Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Questions 4

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Buy Now
Questions 5

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Buy Now
Questions 6

Which of the following commands shows the current color depth of the X Server?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Buy Now
Questions 7

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Buy Now
Questions 8

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 9

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

Options:

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Buy Now
Questions 10

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Buy Now
Questions 11

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Buy Now
Questions 12

What is true regarding the command sendmail?

Options:

A.

With any MTA, the sendmail command must be run periodically by the cron daemon.

B.

All MTAs, including Postfix and Exim, provide a sendmail command.

C.

The sendmail command prints the MTAs queue history of which mails have been sent successfully.

D.

It is only available when the sendmail MTA is installed.

Buy Now
Questions 13

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Buy Now
Questions 14

On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem?

Options:

A.

date -d '+ 1 day'

B.

hwclock --systohc --localtime

C.

ntpdate pool.ntp.org

D.

time hwclock

Buy Now
Questions 15

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 16

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Options:

Buy Now
Questions 17

Why is the correct configuration of a system's time zone important?

Options:

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Buy Now
Questions 18

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this?

Options:

A.

cupsreject -c -r hello HPLaserjet4

B.

cupsreject -p -m hello HPLaserjet4

C.

cupsdisable -c -r hello HPLaserjet4

D.

cupsdisable -p -m hello HPLaserjet4

Buy Now
Questions 19

What is true regarding TCP port 23?

Options:

A.

Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used.

B.

Port 23 is the well known port for the SSH service which provides secure logins.

C.

Port 23 is the well known port for the rlogin service which is SSL secured by default.

D.

Port 23 is the well known port for the system login services which are encrypted when the user runs the starttls command in his login shell.

Buy Now
Questions 20

Which of the following commands will help identify a broken router between the local and the remote machine?

Options:

A.

ps

B.

netstat

C.

nslookup

D.

ifconfig

E.

traceroute

Buy Now
Questions 21

What is the purpose of the nsswitch.conf file?

Options:

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Buy Now
Questions 22

Which of the following is a valid IPv6 address?

Options:

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Buy Now
Questions 23

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

Options:

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Buy Now
Questions 24

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)

Options:

A.

2001:db8::15 www.example.com www

B.

www.example.com www 203.0.13.15

C.

203.0.113.15 www.example.com www

D.

www.example.com,www 203.0.13.15,2001:db8::15

E.

2003.0.113.15,2001:db8::15 www.example.com www

Buy Now
Questions 25

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Options:

Buy Now
Questions 26

Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 27

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

Options:

A.

resolv

B.

dns

C.

remote

D.

files

E.

hosts

Buy Now
Questions 28

Which command can be used to delete a group from a Linux system?

Options:

A.

groupdel

B.

groupmod

C.

groups

D.

groupedit

Buy Now
Questions 29

Which of the following can the chage command NOT change?

Options:

A.

The number of days since January 1, 1970 after which the user's account will no longer be accessible.

B.

The number of days since January 1, 1970 after which the password can change.

C.

The number of days since January 1, 1970 since the password was last changed.

D.

The maximum number of days during which a password is valid.

E.

The number of days of inactivity after a password has expired before the account is locked.

Buy Now
Questions 30

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Options:

Buy Now
Questions 31

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Buy Now
Questions 32

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 33

To prevent a specific user from scheduling tasks with at, what should the administrator do?

Options:

A.

Add the specific user to /etc/at.allow file.

B.

Add the specific user to [deny] section in the /etc/atd.conf file.

C.

Add the specific user to /etc/at.deny file.

D.

Add the specific user to nojobs group.

E.

Run the following: atd --deny [user].

Buy Now
Questions 34

The ________ command is used to add a group to the system.

Options:

Buy Now
Questions 35

Where are user specific crontabs stored?

Options:

A.

In the database file /etc/crontab.db which is shared by all users.

B.

As individual per-user files within /var/spool/cron.

C.

As individual per-user files in /etc/cron.user.d.

D.

In the .crontab file in the user's home directory.

