Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > LPI > LPIC Level 1 > 102-500

102-500 LPIC-1 Exam 102 - Part 2 of 2 - version 5.0 Question and Answers

Question # 4

Which of the following can the chage command NOT change?

A.

The number of days since January 1, 1970 after which the user's account will no longer be accessible.

B.

The number of days since January 1, 1970 after which the password can change.

C.

The number of days since January 1, 1970 since the password was last changed.

D.

The maximum number of days during which a password is valid.

E.

The number of days of inactivity after a password has expired before the account is locked.

Full Access
Question # 5

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?

A.

Use passwd -d username to give the user an empty password.

B.

Use chage to expire the user account.

C.

Change the user's password.

D.

Add the command exit to the user's .login file.

Full Access
Question # 6

What is the conventional purpose of Linux UIDs that are lower than 100?

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Full Access
Question # 7

Which file specifies the user accounts that can NOT submit jobs via at or batch? (Provide the full path and filename)

Full Access
Question # 8

Which of the following fields are available in both the global /etc/crontab file as well as in user-specific crontab files? (Select TWO correct answers)

A.

Year

B.

Minute

C.

Username

D.

Command

Full Access
Question # 9

Which command will set the local machine's timezone to UTC?

A.

cat UTC > /etc/timezone

B.

ln -s /usr/share/zoneinfo/UTC /etc/localtime

C.

date --timezone=UTC

D.

mv /usr/timezone/UTC /etc

Full Access
Question # 10

Which file contains the date of the last change of a user's password?

A.

/etc/gshadow

B.

/etc/passwd

C.

/etc/pwdlog

D.

/etc/shadow

E.

/var/log/shadow

Full Access
Question # 11

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.)

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Full Access
Question # 12

What is the purpose of the command mailq?

A.

It fetches new emails from a remote server using POP3 or IMAP.

B.

It is a multi-user mailing list manager.

C.

It is a proprietary tool contained only in the qmail MTA.

D.

It queries the mail queue of the local MTA.

E.

It is a command-line based tool for reading and writing emails.

Full Access
Question # 13

Which of the following is observed and corrected by a NTP client?

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Full Access
Question # 14

What is pool.ntp.org?

A.

A deprecated feature for maintaining system time in the Linux kernel

B.

A website which provides binary and source packages for the OpenNTPD project

C.

A virtual cluster of various timeservers

D.

A community website used to discuss the localization of Linux

Full Access
Question # 15

What command should be used to print a listing of email in the system's mail queue?

A.

lpq

B.

mailq

C.

mlq

D.

sendmail –l

Full Access
Question # 16

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Full Access
Question # 17

On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem?

A.

date -d '+ 1 day'

B.

hwclock --systohc --localtime

C.

ntpdate pool.ntp.org

D.

time hwclock

Full Access
Question # 18

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

A.

lpd

B.

lpp

C.

lpq

D.

lpr

Full Access
Question # 19

What benefit does an alias in bash provide?

A.

It provides faster lookups for commands in the system directory.

B.

It creates a local copy of a file from another directory.

C.

It hides what command you are running from others.

D.

It allows a string to be substituted for the first word of a simple command.

Full Access
Question # 20

What word is missing from the following SQL statement?

insert into tablename ________(909, 'text');

(Please specify the missing word using lower-case letters only.)

Full Access
Question # 21

Which of the following commands lists all defined variables and functions within Bash?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 22

What keyword is missing from this code sample of a shell script?

____ i in *.txt; do

echo $i

done

A.

for

B.

loop

C.

until

D.

while

Full Access
Question # 23

Which of the following configuration files should be modified to set default shell variables for all users?

A.

/etc/bashrc

B.

/etc/profile

C.

~/.bash_profile

D.

/etc/.bashrc

Full Access
Question # 24

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Full Access
Question # 25

You are looking into a new script you received from your senior administrator. In the very first line you notice a #! followed by a file path. This indicates that:

A.

The file at that location was used to make the script.

B.

