You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-1 (102-500) Practice Test 2 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-1 (102-500)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
When performing a SSH remote access configuration via public keys, without the use of passwords, which file must be manually changed?
Correct
The shared public key must be included in the user‘s authorized_keys file.
Incorrect
The shared public key must be included in the user‘s authorized_keys file.
Unattempted
The shared public key must be included in the user‘s authorized_keys file.
Question 2 of 60
2. Question
From the following options, what are protocols for remote access to graphical desktops? (Select 3)
Correct
The X Display Manager Control Protocol (XDMCP) is the native X11 protocol. SPICE (Simple Protocol for Independent Computing Environment) is a complete and secure solution for remote access. RFB (Remote FrameBuffer) is the protocol used by VNC and its derivatives.
Incorrect
The X Display Manager Control Protocol (XDMCP) is the native X11 protocol. SPICE (Simple Protocol for Independent Computing Environment) is a complete and secure solution for remote access. RFB (Remote FrameBuffer) is the protocol used by VNC and its derivatives.
Unattempted
The X Display Manager Control Protocol (XDMCP) is the native X11 protocol. SPICE (Simple Protocol for Independent Computing Environment) is a complete and secure solution for remote access. RFB (Remote FrameBuffer) is the protocol used by VNC and its derivatives.
Question 3 of 60
3. Question
In which configuration file are user login properties such as the maximum number of days that the user can use the same password and when the account will be locked?
Correct
The /etc/shadow file contains the hash of each user‘s password, as well as several settings related to the user‘s password, such as password change limit, date of last change, and so on.
Incorrect
The /etc/shadow file contains the hash of each user‘s password, as well as several settings related to the user‘s password, such as password change limit, date of last change, and so on.
Unattempted
The /etc/shadow file contains the hash of each user‘s password, as well as several settings related to the user‘s password, such as password change limit, date of last change, and so on.
Question 4 of 60
4. Question
What softwares below can help individuals with visual impairments? (Select 3)
Correct
The Braille Display is a device for implementing the Braille code. Screen reader is a kind of sofware to read a text file. And Screen Magnifier is a tool to increase what is displayed on the screen. GOK is an application that provides a virtual keyboard to be used with the mouse and the Toggle Keys associated with motor difficulties.
Incorrect
The Braille Display is a device for implementing the Braille code. Screen reader is a kind of sofware to read a text file. And Screen Magnifier is a tool to increase what is displayed on the screen. GOK is an application that provides a virtual keyboard to be used with the mouse and the Toggle Keys associated with motor difficulties.
Unattempted
The Braille Display is a device for implementing the Braille code. Screen reader is a kind of sofware to read a text file. And Screen Magnifier is a tool to increase what is displayed on the screen. GOK is an application that provides a virtual keyboard to be used with the mouse and the Toggle Keys associated with motor difficulties.
Question 5 of 60
5. Question
Which command can be used to configure the system time zone?
Correct
The “dpkg-reconfigure tzdata“ command allows the administrator to configure the time zone settings by reconfiguring the tzdata package. The tzselect command only selects the state and time zone for later configuration.
Incorrect
The “dpkg-reconfigure tzdata“ command allows the administrator to configure the time zone settings by reconfiguring the tzdata package. The tzselect command only selects the state and time zone for later configuration.
Unattempted
The “dpkg-reconfigure tzdata“ command allows the administrator to configure the time zone settings by reconfiguring the tzdata package. The tzselect command only selects the state and time zone for later configuration.
Question 6 of 60
6. Question
Consider the following entries in a user‘s crontab: */10 * * * * /opt/system/log-check.sh 9-18 * * * 1-5 /opt/system/report.sh 0,30 * 5 * * /opt/system/payment.sh Which statements are correct? (Select 3)
Correct
The 5 fields of a crontab schedule are: minute hour day-of-month month day-of-week. The use of */10 indicates every 10 minutes, every 10 days and so on. The use of 9-18 indicates a range, for example, from hours 9 to 18. The use of 5,10,15,20 indicates several specific values, for example minutes 5, 10, 15, 20. The last field is referring to the day of the week, 0 and 7 indicate Sunday, 1 = Monday, 2 = Tuesday, 3 = Wednesday, 4 = Thursday, 5 = Friday and 6 = Saturday.
