You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-1 (101-500) Practice Test 6 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-1 (101-500)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
When we start a process using nice but without informing any value, what nice value is assigned to the process?
Correct
When using the nice command to start a process, by default the value 10 is assigned to it, that is, the priority is reduced. When a process is started without using nice, the assumed NICE value is 0.
Incorrect
When using the nice command to start a process, by default the value 10 is assigned to it, that is, the priority is reduced. When a process is started without using nice, the assumed NICE value is 0.
Unattempted
When using the nice command to start a process, by default the value 10 is assigned to it, that is, the priority is reduced. When a process is started without using nice, the assumed NICE value is 0.
Question 2 of 60
2. Question
The user has in the current directory the report.sh script, considering that this directory is not listed in the PATH environment variable, and that the script has the proper execute permissions, which commands can be used to execute the script? (Select 3)
Correct
Since the directory is not in the PATH, the form “report.sh“ can not be used, the ./report.sh should be used. Another way is to use the script as the command shell/bash shell (or sh, or ksh, etc).
Incorrect
Since the directory is not in the PATH, the form “report.sh“ can not be used, the ./report.sh should be used. Another way is to use the script as the command shell/bash shell (or sh, or ksh, etc).
Unattempted
Since the directory is not in the PATH, the form “report.sh“ can not be used, the ./report.sh should be used. Another way is to use the script as the command shell/bash shell (or sh, or ksh, etc).
Question 3 of 60
3. Question
What is the expected result when executing the command below: echo Online Linux Training | tr -d ‘aeiou‘
Correct
The tr command will receive the string “Online Linux Training“ as input, the -d command will remove the entered characters generating the new output. Remember that everything is case sensitive, thatÂ’s why the “O“ of Online is not removed.
Incorrect
The tr command will receive the string “Online Linux Training“ as input, the -d command will remove the entered characters generating the new output. Remember that everything is case sensitive, thatÂ’s why the “O“ of Online is not removed.
Unattempted
The tr command will receive the string “Online Linux Training“ as input, the -d command will remove the entered characters generating the new output. Remember that everything is case sensitive, thatÂ’s why the “O“ of Online is not removed.
Question 4 of 60
4. Question
What functions can the touch command perform? (Select 2)
Correct
The touch command can be used to create a file without any content and also to change the dates of access and modification of a file.
Incorrect
The touch command can be used to create a file without any content and also to change the dates of access and modification of a file.
Unattempted
The touch command can be used to create a file without any content and also to change the dates of access and modification of a file.
Question 5 of 60
5. Question
The administrator wants to create an image of the /dev/sda1 partition with the name backup.img. Which command should be used?
Correct
The most common use of the dd command is to create an image from a partition, and vice versa, in that way the syntax uses if= to inform the source and of= to inform the destination.
Incorrect
The most common use of the dd command is to create an image from a partition, and vice versa, in that way the syntax uses if= to inform the source and of= to inform the destination.
Unattempted
The most common use of the dd command is to create an image from a partition, and vice versa, in that way the syntax uses if= to inform the source and of= to inform the destination.
Question 6 of 60
6. Question
Which command can be used to only display the files and directories contained in the backup.tgz file?
Correct
In the tar command, the “t“ option displays the contents of the grouped/compressed file, the -f should always be used to indicate the .tar or .tgz file.
Incorrect
In the tar command, the “t“ option displays the contents of the grouped/compressed file, the -f should always be used to indicate the .tar or .tgz file.
Unattempted
In the tar command, the “t“ option displays the contents of the grouped/compressed file, the -f should always be used to indicate the .tar or .tgz file.
Question 7 of 60
7. Question
Which command will remove the class1 directory and all its files and subdirectories?
Correct
The rm command with the -r option removes a directory recursively, that is, removes the directory and everything inside. rmdir is only used to remove empty directories.
Incorrect
The rm command with the -r option removes a directory recursively, that is, removes the directory and everything inside. rmdir is only used to remove empty directories.
Unattempted
The rm command with the -r option removes a directory recursively, that is, removes the directory and everything inside. rmdir is only used to remove empty directories.
Question 8 of 60
8. Question
Which of the following options displays the word “linux“ on the screen? (Select 3)
Correct
In “cat <<< linux“, the text after the <<< header is sent as input to the cat command, so the text is displayed. In “echo linux|cat“, the text output is also sent to the cat command and the text is displayed. In “echo linux 2> file“, only the error output is being redirected to the file file, the standard output is displayed on the screen.
