Linux LPIC-1 (102-500) Total Questions: 329 – 6 Mock Exams
Practice Set 1
Time limit: 0
0 of 60 questions completed
Questions:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Information
Click on Start Test
You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-1 (102-500) Practice Test 1 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-1 (102-500)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Which of the following commands causes SSH to open a local port number 888 that will be redirected to IP 192.168.10.10 on port 80?
Correct
SSH allows the creation of tunnels through which data of any type of service will be sent. The syntax for opening a tunnel is: ssh -L Port_Local: Destination_Direction: Destination_port
Incorrect
SSH allows the creation of tunnels through which data of any type of service will be sent. The syntax for opening a tunnel is: ssh -L Port_Local: Destination_Direction: Destination_port
Unattempted
SSH allows the creation of tunnels through which data of any type of service will be sent. The syntax for opening a tunnel is: ssh -L Port_Local: Destination_Direction: Destination_port
Question 2 of 60
2. Question
Which file can be queried by a user to identify errors that are occurring in a graphical environment that uses the X11 server?
Correct
The .xsession-errors file is where the X Window system logs all errors that occur in the Linux graphical environment. Logs are logged in each user‘s $ HOME, so ~/.xsession-errors.
Incorrect
The .xsession-errors file is where the X Window system logs all errors that occur in the Linux graphical environment. Logs are logged in each user‘s $ HOME, so ~/.xsession-errors.
Unattempted
The .xsession-errors file is where the X Window system logs all errors that occur in the Linux graphical environment. Logs are logged in each user‘s $ HOME, so ~/.xsession-errors.
Question 3 of 60
3. Question
What is the native X server remote access protocol?
Correct
The X Display Manager Control Protocol (XDMCP), which is implemented by the display manager. The protocol is simple, with no compression or encryption capabilities.
Incorrect
The X Display Manager Control Protocol (XDMCP), which is implemented by the display manager. The protocol is simple, with no compression or encryption capabilities.
Unattempted
The X Display Manager Control Protocol (XDMCP), which is implemented by the display manager. The protocol is simple, with no compression or encryption capabilities.
Question 4 of 60
4. Question
In which configuration file is defined the shell that will be used by each user after login?
Correct
The default shell is indicated in the last field of each record in the /etc/passwd file. In general, /bin/bash is used, in addition to other shells, another option is to use / bin / false to prevent a user from logging into the system.
Incorrect
The default shell is indicated in the last field of each record in the /etc/passwd file. In general, /bin/bash is used, in addition to other shells, another option is to use / bin / false to prevent a user from logging into the system.
Unattempted
The default shell is indicated in the last field of each record in the /etc/passwd file. In general, /bin/bash is used, in addition to other shells, another option is to use / bin / false to prevent a user from logging into the system.
Question 5 of 60
5. Question
From the options below, what are open source solutions for speech recognition? (Select 3)
Correct
CMUSphinx, Simon (from the KDE project) and Julius are some of the many open source speech recognition solutions that are in development.
Incorrect
CMUSphinx, Simon (from the KDE project) and Julius are some of the many open source speech recognition solutions that are in development.
Unattempted
CMUSphinx, Simon (from the KDE project) and Julius are some of the many open source speech recognition solutions that are in development.
Question 6 of 60
6. Question
What locale variable is used to define a formatting of date and time?
Correct
A series of environment variables initiated by LC_ define the location settings for various data types, including LC_TIME for date and time, LC_MESSAGES for system informational messages, LC_MONETARY for currency units, and so on.
Incorrect
A series of environment variables initiated by LC_ define the location settings for various data types, including LC_TIME for date and time, LC_MESSAGES for system informational messages, LC_MONETARY for currency units, and so on.
Unattempted
A series of environment variables initiated by LC_ define the location settings for various data types, including LC_TIME for date and time, LC_MESSAGES for system informational messages, LC_MONETARY for currency units, and so on.
Question 7 of 60
7. Question
What is the behavior of the system if a user is listed in /etc/cron.allow and /etc/cron.deny?
Correct
The /etc/cron.allow file is the first one to read, if a user is listed in cron.allow its usage is freed, regardless of whether it is also listed in cron.deny. The empty cron.allow file indicates that no user can use the service. The empty cron.deny file indicates that all users can use the service. If both files are blank, no user can use the feature. If neither file exists, all users can schedule tasks with cron.