Incorrect
The 5 fields of a crontab schedule are: minute hour day-of-month month day-of-week. The use of */10 indicates every 10 minutes, every 10 days and so on. The use of 9-18 indicates a range, for example, from hours 9 to 18. The use of 5,10,15,20 indicates several specific values, for example minutes 5, 10, 15, 20. The last field is referring to the day of the week, 0 and 7 indicate Sunday, 1 = Monday, 2 = Tuesday, 3 = Wednesday, 4 = Thursday, 5 = Friday and 6 = Saturday.
Unattempted
The 5 fields of a crontab schedule are: minute hour day-of-month month day-of-week. The use of */10 indicates every 10 minutes, every 10 days and so on. The use of 9-18 indicates a range, for example, from hours 9 to 18. The use of 5,10,15,20 indicates several specific values, for example minutes 5, 10, 15, 20. The last field is referring to the day of the week, 0 and 7 indicate Sunday, 1 = Monday, 2 = Tuesday, 3 = Wednesday, 4 = Thursday, 5 = Friday and 6 = Saturday.
Question 7 of 60
7. Question
Which file contains the crontab of general use of a Linux system, being administered by the user root?
Correct
The /etc/crontab file contains system schedules, not directly related to any user but can only be changed by the root user. This file is also commonly used to invoke the scripts located in the /etc/cron.hourly/, /etc/cron.daily/, /etc/cron.weekly/ and /etc/cron.montly/
Incorrect
The /etc/crontab file contains system schedules, not directly related to any user but can only be changed by the root user. This file is also commonly used to invoke the scripts located in the /etc/cron.hourly/, /etc/cron.daily/, /etc/cron.weekly/ and /etc/cron.montly/
Unattempted
The /etc/crontab file contains system schedules, not directly related to any user but can only be changed by the root user. This file is also commonly used to invoke the scripts located in the /etc/cron.hourly/, /etc/cron.daily/, /etc/cron.weekly/ and /etc/cron.montly/
Question 8 of 60
8. Question
When using systemd-timers to schedule a task, which setting will set the service to run from Monday to Friday at 08:30?
Correct
In the configurations of the systemd-timer scheduling units, the OnCalendar= parameter is used to define when the related service will run. The time is set with “WeekDay Year-Month-Day Hour:Minute:Second“. Details and more examples can be seen by the “man systemd.time“
Incorrect
In the configurations of the systemd-timer scheduling units, the OnCalendar= parameter is used to define when the related service will run. The time is set with “WeekDay Year-Month-Day Hour:Minute:Second“. Details and more examples can be seen by the “man systemd.time“
Unattempted
In the configurations of the systemd-timer scheduling units, the OnCalendar= parameter is used to define when the related service will run. The time is set with “WeekDay Year-Month-Day Hour:Minute:Second“. Details and more examples can be seen by the “man systemd.time“
Question 9 of 60
9. Question
Based on the following entry in the /etc/passwd file: system1:x:1004:1010:System Test User:/home/test2:/bin/ksh We can state that: (Select 3)
Correct
The first field is user login, the “x“ in the second field indicates that the password will be found in hash format in the /etc/shadow file, the third field is the user ID (UID), the fourth the primary group GID), the fifth the user description, the sixth the user‘s home and the seventh and last shell used by the user after login.
Incorrect
The first field is user login, the “x“ in the second field indicates that the password will be found in hash format in the /etc/shadow file, the third field is the user ID (UID), the fourth the primary group GID), the fifth the user description, the sixth the user‘s home and the seventh and last shell used by the user after login.
