Exam 102
Exam 102
Exam 102
60q
Number: 102-500
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
102-500
LPI Level 1
Version 1.0
Exam A
QUESTION 1
Which of the following statements is true regarding systemd timer units?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which of the following fields are available in the standard format of both the global /etc/crontab file as well
as in user-specific crontab files? (Choose two.)
A. Year
B. Minute
C. Username
D. Effective group ID
E. Command
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which of the following nmcli subcommands exist? (Choose two.)
A. nmcli ethernet
B. nmcli device
C. nmcli wifi
D. nmcli address
E. nmcli connection
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?
A. 6
B. 14
C. 30
D. 62
E. 126
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
What is true about the file /etc/localtime?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
FILL BLANK
Which command included in NetworkManager is a curses application which provides easy acces to the
NetworkManager on the command line? (Specify only the command without any path or parameters.)
Explanation/Reference:
QUESTION 7
Which of the following statements is valid in the file /etc/nsswitch.conf?
A. multi on
B. 192.168.168.4 dns-server
C. namespaces: net mount procs
D. include /etc/nsswitch.d/
E. hosts: files dns
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which of the following connection types, as seen in nmcli connection show, may exist in
NetworkManager? (Choose three.)
A. tcp
B. ethernet
C. wifi
D. ipv6
E. bridge
Explanation/Reference:
QUESTION 9
On a Linux workstation, the route command takes a long time before printing out the routing table. Which of
the following errors does that indicate?
A. The local routing information may be corrupted and must be re-validated using a routing protocol.
B. One of the routers in the routing table is not available which causes the automatic router failure detection
mechanism (ARF-D) to wait for a timeout.
C. There may accidentally be more than one default router in which case a default router election has to be
done on the network in order to choose one router as the default.
D. The Linux Kernel Routing Daemon (LKRD) is not running and should be started using its init script or
systemd unit.
E. DNS resolution may not be working as route by default tries to resolve names of routers and destinations
and may run into a timeout.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
Which of the following statements is true regarding a display manager?
A. A display manager handles remote X11 logins only and has no purpose on a system that is not attached to
a network.
B. The display manager is configured in the X11 configuration file xorg. conf
C. There is only one display manager X11 OM that must be started on all systems running X11.
D. Without a display manager, no graphical programs can be run.
E. After system startup, the display manager handles the login of a user.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
FILL BLANK
Which command is used to set the hostname of the local system? (Specify only the command without any path
or parameters.)
Explanation/Reference:
QUESTION 12
Which of the following is a valid IPv6 address?
A. 2001:db8:0g21::1
B. 2001::db8:4581::1
C. 2001:db8:3241::1
D. 2001%db8%9990%%1
E. 2001.db8.819f..1
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
FILL BLANK
What command, depending on its options, can display the open TCP connections, the routing tables, as well as
network interface statistics? (Specify only the command without any path or parameters.)
Explanation/Reference:
QUESTION 14
What can be specified with useradd? (Choose two.)
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
Given the following excerpt of the sudo configuration:
jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk
Explanation/Reference:
QUESTION 16
Which command makes the shell variable named VARIABLE visible to subshells?
A. export $VARIABLE
B. env VARIABLE
C. set $VARIABLE
D. set VARIABLE
E. export VARIABLE
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Which of the following information is stored in /etc/shadow for each user?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which of the following commands lists all queued print jobs?
A. lpd
B. lpr
C. lp
D. lsq
E. lpq
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Which of the commands below might have been used to create the following /etc/passwd entry?
fred:x:1001:1001:accountant:/home/fred:/bin/bash
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which of the following commands displays all environment and shell variables?
A. getargs
B. lsenv
C. ls
D. env
E. lsshell
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
What is true about the Hop Limit field in the IPv6 header?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which of the following commands shows all active systemd timers?
A. systemctl-timer show
B. timectl list
C. systemctl –t
D. systemctl list-timers
E. timeq
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Which of the following comparison operators for test work on elements in the file system? (Choose two.)
A. –z
B. –eq
C. –d
D. –f
E. –lt
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
What information is provided by the echo $$ command?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
Which of the following configuration files should be modified to globally set shell variables for all users?
