Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

LPI 102-500 Dumps

Page: 1 / 24
Total 235 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Question 1

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Options:

Question 2

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Options:

Question 3

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

Options:

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Question 4

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

Options:

A.

The local routing information may be corrupted and must be re-validated using a routing protocol.

B.

One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.

C.

There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.

D.

DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

Question 5

Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.)

Options:

A.

substitute

B.

nameserver

C.

search

D.

lookup

E.

method

Question 6

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

Options:

A.

New name servers may be added to the resolver configuration.

B.

Network interfaces may become active or inactive.

C.

The routing table may change.

D.

IP addresses may change.

E.

The system's host name may change.

Question 7

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

Options:

A.

resolve

B.

dns

C.

remote

D.

files

E.

hosts

Question 8

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

Options:

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Question 9

Which of the following is a valid IPv6 address?

Options:

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Question 10

What is the purpose of the nsswitch.conf file?

Options:

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Question 11

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Options:

Question 12

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

Options:

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Question 13

What command is used to add OpenSSH private keys to a running ssh-agen . instance? (Specify the command name only without any path.)

Options:

Question 14

Which standardized TCP port is used by HTTPS services?

Options:

A.

25

B.

80

C.

8080

D.

443

E.

636

Question 15

Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization?

Options:

A.

iburst

B.

quickstart

C.

fast

D.

D. fsync

E.

flood

Question 16

Which of the following commands display the number of bytes transmitted and received via the etho network interface? (Choose TWO correct answer.)

Options:

A.

Route –v via etho

B.

Ip stats show dev etho

C.

Netstat –s –I etho

D.

Ifconfig etho

E.

Ip –s link show etho

Question 17

Which of the following files is not read directly by a Bash login shell?

Options:

A.

-/.bashrc

B.

-/.bash_profile

C.

-/.bash_login

D.

-/.profile

E.

/etc/profile

Question 18

In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?

Options:

Question 19

Which of the following features are provided by SPICE? (Choose two.)

Options:

A.

Connecting local USB devices to remote applications.

B.

Accessing graphical applications on a remote host.

C.

Replacing Xorg as local X11 server.

D.

Downloading and locally installing applications from a remote machine.

E.

Uploading and running a binary program on a remote machine.

Question 20

Depending on a system's configuration, which of the following files can be used to enable and disable network services running on this host?

Options:

A.

/etc/profile

B.

/etc/xinetd.conf

C.

/etc/ports

D.

/et/host.conf

E.

/etc/host.conf

Question 21

Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)

Options:

A.

ifconf

B.

ifdown

C.

ifpause

D.

ifstart

E.

ifup

Question 22

Given the following excerpt of the sudo configuration:

jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk

Which of the following statements are true? (Choose three.)

Options:

A.

Jane can run /bin/id only after specifying her password.

B.

Jane can run /sbin/fdisk after specifying root’s password.

C.

Jane can run /sbin/fdisk after specifying her password.

D.

Jane can run /bin/kill without specifying a password.

E.

Jane can run /bin/id without specifying her password.

Question 23

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Question 24

Which of the following nmcli subcommands exist? (Choose two.)

Options:

A.

nmcli ethernet

B.

nmcli device

C.

nmcli wifi

D.

nmcli address

E.

nmcli connection

Question 25

To prevent a specific user from scheduling tasks with at, what should the administrator do?

Options:

A.

Add the specific user to /etc/at.allow file.

B.

Add the specific user to [deny] section in the /etc/atd.conf file.

C.

Add the specific user to /etc/at.deny file.

D.

Add the specific user to nojobs group.

E.

Run the following: atd --deny [user].

Question 26

Of the ways listed, which is the best way to temporarily suspend a single user's ability to interactively login?

Options:

A.

Add the user name to /etc/nologin.

B.

Change the user's password.

C.

Change the user name in /etc/passwd.

D.

Use change to expire the user account.

E.

Place the command logout in the user's profile.

Question 27

Which of the following steps prevents a user from obtaining an interactive login session?