Incorrect
In “cat <<< linux“, the text after the <<< header is sent as input to the cat command, so the text is displayed. In “echo linux|cat“, the text output is also sent to the cat command and the text is displayed. In “echo linux 2> file“, only the error output is being redirected to the file file, the standard output is displayed on the screen.
Unattempted
In “cat <<< linux“, the text after the <<< header is sent as input to the cat command, so the text is displayed. In “echo linux|cat“, the text output is also sent to the cat command and the text is displayed. In “echo linux 2> file“, only the error output is being redirected to the file file, the standard output is displayed on the screen.
Question 9 of 60
9. Question
Which of the following redirects will write the standard output and the error output in the log.out file?
Correct
The >log.out indication redirects the standard output (stout, value descriptor 1) to the log.out file. The indication 2>&1 says that the error output (stderr, value descriptor 2) must be associated with the same location that is associated with the standard output.
Incorrect
The >log.out indication redirects the standard output (stout, value descriptor 1) to the log.out file. The indication 2>&1 says that the error output (stderr, value descriptor 2) must be associated with the same location that is associated with the standard output.
Unattempted
The >log.out indication redirects the standard output (stout, value descriptor 1) to the log.out file. The indication 2>&1 says that the error output (stderr, value descriptor 2) must be associated with the same location that is associated with the standard output.
Question 10 of 60
10. Question
The syadmin wants to compress all files in the /var directory that end with “2015.log“. Which command can be used?
Correct
The ‘find /var -name “* 2015.log“‘ command will return all files in the /var directory ending with 2015.log, these files will be sent one by one as a parameter to the gzip command via xargs. , the xargs command is essential to do the intermediate between the output of the first command, and the delivery of the input to the gzip command, since it only works with one file at a time.
Incorrect
The ‘find /var -name “* 2015.log“‘ command will return all files in the /var directory ending with 2015.log, these files will be sent one by one as a parameter to the gzip command via xargs. , the xargs command is essential to do the intermediate between the output of the first command, and the delivery of the input to the gzip command, since it only works with one file at a time.
Unattempted
The ‘find /var -name “* 2015.log“‘ command will return all files in the /var directory ending with 2015.log, these files will be sent one by one as a parameter to the gzip command via xargs. , the xargs command is essential to do the intermediate between the output of the first command, and the delivery of the input to the gzip command, since it only works with one file at a time.
Question 11 of 60
11. Question
The user wants that when executing the myapp command, the result is displayed on the screen and at the same time written in the log.out file, without overwriting the previous contents of the log.out file. Which command must be used?
Correct
The tee command must be used to display an output on the screen while writing to a file, but by default the tee overwrites the file if it already exists, the -a option causes the tee to append to the file, including output at the end, without deleting the previous content.
Incorrect
The tee command must be used to display an output on the screen while writing to a file, but by default the tee overwrites the file if it already exists, the -a option causes the tee to append to the file, including output at the end, without deleting the previous content.
Unattempted
The tee command must be used to display an output on the screen while writing to a file, but by default the tee overwrites the file if it already exists, the -a option causes the tee to append to the file, including output at the end, without deleting the previous content.
Question 12 of 60
12. Question
What is the numerical code of the SIGHUP signal?
Correct
SIGHUP can cause a process to die, to be restarted, or to reread its configuration files, with 1 being its numeric code. 9 is the code for SIGKILL, 10 for SIGUSR1 and 15 for SIGTERM.
Incorrect
SIGHUP can cause a process to die, to be restarted, or to reread its configuration files, with 1 being its numeric code. 9 is the code for SIGKILL, 10 for SIGUSR1 and 15 for SIGTERM.
Unattempted
SIGHUP can cause a process to die, to be restarted, or to reread its configuration files, with 1 being its numeric code. 9 is the code for SIGKILL, 10 for SIGUSR1 and 15 for SIGTERM.
Question 13 of 60
13. Question
Which symbol should be used after a command to run it in the background mode?
Correct
In the shell, by default every command will be started in foreground mode, to force initialization as background, that is, unlinked from the shell, the & symbol at the end of the command should be used.
Incorrect
In the shell, by default every command will be started in foreground mode, to force initialization as background, that is, unlinked from the shell, the & symbol at the end of the command should be used.
Unattempted
In the shell, by default every command will be started in foreground mode, to force initialization as background, that is, unlinked from the shell, the & symbol at the end of the command should be used.
Question 14 of 60
14. Question
What options should be used next to the ps command to display the processes of all users of the system, linked (or not) to any terminal, including the name of the user who owns each process.
Correct
Option “a“ shows the processes of other users but linked to the current terminal. The “u“ option enables the user format, displaying the user name of each process as well as other details of the process. The “x“ option shows the processes of all terminals, as well as processes that are not associated with any terminal.