A. /etc/profile
B. /etc/bashrc
C. ~/.bash_profile
D. /etc/.bashrc
E. /etc/shellenv
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
What output does the command seq 10 produce?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which of the following steps prevents a user from obtaining an interactive login session?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
FILL BLANK
Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information?
(Specify only the option without any values or parameters.)
Explanation/Reference:
QUESTION 29
What output is produced by the following command sequence?
echo ‘1 2 3 4 5 6’ | while read a b c; do
echo result $c $b $a;
done
A. result: 6 5 4
B. result: 1 2 3 4 5 6
C. result: 3 4 5 6 2 1
D. result: 6 5 4 3 2 1
E. result: 3 2 1
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
Which of the following commands should be executed when starting a login shell in order to change the
language of messages for an internationalized program to Portuguese (pt)?
A. export LANGUAGE=“pt”
B. export LC_MESSAGES=“pt”
C. export UI_MESSAGES=“pt”
D. export MESSAGE=“pt”
E. export ALL_MESSAGES=“pt”
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Depending on a system’s configuration, which of the following files can be used to enable and disable network
services running on this host?
A. /etc/profile
B. /etc/xinetd.conf
C. /etc/ports
D. /etc/services
E. /etc/host.conf
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which of the following commands can identify the PID od a process which opened a TCP port?
A. ptrace
B. strace
C. debug
D. lsof
E. nessus
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Which of the following tasks can the date command accomplish? (Choose two.)
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify the client’s host.
B. It is root key by which all user SSH keys must be signed.
C. It provides the server’s identity information to connecting SSH clients.
D. It authenticates any user that logs into a remote machine from the key’s host.
E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
FILL BLANK
Which file, if present, must contain all users that are allowed to use the cron scheduling system? (Specify the
full name of the file, including path.)
Explanation/Reference:
QUESTION 36
What is the purpose of TCP wrapper?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Which of the following commands configure network interfaces based on the system’s existing distribution-
specific configuration files? (Choose two.)
A. ifconf
B. ifdown
C. ifpause
D. ifstart
E. ifup
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/
maillog and sends all critical events to the remote server logger.example.com?
A. mail.* /var/log/maillog
mail,crit @logger.example.org
B. mail.* /var/log/maillog
mail.crit syslog://logger.example.org
C. mail /var/log/maillog
mail.crit @logger.example.org
D. mail.* /var/log/maillog
mail.crit @logger.example.org
E. mail * /var/log/maillog
mail crit @logger.example.org
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Which of the following statements is true if the UID of a regular user is identical to the GID of a group?
A. UID have precedence over GIDs, therefore the user is available while the group doesn’t.
B. The user as well as the group are not available to avoid ambiguity due to the ID conflict.
C. UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.
D. The user is the only member of the group, even if the group configuration contains other members.
E. GIDs have precedence over UIDs, therefore the group is available while the user isn’t.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
Which if the following tools, used for DNS debugging, reports not only the response from the name sever but
also details about the query?
A. dnsq
B. hostname
C. dig
D. dnslookup
E. zoneinfo
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing?
(Choose three.)
A. 10.0.0.0/8
B. 127.0.0.0/8
C. 169.255.0.0/16
D. 172.16.0.0/12
E. 192.168.0.0/16
Explanation/Reference:
QUESTION 42
Which of the following changes may occur as a consequence of using the command ip? (Choose three.)
Explanation/Reference:
QUESTION 43
FILL BLANK
When using X11 forwarding in SSH, what environment variable is automatically set in the remote shell in order
to help applications to connect to the correct X11 server? (Specify only the environment variable without any
additional commands or values.)
Explanation/Reference:
QUESTION 44
Which of the following commands preloads and manages existing SSH keys that are used for automatic
authentication while logging in to order machines using SSH?
A. sshd
B. ssh-keyring
C. ssh-keygen
D. ssh-pki
E. ssh-agent
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
What's the purpose of the command seq?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Which of the following files assigns a user to its primary group?
A. /etc/pgroup
B. /etc/shadow
C. /etc/passwd
D. /etc/group
E. /etc/gshadow
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
Which configuration file contains the default options for SSH clients?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/ssh_config
D. /etc/ssh/client
E. /etc/ssh/ssh_client
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
Which of the following commands can be used to limit the amount of memory a user may use?
A. umask
B. usermod
C. passwd
D. ulimit
E. chage
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
Which of the following protocols is related to the term open relay?
