Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

LPI 102-500 Dumps

Page: 1 / 20
Total 197 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Question 1

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

Options:

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Question 2

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this?

Options:

A.

cupsreject -c -r hello HPLaserjet4

B.

cupsreject -p -m hello HPLaserjet4

C.

cupsdisable -c -r hello HPLaserjet4

D.

cupsdisable -p -m hello HPLaserjet4

Question 3

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Options:

Question 4

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.)

Options:

A.

--from=

B.

--since=

C.

--until=

D.

--upto=

E.

--date=

Question 5

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Options:

Question 6

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

Options:

A.

lpd

B.

lpp

C.

lpq

D.

lpr

Question 7

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Question 8

Why is the correct configuration of a system's time zone important?

Options:

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Question 9

Which of the following are syslog facilities? (Choose TWO correct answers.)

Options:

A.

local7

B.

mail

C.

advanced

D.

postmaster

E.

remote

Question 10

Which configuration file would be edited to change the default options for outbound SSH sessions?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/client

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_client

Question 11

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Options:

Question 12

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

Options:

A.

debug

B.

lsof

C.

nessus

D.

strace

E.

traceroute

Question 13

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Options:

Question 14

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

Options:

Question 15

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Options:

Question 16

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Question 17

In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?

Options:

Question 18

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including

Options:

Question 19

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Options:

Question 20

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Options:

Question 21

Given the following routing table:

as

How would an outgoing packet to the destination 192.168.2.150 be handled?

Options:

A.

It would be passed to the default router 192.168.178.1 on wlan0.

B.

It would be directly transmitted on the device eth0.

C.

It would be passed to the default router 255.255.255.0 on eth0.

D.

It would be directly transmitted on the device wlan0.

E.

It would be passed to the router 192.168.1.1 on eth0.

Question 22

Which of the following programs can be used to determine the routing path to a given destination?

Options:

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Question 23

Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)

Options:

Question 24

What is the purpose of the nsswitch.conf file?

Options:

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Question 25

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Options:

Question 26

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

Options:

A.

The local routing information may be corrupted and must be re-validated using a routing protocol.

B.

One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.

C.

There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.

D.

DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

Question 27

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

Options:

A.

resolv

B.

dns

C.

remote

D.

files

E.

hosts

Question 28

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Question 29

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

Options:

A.

*

B.

-

C.

s

D.

x

Question 30

The ________ command is used to add a group to the system.

Options:

Question 31

Where are user specific crontabs stored?

Options:

A.

In the database file /etc/crontab.db which is shared by all users.

B.

As individual per-user files within /var/spool/cron.

C.

As individual per-user files in /etc/cron.user.d.

D.

In the .crontab file in the user's home directory.

E.

In the file /var/cron/user-crontab which is shared by all users.

Question 32

What is the conventional purpose of Linux UIDs that are lower than 100?

Options:

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Question 33

A French user has installed the French language pack, but currencies are still being displayed with a leading '$' sign in his spreadsheets. What must be done to fix this?

Options:

A.

Alter the locale.

B.

Set the timezone correctly.

C.

Edit /etc/currency.

D.

Reinstall the French language pack.

Question 34

The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5 p.m.:

Options:

A.

* 3,4,5 1 * * chklog

B.

3 3,4,5 1 * * chklog

C.

3 15,16,17 * * * chklog

D.

0 15,16,17 1 * * chklog

E.

* 15,16,17 1 * * chklog

Question 35

What is NOT contained in the locale setting of the operating system?

Options:

A.

currency symbol

B.

language

C.

timezone

D.

thousands separator

Question 36

To prevent a specific user from scheduling tasks with at, what should the administrator do?

Options:

A.

Add the specific user to /etc/at.allow file.

B.

Add the specific user to [deny] section in the /etc/atd.conf file.

C.

Add the specific user to /etc/at.deny file.

D.

Add the specific user to nojobs group.

E.

Run the following: atd --deny [user].

Question 37

Which of the following commands can identify the PID od a process which opened a TCP port?

Options:

A.

ptrace

B.

strace

C.

debug

D.

lsof

E.

nessus

Question 38

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Options:

Question 39

What is the purpose of TCP wrapper?

Options:

A.

Manage and adjust bandwidth used by TCP services.

B.

Bind a network service to a TCP port.

C.

Encapsulate TCP messages in IP packets.

D.

Add SSL support to plain text TCP services.

E.

Limit access to a network service.

Question 40

How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?

Options:

A.

6

B.

14

C.

30

D.

62

E.

126

Question 41

Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)?

Options:

A.

export LANGUAGE=“pt”

B.

export LC_MESSAGES=“pt”

C.

export UI_MESSAGES=“pt”

D.

export MESSAGE=“pt”

E.

export ALL_MESSAGES=“pt”

Question 42

Which of the following commands displays all environment and shell variables?

Options:

A.

getargs

B.

lsenv

C.

ls

D.

env

E.

lsshell

Question 43

Which of the following commands lists all queued print jobs?

Options:

A.

lpd

B.

lpr

C.

lp

D.

lsq

E.

lpq

Question 44

Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

Options:

A.

Year

B.

Minute

C.

Username

D.

Effective group ID

E.

Command

Question 45

What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the directory.)

Options:

Question 46

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Question 47

When the command echo $ outputs 1, which of the following statements is true?

Options:

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the exit value of the command executed immediately before echo.

D.

It is the exit value of the echo command.

Question 48

Which of the following is the best way to list all defined shell variables?

Options:

A.

env

B.

set

C.

env -a

D.

echo $ENV

Question 49

Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records?

Options:

A.

LIMIT

B.

FROM

C.

WHERE

D.

IF

Question 50

Which command allows you to make a shell variable visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Question 51

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Question 52

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Options:

A.

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.

COUNT(SELECT order_type FROM orders);

D.

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.

SELECT AUTO_COUNT FROM orders COUNT order_type;

Question 53

What output will the command seq 10 produce?

Options:

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Question 54

What is the difference between the commands test -e path and test -f path?

Options:

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Question 55

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Question 56

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Question 57

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Question 58

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Question 59

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Page: 1 / 20
Total 197 questions