Options:

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Question 28

Which of the following can the chage command NOT change?

Options:

A.

The number of days since January 1, 1970 after which the user's account will no longer be accessible.

B.

The number of days since January 1, 1970 after which the password can change.

C.

The number of days since January 1, 1970 since the password was last changed.

D.

The maximum number of days during which a password is valid.

E.

The number of days of inactivity after a password has expired before the account is locked.

Question 29

Which of the following commands can be used to convert text files in one character encoding to another character encoding?

Options:

A.

cat

B.

convert

C.

dd

D.

iconv

E.

utf2utf

Question 30

Which command should be added to /etc/bash_profile to change the language of messages from an internationalised program to Portuguese (pt)? (Select TWO correct answers)

Options:

A.

export LANGUAGE="pt"

B.

export MESSAGE="pt"

C.

export LANG="pt"

D.

export LC_MESSAGES="pt"

E.

export ALL_MESSAGES="pt"

Question 31

What is the purpose of the iconv command?

Options:

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Question 32

The system's timezone may be set by linking /etc/localtime to an appropriate file in which directory? (Provide the full path to the directory, without any country information)

Options:

Question 33

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Options:

A.

Without additional configuration, no users may have user specific crontabs.

B.

Without additional configuration, all users may have user specific crontabs.

C.

The cron daemon will refuse to start and report missing files in the system's logfile.

D.

When a user creates a user specific crontab the system administrator must approve it explicitly.

Question 34

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Options:

Question 35

The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5 p.m.:

Options:

A.

* 3,4,5 1 * * chklog

B.

3 3,4,5 1 * * chklog

C.

3 15,16,17 * * * chklog

D.

0 15,16,17 1 * * chklog

E.

* 15,16,17 1 * * chklog

Question 36

Which directory in /etc is used to keep a sample copy of files and directories for when a new user has a home directory created? (Please provide the full path)

Options:

Question 37

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

Options:

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Question 38

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Question 39

What output will the following command produce?

seq 1 5 20

Options:

A.

1

6

1

1

1

6

B.

1

5

10

15

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Question 40

After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?

Options:

A.

A B

B.

A B C

C.

A C

D.

B C

E.

C B A

Question 41

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Options:

Question 42

What output will the command seq 10 produce?

Options:

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Question 43

What keyword is missing from this code sample of a shell script?

____ i in *.txt; do

echo $i

done

Options:

A.

for

B.

loop

C.

until

D.

while

Question 44

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

Options:

Question 45

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Options:

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Question 46

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Question 47

Which of the following commands lists all defined variables and functions within Bash?

Options:

A.

env

B.

set

C.

env -a

D.

echo $ENV

Question 48

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Options:

Question 49

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Question 50

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

Options:

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Question 51

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Options:

Question 52

Why is the xhost program considered dangerous to use?

Options:

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Question 53

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Question 54

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Question 55

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Question 56

Which file used by XDM specifies the default wallpaper?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Question 57

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Question 58

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Question 59

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Question 60

Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.)

Options:

A.

Synchronize the hardware and system clocks.

B.

Output date and time in different formats.

C.

Set the system clock.

D.

Set the hardware clock.

E.

Update the time via NTP.

Question 61

What is true regarding the command sendmail?

Options:

A.

With any MTA, the sendmail command must be run periodically by the cron daemon.

B.

All MTAs, including Postfix and Exim, provide a sendmail command.

C.

The sendmail command prints the MTAs queue history of which mails have been sent successfully.

D.

It is only available when the sendmail MTA is installed.

Question 62

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)

Options:

Question 63

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Question 64

Why is the correct configuration of a system's time zone important?

Options:

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Question 65

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

Options:

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Question 66

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Options:

Question 67

Which of the following is observed and corrected by a NTP client?

Options:

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Question 68

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)

Options:

Question 69

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?

Options:

A.

*.* /dev/tty12

B.

/var/log/messages | /dev/tty12

C.

| /dev/tty12

D.

syslog tty12

E.

mail.* /dev/tty12

Page: 1 / 24
Total 235 questions