Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 Questions and Answers

Questions 4

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

Options:

Buy Now
Questions 5

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Options:

Buy Now
Questions 6

What is true regarding the file ~/.forward?

Options:

A.

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Buy Now
Questions 7

What is true about the ntpdate command?

Options:

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Buy Now
Questions 8

Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.)

Options:

A.

Synchronize the hardware and system clocks.

B.

Output date and time in different formats.

C.

Set the system clock.

D.

Set the hardware clock.

E.

Update the time via NTP.

Buy Now
Questions 9

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Buy Now
Questions 10

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

Options:

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Buy Now
Questions 11

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Options:

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Buy Now
Questions 12

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

Options:

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Buy Now
Questions 13

You are looking into a new script you received from your senior administrator. In the very first line you notice a #! followed by a file path. This indicates that:

Options:

A.

The file at that location was used to make the script.

B.

This script provides identical functionality as the file at that location.

C.

This script will self-extract into a file at that location.

D.

The program at that location will be used to process the script.

Buy Now
Questions 14

Which of the following SQL statements will select the fields name and address from the contacts table?

Options:

A.

SELECT (name, address) FROM contacts;

B.

SELECT (name address) FROM contacts;

C.

SELECT name, address FROM contacts;

D.

SELECT name address FROM contacts;

Buy Now
Questions 15

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.

~/.bashconf

B.

~/.bashrc

C.

~/.bashdefaults

D.

~/.bash_etc

E.

~/.bash_profile

Buy Now
Questions 16

What is the purpose of the file /etc/profile?

Options:

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Buy Now
Questions 17

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Options:

A.

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.

COUNT(SELECT order_type FROM orders);

D.

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.

SELECT AUTO_COUNT FROM orders COUNT order_type;

Buy Now
Questions 18

Which of the following commands lists all defined variables and functions within Bash?

Options:

A.

env

B.

set

C.

env -a

D.

echo $ENV

Buy Now
Questions 19

What output will the command seq 10 produce?

Options:

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Buy Now
Questions 20

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Options:

Buy Now
Questions 21

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

Options:

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Buy Now
Questions 22

What output will the following command sequence produce?

echo '1 2 3 4 5 6' | while read a b c; do

echo result: $c $b $a;

done

Options:

A.

result: 3 4 5 6 2 1

B.

result: 1 2 3 4 5 6

C.

result: 6 5 4

D.

result: 6 5 4 3 2 1

E.

result: 3 2 1

Buy Now
Questions 23

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Buy Now
Questions 24

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Options:

Buy Now
Questions 25

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Options:

Buy Now
Questions 26

What is the purpose of the nsswitch.conf file?

Options:

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Buy Now
Questions 27

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)

Options:

A.

2001:db8::15 www.example.com www

B.

www.example.com www 203.0.13.15

C.

203.0.113.15 www.example.com www

D.

www.example.com,www 203.0.13.15,2001:db8::15

E.

2003.0.113.15,2001:db8::15 www.example.com www

Buy Now
Questions 28

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

Options:

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Buy Now
Questions 29

Which of the following statements is valid in the file /etc/nsswitch.conf?

Options:

A.

multi on

B.

192.168.168.4 dns-server

C.

hosts: files dns

D.

include /etc/nsswitch.d/

Buy Now
Questions 30

Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.)

Options:

A.

substitute

B.

nameserver

C.

search

D.

lookup

E.

method

Buy Now
Questions 31

Which of the following details is NOT provided in any output from the netstat utility?

Options:

A.

broadcast services

B.

interface statistics

C.

masquerading connections

D.

network connections

E.

routing tables

Buy Now
Questions 32

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Buy Now
Questions 33

Which of the following commands shows the current color depth of the X Server?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Buy Now
Questions 34

With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)

Options:

Buy Now
Questions 35

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

Options:

A.

The local routing information may be corrupted and must be re-validated using a routing protocol.

B.

One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.

C.

There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.

D.

DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

Buy Now
Questions 36

Which file used by XDM specifies the default wallpaper?

Options:

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Buy Now
Questions 37

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Buy Now
Questions 38

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Buy Now
Questions 39

How is a display manager started?

Options:

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Buy Now
Questions 40

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Buy Now
Questions 41

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Buy Now
Questions 42

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

Options:

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Buy Now
Questions 43

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

Options:

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Buy Now
Questions 44

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Buy Now
Questions 45

Why is the xhost program considered dangerous to use?

Options:

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Buy Now
Questions 46

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Buy Now
Questions 47

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 48

Which environment variable should be set in order to change the time zone for the commands run from within the environment variable's scope? (Specify the variable name only.)

Options:

Buy Now
Questions 49

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

Options:

A.

*

B.

-

C.

s

D.

x

Buy Now
Questions 50

Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays?

Options:

A.

0 * * * 30 myscript

B.

30 * * * 6 myscript

C.

30 0 * * 0 myscript

D.