Incorrect
The /etc/cron.allow file is the first one to read, if a user is listed in cron.allow its usage is freed, regardless of whether it is also listed in cron.deny. The empty cron.allow file indicates that no user can use the service. The empty cron.deny file indicates that all users can use the service. If both files are blank, no user can use the feature. If neither file exists, all users can schedule tasks with cron.
Unattempted
The /etc/cron.allow file is the first one to read, if a user is listed in cron.allow its usage is freed, regardless of whether it is also listed in cron.deny. The empty cron.allow file indicates that no user can use the service. The empty cron.deny file indicates that all users can use the service. If both files are blank, no user can use the feature. If neither file exists, all users can schedule tasks with cron.
Question 8 of 60
8. Question
What command can be used by the administrator of a Linux system to remove all cron entries from user support1?
Correct
The root user must use the crontab command together with the -u option to enter the user name and the -r option to remove.
Incorrect
The root user must use the crontab command together with the -u option to enter the user name and the -r option to remove.
Unattempted
The root user must use the crontab command together with the -u option to enter the user name and the -r option to remove.
Question 9 of 60
9. Question
By default, in what directory are the cron appointments made by all system users stored?
Correct
In the /var/spool/cron directory there will be a text file with the name of each user containing the schedules. In the case of Debian-based systems, the directory will be more specifically /var/spool/cron /crontab/
Incorrect
In the /var/spool/cron directory there will be a text file with the name of each user containing the schedules. In the case of Debian-based systems, the directory will be more specifically /var/spool/cron /crontab/
Unattempted
In the /var/spool/cron directory there will be a text file with the name of each user containing the schedules. In the case of Debian-based systems, the directory will be more specifically /var/spool/cron /crontab/
Question 10 of 60
10. Question
What commands can be used to schedule the execution of a series of commands at 4:00 p.m.? (Select 2)
Correct
The at command allows a time to be reported as 1600 or 16:00. The at also allows the use of words like now, noon, midnight and teatime (4p.m.).
Incorrect
The at command allows a time to be reported as 1600 or 16:00. The at also allows the use of words like now, noon, midnight and teatime (4p.m.).
Unattempted
The at command allows a time to be reported as 1600 or 16:00. The at also allows the use of words like now, noon, midnight and teatime (4p.m.).
Question 11 of 60
11. Question
On group administration in Linux, it is true to state that: (Select 3)
Correct
The groupmod command can change both the GID and the name of an existing group. On Linux, every user must be associated with at least one group.
Incorrect
The groupmod command can change both the GID and the name of an existing group. On Linux, every user must be associated with at least one group.
Unattempted
The groupmod command can change both the GID and the name of an existing group. On Linux, every user must be associated with at least one group.
Question 12 of 60
12. Question
Which command will remove a user and at the same time remove the default directory of this user, usually present in /home/?
Correct
By default the userdel does not remove the user‘s default directory, in order to do so the -r option must be used.
Incorrect
By default the userdel does not remove the user‘s default directory, in order to do so the -r option must be used.
Unattempted
By default the userdel does not remove the user‘s default directory, in order to do so the -r option must be used.
Question 13 of 60
13. Question
Which command shows the date of the last password change of the user “system“?
Correct
The -l option of the chage command displays various information about the user‘s login properties, extracted from the /etc/shadow file. The command “passwd -S“ also returns the information.
Incorrect
The -l option of the chage command displays various information about the user‘s login properties, extracted from the /etc/shadow file. The command “passwd -S“ also returns the information.
Unattempted
The -l option of the chage command displays various information about the user‘s login properties, extracted from the /etc/shadow file. The command “passwd -S“ also returns the information.
Question 14 of 60
14. Question
The contents of which directory will be copied to the default directory of every new user created using the useradd command and the -m option?
Correct
All files and sub-directories present in the /etc/skell/ directory will be copied to the new user‘s home directory.
Incorrect
All files and sub-directories present in the /etc/skell/ directory will be copied to the new user‘s home directory.
Unattempted
All files and sub-directories present in the /etc/skell/ directory will be copied to the new user‘s home directory.
Question 15 of 60
15. Question
Which process has the function of storing GPG private keys in memory, so that the GPG utilities consult this information in this process, thus avoiding the need for the user to inform them in every request?
Correct
The gpg-agent is started automatically by the gpg processes, the first execution access to the private keys is requested, but after that the information is kept in memory.
Incorrect
The gpg-agent is started automatically by the gpg processes, the first execution access to the private keys is requested, but after that the information is kept in memory.
