Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

LPI 102-500 Dumps

Page: 1 / 15
Total 197 questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Question 1

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Question 2

How is a display manager started?

Options:

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Question 3

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Question 4

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Question 5

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Options:

Question 6

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Question 7

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Question 8

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Question 9

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Question 10

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

Options:

A.

sshd

B.

ssh-agent

C.

ssh-keygen

D.

ssh-add

Question 11

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Question 12

What is a purpose of an SSH host key?

Options:

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Question 13

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including

Options:

Question 14

In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?

Options:

Question 15

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Options:

Question 16

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

Options:

A.

ssh --port 2222 example.com

B.

ssh -p 2222 example.com

C.

ssh -o Port=2222 example.com

D.

ssh -o GatewayPort=2222 example.com

E.

ssh example.com:2222

Question 17

Which configuration file would be edited to change the default options for outbound SSH sessions?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/client

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_client

Question 18

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

Options:

A.

debug

B.

lsof

C.

nessus

D.

strace

E.

traceroute

Question 19

Which of the following commands will help identify a broken router between the local and the remote machine?

Options:

A.

ps

B.

netstat

C.

nslookup

D.

ifconfig

E.

traceroute

Question 20

Which of the following statements is valid in the file /etc/nsswitch.conf?

Options:

A.

multi on

B.

192.168.168.4 dns-server

C.

hosts: files dns

D.

include /etc/nsswitch.d/

Question 21

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Question 22

Which of the following programs can be used to determine the routing path to a given destination?

Options:

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Question 23

Given the following routing table:

How would an outgoing packet to the destination 192.168.2.150 be handled?

Options:

A.

It would be passed to the default router 192.168.178.1 on wlan0.

B.

It would be directly transmitted on the device eth0.

C.

It would be passed to the default router 255.255.255.0 on eth0.

D.

It would be directly transmitted on the device wlan0.

E.

It would be passed to the router 192.168.1.1 on eth0.

Question 24

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

Options:

A.

resolv

B.

dns

C.

remote

D.

files

E.

hosts

Question 25

Which of the following details is NOT provided in any output from the netstat utility?

Options:

A.

broadcast services

B.

interface statistics

C.

masquerading connections

D.

network connections

E.

routing tables

Question 26

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Options:

Question 27

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

Options:

A.

New name servers may be added to the resolver configuration.

B.

Network interfaces may become active or inactive.

C.

The routing table may change.

D.

IP addresses may change.

E.

The system's host name may change.

Question 28

Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)?

Options:

A.

export LANGUAGE=“pt”

B.

export LC_MESSAGES=“pt”

C.

export UI_MESSAGES=“pt”

D.

export MESSAGE=“pt”

E.

export ALL_MESSAGES=“pt”

Question 29

Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/maillog and sends all critical events to the remote server logger.example.com?

Options:

A.

mail.*/var/log/maillogmail,crit@logger.example.org

B.

mail.*/var/log/maillogmail.critsyslog://logger.example.org

C.

mail/var/log/maillogmail.crit@logger.example.org

D.

mail.*/var/log/maillogmail.crit@logger.example.org

E.

mail */var/log/maillogmail crit@logger.example.org

Question 30

Which of the following statements about sytemd-journald are true? (Choose three.)

Options:

A.

It is incompatible with syslog and cannot be installed on a system using regular syslog.

B.

It only processes messages of systemd and not messages of any other tools.

C.

It can pass log messages to syslog for further processing.

D.

It maintains metadata such as _UID or _PID for each message.

E.

It supports syslog facilities such as kern, user, and auth.

Question 31

Which of the following connection types, as seen in unroll connection show, may exist in Network Manager? (Choose THREE correct answers.)

Options:

A.

tcp

B.

Ethernet

C.

wifi

D.

ipv6

E.

bridge

Question 32

Given the following excerpt of the sudo configuration:

jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk

Which of the following statements are true? (Choose three.)

Options:

A.

Jane can run /bin/id only after specifying her password.

B.

Jane can run /sbin/fdisk after specifying root’s password.

C.

Jane can run /sbin/fdisk after specifying her password.