Incorrect
Option “a“ shows the processes of other users but linked to the current terminal. The “u“ option enables the user format, displaying the user name of each process as well as other details of the process. The “x“ option shows the processes of all terminals, as well as processes that are not associated with any terminal.
Unattempted
Option “a“ shows the processes of other users but linked to the current terminal. The “u“ option enables the user format, displaying the user name of each process as well as other details of the process. The “x“ option shows the processes of all terminals, as well as processes that are not associated with any terminal.
Question 15 of 60
15. Question
What commands can be used to check the machine‘s average load? (Select 2)
Correct
In general, load average allows you to check how the execution of processes on a system is. This value can be viewed by the uptime and top commands.
Incorrect
In general, load average allows you to check how the execution of processes on a system is. This value can be viewed by the uptime and top commands.
Unattempted
In general, load average allows you to check how the execution of processes on a system is. This value can be viewed by the uptime and top commands.
Question 16 of 60
16. Question
Which command will return the kernel release used by the system?
Correct
The uname command provides various system information, including the kernel-release, by the -r option.
Incorrect
The uname command provides various system information, including the kernel-release, by the -r option.
Unattempted
The uname command provides various system information, including the kernel-release, by the -r option.
Question 17 of 60
17. Question
What programs can be used to change the execution priority of a program that is already running? (Select 2)
Correct
The renice and top commands can be used to change the NICE value of a process that is already running. The nice command is used to set the value when starting a process.
Incorrect
The renice and top commands can be used to change the NICE value of a process that is already running. The nice command is used to set the value when starting a process.
Unattempted
The renice and top commands can be used to change the NICE value of a process that is already running. The nice command is used to set the value when starting a process.
Question 18 of 60
18. Question
Which command shows all records in the /etc/passwd file, except those with the string “/bin/false“?
Correct
In grep/egrep/fgrep, the -v option has the effect of not displaying the string or results of the expression used.
Incorrect
In grep/egrep/fgrep, the -v option has the effect of not displaying the string or results of the expression used.
Unattempted
In grep/egrep/fgrep, the -v option has the effect of not displaying the string or results of the expression used.
Question 19 of 60
19. Question
Considering the test.txt file with the following content: Class1 Class11 Class12 Class111 Class 2 Class 22 Class3 Class4 What is the result of the command: “egrep -c Class1+ test.txt“?
Correct
The -c option in grep/egrep counts the number of rows in which the string/expression is found. The expression “Class1+“ says that the character “1“ must be present in the string and may or may not be followed by other characters. This way you can find :Class1, Class11, Class12 and Class111
Incorrect
The -c option in grep/egrep counts the number of rows in which the string/expression is found. The expression “Class1+“ says that the character “1“ must be present in the string and may or may not be followed by other characters. This way you can find :Class1, Class11, Class12 and Class111
Unattempted
The -c option in grep/egrep counts the number of rows in which the string/expression is found. The expression “Class1+“ says that the character “1“ must be present in the string and may or may not be followed by other characters. This way you can find :Class1, Class11, Class12 and Class111
Question 20 of 60
20. Question
In a system whose default text editor is nano, a specific user wants the editor to be the vim in their shell sessions. Which environment variable can be configured for this purpose?
Correct
The EDITOR environment variable can be used to define the default text editor in the shell.
Incorrect
The EDITOR environment variable can be used to define the default text editor in the shell.
Unattempted
The EDITOR environment variable can be used to define the default text editor in the shell.
Question 21 of 60
21. Question
In VI, after making changes to the file, which command should be used to leave editing the file without saving the changes made?
Correct
The option :q requests that the vi exit editing, but if the file has been changed you must use :q! to force the output of vi without saving the changes made. The commands :wq and ZZ are used to save and exit.
Incorrect
The option :q requests that the vi exit editing, but if the file has been changed you must use :q! to force the output of vi without saving the changes made. The commands :wq and ZZ are used to save and exit.
Unattempted
The option :q requests that the vi exit editing, but if the file has been changed you must use :q! to force the output of vi without saving the changes made. The commands :wq and ZZ are used to save and exit.
Question 22 of 60
22. Question
In VI, which keys can be used to enter text edit mode? (Select 3)
Correct
The “a“ option enters edit mode one character after the current cursor position. The “i“ option enters edit mode exactly at the current cursor position. The “o“ option enters edit mode on the line below the current cursor position.
Incorrect
The “a“ option enters edit mode one character after the current cursor position. The “i“ option enters edit mode exactly at the current cursor position. The “o“ option enters edit mode on the line below the current cursor position.