30 0-23 * * 0 myscript

E.

0 0-23 * * 30 myscript

Buy Now
Questions 51

Which crontab entry could be used to set the system time at regular intervals?

Options:

A.

1 0 * * * date $d $t $24

B.

1 0 * * * ntpdate ntp1.digex.net

C.

1 0 * * * date ntp1.digex.net

D.

1 0 * * * runcron date ntp1.digex.net

E.

1 0 * * * settime $d $t $24

Buy Now
Questions 52

A user was not given permission to use the CRON scheduling system. What file needs to be modified to provide that access? (Please specify the full path to the file)

Options:

Buy Now
Questions 53

Which of the following fields are available in both the global /etc/crontab file as well as in user-specific crontab files? (Select TWO correct answers)

Options:

A.

Year

B.

Minute

C.

Username

D.

Command

Buy Now
Questions 54

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.)

Options:

A.

The list of users that belong to the group.

B.

The home directory of the group.

C.

The name of the group.

D.

The description of the group.

E.

The password of the group.

Buy Now
Questions 55

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Buy Now
Questions 56

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?

Options:

A.

Use passwd -d username to give the user an empty password.

B.

Use chage to expire the user account.

C.

Change the user's password.

D.

Add the command exit to the user's .login file.

Buy Now
Questions 57

Each entry in a crontab must end with what character?

Options:

A.

Tab

B.

Space

C.

Backslash

D.

Newline

Buy Now
Questions 58

Which of Ihe following slates can NetworkManager show regarding the system's network connectivity? (Choose TWO correct answers.)

Options:

A.

Up

B.

Portal

C.

full

D.

Login-required

E.

firewalled

Buy Now
Questions 59

What information related to a user account is modified using the change command?

Options:

A.

Default ownership for new files

B.

Group membership

C.

Set of commands available to the user

D.

Password expiry information

E.

Default permissions for new files

Buy Now
Questions 60

What command is used to add OpenSSH private keys to a running ssh-agen . instance? (Specify the command name only without any path.)

Options:

Buy Now
Questions 61

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Options:

A.

Without additional configuration, no users may have user specific crontabs.

B.

Without additional configuration, all users may have user specific crontabs.

C.

The cron daemon will refuse to start and report missing files in the system's logfile.

D.

When a user creates a user specific crontab the system administrator must approve it explicitly.

Buy Now
Questions 62

What is Irue regarding the statement beginning with #. that is found in the first line of a script? (Choose TWO correct answers.)

Options:

A.

It prevents the script from being executed until the, is removed

B.

It triggers the installation of the script's interpreter.

C.

It specifies the path and the arguments of the interpreter used to run the script.

D.

It defines the character encoding of the script.

E.

It is a comment that is ignored by the script interpreter.

Buy Now
Questions 63

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

Options:

A.

find /usr -uid 0 -perm +4000

B.

find -user root +mode +s /usr

C.

find -type suid -username root -d /usr

D.

find /usr -ls \*s\* -u root

E.

find /usr -suid -perm +4000

Buy Now
Questions 64

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Buy Now
Questions 65

How can a specific user be prevented from scheduling tasks with a i.?

Options:

A.

By adding the specific user to the /etc/ at,allow file.

B.

By adding the specific user to the [deny] section in the /etc./atd.conf file.

C.

By adding the specific user to the nojoba group.

D.

By adding the specific user to the /etc/at.deny file.

E.

By executing the atd –deny [user] command.

Buy Now
Questions 66

Which file is processed by newaliases? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 67

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

Options:

A.

core

B.

edquota

C.

ulimit

D.

quota

Buy Now
Questions 68

Given the following excerpt of the sudo configuration:

jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk

Which of the following statements are true? (Choose three.)

Options:

A.

Jane can run /bin/id only after specifying her password.

B.

Jane can run /sbin/fdisk after specifying root’s password.

C.

Jane can run /sbin/fdisk after specifying her password.

D.

Jane can run /bin/kill without specifying a password.

E.

Jane can run /bin/id without specifying her password.

Buy Now
Questions 69

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

Options:

A.

ssh --port 2222 example.com

B.

ssh -p 2222 example.com

C.

ssh -o Port=2222 example.com

D.

ssh -o GatewayPort=2222 example.com

E.

ssh example.com:2222

Buy Now
Questions 70

Which of the following commands shows all active systemd timers?

Options:

A.

systemctl-timer show

B.

timectl list

C.

systemctl –t

D.

systemctl list-timers

E.

timeq

Buy Now
Exam Code: 102-500
Exam Name: LPIC-1 Exam 102, Part 2 of 2, version 5.0
Last Update: Jan 18, 2025
Questions: 235
102-500 pdf

102-500 PDF

$29.75  $84.99
102-500 Engine

102-500 Testing Engine

$35  $99.99
102-500 PDF + Engine

102-500 PDF + Testing Engine

$47.25  $134.99