The field is transmitted within a hop-by-hop extension header.

C.

Each router forwarding the packet increases the field’s value.

D.

Each router forwarding the packet decreases the field’s value.

E.

For multicast packages, the field’s value is always 1.

Question 31

What is the purpose of TCP wrapper?

Options:

A.

Manage and adjust bandwidth used by TCP services.

B.

Bind a network service to a TCP port.

C.

Encapsulate TCP messages in IP packets.

D.

Add SSL support to plain text TCP services.

E.

Limit access to a network service.

Question 32

Which mechanism does ggfe use to interact with the SSH agent?

Options:

A.

Connecting to pod 2222 which is used by the system-wide SSH agent.

B.

Using the fixed socket .BBh-ngant/ipe.

C.

Creating an alias replacing anh with calls to ssh-agent.

D.

Starting ssh-agent as a child process for each sir. invocation.

E.

Evaluating environment variables such as SSH_AUTH_SOCK.

Question 33

What is Irue regarding the statement beginning with #. that is found in the first line of a script? (Choose TWO correct answers.)

Options:

A.

It prevents the script from being executed until the, is removed

B.

It triggers the installation of the script's interpreter.

C.

It specifies the path and the arguments of the interpreter used to run the script.

D.

It defines the character encoding of the script.

E.

It is a comment that is ignored by the script interpreter.

Question 34

Which of the following changes may occur as a consequence of using the command ip? (Choose three.)

Options:

A.

Network interfaces may become active or inactive.

B.

New name servers may be added to the resolver configuration.

C.

The system’s host name may change.

D.

IP addresses may change.

E.

The routing table may change.

Question 35

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Question 36

What command is used to add OpenSSH private keys to a running ssh-agen . instance? (Specify the command name only without any path.)

Options:

Question 37

How is a display manager started?

Options:

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Question 38

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Options:

Question 39

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Question 40

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Options:

Question 41

Why is the xhost program considered dangerous to use?

Options:

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Question 42

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Question 43

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Question 44

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Question 45

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Question 46

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Question 47

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

Options:

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Question 48

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Question 49

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Question 50

What is true regarding a default route?

Options:

A.

The default route is always used first. When the default route is not available more specific routes are tried.

B.

When a default route is set, all other routes are disabled until the default route is deleted.

C.

The default route is only used if there is not a more specific route to a destination host or network.

D.

Without a default route, no network communication even in directly attached networks is possible.

Question 51

Which of the following is a valid IPv6 address?

Options:

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Question 52

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

Options:

A.

resolve

B.

dns

C.

remote

D.

files

E.

hosts

Question 53

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Options:

Question 54

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

Options:

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Question 55

Given the following routing table:

Question # 55

How would an outgoing packet to the destination 192.168.2.150 be handled?

Options:

A.

It would be passed to the default router 192.168.178.1 on wlan0.

B.

It would be directly transmitted on the device eth0.

C.

It would be passed to the default router 255.255.255.0 on eth0.

D.

It would be directly transmitted on the device wlan0.

E.

It would be passed to the router 192.168.1.1 on eth0.

Question 56

Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.)

Options:

A.

substitute

B.

nameserver

C.

search

D.

lookup

E.

method

Question 57

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

Options:

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Question 58

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Options:

Question 59

Which of the following statements is valid in the file /etc/nsswitch.conf?

Options:

A.

multi on

B.

192.168.168.4 dns-server

C.

hosts: files dns

D.

include /etc/nsswitch.d/

Question 60

Which of the following programs can be used to determine the routing path to a given destination?

Options:

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Question 61

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

Options:

A.

*

B.

-

C.

s

D.

x

Question 62

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?

Options:

A.

Use passwd -d username to give the user an empty password.

B.

Use chage to expire the user account.

C.

Change the user's password.

D.

Add the command exit to the user's .login file.

Question 63

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Options:

Question 64

Of the ways listed, which is the best way to temporarily suspend a single user's ability to interactively login?

Options:

A.

Add the user name to /etc/nologin.

B.

Change the user's password.

C.

Change the user name in /etc/passwd.

D.

Use change to expire the user account.

E.

Place the command logout in the user's profile.

Question 65

Which of the following commands can be used to convert text files in one character encoding to another character encoding?

Options:

A.

cat

B.

convert

C.

dd

D.

iconv

E.

utf2utf

Question 66

Which of the following commands can remove a user from a group?

Options:

A.

grouprm

B.

groupmod

C.

passwd

D.

usergroups

E.

usermod

Question 67

Which command should be added to /etc/bash_profile to change the language of messages from an internationalised program to Portuguese (pt)? (Select TWO correct answers)

Options:

A.

export LANGUAGE="pt"

B.

export MESSAGE="pt"

C.

export LANG="pt"

D.

export LC_MESSAGES="pt"

E.

export ALL_MESSAGES="pt"

Question 68

Which crontab entry could be used to set the system time at regular intervals?

Options:

A.

1 0 * * * date $d $t $24

B.

1 0 * * * ntpdate ntp1.digex.net

C.

1 0 * * * date ntp1.digex.net

D.

1 0 * * * runcron date ntp1.digex.net

E.

1 0 * * * settime $d $t $24

Question 69

Which of the following steps prevents a user from obtaining an interactive login session?

Options:

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Question 70

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Page: 1 / 24
Total 235 questions