D.

Jane can run /bin/kill without specifying a password.

E.

Jane can run /bin/id without specifying her password.

Question 33

What is true about the Hop Limit field in the IPv6 header?

Options:

A.

The field is not changed during the transport of a package.

B.

The field is transmitted within a hop-by-hop extension header.

C.

Each router forwarding the packet increases the field’s value.

D.

Each router forwarding the packet decreases the field’s value.

E.

For multicast packages, the field’s value is always 1.

Question 34

Which of the following features are provided by SPICE? (Choose two.)

Options:

A.

Connecting local USB devices to remote applications.

B.

Accessing graphical applications on a remote host.

C.

Replacing Xorg as local X11 server.

D.

Downloading and locally installing applications from a remote machine.

E.

Uploading and running a binary program on a remote machine.

Question 35

Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

Options:

A.

Year

B.

Minute

C.

Username

D.

Effective group ID

E.

Command

Question 36

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Options:

Question 37

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this?

Options:

A.

cupsreject -c -r hello HPLaserjet4

B.

cupsreject -p -m hello HPLaserjet4

C.

cupsdisable -c -r hello HPLaserjet4

D.

cupsdisable -p -m hello HPLaserjet4

Question 38

Why is the correct configuration of a system's time zone important?

Options:

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Question 39

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Options:

Question 40

What is true about the ntpdate command?

Options:

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Question 41

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

Options:

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Question 42

What is the purpose of the command mailq?

Options:

A.

It fetches new emails from a remote server using POP3 or IMAP.

B.

It is a multi-user mailing list manager.

C.

It is a proprietary tool contained only in the qmail MTA.

D.

It queries the mail queue of the local MTA.

E.

It is a command-line based tool for reading and writing emails.

Question 43

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

Options:

A.

lpd

B.

lpp

C.

lpq

D.

lpr

Question 44

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Options:

Question 45

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.)

Options:

A.

--from=

B.

--since=

C.

--until=

D.

--upto=

E.

--date=

Question 46

Which of the following commands can be used to convert text files in one character encoding to another character encoding?

Options:

A.

cat

B.

convert

C.

dd

D.

iconv

E.

utf2utf

Question 47

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.)

Options:

A.

The list of users that belong to the group.

B.

The home directory of the group.

C.

The name of the group.

D.

The description of the group.

E.

The password of the group.

Question 48

Which of the following files assigns a user to its primary group?

Options:

A.

/etc/pgroup

B.

/etc/shadow

C.

/etc/group

D.

/etc/passwd

E.

/etc/gshadow

Question 49

Which TWO statements about crontab are true?

Options:

A.

Every user may have their own crontab.

B.

Changing a crontab requires a reload/restart of the cron daemon.

C.

The cron daemon reloads crontab files automatically when necessary.

D.

hourly is the same as "0 * * * *".

E.

A cron daemon must run for each existing crontab.

Question 50

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Options:

Question 51

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

Options:

A.

*

B.

-

C.

s

D.

x

Question 52

Which of the following commands can be used to convert text files in one character encoding to another character encoding?

Options:

A.

cat

B.

convert

C.

dd

D.

iconv

E.

utf2utf

Question 53

What is the conventional purpose of Linux UIDs that are lower than 100?

Options:

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Question 54

Which of the following can the chage command NOT change?

Options:

A.

The number of days since January 1, 1970 after which the user's account will no longer be accessible.

B.

The number of days since January 1, 1970 after which the password can change.

C.

The number of days since January 1, 1970 since the password was last changed.

D.

The maximum number of days during which a password is valid.

E.

The number of days of inactivity after a password has expired before the account is locked.

Question 55

Which command allows you to make a shell variable visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Question 56

What is the purpose of the file /etc/profile?

Options:

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Question 57

Which of the following commands puts the output of the command date into the shell variable mydate?

Options:

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Question 58

When the command echo $ outputs 1, which of the following statements is true?

Options:

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the exit value of the command executed immediately before echo.

D.

It is the exit value of the echo command.

Question 59

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Options:

Page: 1 / 15
Total 197 questions