E.

In the file /var/cron/user-crontab which is shared by all users.

Buy Now
Questions 36

Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 37

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 38

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Options:

Buy Now
Questions 39

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

Options:

A.

find /usr -uid 0 -perm +4000

B.

find -user root +mode +s /usr

C.

find -type suid -username root -d /usr

D.

find /usr -ls \*s\* -u root

E.

find /usr -suid -perm +4000

Buy Now
Questions 40

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Options:

Buy Now
Questions 41

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 42

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Options:

Buy Now
Questions 43

What is a purpose of an SSH host key?

Options:

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Buy Now
Questions 44

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

Options:

A.

ssh --port 2222 example.com

B.

ssh -p 2222 example.com

C.

ssh -o Port=2222 example.com

D.

ssh -o GatewayPort=2222 example.com

E.

ssh example.com:2222

Buy Now
Questions 45

Which configuration file would be edited to change the default options for outbound SSH sessions?

Options:

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/client

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_client

Buy Now
Questions 46

Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)

Options:

A.

ifconf

B.

ifdown

C.

ifpause

D.

ifstart

E.

ifup

Buy Now
Questions 47

Which of the following protocols is related to the term open relay?

Options:

A.

SMTP

B.

POP3

C.

NTP

D.

IMAP

E.

LDAP

Buy Now
Questions 48

Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

Options:

A.

UID have precedence over GIDs, therefore the user is available while the group doesn’t.

B.

The user as well as the group are not available to avoid ambiguity due to the ID conflict.

C.

UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.

D.

The user is the only member of the group, even if the group configuration contains other members.

E.

GIDs have precedence over UIDs, therefore the group is available while the user isn’t.

Buy Now
Questions 49

Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.)

Options:

Buy Now
Questions 50

Which of the following statements is true regarding systemd timer units?

Options:

A.

Timer units can only be defined within a service unit’s file.

B.

The command executed by the timer is specified in the timer unit’s [Cmd] section.

C.

A dedicated system service, systemd-cron, handles the execution of timer units.

D.

Timer units only exist in the system scope and are not available for users.

E.

Each systemd timer unit controls a specific systemd service unit.

Buy Now
Questions 51

What can be specified with useradd? (Choose two.)

Options:

A.

Commands the user can run using sudo.

B.

The absolute path to the user’s home directory.

C.

Which printers are available for the new user.

D.

The SSH keys used to login to the new account.

E.

The numeric user ID (UID) of the user.

Buy Now
Questions 52

What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the directory.)

Options:

Buy Now
Questions 53

On a machine running serval X servers. how do programs identify the different instances of theX11 server?

Options:

A.

By a fixed UUID that is defined in the X11 configuration file.

B.

By a display name like :1.

C.

By the name of the user that turns the X server like x11: bob.

D.

By a device name like /dov/x11/xeorvore/1.

E.

By a unique IPv6 address from the fc80: /64 subnet.

Buy Now
Questions 54

Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

Options:

A.

Year

B.

Minute

C.

Username

D.

Effective group ID

E.

Command

Buy Now
Questions 55

Which of the following commands puts the output of the command date into the shell variable mydate?

Options:

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Buy Now
Questions 56

What is the purpose of the file /etc/profile?

Options:

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Buy Now
Questions 57

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Buy Now
Questions 58

What benefit does an alias in bash provide?

Options:

A.

It provides faster lookups for commands in the system directory.

B.

It creates a local copy of a file from another directory.

C.

It hides what command you are running from others.

D.

It allows a string to be substituted for the first word of a simple command.

Buy Now
Questions 59

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

Options:

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Buy Now
Exam Code: 102-500
Exam Name: LPIC-1 Exam 102, Part 2 of 2, version 5.0
Last Update: Nov 23, 2024
Questions: 197
102-500 pdf

102-500 PDF

$25.5  $84.99
102-500 Engine

102-500 Testing Engine

$30  $99.99
102-500 PDF + Engine

102-500 PDF + Testing Engine

$40.5  $134.99