Unattempted
The first field is user login, the “x“ in the second field indicates that the password will be found in hash format in the /etc/shadow file, the third field is the user ID (UID), the fourth the primary group GID), the fifth the user description, the sixth the user‘s home and the seventh and last shell used by the user after login.
Question 10 of 60
10. Question
Which commands can be used by any user to check all the groups that he is part of? (Select 2)
Correct
In a slightly different way, the groups and id commands show all the groups, primary and additional, that a user belongs to.
Incorrect
In a slightly different way, the groups and id commands show all the groups, primary and additional, that a user belongs to.
Unattempted
In a slightly different way, the groups and id commands show all the groups, primary and additional, that a user belongs to.
Question 11 of 60
11. Question
Which command will set the “support“ group as the user‘s primary group of user “analyst1“?
Correct
The usermod -g option defines a user‘s primary group. The -G option defines the additional groups.
Incorrect
The usermod -g option defines a user‘s primary group. The -G option defines the additional groups.
Unattempted
The usermod -g option defines a user‘s primary group. The -G option defines the additional groups.
Question 12 of 60
12. Question
Which option of the useradd command is used to determine that the default user directory is created along with the user creation on the system?
Correct
By default, useradd does not create the user‘s default directory, to force this creation you must use the -m option. The -d option enables the administrator to set a directory other than the /home/user directory.
Incorrect
By default, useradd does not create the user‘s default directory, to force this creation you must use the -m option. The -d option enables the administrator to set a directory other than the /home/user directory.
Unattempted
By default, useradd does not create the user‘s default directory, to force this creation you must use the -m option. The -d option enables the administrator to set a directory other than the /home/user directory.
Question 13 of 60
13. Question
From the environment variables below, which are related to the operation of ssh-agent? (Select 2)
Correct
The environment variable SSH_AGENT_SOCK stores the socket file that will be used for communication between processes, and SSH_AGENT_PID, the ssh-agent PID.
Incorrect
The environment variable SSH_AGENT_SOCK stores the socket file that will be used for communication between processes, and SSH_AGENT_PID, the ssh-agent PID.
Unattempted
The environment variable SSH_AGENT_SOCK stores the socket file that will be used for communication between processes, and SSH_AGENT_PID, the ssh-agent PID.
Question 14 of 60
14. Question
Which gpg command option lists the keys already configured for the current user?
Correct
The command “gpg –list-keys“ shows all the keys (public and private) configured on the user‘s key chain.
Incorrect
The command “gpg –list-keys“ shows all the keys (public and private) configured on the user‘s key chain.
Unattempted
The command “gpg –list-keys“ shows all the keys (public and private) configured on the user‘s key chain.
Question 15 of 60
15. Question
What is the command used to generate the public and private keys of a user?
Correct
The ssh-keygen command has the function of creating and managing a user‘s public and private keys. These keys are stored in the $HOME/.ssh/
Incorrect
The ssh-keygen command has the function of creating and managing a user‘s public and private keys. These keys are stored in the $HOME/.ssh/
Unattempted
The ssh-keygen command has the function of creating and managing a user‘s public and private keys. These keys are stored in the $HOME/.ssh/
Question 16 of 60
16. Question
The administrator wants to configure the machine‘s X server 192.168.8.10 to accept connections from the IP 192.168.8.55 machine. Which command should be used on the machine that will receive these connections?
Correct
The xhost command is used to define which sources can access the X server on the machine. Without arguments it displays the current settings.
Incorrect
The xhost command is used to define which sources can access the X server on the machine. Without arguments it displays the current settings.
Unattempted
The xhost command is used to define which sources can access the X server on the machine. Without arguments it displays the current settings.
Question 17 of 60
17. Question
If the access to a service from a specific IP is configured both in the /etc/hosts.allow file, and in the /etc/hosts.deny file, what will be the behavior of the system?