Unattempted
The “a“ option enters edit mode one character after the current cursor position. The “i“ option enters edit mode exactly at the current cursor position. The “o“ option enters edit mode on the line below the current cursor position.
Question 23 of 60
23. Question
Which command can be used to show, in some way, all system partitions? (Select 3)
Correct
Both fdisk and parted have the -l option to display the system partitions. The information is also always present in the /proc/partitions file. “Mount -a“ will mount all partitions defined as auto in /etc/fstab, but without any option it also displays mounted partitions.
Incorrect
Both fdisk and parted have the -l option to display the system partitions. The information is also always present in the /proc/partitions file. “Mount -a“ will mount all partitions defined as auto in /etc/fstab, but without any option it also displays mounted partitions.
Unattempted
Both fdisk and parted have the -l option to display the system partitions. The information is also always present in the /proc/partitions file. “Mount -a“ will mount all partitions defined as auto in /etc/fstab, but without any option it also displays mounted partitions.
Question 24 of 60
24. Question
What is the main difference between the ext2 and ext3 filesystem?
Correct
The journaling feature was implemented in the ext3 filesystem, the only difference being with ext2.
Incorrect
The journaling feature was implemented in the ext3 filesystem, the only difference being with ext2.
Unattempted
The journaling feature was implemented in the ext3 filesystem, the only difference being with ext2.
Question 25 of 60
25. Question
The sysadmin has identified that the /var directory partition is 100% utilized. What command can it use to identify what is the /var directory with the highest data volume?
Correct
The du command can be used to recursively check the disk space usage of files and directories. Df is used to show the use of system partitions.
Incorrect
The du command can be used to recursively check the disk space usage of files and directories. Df is used to show the use of system partitions.
Unattempted
The du command can be used to recursively check the disk space usage of files and directories. Df is used to show the use of system partitions.
Question 26 of 60
26. Question
What command can be used to convert an ext2 file system to ext3?
Correct
The difference from ext3 to ext2 is the journaling feature, so the tune2fs command, with the -j option, to turn a device into ext3.
Incorrect
The difference from ext3 to ext2 is the journaling feature, so the tune2fs command, with the -j option, to turn a device into ext3.
Unattempted
The difference from ext3 to ext2 is the journaling feature, so the tune2fs command, with the -j option, to turn a device into ext3.
Question 27 of 60
27. Question
What is the result of running the “mount -a“ command?
Correct
The -a option of the mount command will mount all partitions listed in /etc/fstab, except entries containing the “noauto“ option. Without any option, mount only displays the currently mounted partitions.
Incorrect
The -a option of the mount command will mount all partitions listed in /etc/fstab, except entries containing the “noauto“ option. Without any option, mount only displays the currently mounted partitions.
Unattempted
The -a option of the mount command will mount all partitions listed in /etc/fstab, except entries containing the “noauto“ option. Without any option, mount only displays the currently mounted partitions.
Question 28 of 60
28. Question
Which of the entries in the /etc/fstab file below is incorrect?
Correct
The first line information of /etc/fstab should be the device name (device, UUID or Label), the second should be the directory to be mounted. In the case of a swap partition, the second field can be described as “none“.
Incorrect
The first line information of /etc/fstab should be the device name (device, UUID or Label), the second should be the directory to be mounted. In the case of a swap partition, the second field can be described as “none“.
Unattempted
The first line information of /etc/fstab should be the device name (device, UUID or Label), the second should be the directory to be mounted. In the case of a swap partition, the second field can be described as “none“.
Question 29 of 60
29. Question
The administrator wants to analyze and automatically repair the data from the ext3 /dev/sdb1 partition, which is currently mounted on your server. What is the first command that should be executed?
Correct
The partition must be unmounted so that the fsck command is used and the partition is checked. For this the first command to be executed must be the umount.
Incorrect
The partition must be unmounted so that the fsck command is used and the partition is checked. For this the first command to be executed must be the umount.
Unattempted
The partition must be unmounted so that the fsck command is used and the partition is checked. For this the first command to be executed must be the umount.
Question 30 of 60
30. Question
Given the current value of umask as 022, what is the permission of every new directory created?
Correct
Permissions are set by subtracting the umask value from value 666 for files and 777 for directories. Thus, the value 022, which can also appear as 0022, will be 777 – 022 = 755 (rwxr-xr-x)).
Incorrect
Permissions are set by subtracting the umask value from value 666 for files and 777 for directories. Thus, the value 022, which can also appear as 0022, will be 777 – 022 = 755 (rwxr-xr-x)).