A. SMTP
B. POP3
C. NTP
D. IMAP
E. LDAP
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
Which file in the filesystem contains the password hashes of all local users on a Linux system with shadow
passwords enabled? (Specify the full name of the file, including path.)
Explanation/Reference:
QUESTION 51
FILL BLANK
The presence of what file will temporarily prevent all users except root from logging into a system? (Specify the
full name of the file, including path.)
Explanation/Reference:
QUESTION 52
Which of the following commands prints the exit value of the most recently executed program in Bash?
A. echo $-1
B. echo $#
C. echo $?
D. echo $return
E. echo $&
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
Which of the following operators does test support? (Choose TWO correct answers.)
A. -or
B. -&
C. -eq
D. -le
E. -is
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
What is the purpose of the xhost program?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
FILL BLANK
Which command included in systemd supports selecting messages from the systemd journal by criteria such
as time or unit name? (Specify only the command without any path or parameters.)
Explanation/Reference:
QUESTION 56
Which of the following technologies are useful aids for a user with a visual impairment? (Choose TWO correct
answers.)
A. Toggle keys
B. Sticky keys
C. Braille Displays
D. On-screen keyboards
E. High contrast desktop themes
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
On a machine running several X servers, how do programs identify the different instances of the X11 server?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 58
FILL BLANK
What command list the aliases defined in the current Bash shell? (Specify only the command without any path
or parameters.)
Explanation/Reference:
QUESTION 59
Which of the following commands defines a function in Bash
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
Which of the following commands reads a string from the standard input and saves it in the $input shell
variable?
A. read $input
B. read @input
C. read input
D. read > $input
E. read &>input
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
Where can user-specific environment variables be set?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
FILL BLANK
What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the
directory.)
Explanation/Reference:
QUESTION 63
Which of the following protocols is used by the Linux tool rdesktop to access a remote windows machine's
graphical interface?
A. RDP
B. WDMCP
C. DirectX
D. SMB2
E. X11
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
What is true about user groups in a Linux system? (Choose TWO correct answers.)
A. Groups can be nested meaning that one group can be a member of another group
B. Each user can only be a member of one group at a time
C. Groups may have a password that allows users to join that group temporarily.
D. Group memberships are optional such that there may be users that do not belong to any group
E. Each user may be a member of several groups. However, only one group is the user's primary group
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65
Which of the following netmasks is valid for IPv4?
A. 255.255.255.224
B. 255.255.0.255
C. 1.2.3.4
D. ff.ff.9b.f0
E. 224.224.224.0
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
What is the purpose of a screen reader?
Explanation/Reference:
QUESTION 67
Which of the following commands display all open network ports on the local system? (Choose TWO correct
answers.)
A. netstat -r
B. netstat -a
C. lsof -i
D. lsof -i4
E. netstat -i
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
Which type of systemd unit runs services in a way similar to inetd?
A. TCP units
B. Timer units
C. Socket units
D. Network units
E. Service units
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
The X11 configuration file xorg. conf is grouped into section. How is the content of the section
SectionName represented?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
Which of the following features are provided by SPICE? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
Which of the following commands makes the environment variable FOO available to child processes started
from the current shell?
A. env $FOO
B. env FOO
C. export $FOO
D. alias FOO
E. export FOO
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
What is the purpose of the source command?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 73
Which of the following statements about sytemd-journald are true? (Choose three.)
A. It is incompatible with syslog and cannot be installed on a system using regular syslog.
B. It only processes messages of systemd and not messages of any other tools.
C. It can pass log messages to syslog for further processing.
D. It maintains metadata such as _UID or _PID for each message.
E. It supports syslog facilities such as kern, user, and auth.
Explanation/Reference:
QUESTION 74
Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to
speed up the initial synchronization?
A. iburst
B. quickstart
C. fast
D. fsync
E. flood
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
Which of the following commands is used to rotate, compress, and mail system logs?
A. logrotate
B. striplog
C. syslogd –-rotate
D. rotatelog
E. logger
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
Why is the correct configuration of a system’s time zone important?
A. Because the timezone is included in checksum calculations and timezone changes invalidate existing
checksums.
B. Because the time zone is saved as part of the modification times of files and cannot be changed after a file
is created.
C. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time
zone.