Correct
The /etc/hosts.allow file settings are read first, and if there is a release for the service, for an IP or network on hosts.allow, hosts.deny is not even queried.
Incorrect
The /etc/hosts.allow file settings are read first, and if there is a release for the service, for an IP or network on hosts.allow, hosts.deny is not even queried.
Unattempted
The /etc/hosts.allow file settings are read first, and if there is a release for the service, for an IP or network on hosts.allow, hosts.deny is not even queried.
Question 18 of 60
18. Question
What directory contains the xinetd configuration files?
Correct
The xinetd service has /etc/xinetd.conf as the main configuration file, but most service-related configurations are included in the /etc/xinetd.d/ directory.
Incorrect
The xinetd service has /etc/xinetd.conf as the main configuration file, but most service-related configurations are included in the /etc/xinetd.d/ directory.
Unattempted
The xinetd service has /etc/xinetd.conf as the main configuration file, but most service-related configurations are included in the /etc/xinetd.d/ directory.
Question 19 of 60
19. Question
Which process are associated with /etc/hosts.allow and /etc/hosts.deny?
Correct
The /usr/sbin/tcpd process uses the libwrap library, which uses the settings included in the /etc/hosts.allow and /etc/hosts.deny files to control access to services available on the system.
Incorrect
The /usr/sbin/tcpd process uses the libwrap library, which uses the settings included in the /etc/hosts.allow and /etc/hosts.deny files to control access to services available on the system.
Unattempted
The /usr/sbin/tcpd process uses the libwrap library, which uses the settings included in the /etc/hosts.allow and /etc/hosts.deny files to control access to services available on the system.
Question 20 of 60
20. Question
The administrator wants to limit the number of files a user can open simultaneously. In what configuration file should it make this setting?
Correct
The ulimit command is used to set these limits in a session, but to set them permanently for a user must be done by the file /etc/security/limits.conf.
Incorrect
The ulimit command is used to set these limits in a session, but to set them permanently for a user must be done by the file /etc/security/limits.conf.
Unattempted
The ulimit command is used to set these limits in a session, but to set them permanently for a user must be done by the file /etc/security/limits.conf.
Question 21 of 60
21. Question
The network administrator wants to check all open ports on the IP machine 192.168.8.158. Which command should it use?
Correct
The nmap command is used to scan a local or remote machine for Open Ports, as well as other information. It can also be used to analyze all machines in a specific logical network.
Incorrect
The nmap command is used to scan a local or remote machine for Open Ports, as well as other information. It can also be used to analyze all machines in a specific logical network.
Unattempted
The nmap command is used to scan a local or remote machine for Open Ports, as well as other information. It can also be used to analyze all machines in a specific logical network.
Question 22 of 60
22. Question
Considering the following command output: # passwd -S user1 user1 P 10/12/2017 1 60 7 -1 We can affirm that:
Correct
The information displayed by the “passwd -S“ command is: Account Status (P=Password OK, NP=No Password, L=Locked Account). Date of Last Password Change. Minimum days limit for password. Limit maximum number of days for the password. Warning days before the password expires. Time after the password expires until the account is disabled, -1 means disabled.
Analysis based on the passwd -S user1 output user1 P 10/12/2017 1 60 7 -1:
P: Account Status P means “Password OK“. So, “The account is locked“ is incorrect. 10/12/2017: This is the “Date of Last Password Change“. So, “The date of the next password change will be October 12, 2017“ is incorrect. The next password change date depends on the maximum days. 60: This is the “Limit maximum number of days for the password“. 60 days is approximately 2 months. So, “The user must change the password every 2 months“ is Correct. -1: This is “Time after the password expires until the account is disabled, -1 means disabled“. A value of -1 here typically means the account will not be disabled (locked) after expiration, but rather the password will simply be expired and the user will be forced to change it on next login. Thus, “The account will not be locked after the password expires“ is Correct. 7: This is “Warning days before the password expires“. So, “7 days before the expiration of the password the user will receive system warnings“ is Correct.