Unattempted
The gpg-agent is started automatically by the gpg processes, the first execution access to the private keys is requested, but after that the information is kept in memory.
Question 16 of 60
16. Question
From the options below, what are the components of a Desktop Environment? (Select 3)
Correct
The Desktop Environment groups a set of applications, including the window manager, the display manager, and the graphical interface or GUI.
Incorrect
The Desktop Environment groups a set of applications, including the window manager, the display manager, and the graphical interface or GUI.
Unattempted
The Desktop Environment groups a set of applications, including the window manager, the display manager, and the graphical interface or GUI.
Question 17 of 60
17. Question
On the public and private key model used in an SSH connection, we can state that: (Select 3 answers)
Correct
The basis of SSH communication via public and private key is to understand that the public key is shared with another user who will use it to encrypt the data before sending it. The private key must never be shared and it will be used to decrypt the data that was encrypted with the equivalent public key.
Incorrect
The basis of SSH communication via public and private key is to understand that the public key is shared with another user who will use it to encrypt the data before sending it. The private key must never be shared and it will be used to decrypt the data that was encrypted with the equivalent public key.
Unattempted
The basis of SSH communication via public and private key is to understand that the public key is shared with another user who will use it to encrypt the data before sending it. The private key must never be shared and it will be used to decrypt the data that was encrypted with the equivalent public key.
Question 18 of 60
18. Question
In what file should the configuration be made to prevent the root user from performing a direct login via SSH?
Correct
The above configuration must be performed on the SSH Server, ie on sshd, so it must be done in the /etc/ssh/sshd_config file. SSH client-related settings must be made in the /etc/ssh/ssh_config file.
Incorrect
The above configuration must be performed on the SSH Server, ie on sshd, so it must be done in the /etc/ssh/sshd_config file. SSH client-related settings must be made in the /etc/ssh/ssh_config file.
Unattempted
The above configuration must be performed on the SSH Server, ie on sshd, so it must be done in the /etc/ssh/sshd_config file. SSH client-related settings must be made in the /etc/ssh/ssh_config file.
Question 19 of 60
19. Question
A maintenance is being performed on the Linux server and the administrator wants to block the login of all users by displaying a “System in Maintenance“ message when the user attempts to log in. How can this be done?
Correct
When the /etc/nologin file exists, no user, except for root, can log in to the system, when the attempt is made the message written to the file is returned to the user.
Incorrect
When the /etc/nologin file exists, no user, except for root, can log in to the system, when the attempt is made the message written to the file is returned to the user.
Unattempted
When the /etc/nologin file exists, no user, except for root, can log in to the system, when the attempt is made the message written to the file is returned to the user.
Question 20 of 60
20. Question
In the configuration file of a Unit of type Socket in systemd, what option is used to define in which IP and Port the Socket will listen?
Correct
The ListenStream option specifies an address to listen to a stream of data, usually a port, but the IP can also be specified.
Incorrect
The ListenStream option specifies an address to listen to a stream of data, usually a port, but the IP can also be specified.
Unattempted
The ListenStream option specifies an address to listen to a stream of data, usually a port, but the IP can also be specified.
Question 21 of 60
21. Question
Which of the following files, by default, can not be read by any system users except the root user?
Correct
Because the /etc/shadow file has user password information, read access is restricted to the root user only.
Incorrect
Because the /etc/shadow file has user password information, read access is restricted to the root user only.
Unattempted
Because the /etc/shadow file has user password information, read access is restricted to the root user only.
Question 22 of 60
22. Question
What command can be used to define, in the current session, the maximum number of processes a user can execute simultaneously?
Correct
The ulimit command defines in the current session limits for use of the machine resources such as maximum size of files, open files, process usage, CPU utilization, memory, and so on.
Incorrect
The ulimit command defines in the current session limits for use of the machine resources such as maximum size of files, open files, process usage, CPU utilization, memory, and so on.
Unattempted
The ulimit command defines in the current session limits for use of the machine resources such as maximum size of files, open files, process usage, CPU utilization, memory, and so on.
Question 23 of 60
23. Question
The administrator wants to give permission for a regular user of the system to be able to add new users. In which file it can to perform this configuration?
Correct
The above configuration must be done by the sudo tool, so the /etc/sudoers file must be configured by vi, or simply use the “visudo“ command.
Incorrect
The above configuration must be done by the sudo tool, so the /etc/sudoers file must be configured by vi, or simply use the “visudo“ command.