Unattempted
Permissions are set by subtracting the umask value from value 666 for files and 777 for directories. Thus, the value 022, which can also appear as 0022, will be 777 – 022 = 755 (rwxr-xr-x)).
Question 31 of 60
31. Question
Which of the following runlevels can never be used as the default runlevel of a system? (Select 2)
Correct
Runlevel 0 is related to system shutdown and runlevel 6 to system reboot, so using 0 or 6 would make it impossible to boot the system.
Incorrect
Runlevel 0 is related to system shutdown and runlevel 6 to system reboot, so using 0 or 6 would make it impossible to boot the system.
Unattempted
Runlevel 0 is related to system shutdown and runlevel 6 to system reboot, so using 0 or 6 would make it impossible to boot the system.
Question 32 of 60
32. Question
What can you say by looking at a file with the lrwxrwxrwx permission?
Correct
Whenever a file has the letter “l“ at the beginning of its permissions, followed by 777 permissions, it is an indicator of being a symbolic link. You will also be able to see the following: link-name -> file/directory-destination
Incorrect
Whenever a file has the letter “l“ at the beginning of its permissions, followed by 777 permissions, it is an indicator of being a symbolic link. You will also be able to see the following: link-name -> file/directory-destination
Unattempted
Whenever a file has the letter “l“ at the beginning of its permissions, followed by 777 permissions, it is an indicator of being a symbolic link. You will also be able to see the following: link-name -> file/directory-destination
Question 33 of 60
33. Question
Which command searches for files only in the directories included in the PATH environment variable?
Correct
Which searches for files only in the directories included in the PATH. Whereis finds the binary files, libraries, source codes and manuals. Locate uses an internal database that contains the location of all system files.
Incorrect
Which searches for files only in the directories included in the PATH. Whereis finds the binary files, libraries, source codes and manuals. Locate uses an internal database that contains the location of all system files.
Unattempted
Which searches for files only in the directories included in the PATH. Whereis finds the binary files, libraries, source codes and manuals. Locate uses an internal database that contains the location of all system files.
Question 34 of 60
34. Question
From the elements below, which one is essential to enable the implementation of virtual machines in a particular infrastructure?
Correct
The hypervisor is a required layer between the Infrastructure (aka Host) and the Virtual Machine itself, or Guest. The hypervisor controls and manages the access of virtual machines to the hardware elements of the infrastructure.
Incorrect
The hypervisor is a required layer between the Infrastructure (aka Host) and the Virtual Machine itself, or Guest. The hypervisor controls and manages the access of virtual machines to the hardware elements of the infrastructure.
Unattempted
The hypervisor is a required layer between the Infrastructure (aka Host) and the Virtual Machine itself, or Guest. The hypervisor controls and manages the access of virtual machines to the hardware elements of the infrastructure.
Question 35 of 60
35. Question
What options can be used for file compression with different algorithms? (Select 3)
Correct
The gzip, bzip2 and xz commands are used for compression, just as the gunzip, bunzip2, and unxz commands are used for unpacking, respectively.
Incorrect
The gzip, bzip2 and xz commands are used for compression, just as the gunzip, bunzip2, and unxz commands are used for unpacking, respectively.
Unattempted
The gzip, bzip2 and xz commands are used for compression, just as the gunzip, bunzip2, and unxz commands are used for unpacking, respectively.
Question 36 of 60
36. Question
From the regular expressions below, which one can be used to find in a text, phone numbers in the format 999-999-9999?
Correct
The characters [] define a list, and [0-9] indicates that all numeric characters are accepted. The keys {} indicate a quantifier, that is, how many occurrences of the previous character is expected. Remember that because it is an extended regular expression, the expression will only work with the use of the egrep or grep -E command.
Incorrect
The characters [] define a list, and [0-9] indicates that all numeric characters are accepted. The keys {} indicate a quantifier, that is, how many occurrences of the previous character is expected. Remember that because it is an extended regular expression, the expression will only work with the use of the egrep or grep -E command.
Unattempted
The characters [] define a list, and [0-9] indicates that all numeric characters are accepted. The keys {} indicate a quantifier, that is, how many occurrences of the previous character is expected. Remember that because it is an extended regular expression, the expression will only work with the use of the egrep or grep -E command.
Question 37 of 60
37. Question
Among the options below, what are alternatives to the “vi“ text editor? (Select 3)
Correct
Vim is an improvement on vi, in practice currently in most distributions the vi command is a link to vim. Other options are nano and emacs.
Incorrect
Vim is an improvement on vi, in practice currently in most distributions the vi command is a link to vim. Other options are nano and emacs.