Incorrect
The information displayed by the “passwd -S“ command is: Account Status (P=Password OK, NP=No Password, L=Locked Account). Date of Last Password Change. Minimum days limit for password. Limit maximum number of days for the password. Warning days before the password expires. Time after the password expires until the account is disabled, -1 means disabled.
Analysis based on the passwd -S user1 output user1 P 10/12/2017 1 60 7 -1:
P: Account Status P means “Password OK“. So, “The account is locked“ is incorrect. 10/12/2017: This is the “Date of Last Password Change“. So, “The date of the next password change will be October 12, 2017“ is incorrect. The next password change date depends on the maximum days. 60: This is the “Limit maximum number of days for the password“. 60 days is approximately 2 months. So, “The user must change the password every 2 months“ is Correct. -1: This is “Time after the password expires until the account is disabled, -1 means disabled“. A value of -1 here typically means the account will not be disabled (locked) after expiration, but rather the password will simply be expired and the user will be forced to change it on next login. Thus, “The account will not be locked after the password expires“ is Correct. 7: This is “Warning days before the password expires“. So, “7 days before the expiration of the password the user will receive system warnings“ is Correct.
Unattempted
The information displayed by the “passwd -S“ command is: Account Status (P=Password OK, NP=No Password, L=Locked Account). Date of Last Password Change. Minimum days limit for password. Limit maximum number of days for the password. Warning days before the password expires. Time after the password expires until the account is disabled, -1 means disabled.
Analysis based on the passwd -S user1 output user1 P 10/12/2017 1 60 7 -1:
P: Account Status P means “Password OK“. So, “The account is locked“ is incorrect. 10/12/2017: This is the “Date of Last Password Change“. So, “The date of the next password change will be October 12, 2017“ is incorrect. The next password change date depends on the maximum days. 60: This is the “Limit maximum number of days for the password“. 60 days is approximately 2 months. So, “The user must change the password every 2 months“ is Correct. -1: This is “Time after the password expires until the account is disabled, -1 means disabled“. A value of -1 here typically means the account will not be disabled (locked) after expiration, but rather the password will simply be expired and the user will be forced to change it on next login. Thus, “The account will not be locked after the password expires“ is Correct. 7: This is “Warning days before the password expires“. So, “7 days before the expiration of the password the user will receive system warnings“ is Correct.
Question 23 of 60
23. Question
Which statements are true regarding the /etc/resolv.conf file settings?
Correct
The /etc/resolv.conf file allows the configuration of multiple DNS servers, and they will be classified as primary DNS, secondary DNS, and so on. However only one will be consulted and if it does not have the answer or if it is out of service, the next server will be queried. In addition to the nameserver, the domain and search parameters can be used.
Incorrect
The /etc/resolv.conf file allows the configuration of multiple DNS servers, and they will be classified as primary DNS, secondary DNS, and so on. However only one will be consulted and if it does not have the answer or if it is out of service, the next server will be queried. In addition to the nameserver, the domain and search parameters can be used.
Unattempted
The /etc/resolv.conf file allows the configuration of multiple DNS servers, and they will be classified as primary DNS, secondary DNS, and so on. However only one will be consulted and if it does not have the answer or if it is out of service, the next server will be queried. In addition to the nameserver, the domain and search parameters can be used.
Question 24 of 60
24. Question
Which of the following is a valid entry for the /etc/hosts file?
Correct
The first space should be the IP and then the equivalent names. Only 1 IP can be entered per line, but it can be associated with multiple names.
Incorrect
The first space should be the IP and then the equivalent names. Only 1 IP can be entered per line, but it can be associated with multiple names.
Unattempted
The first space should be the IP and then the equivalent names. Only 1 IP can be entered per line, but it can be associated with multiple names.