Unattempted
The above configuration must be done by the sudo tool, so the /etc/sudoers file must be configured by vi, or simply use the “visudo“ command.
Question 24 of 60
24. Question
Which command will display all the files and directories of the system that have the SUID bit active?
Correct
Permission code 4000 is equivalent to SUID and 2000 to SGID. In the exam it is common questions about searching the files that do not have any associated user or group, in this case the find must be used as follows: find / \( -nouser -o -nogroup \)
Incorrect
Permission code 4000 is equivalent to SUID and 2000 to SGID. In the exam it is common questions about searching the files that do not have any associated user or group, in this case the find must be used as follows: find / \( -nouser -o -nogroup \)
Unattempted
Permission code 4000 is equivalent to SUID and 2000 to SGID. In the exam it is common questions about searching the files that do not have any associated user or group, in this case the find must be used as follows: find / \( -nouser -o -nogroup \)
Question 25 of 60
25. Question
The administrator wants to perform a DNS resolution test from http://www.lpi.org using the external IP 1.1.1.1 as the DNS Server. Which commands can be used? (Select 2)
Correct
In the host command, the IP of the DNS server to be used must be informed after the address, according to the syntax of the “c“ option. In the command dig, the @ should be used to indicate the IP of the DNS server, according to the syntax of option “b“.
Incorrect
In the host command, the IP of the DNS server to be used must be informed after the address, according to the syntax of the “c“ option. In the command dig, the @ should be used to indicate the IP of the DNS server, according to the syntax of option “b“.
Unattempted
In the host command, the IP of the DNS server to be used must be informed after the address, according to the syntax of the “c“ option. In the command dig, the @ should be used to indicate the IP of the DNS server, according to the syntax of option “b“.
Question 26 of 60
26. Question
In the /etc/nsswitch.conf file, the “hosts: files dns“ configuration line indicates that:
Correct
This setting indicates that the information contained in the /etc/hosts file is queried before the search is sent to the DNS server.
Incorrect
This setting indicates that the information contained in the /etc/hosts file is queried before the search is sent to the DNS server.
Unattempted
This setting indicates that the information contained in the /etc/hosts file is queried before the search is sent to the DNS server.
Question 27 of 60
27. Question
Which command will add the IP 10.0.0.50, with mask 255.255.255.0, in interface eth1?
Correct
When using “ip address add“ the IP will be added in the interface, keeping the previous IPs if they exist.
Incorrect
When using “ip address add“ the IP will be added in the interface, keeping the previous IPs if they exist.
Unattempted
When using “ip address add“ the IP will be added in the interface, keeping the previous IPs if they exist.
Question 28 of 60
28. Question
Which command only displays the TCP connections in listening state, in a way that the addresses and ports are not translated by the DNS server?
Correct
In both ss and netstat, the “l“ option displays only “listen“ connections, the “t“ option restricts the TCP protocol, and “n“ prevents name resolution. The “a“ option displays all types of connection states.
Incorrect
In both ss and netstat, the “l“ option displays only “listen“ connections, the “t“ option restricts the TCP protocol, and “n“ prevents name resolution. The “a“ option displays all types of connection states.
Unattempted
In both ss and netstat, the “l“ option displays only “listen“ connections, the “t“ option restricts the TCP protocol, and “n“ prevents name resolution. The “a“ option displays all types of connection states.
Question 29 of 60
29. Question
Which command will establish a connection on port 1234 of IP 172.16.12.1?
Correct
The netcat or nc commands (the same command) can perform a variety of activities, including connecting to a specific IP and port. The telnet command can also make this connection, but the syntax entered is incorrect, it should be: telnet 172.16.12.1 1234
Incorrect
The netcat or nc commands (the same command) can perform a variety of activities, including connecting to a specific IP and port. The telnet command can also make this connection, but the syntax entered is incorrect, it should be: telnet 172.16.12.1 1234
Unattempted
The netcat or nc commands (the same command) can perform a variety of activities, including connecting to a specific IP and port. The telnet command can also make this connection, but the syntax entered is incorrect, it should be: telnet 172.16.12.1 1234
Question 30 of 60
30. Question
What commands below can be used to check the default route of a Linux machine?
Correct
The route command is dedicated to viewing and changing machine routes, the -n option disables name resolution. The command has several functions, among them also to view and manipulate the routing table. The main function of the netstat command is to analyze the established connections, however the -r option displays the routes of the machine in a very similar way to the route -n.