Unattempted
Vim is an improvement on vi, in practice currently in most distributions the vi command is a link to vim. Other options are nano and emacs.
Question 38 of 60
38. Question
The sysadmin wants to use on the /home partition a file system that natively allows the use of subvolumes and snapshots. Which of the following is a valid option?
Correct
Btrfs natively supports features like subvolumes, snapshots, multi-devices/RAID and transparent data compression.
Incorrect
Btrfs natively supports features like subvolumes, snapshots, multi-devices/RAID and transparent data compression.
Unattempted
Btrfs natively supports features like subvolumes, snapshots, multi-devices/RAID and transparent data compression.
Question 39 of 60
39. Question
What commands can be used to create GPT partitions? (Select 3)
Correct
fdisk and parted can create GPT and MBR partitions. gdisk is specific to the GPT type.
Incorrect
fdisk and parted can create GPT and MBR partitions. gdisk is specific to the GPT type.
Unattempted
fdisk and parted can create GPT and MBR partitions. gdisk is specific to the GPT type.
Question 40 of 60
40. Question
What is the standard used for identifying SATA storage devices?
Correct
SATA storage devices follow the same standard as SCSI disks, that is, /dev/sdX. ATA/IDE disks use the /dev/hdX standard.
Incorrect
SATA storage devices follow the same standard as SCSI disks, that is, /dev/sdX. ATA/IDE disks use the /dev/hdX standard.
Unattempted
SATA storage devices follow the same standard as SCSI disks, that is, /dev/sdX. ATA/IDE disks use the /dev/hdX standard.
Question 41 of 60
41. Question
Which command will show the current associations of IRQs?
Correct
IRQ stands for Interrut Request Line, or Interrupt Request. This information is recorded in the /proc/interrupts dynamic file.
Incorrect
IRQ stands for Interrut Request Line, or Interrupt Request. This information is recorded in the /proc/interrupts dynamic file.
Unattempted
IRQ stands for Interrut Request Line, or Interrupt Request. This information is recorded in the /proc/interrupts dynamic file.
Question 42 of 60
42. Question
When the SysV is in use, what is the first process to be started in the system and therefore always has the PID equal to 1?
Correct
After the boot process, the kernel invokes the /sbin/init process as the first system process, and it starts the other processes, so all other processes are children of the init process.
Incorrect
After the boot process, the kernel invokes the /sbin/init process as the first system process, and it starts the other processes, so all other processes are children of the init process.
Unattempted
After the boot process, the kernel invokes the /sbin/init process as the first system process, and it starts the other processes, so all other processes are children of the init process.
Question 43 of 60
43. Question
What is the name of the process performed by the BIOS that is responsible for performing a test on the hardware devices connected to the motherboard?
Correct
POST (Power-On Self-Test) is a BIOS procedure that checks if all devices are ready for use. The MBR (Master Boot Record) is the disk area that contains the information that will be used during the boot processs, GRUB is a boot manager and UEFI is a new firwmware being used in BIOS‘s place in modern systems.
Incorrect
POST (Power-On Self-Test) is a BIOS procedure that checks if all devices are ready for use. The MBR (Master Boot Record) is the disk area that contains the information that will be used during the boot processs, GRUB is a boot manager and UEFI is a new firwmware being used in BIOS‘s place in modern systems.
Unattempted
POST (Power-On Self-Test) is a BIOS procedure that checks if all devices are ready for use. The MBR (Master Boot Record) is the disk area that contains the information that will be used during the boot processs, GRUB is a boot manager and UEFI is a new firwmware being used in BIOS‘s place in modern systems.
Question 44 of 60
44. Question
Which kernel boot parameter can be used to bypass most of the messages generated during the boot process?
Correct
The kernel supports a series of parameters that can be used at startup, such as quiet enable silent mode, not displaying startup and error messages. Other options are mem (maximum amount of RAM), ro (read only), splash (splash screen), among others.
Incorrect
The kernel supports a series of parameters that can be used at startup, such as quiet enable silent mode, not displaying startup and error messages. Other options are mem (maximum amount of RAM), ro (read only), splash (splash screen), among others.
Unattempted
The kernel supports a series of parameters that can be used at startup, such as quiet enable silent mode, not displaying startup and error messages. Other options are mem (maximum amount of RAM), ro (read only), splash (splash screen), among others.
Question 45 of 60
45. Question
On a system that uses systemd, which command will put the system into maintenance mode (single-user)?
Correct
In systemctl, the isolate option is used to switch between execute modes, or target (runlevels in SysV). For recovery mode (or single mode) the targets rescue.target or runlevel1.target are used.