Question 25 of 60
25. Question
By what protocol does the ping command send the packets to the destination address?
Correct
The ping command sends packets by using the Internet Control Message Protocol (ICMP) protocol. The command sends a packet and waits for the response of the destination, thus verifying that the destination is accessible, responding to the requests and the response time.
Incorrect
The ping command sends packets by using the Internet Control Message Protocol (ICMP) protocol. The command sends a packet and waits for the response of the destination, thus verifying that the destination is accessible, responding to the requests and the response time.
Unattempted
The ping command sends packets by using the Internet Control Message Protocol (ICMP) protocol. The command sends a packet and waits for the response of the destination, thus verifying that the destination is accessible, responding to the requests and the response time.
Question 26 of 60
26. Question
What commands can be used to disable the enp0s1 interface? (Select 3)
Correct
The ifdown and ifup command works based on the /etc/network/intefaces or /etc/sysconfig/network-scripts configuration files. In the ip command, the link option refers to the interfaces and the set option can be used to enable or disable an interface.
Incorrect
The ifdown and ifup command works based on the /etc/network/intefaces or /etc/sysconfig/network-scripts configuration files. In the ip command, the link option refers to the interfaces and the set option can be used to enable or disable an interface.
Unattempted
The ifdown and ifup command works based on the /etc/network/intefaces or /etc/sysconfig/network-scripts configuration files. In the ip command, the link option refers to the interfaces and the set option can be used to enable or disable an interface.
Question 27 of 60
27. Question
You realize that you are not able to access any Internet address. Your access to the machines on the local network is working normally. Your machine is using an internal DNS server and when you use the “host“ command you notice that the names are normally being resolved to the corresponding IP. Ping does not return responses when you use external IPs or names. There is no active firewall. What is the most likely cause of the problem?
Correct
When there is no default route defined, packets sent to IPs that are not part of the machine‘s network do not know the way forward, so Internet access will not be possible by domain names or direct IPs.
Incorrect
When there is no default route defined, packets sent to IPs that are not part of the machine‘s network do not know the way forward, so Internet access will not be possible by domain names or direct IPs.
Unattempted
When there is no default route defined, packets sent to IPs that are not part of the machine‘s network do not know the way forward, so Internet access will not be possible by domain names or direct IPs.
Question 28 of 60
28. Question
Which command will show the entire route used by a packet to get to the destination address?
Correct
The traceroute command traces a route from the local machine to the target machine, informing all the gateways/hops that were used in the path.
Incorrect
The traceroute command traces a route from the local machine to the target machine, informing all the gateways/hops that were used in the path.
Unattempted
The traceroute command traces a route from the local machine to the target machine, informing all the gateways/hops that were used in the path.
Question 29 of 60
29. Question
From the following options, what is an alternative to NetworkManager?
Correct
systemd-networkd is a system service that manages networks. It detects and configures network devices as they appear.
Incorrect
systemd-networkd is a system service that manages networks. It detects and configures network devices as they appear.
Unattempted
systemd-networkd is a system service that manages networks. It detects and configures network devices as they appear.
Question 30 of 60
30. Question
In the /etc/resolv.conf file, which property is used to define the DNS server addresses used by the system?
Correct
The nameserver property is used to specify the IPs of the DNS servers used for name resolution. More than one can be used to indicate Primary, Secondary, and DNS.
Incorrect
The nameserver property is used to specify the IPs of the DNS servers used for name resolution. More than one can be used to indicate Primary, Secondary, and DNS.
Unattempted
The nameserver property is used to specify the IPs of the DNS servers used for name resolution. More than one can be used to indicate Primary, Secondary, and DNS.
Question 31 of 60
31. Question
A machine is configured with IP 192.168.8.180 and mask 255.255.255.128. What is the network address of the subnet on which the machine is included?