Incorrect
The route command is dedicated to viewing and changing machine routes, the -n option disables name resolution. The command has several functions, among them also to view and manipulate the routing table. The main function of the netstat command is to analyze the established connections, however the -r option displays the routes of the machine in a very similar way to the route -n.
Unattempted
The route command is dedicated to viewing and changing machine routes, the -n option disables name resolution. The command has several functions, among them also to view and manipulate the routing table. The main function of the netstat command is to analyze the established connections, however the -r option displays the routes of the machine in a very similar way to the route -n.
Question 31 of 60
31. Question
From the following addresses, which ones belong to the bands reserved for private IPs? (Select 3 answers)
Correct
Tracks reserved for Private IPs are: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255 e 169.254.0.0 – 169.254.255.255
Incorrect
Tracks reserved for Private IPs are: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255 e 169.254.0.0 – 169.254.255.255
Unattempted
Tracks reserved for Private IPs are: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255 e 169.254.0.0 – 169.254.255.255
Question 32 of 60
32. Question
In what directory can all the timezones files available on the system be found?
Correct
In the /usr/share/zoneinfo/directory, the time zone and daylight saving time settings files for all possible locations are found. The /etc/localtime file is usually a link to some of these files.
Incorrect
In the /usr/share/zoneinfo/directory, the time zone and daylight saving time settings files for all possible locations are found. The /etc/localtime file is usually a link to some of these files.
Unattempted
In the /usr/share/zoneinfo/directory, the time zone and daylight saving time settings files for all possible locations are found. The /etc/localtime file is usually a link to some of these files.
Question 33 of 60
33. Question
Which of the following commands can be used to set the BIOS and Linux system clock?
Correct
The hwclock command allows the administrator to configure system time and hardware time (BIOS). You can also set a time based on the other time.
Incorrect
The hwclock command allows the administrator to configure system time and hardware time (BIOS). You can also set a time based on the other time.
Unattempted
The hwclock command allows the administrator to configure system time and hardware time (BIOS). You can also set a time based on the other time.
Question 34 of 60
34. Question
What is the main configuration file for ntpd service?
Correct
The /etc/ntp.conf file contains the main parameters of the ntpd process, including the servers that will be used as the source of the time data.
Incorrect
The /etc/ntp.conf file contains the main parameters of the ntpd process, including the servers that will be used as the source of the time data.
Unattempted
The /etc/ntp.conf file contains the main parameters of the ntpd process, including the servers that will be used as the source of the time data.
Question 35 of 60
35. Question
What command can be used to immediately update the system date and time based on some NTP server reported as a parameter?
Correct
By using the “ntpdate pool.ntp.org“ command the system date and time will be immediately updated based on the pool.ntp.org server/pool data.
Incorrect
By using the “ntpdate pool.ntp.org“ command the system date and time will be immediately updated based on the pool.ntp.org server/pool data.
Unattempted
By using the “ntpdate pool.ntp.org“ command the system date and time will be immediately updated based on the pool.ntp.org server/pool data.
Question 36 of 60
36. Question
The system administrator wants to create a script and have it generating logs using the rsyslogd features. What facility can be used for rsyslog to manage a specific log file for the script?
Correct
Rsyslog provides facilities from local0 to local7 to be used at the discretion of the system administrator.
Incorrect
Rsyslog provides facilities from local0 to local7 to be used at the discretion of the system administrator.
Unattempted
Rsyslog provides facilities from local0 to local7 to be used at the discretion of the system administrator.
Question 37 of 60
37. Question
On a Linux system, which program is responsible for compressing and rotating old log files?
Correct
Logrotate is a crontab program that enables you to control logs generated by the system, with rotation, compression and removal of old logs.
Incorrect
Logrotate is a crontab program that enables you to control logs generated by the system, with rotation, compression and removal of old logs.
Unattempted
Logrotate is a crontab program that enables you to control logs generated by the system, with rotation, compression and removal of old logs.
Question 38 of 60
38. Question
Which command has the function of examining the journal logs of the systemd service?
Correct
The systemd service has a specific log record called the journal, and the journalctl command is the tool specifically designed to query these logs.
Incorrect
The systemd service has a specific log record called the journal, and the journalctl command is the tool specifically designed to query these logs.
Unattempted
The systemd service has a specific log record called the journal, and the journalctl command is the tool specifically designed to query these logs.
Question 39 of 60
39. Question
Which configuration parameter sets the maximum disk space that can be used by logs generated by systemd-journal?