Incorrect
In systemctl, the isolate option is used to switch between execute modes, or target (runlevels in SysV). For recovery mode (or single mode) the targets rescue.target or runlevel1.target are used.
Unattempted
In systemctl, the isolate option is used to switch between execute modes, or target (runlevels in SysV). For recovery mode (or single mode) the targets rescue.target or runlevel1.target are used.
Question 46 of 60
46. Question
What is the function of the following command? ln file1 file2
Correct
If you use the ln command without any option, a hard link will be created. The most commonly used syntax is: ln
Incorrect
If you use the ln command without any option, a hard link will be created. The most commonly used syntax is: ln
Unattempted
If you use the ln command without any option, a hard link will be created. The most commonly used syntax is: ln
Question 47 of 60
47. Question
On a system that uses SysV, in which configuration file should the default runlevel be set to be used after booting?
Correct
The /etc/inittab file shows the init process which is the default runlevel, by the parameter “initdefault“, and with that, which services should be started by the system.
Incorrect
The /etc/inittab file shows the init process which is the default runlevel, by the parameter “initdefault“, and with that, which services should be started by the system.
Unattempted
The /etc/inittab file shows the init process which is the default runlevel, by the parameter “initdefault“, and with that, which services should be started by the system.
Question 48 of 60
48. Question
How many primary partitions does a system using the MBR partitioning system have?
Correct
In MBR partitioning, there is a limit of 4 primary partitions or 3 primary partitions and 1 extended partitions in which the logical partitions will be associated.
Incorrect
In MBR partitioning, there is a limit of 4 primary partitions or 3 primary partitions and 1 extended partitions in which the logical partitions will be associated.
Unattempted
In MBR partitioning, there is a limit of 4 primary partitions or 3 primary partitions and 1 extended partitions in which the logical partitions will be associated.
Question 49 of 60
49. Question
Which of the following elements are used in the sizing definitions made through LVM? (Select 3)
Correct
The LVM (Logical Volume Manager) has 5 main elements: VG (Volume Group), PV (Physical Volume), LV (Logical Volume), PE (Physical Extent) and LE (Logical Extent).
Incorrect
The LVM (Logical Volume Manager) has 5 main elements: VG (Volume Group), PV (Physical Volume), LV (Logical Volume), PE (Physical Extent) and LE (Logical Extent).
Unattempted
The LVM (Logical Volume Manager) has 5 main elements: VG (Volume Group), PV (Physical Volume), LV (Logical Volume), PE (Physical Extent) and LE (Logical Extent).
Question 50 of 60
50. Question
By analyzing the /boot/grub/menu.lst file, you checked for “hd0,3“ in the “root“ parameter. Which of the following partitions is indicated?
Correct
As the question mentions the file menu.lst, we are talking about the Legacy GRUB and in that standard hd0,3 indicates the fourth partition (since the count starts from 0) of the first disk. If it were GRUB2, hd0,3 would be the third partition of the first disk, ie / dev / hda3.
Incorrect
As the question mentions the file menu.lst, we are talking about the Legacy GRUB and in that standard hd0,3 indicates the fourth partition (since the count starts from 0) of the first disk. If it were GRUB2, hd0,3 would be the third partition of the first disk, ie / dev / hda3.
Unattempted
As the question mentions the file menu.lst, we are talking about the Legacy GRUB and in that standard hd0,3 indicates the fourth partition (since the count starts from 0) of the first disk. If it were GRUB2, hd0,3 would be the third partition of the first disk, ie / dev / hda3.
Question 51 of 60
51. Question
In GRUB 2 configuration, which parameter indicates what is the system started by default?
Correct
GRUB_DEFAULT = X indicates which system should be started by default. GRUB_TIMEOUT indicates the timeout before booting the kernel. The “default“ option indicates the default system in the GRUB Legacy and “root“ indicates the partition to be used.
Incorrect
GRUB_DEFAULT = X indicates which system should be started by default. GRUB_TIMEOUT indicates the timeout before booting the kernel. The “default“ option indicates the default system in the GRUB Legacy and “root“ indicates the partition to be used.
Unattempted
GRUB_DEFAULT = X indicates which system should be started by default. GRUB_TIMEOUT indicates the timeout before booting the kernel. The “default“ option indicates the default system in the GRUB Legacy and “root“ indicates the partition to be used.
Question 52 of 60
52. Question
Which system file is upgraded after running the ldconfig command?