D. Because NTP chooses servers nearby based on the configured time zone.
E. Because the conversion of Unix timestamps to local time relies on the time zone configuration.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
FILL BLANK
Which command must be run after adding a new email alias to the configuration in order to make this change
effective? (Specify the command without any path but including all required parameters.)
Explanation/Reference:
QUESTION 78
FILL BLANK
Which command, available with all sendmail-compatible MTAs, is used to list the contents of the MTA’s mail
queue? (Specify only the command without any path or parameters.)
Explanation/Reference:
QUESTION 79
Which configuration file sets default options for the OpenSSH server?
A. /etc/ssh/ssh_server
B. /etc/ssh/ssh
C. /etc/ssh/server
D. /etc/ssh/ssh_config
E. /etc/ssh/sshd_config
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
Which NetworkManager command lists the available wifi networks as shown below?
A. nmcli wlan scan
B. nmcli show wireless --available
C. nmcli device wifi list
D. nmcli connection wifi scan
E. nmcli status wifi networks
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
Which of the following systemd components can influence the network configuration? (Choose TWO correct
answers.)
A. systemd-ifconfigd
B. systemd-linkd
C. systemd-networkd
D. systemd-routed
E. systemd-resolved
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 82
Which command configures a network interface according to distribution-specific configuration files such as /
etc/network/interfaces or /etc/sysconfig/network scripts/ifcfg-ethO?
A. ifconfig
B. nictl
C. sysctl
D. ifup
E. netctl
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
Which of the following lines in the sudo configuration allows the user tim to run the updatedb command with
root privileges?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84
After a new email alias has been configured on a Sendmail compatible system, what command should be run
to rebuild the aliases database? (Specify ONLY the command without any path or parameters.)
Explanation/Reference:
QUESTION 85
Which of the following names follow the Predictable Network Interface Names convention? (Choose TWO
correct answers.)
A. enp2s0
B. ensl
C. wlanO
D. networkmanager-fa13181357c9
E. if2@vlan0
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
Which command transfers the public part of a user's SSH key pair to an account on a remote machine and
configures the account to accept logins using that key? (Specify ONLY the command without any path or
parameters.)
Explanation/Reference:
QUESTION 87
Which of the following commands gets the GnuPG public key with the id 63B4835B from the keyserver
example. com?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
What is true about UIDs and GIDs?
A. UIDs and GIDs share a common number space. Each time a new user or group is created, the next free ID
is assigned.
B. There are distinct number spaces for UIDs and GIDs. The same number may be used as both a UID and a
GID
C. The GID of a group is always the sum of the UIDs of its members
D. The number space is split up. UIDs usually reside in the range from Oto 32767 while GIDs reside in the
range from 32768 to 65535.
E. The first four digits of each UID are the GID of the primary group of that user
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 89
What happens if the password of a user in the shadow password database is prepended with the ! character?
A. when logging in, the user automatically gets root privileges in addition to his regular privileges
B. The password is inverted which allows the user to log in with any password other than the current one.
C. The password becomes invalid which disables password based logins, although, other login methods
remain usable
D. Upon the next log in, the user is forced to change his password.
E. The user can continue to use his old password but is unable to change his password.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 90
What command is used to manually set the hardware date and time? (Specify ONLY the command without any
path or parameters.)
Explanation/Reference:
QUESTION 91
In the context of syslog, what is a facility?
A. Facilities are different connection interfaces to syslog. Each facility has its own device in /dev/syslog/.
B. Facilities describe categories or groups of messages such as mail or auth
C. Facilities describe the severity of a log message such as emerg or info.
D. When using remote logging, the hostname of the server that generated a message is called facility.
E. From syslog's point of view, each Unix process that issues messages is a facility.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
Which of the following files holds the configuration for journald when running systemd?
A. /etc/systemd/journalctl.conf
B. /etc/systemd/systemd-journald.conf
C. /etc/systemd/journald.conf
D. /etc/systemd/systemd-journalctl.conf
E. /usr/lib/systemd/journalctl.conf
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 93
Which option of the command ss displays only TCP sockets? (Specify ONLY the option name without any
values or parameters.)
Correct Answer: -s
Section: (none)
Explanation
Explanation/Reference:
QUESTION 94
What command lists the scheduled at jobs? (Specify ONLY the command without any path or parameters.)