Correct
SystemMaxUse sets the maximum usage limit for persistent journal logs on the partition, normally stored in the /var/log/journal directory. The default value is 10%.
Incorrect
SystemMaxUse sets the maximum usage limit for persistent journal logs on the partition, normally stored in the /var/log/journal directory. The default value is 10%.
Unattempted
SystemMaxUse sets the maximum usage limit for persistent journal logs on the partition, normally stored in the /var/log/journal directory. The default value is 10%.
Question 40 of 60
40. Question
From the following options, which MTAs are typically used on Linux servers?
Correct
The main MTA (Mail Transfer Agents) or simply mail servers used in Linux are: Sendmail, Postfix, Exim and qmail. Postgree is a relational database, Procmail is a utility used in conjunction with an MTA to filter emails, make checksums, antispam, and so on.
Incorrect
The main MTA (Mail Transfer Agents) or simply mail servers used in Linux are: Sendmail, Postfix, Exim and qmail. Postgree is a relational database, Procmail is a utility used in conjunction with an MTA to filter emails, make checksums, antispam, and so on.
Unattempted
The main MTA (Mail Transfer Agents) or simply mail servers used in Linux are: Sendmail, Postfix, Exim and qmail. Postgree is a relational database, Procmail is a utility used in conjunction with an MTA to filter emails, make checksums, antispam, and so on.
Question 41 of 60
41. Question
What is the .forward file‘s role in a Linux user‘s home?
Correct
Every user can create and configure the .forward file in their default directory and indicate other email to which the emails they receive will be sent to their local account.
Incorrect
Every user can create and configure the .forward file in their default directory and indicate other email to which the emails they receive will be sent to their local account.
Unattempted
Every user can create and configure the .forward file in their default directory and indicate other email to which the emails they receive will be sent to their local account.
Question 42 of 60
42. Question
Which environment setting file runs whenever a bash session is terminated?
Correct
When you end a bash session, all settings and commands entered in the .bash_logout file will be executed, for example, removing a temporary file or a log record.
Incorrect
When you end a bash session, all settings and commands entered in the .bash_logout file will be executed, for example, removing a temporary file or a log record.
Unattempted
When you end a bash session, all settings and commands entered in the .bash_logout file will be executed, for example, removing a temporary file or a log record.
Question 43 of 60
43. Question
Which configuration file contains all the printers configured in the CUPS print management service?
Correct
The /etc/cups/printers.conf file contains the printers added to the cups and their properties. The /etc/cups/cupsd.conf file is the main and general CUPS configuration file.
Incorrect
The /etc/cups/printers.conf file contains the printers added to the cups and their properties. The /etc/cups/cupsd.conf file is the main and general CUPS configuration file.
Unattempted
The /etc/cups/printers.conf file contains the printers added to the cups and their properties. The /etc/cups/cupsd.conf file is the main and general CUPS configuration file.
Question 44 of 60
44. Question
Which command will list all the printer drivers currently supported (but not necessarily used) by the cupsd service?
Correct
The lpinfo command is used to display the devices and drivers supported by the internal base of the cups. The -v option shows all currently supported devices and protocols and the -m option for all supported drivers.
Incorrect
The lpinfo command is used to display the devices and drivers supported by the internal base of the cups. The -v option shows all currently supported devices and protocols and the -m option for all supported drivers.
Unattempted
The lpinfo command is used to display the devices and drivers supported by the internal base of the cups. The -v option shows all currently supported devices and protocols and the -m option for all supported drivers.
Question 45 of 60
45. Question
Which of the following network masks is described as /26 in the CIDR format?
Correct
The mask 255.255.255.192 is represented as /26 in the CIDR format and the binary representation is 11111111.11111111.11111111.11000000. The mask 255.255.255.128 uses CIDR /25 and 255.255.255.248 is equal to /29.
Incorrect
The mask 255.255.255.192 is represented as /26 in the CIDR format and the binary representation is 11111111.11111111.11111111.11000000. The mask 255.255.255.128 uses CIDR /25 and 255.255.255.248 is equal to /29.
Unattempted
The mask 255.255.255.192 is represented as /26 in the CIDR format and the binary representation is 11111111.11111111.11111111.11000000. The mask 255.255.255.128 uses CIDR /25 and 255.255.255.248 is equal to /29.
Question 46 of 60
46. Question
Which command should be used to effect changes made to the /etc/aliases file?