Correct
The ldconfig command updates the /etc/ld.so.cache file information according to what is configured in the /etc/ld.so.conf file and the files in the /etc/ld.so.conf.d/ directory
Incorrect
The ldconfig command updates the /etc/ld.so.cache file information according to what is configured in the /etc/ld.so.conf file and the files in the /etc/ld.so.conf.d/ directory
Unattempted
The ldconfig command updates the /etc/ld.so.cache file information according to what is configured in the /etc/ld.so.conf file and the files in the /etc/ld.so.conf.d/ directory
Question 53 of 60
53. Question
Which command will display all the dependencies of the already installed vim package?
Correct
Among the options presented, apt-cache depends shows the dependencies of a package, “apt“ has the same option. The command “dpkg -s vim“ would also return this information.
Incorrect
Among the options presented, apt-cache depends shows the dependencies of a package, “apt“ has the same option. The command “dpkg -s vim“ would also return this information.
Unattempted
Among the options presented, apt-cache depends shows the dependencies of a package, “apt“ has the same option. The command “dpkg -s vim“ would also return this information.
Question 54 of 60
54. Question
What is the command used to update the repositories data in a distribution that uses a Debian package management standard?
Correct
Apt-get update updates the package information contained in the configured repositories, but does not update the packages. The apt-get upgrade and dis-upgrade options are the ones used to perform the actual updates.
Incorrect
Apt-get update updates the package information contained in the configured repositories, but does not update the packages. The apt-get upgrade and dis-upgrade options are the ones used to perform the actual updates.
Unattempted
Apt-get update updates the package information contained in the configured repositories, but does not update the packages. The apt-get upgrade and dis-upgrade options are the ones used to perform the actual updates.
Question 55 of 60
55. Question
Which command should be used by the system administrator to install the new-software.deb package name?
Correct
The dpkg command is used to install/update/remove packages directly, the -i option does the installation procedure. The apt-get and aptitude commands use the repositories as the source of the packages.
Incorrect
The dpkg command is used to install/update/remove packages directly, the -i option does the installation procedure. The apt-get and aptitude commands use the repositories as the source of the packages.
Unattempted
The dpkg command is used to install/update/remove packages directly, the -i option does the installation procedure. The apt-get and aptitude commands use the repositories as the source of the packages.
Question 56 of 60
56. Question
The administrator of a Red Hat system wants to check which package was responsible for installing the /etc/virc file. Which command should be used?
Correct
In the rpm command you must first enter the operating mode parameter, in this case the mode is the query, represented by -q, after that the option “f“ receives a file as parameter and rpm identifies the package related to it.
Incorrect
In the rpm command you must first enter the operating mode parameter, in this case the mode is the query, represented by -q, after that the option “f“ receives a file as parameter and rpm identifies the package related to it.
Unattempted
In the rpm command you must first enter the operating mode parameter, in this case the mode is the query, represented by -q, after that the option “f“ receives a file as parameter and rpm identifies the package related to it.
Question 57 of 60
57. Question
Which command and option should be used to check the integrity of a .rpm package, including timestamps, MD5 checksums, and file sizes?
Correct
The -V or -verify option of rpm checks the integrity of a package.
Incorrect
The -V or -verify option of rpm checks the integrity of a package.
Unattempted
The -V or -verify option of rpm checks the integrity of a package.
Question 58 of 60
58. Question
In system using a Red Hat package management standard, in what file or directory are the data about the repositories used by the package manager?
Correct
The repositories are indicated in the files in the /etc/yum.repos.d/ directory. /etc/yum.conf refers to general YUM settings.
Incorrect
The repositories are indicated in the files in the /etc/yum.repos.d/ directory. /etc/yum.conf refers to general YUM settings.
Unattempted
The repositories are indicated in the files in the /etc/yum.repos.d/ directory. /etc/yum.conf refers to general YUM settings.
Question 59 of 60
59. Question
The user has declared the “SYSTEM“ variable in his shell session and wants all processes started from this shell to be able to view the contents of this variable. Which command should be used?
Correct
The export command causes a variable to become global, so that all child processes can work with the contents of this variable.
Incorrect
The export command causes a variable to become global, so that all child processes can work with the contents of this variable.
Unattempted
The export command causes a variable to become global, so that all child processes can work with the contents of this variable.
Question 60 of 60
60. Question
Which file in a user‘s directory stores the history of typed commands?
Correct
By default Linux, the .bash_history file in the user‘s $ HOME will contain the command execution history, being updated at the end of each user session.
Incorrect
By default Linux, the .bash_history file in the user‘s $ HOME will contain the command execution history, being updated at the end of each user session.
Unattempted
By default Linux, the .bash_history file in the user‘s $ HOME will contain the command execution history, being updated at the end of each user session.
X
Use Page numbers below to navigate to other practice tests