Correct
The mask 255.255.255.128, or /25, divides a network into 2 subnets. In this case, the subnet in which IP 192.168.8.180 is included has the subnet address 192.168.8.128 and the broadcast address 192.168.8.255. The other subnet has the network address of 192.168.8.0 and the broadcast address of 192.168.8.127.
Incorrect
The mask 255.255.255.128, or /25, divides a network into 2 subnets. In this case, the subnet in which IP 192.168.8.180 is included has the subnet address 192.168.8.128 and the broadcast address 192.168.8.255. The other subnet has the network address of 192.168.8.0 and the broadcast address of 192.168.8.127.
Unattempted
The mask 255.255.255.128, or /25, divides a network into 2 subnets. In this case, the subnet in which IP 192.168.8.180 is included has the subnet address 192.168.8.128 and the broadcast address 192.168.8.255. The other subnet has the network address of 192.168.8.0 and the broadcast address of 192.168.8.127.
Question 32 of 60
32. Question
Which command can be used to convert ISO-8859-1 encoded text to UTF-8?
Correct
The iconv command is used to convert character encoding from one file to another type of encoding.
Incorrect
The iconv command is used to convert character encoding from one file to another type of encoding.
Unattempted
The iconv command is used to convert character encoding from one file to another type of encoding.
Question 33 of 60
33. Question
In a script, what value should be assigned to the LANG environment variable so that it does not produce different results based on the machine‘s locale settings on which it is running?
Correct
Defining the LANC variable with the C value is a common practice in scripts or programs that should always use the same location definitions, regardless of where it is running.
Incorrect
Defining the LANC variable with the C value is a common practice in scripts or programs that should always use the same location definitions, regardless of where it is running.
Unattempted
Defining the LANC variable with the C value is a common practice in scripts or programs that should always use the same location definitions, regardless of where it is running.
Question 34 of 60
34. Question
Which command can be used to set the system clock time at the same time as the hardware clock (BIOS)?
Correct
The hwclock command with the -s or –hctosys parameters sets the system time from the BIOS time. The -w or –systohc options do the opposite, set the BIOS time based on the current system time.
Incorrect
The hwclock command with the -s or –hctosys parameters sets the system time from the BIOS time. The -w or –systohc options do the opposite, set the BIOS time based on the current system time.
Unattempted
The hwclock command with the -s or –hctosys parameters sets the system time from the BIOS time. The -w or –systohc options do the opposite, set the BIOS time based on the current system time.
Question 35 of 60
35. Question
Which chronyc option is used to display information about the current time sources that chronyd is accessing?
Correct
The sources option displays detailed synchronization information for each server and pool that is configured and in use.
Incorrect
The sources option displays detailed synchronization information for each server and pool that is configured and in use.
Unattempted
The sources option displays detailed synchronization information for each server and pool that is configured and in use.
Question 36 of 60
36. Question
Which statements below are true about NTP?
Correct
NTP is an optional but highly recommended service on Linux servers. The ntpd and chronyd services queries remote servers via UDP/123 port, and based on its information keeps the date and time of the local machine updated.
Incorrect
NTP is an optional but highly recommended service on Linux servers. The ntpd and chronyd services queries remote servers via UDP/123 port, and based on its information keeps the date and time of the local machine updated.
Unattempted
NTP is an optional but highly recommended service on Linux servers. The ntpd and chronyd services queries remote servers via UDP/123 port, and based on its information keeps the date and time of the local machine updated.
Question 37 of 60
37. Question
What command can be used inside a shell script so that the logs are sent and managed directly by the settings defined in rsyslog?
Correct
The logger command is used inside the script, sending log records to the configured facilities in syslog or rsyslog. An example usage is: logger -p local0.warn “Warning message“
Incorrect
The logger command is used inside the script, sending log records to the configured facilities in syslog or rsyslog. An example usage is: logger -p local0.warn “Warning message“
Unattempted
The logger command is used inside the script, sending log records to the configured facilities in syslog or rsyslog. An example usage is: logger -p local0.warn “Warning message“
Question 38 of 60
38. Question
The sysadmin wants to configure rsyslog so that kernel messages with priority equal to or greater than “error“ are logged in the /var/log/kernel.error file. Which setting should be included?