This script provides identical functionality as the file at that location.

C.

This script will self-extract into a file at that location.

D.

The program at that location will be used to process the script.

Full Access
Question # 26

Which of the following commands puts the output of the command date into the shell variable mydate?

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Full Access
Question # 27

Which of the following SQL statements will select the fields name and address from the contacts table?

A.

SELECT (name, address) FROM contacts;

B.

SELECT (name address) FROM contacts;

C.

SELECT name, address FROM contacts;

D.

SELECT name address FROM contacts;

Full Access
Question # 28

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Full Access
Question # 29

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

A.

debug

B.

lsof

C.

nessus

D.

strace

E.

traceroute

Full Access
Question # 30

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Full Access
Question # 31

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

Full Access
Question # 32

In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?

Full Access
Question # 33

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

A.

core

B.

edquota

C.

ulimit

D.

quota

Full Access
Question # 34

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Full Access
Question # 35

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Full Access
Question # 36

Which configuration file would be edited to change the default options for outbound SSH sessions?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/client

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_client

Full Access
Question # 37

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Full Access
Question # 38

Which of the following features are provided by SPICE? (Choose two.)

A.

Connecting local USB devices to remote applications.

B.

Accessing graphical applications on a remote host.

C.

Replacing Xorg as local X11 server.

D.

Downloading and locally installing applications from a remote machine.

E.

Uploading and running a binary program on a remote machine.

Full Access
Question # 39

Which file, if present, must contain all users that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Full Access
Question # 40

Which of the following protocols is related to the term open relay?

A.

SMTP

B.

POP3

C.

NTP

D.

IMAP

E.

LDAP

Full Access
Question # 41

Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

A.

Year

B.

Minute

C.

Username

D.

Effective group ID

E.

Command

Full Access
Question # 42

Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

A.

UID have precedence over GIDs, therefore the user is available while the group doesn’t.

B.

The user as well as the group are not available to avoid ambiguity due to the ID conflict.

C.

UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.

D.

The user is the only member of the group, even if the group configuration contains other members.

E.

GIDs have precedence over UIDs, therefore the group is available while the user isn’t.

Full Access
Question # 43

What can be specified with useradd? (Choose two.)

A.

Commands the user can run using sudo.

B.

The absolute path to the user’s home directory.

C.

Which printers are available for the new user.

D.

The SSH keys used to login to the new account.

E.

The numeric user ID (UID) of the user.

Full Access
Question # 44

Depending on a system's configuration, which of the following files can be used to enable and disable network services running on this host?

A.

/etc/profile

B.

/etc/xinetd.conf

C.

/etc/ports

D.

/et/host.conf

E.

/etc/host.conf

Full Access
Question # 45

Which of the following statements about sytemd-journald are true? (Choose three.)

A.

It is incompatible with syslog and cannot be installed on a system using regular syslog.

B.

It only processes messages of systemd and not messages of any other tools.

C.

It can pass log messages to syslog for further processing.

D.

It maintains metadata such as _UID or _PID for each message.

E.

It supports syslog facilities such as kern, user, and auth.

Full Access
Question # 46

Which of the following is true about IPv6?

A.

With IPv6, the TCP port numbers of most services have changed.

B.

IPv6 no longer supports broadcast addresses.

C.

IPv4 addresses can be used without any change with IPv6.

D.

IPv6 no longer supports multicast addresses.

E.

For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.

Full Access
Question # 47

What is the purpose of the nsswitch.conf file?

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Full Access
Question # 48

With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)

Full Access
Question # 49

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Full Access
Question # 50

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Full Access
Question # 51

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Full Access
Question # 52

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Full Access
Question # 53

Which of the following commands will help identify a broken router between the local and the remote machine?

A.

ps

B.

netstat

C.

nslookup

D.

ifconfig

E.

traceroute

Full Access
Question # 54

Which of the following is a valid IPv6 address?

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Full Access
Question # 55

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 56

Which file used by XDM specifies the default wallpaper?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 57

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access
Question # 58

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 59

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access