Correct
In the /etc/aliases file it is possible to create “nicknames“ for internal accounts, that is, to indicate other names that will be interpreted by the local mail server as internal accounts and that in practice will be sent to any of the existing users. After any changes to this file the command “newaliases“ must be executed.
Incorrect
In the /etc/aliases file it is possible to create “nicknames“ for internal accounts, that is, to indicate other names that will be interpreted by the local mail server as internal accounts and that in practice will be sent to any of the existing users. After any changes to this file the command “newaliases“ must be executed.
Unattempted
In the /etc/aliases file it is possible to create “nicknames“ for internal accounts, that is, to indicate other names that will be interpreted by the local mail server as internal accounts and that in practice will be sent to any of the existing users. After any changes to this file the command “newaliases“ must be executed.
Question 47 of 60
47. Question
What is the port used by the SNMP monitoring and management protocol?
Correct
Simple Network Management Protocol (SNMP) uses port 161. 25 = SMTP, 123 = NTP and 465 = SMTPS.
Incorrect
Simple Network Management Protocol (SNMP) uses port 161. 25 = SMTP, 123 = NTP and 465 = SMTPS.
Unattempted
Simple Network Management Protocol (SNMP) uses port 161. 25 = SMTP, 123 = NTP and 465 = SMTPS.
Question 48 of 60
48. Question
Which transmission protocol has as main characteristics the establishment of a connection and the control of the integrity of the transmitted data?
Correct
The TCP protocol is connection oriented and the protocol itself ensures that packets will only be delivered if they are integers and in the correct order. The UDP protocol does not do this control. The ICMP protocol is used to control networks and machines and does not transmit data. FTP is a file transfer protocol.
Incorrect
The TCP protocol is connection oriented and the protocol itself ensures that packets will only be delivered if they are integers and in the correct order. The UDP protocol does not do this control. The ICMP protocol is used to control networks and machines and does not transmit data. FTP is a file transfer protocol.
Unattempted
The TCP protocol is connection oriented and the protocol itself ensures that packets will only be delivered if they are integers and in the correct order. The UDP protocol does not do this control. The ICMP protocol is used to control networks and machines and does not transmit data. FTP is a file transfer protocol.
Question 49 of 60
49. Question
In which configuration file can the following entries be found? 127.0.0.1 localhost linux 192.168.8.50 web-server 192.168.8.1 roteador
Correct
The /etc/hosts file will have a mapping between IPs and names that are normally used internally. The nsswitch.conf file will indicate whether the /etc/hosts file should be queried before or after the DNS service.
Incorrect
The /etc/hosts file will have a mapping between IPs and names that are normally used internally. The nsswitch.conf file will indicate whether the /etc/hosts file should be queried before or after the DNS service.
Unattempted
The /etc/hosts file will have a mapping between IPs and names that are normally used internally. The nsswitch.conf file will indicate whether the /etc/hosts file should be queried before or after the DNS service.
Question 50 of 60
50. Question
Which command can be used to permanently change the machine name setting?
Correct
The hostnamectl command with the set-hostname option will change the contents of the /etc/hostname file, which defines the hostname of the machine. The hostname command currently changes the machine name, but the /etc/hostname file does not change.
Incorrect
The hostnamectl command with the set-hostname option will change the contents of the /etc/hostname file, which defines the hostname of the machine. The hostname command currently changes the machine name, but the /etc/hostname file does not change.
Unattempted
The hostnamectl command with the set-hostname option will change the contents of the /etc/hostname file, which defines the hostname of the machine. The hostname command currently changes the machine name, but the /etc/hostname file does not change.
Question 51 of 60
51. Question
When the NetworkManager is in use, which command can be used to display the current properties of the enp0s3 interface in detail?
Correct
In the nmcli tool, every operation based on the interfaces must be performed with the option “device“, or “dev“ or “d“. The show option displays the details of all or just the specified interfaces.
Incorrect
In the nmcli tool, every operation based on the interfaces must be performed with the option “device“, or “dev“ or “d“. The show option displays the details of all or just the specified interfaces.
Unattempted
In the nmcli tool, every operation based on the interfaces must be performed with the option “device“, or “dev“ or “d“. The show option displays the details of all or just the specified interfaces.
Question 52 of 60
52. Question
When NetworkManager is used, in which directory are stored in files the network connections (wired or wifi) that have already been used at some point by the system, storing, for example, information about SSID, Password, MAC and so on?
Correct
In the /etc/NetworkManager/system-connections/ directory there is a file for each connection already established in the system, so that you can “remember“ the properties and characteristics already used in that network.