Correct Answer: atq
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
Which of the following commands lists the SSH keys which are currently stored in SSH agent?
A. ssh-add -L
B. ssh --keys
C. ssh-keyman ls
D. ssh-agent ls
E. ssh-list
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
A user is specified in the file cron. allow as well as in the file cron. deny. Which of the following statements is
true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
Which of the following statements is valid in the file /etc/resolv.conf ?
A. order hosts,bind
B. domain example.com
C. hosts: files,dns
D. 192.168.168.4 dns-server
E. @192.168.168.4
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
What is true about the -k option for journalctl?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
Which file, when using Sendmail or a compatible MTA system, allows the user bob to redirect all of his mail to
another address?
A. ~bob/.forward
B. /etc/mail/forwarders
C. ~bob/.alias
D. /etc/alias/bob
E. /var/mail/bob
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 100
A printer managed by CUPS is not functioning correctly. Which of the following commands can be used to
check that the printer has been detected by CUPS?
A. lpadmin -L
B. lpinfo -m
C. lpstat -R
D. lpinfo -v
E. lpadmin -m
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 101
What is the lowest numbered unprivileged TCP port?
A. 128
B. 256
C. 512
D. 1024
E. 2048
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 102
Which mechanism is used to discover the link layer address of the device that owns a specific 1Pv4 or 1Pv6
address?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 103
After trying to add the user bob to the group staff using the command usermod -G staff bob it is found that bob
lost all his previous group memberships. How could this have been prevented?
A. By specifying -g instead of -G to add an auxiliary group instead of changing the primary group
B. By using groupmod to turn staff into a non-exclusive group
C. By using groupmod instead of usermod since usermod can not manage group memberships
D. By adding -a to usermod to not overwrite the current group memberships
E. By explicitly enabling multiple group memberships for bob before running usermod
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 104
Where are the individual crontabs for normal users stored?
A. In individual files per user within the directory tree /var/ cache/usertabs /
B. In individual files per user within the directory tree /var/spool/cron/
C. In one common new-line separated plain text file /var/spool/cron/usertabs.
D. In one common new-line separated plain text file /var/spool/cron/crontab.d
E. In individual files per user within the directory /etc/crontabs/.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
Given the following routing table:
default via 172.18.0.1 dev wlan0 proto dhcp metric 20600 172.18.0.0/16 dev wlan0
proto kernel scope link src 172.18.246.175 metric 600
198.51.100.0/24 dev eth0 proto kernel scope link src 198.51.100.1 metric 600
Which of the following target addresses are sent through the default route? (Choose TWO correct answers.)
A. 198.51.100.2
B. 172.17.254.9
C. 198.51.100.1
D. 203.0.113.2
E. 172.18.246.175
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
What is the purpose of the dig command?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
Which of the following resources can be directly limited for a given user using ulimi t? (Choose THREE correct
answers.)
Explanation/Reference:
QUESTION 108
. If the output of traceroute includes the following line: 3 * * * Which of the following statements is correct
about the analyzed connection?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
Which of the following features are offered by xinetd in addition to inetd's features? (Choose TWO correct
answers.)
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
Given the following crontab excerpt: 12 6 1 * * root /usr/local/bin/backup.sh When is this cron job run?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
Which command sets the local machine's timezone to UTC?
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
Which environment variable changes the time zone for the commands run from within the environment
variable's scope? (Specify ONLY the variable name.)
Correct Answer: TZ
Section: (none)
Explanation
Explanation/Reference:
QUESTION 113
What is the purpose of the command tzselect?
A. Ask the user to input specific characters to determine the user's locale settings.
B. Ask the user about his native language to set the user's session language
C. Ask the user which tasks his system should perform and install related packages.
D. Ask the user about his location to determine the user's timezone.
E. Ask the user to press a series of keys to determine the user's keyboard layout.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 114
What is true about the ntpdate command?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 115
Which of the following are features of Internet Protocol version 6 (1Pv6)? (Choose TWO correct answers.)
A. On Ethernet networks, the host section of an IPv6 address always contains the MAC address of the network
card
B. It has a 128 bit address space
C. It has a 64 bit address space.
D. Blocks of zeros can be compressed using the double colon (::) notation.
E. IPv6 does not support subnetting.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference: