Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

LPI 102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 Exam Practice Test

Page: 1 / 20
Total 197 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Question 2

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Question 3

Which file used by XDM specifies the default wallpaper?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Question 4

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Options:

Question 5

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Question 6

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Question 7

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Question 8

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Question 9

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Question 10

Which of the following configuration files should be modified to set default shell variables for all users?

Options:

A.

/etc/bashrc

B.

/etc/profile

C.

~/.bash_profile

D.

/etc/.bashrc

Question 11

What output will the command seq 10 produce?

Options:

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Question 12

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Options:

A.

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.

COUNT(SELECT order_type FROM orders);

D.

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.

SELECT AUTO_COUNT FROM orders COUNT order_type;

Question 13

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Question 14

Which of the following commands puts the output of the command date into the shell variable mydate?

Options:

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Question 15

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Question 16

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Options:

Question 17

Which command makes the shell variable named VARIABLE visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Question 18

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Options:

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Question 19

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Options:

Question 20

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

Options:

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Question 21

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Options:

Question 22

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

Options:

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Question 23

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Question 24

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Options:

Question 25

Which of the following statements is valid in the file /etc/nsswitch.conf?

Options:

A.

multi on

B.

192.168.168.4 dns-server

C.

hosts: files dns

D.

include /etc/nsswitch.d/

Question 26

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Options:

Question 27

What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)

Options:

A.

route del default

B.

ifconfig unset default

C.

netstat -r default

D.

ip route del default

E.

sysctl ipv4.default_gw=0

Question 28

Which of the following commands displays all environment and shell variables?

Options:

A.

getargs

B.

lsenv

C.

ls

D.

env

E.

lsshell

Question 29

Which of the following statements is true regarding systemd timer units?

Options:

A.

Timer units can only be defined within a service unit’s file.

B.

The command executed by the timer is specified in the timer unit’s [Cmd] section.

C.

A dedicated system service, systemd-cron, handles the execution of timer units.

D.

Timer units only exist in the system scope and are not available for users.

E.

Each systemd timer unit controls a specific systemd service unit.

Question 30

Which of the following connection types, as seen in unroll connection show, may exist in Network Manager? (Choose THREE correct answers.)

Options:

A.

tcp

B.

Ethernet

C.

wifi

D.

ipv6

E.

bridge

Question 31

Which of the following statements about sytemd-journald are true? (Choose three.)

Options:

A.

It is incompatible with syslog and cannot be installed on a system using regular syslog.

B.

It only processes messages of systemd and not messages of any other tools.

C.

It can pass log messages to syslog for further processing.

D.

It maintains metadata such as _UID or _PID for each message.

E.

It supports syslog facilities such as kern, user, and auth.

Question 32

Depending on a system's configuration, which of the following files can be used to enable and disable network services running on this host?

Options:

A.

/etc/profile

B.

/etc/xinetd.conf

C.

/etc/ports

D.

/et/host.conf

E.

/etc/host.conf

Question 33

Which of the following protocols is related to the term open relay?

Options:

A.

SMTP

B.

POP3

C.

NTP

D.

IMAP

E.

LDAP

Question 34

Which of the following tasks can the date command accomplish? (Choose two.)

Options:

A.

Set the system’s date and time.

B.

Set the system’s date but not the time.

C.

Calculate the time span between two dates.

D.

Print a calendar for a month or a year.

E.

Display time in a specific format.

Question 35

On a machine running serval X servers. how do programs identify the different instances of theX11 server?

Options:

A.

By a fixed UUID that is defined in the X11 configuration file.

B.

By a display name like :1.

C.

By the name of the user that turns the X server like x11: bob.

D.

By a device name like /dov/x11/xeorvore/1.

E.

By a unique IPv6 address from the fc80: /64 subnet.

Question 36

Which configuration file contains the default options for SSH clients?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/ssh_config

D.

/etc/ssh/client

E.

/etc/ssh/ssh_client

Question 37

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Question 38

What is the purpose of the iconv command?

Options:

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Question 39

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Options:

Question 40

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Question 41

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.)

Options:

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Question 42

Which TWO statements about crontab are true?

Options:

A.

Every user may have their own crontab.

B.

Changing a crontab requires a reload/restart of the cron daemon.

C.

The cron daemon reloads crontab files automatically when necessary.

D.

hourly is the same as "0 * * * *".

E.

A cron daemon must run for each existing crontab.

Question 43

Which file specifies the user accounts that can NOT submit jobs via at or batch? (Provide the full path and filename)

Options:

Question 44

The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5 p.m.:

Options:

A.

* 3,4,5 1 * * chklog

B.

3 3,4,5 1 * * chklog

C.

3 15,16,17 * * * chklog

D.

0 15,16,17 1 * * chklog

E.

* 15,16,17 1 * * chklog

Question 45

What is NOT contained in the locale setting of the operating system?

Options:

A.

currency symbol

B.

language

C.

timezone

D.

thousands separator

Question 46

Why is the correct configuration of a system's time zone important?

Options:

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Question 47

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?

Options:

A.

*.* /dev/tty12

B.

/var/log/messages | /dev/tty12

C.

| /dev/tty12

D.

syslog tty12

E.

mail.* /dev/tty12

Question 48

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Options:

Question 49

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

Options:

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Question 50

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Options:

Question 51

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Question 52

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Options:

Question 53

What is true about the ntpdate command?

Options:

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Question 54

Which of the following is observed and corrected by a NTP client?

Options:

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Question 55

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

Options:

A.

debug

B.

lsof

C.

nessus

D.

strace

E.

traceroute

Question 56

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Options:

Question 57

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Options:

Question 58

Which of the following commands can be used to limit the amount of memory a user may use?

Options:

A.

umask

B.

usermod

C.

ulimit

D.

passwd

E.

chage

Question 59

Which configuration file would be edited to change default options for the OpenSSH server?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/server

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_server

Page: 1 / 20
Total 197 questions