Incorrect
In the /etc/NetworkManager/system-connections/ directory there is a file for each connection already established in the system, so that you can “remember“ the properties and characteristics already used in that network.
Unattempted
In the /etc/NetworkManager/system-connections/ directory there is a file for each connection already established in the system, so that you can “remember“ the properties and characteristics already used in that network.
Question 53 of 60
53. Question
Which command will display the current settings of the various environment variables related to the current locale?
Correct
The “locale“ command will display all current values for LANG, LANGUAGE and LC_*
Incorrect
The “locale“ command will display all current values for LANG, LANGUAGE and LC_*
Unattempted
The “locale“ command will display all current values for LANG, LANGUAGE and LC_*
Question 54 of 60
54. Question
Which of the following commands can be used to execute a script in the Bash shell?
Correct
The “source“ command allows the user to indicate a file/script that will be executed in the current shell session, not in a sub-session, using “. script.sh“ has the same effect.
Incorrect
The “source“ command allows the user to indicate a file/script that will be executed in the current shell session, not in a sub-session, using “. script.sh“ has the same effect.
Unattempted
The “source“ command allows the user to indicate a file/script that will be executed in the current shell session, not in a sub-session, using “. script.sh“ has the same effect.
Question 55 of 60
55. Question
What command can be used to make the NAME variable also visible for the sessions opened from the session where the variable was declared?
Correct
When exporting a variable with the “export“ command, all sub-shells begin to see this variable, then it is said to be a global variable. Note that in the use of export the variable should not be entered with $.
Incorrect
When exporting a variable with the “export“ command, all sub-shells begin to see this variable, then it is said to be a global variable. Note that in the use of export the variable should not be entered with $.
Unattempted
When exporting a variable with the “export“ command, all sub-shells begin to see this variable, then it is said to be a global variable. Note that in the use of export the variable should not be entered with $.
Question 56 of 60
56. Question
From the options below, which are valid function declarations in bash? (Select 2 answers)
Correct
In the declaration of a function the word “function“ can be used or not, it is optional. After the function name there should be () and after that the command sequence between {}, each command ending with ;
Incorrect
In the declaration of a function the word “function“ can be used or not, it is optional. After the function name there should be () and after that the command sequence between {}, each command ending with ;
Unattempted
In the declaration of a function the word “function“ can be used or not, it is optional. After the function name there should be () and after that the command sequence between {}, each command ending with ;
Question 57 of 60
57. Question
What statement should be made in a shell script to define that it should be interpreted by shell /bin/ksh?
Correct
The first line of a shell script should tell which shell to use to interpret the script, and this is done by the #! Indicator, also known as shebang.
Incorrect
The first line of a shell script should tell which shell to use to interpret the script, and this is done by the #! Indicator, also known as shebang.
Unattempted
The first line of a shell script should tell which shell to use to interpret the script, and this is done by the #! Indicator, also known as shebang.
Question 58 of 60
58. Question
In a shell script, which variable contains the amount of arguments entered at the time of script execution?
Correct
$# returns the number of parameters sent by the user at runtime. $? is the return code of the last executed command, $$ the PID of the current script/process, and $* returns all the arguments given.
Incorrect
$# returns the number of parameters sent by the user at runtime. $? is the return code of the last executed command, $$ the PID of the current script/process, and $* returns all the arguments given.
Unattempted
$# returns the number of parameters sent by the user at runtime. $? is the return code of the last executed command, $$ the PID of the current script/process, and $* returns all the arguments given.
Question 59 of 60
59. Question
In a shell script, how should the “if“ conditional statement be terminated?
Correct
The if is terminated by the statement “fi“, The case is terminated by “esac“. while, for, and until are closed by a “done“
Incorrect
The if is terminated by the statement “fi“, The case is terminated by “esac“. while, for, and until are closed by a “done“
Unattempted
The if is terminated by the statement “fi“, The case is terminated by “esac“. while, for, and until are closed by a “done“
Question 60 of 60
60. Question
Which output does the command “seq 2 4 20“ produce?
Correct
The “seq“ syntax is: “seq “, or “seq “, or “seq “. Will always be generated one number per line.
Incorrect
The “seq“ syntax is: “seq “, or “seq “, or “seq “. Will always be generated one number per line.
Unattempted
The “seq“ syntax is: “seq “, or “seq “, or “seq “. Will always be generated one number per line.
X
Use Page numbers below to navigate to other practice tests