Correct
In the rsyslog configuration files the settings must be: facility.priority file-log. The .err setting indicates priority equal to or greater than error, the. =err setting indicates only the error priority.
Incorrect
In the rsyslog configuration files the settings must be: facility.priority file-log. The .err setting indicates priority equal to or greater than error, the. =err setting indicates only the error priority.
Unattempted
In the rsyslog configuration files the settings must be: facility.priority file-log. The .err setting indicates priority equal to or greater than error, the. =err setting indicates only the error priority.
Question 39 of 60
39. Question
From the options below, what services are used to manage the logs of a Linux system?
Correct
Syslog, Rsyslog and Syslog-ng are the log management software currently used in Linux. Syslog is the oldest and most distributions currently use rsyslog.
Incorrect
Syslog, Rsyslog and Syslog-ng are the log management software currently used in Linux. Syslog is the oldest and most distributions currently use rsyslog.
Unattempted
Syslog, Rsyslog and Syslog-ng are the log management software currently used in Linux. Syslog is the oldest and most distributions currently use rsyslog.
Question 40 of 60
40. Question
Which command can be used to have systemd-journal records removed in a controlled manner?
Correct
The vacuum-size option of journalctl causes the /var/log/journal directory‘s “archive“ records to be cleaned up. In the case of vacuum-size, what should be cleaned is defined in Kb, Mb, Gb and so on. However, vacuum-time can also be used to define time-based cleaning and vacuum-file for the number of files.
Incorrect
The vacuum-size option of journalctl causes the /var/log/journal directory‘s “archive“ records to be cleaned up. In the case of vacuum-size, what should be cleaned is defined in Kb, Mb, Gb and so on. However, vacuum-time can also be used to define time-based cleaning and vacuum-file for the number of files.
Unattempted
The vacuum-size option of journalctl causes the /var/log/journal directory‘s “archive“ records to be cleaned up. In the case of vacuum-size, what should be cleaned is defined in Kb, Mb, Gb and so on. However, vacuum-time can also be used to define time-based cleaning and vacuum-file for the number of files.
Question 41 of 60
41. Question
Which file can be configured by the system administrator to link multiple different names to the same user? This way, emails sent to these alternate names will always be sent to the same internal account.
Correct
The /etc/aliases file will implement what is described in the statement. It can only be edited by the root user and for your changes to take effect the “newaliases“ command should be executed.
Incorrect
The /etc/aliases file will implement what is described in the statement. It can only be edited by the root user and for your changes to take effect the “newaliases“ command should be executed.
Unattempted
The /etc/aliases file will implement what is described in the statement. It can only be edited by the root user and for your changes to take effect the “newaliases“ command should be executed.
Question 42 of 60
42. Question
Which command will display all variables and functions defined in the current session?
Correct
The set command shows all variables, exported or not, in addition to the functions defined in the current session. The env command only shows the variables that were exported.
Incorrect
The set command shows all variables, exported or not, in addition to the functions defined in the current session. The env command only shows the variables that were exported.
Unattempted
The set command shows all variables, exported or not, in addition to the functions defined in the current session. The env command only shows the variables that were exported.
Question 43 of 60
43. Question
What is the default port used by an MTA server to send an email to another server?
Correct
Port 25 is the port used by the Simple Mail Transfer Protocol (SMTP) service. It is through this port that the messages are typically sent by the MTA.
Incorrect
Port 25 is the port used by the Simple Mail Transfer Protocol (SMTP) service. It is through this port that the messages are typically sent by the MTA.
Unattempted
Port 25 is the port used by the Simple Mail Transfer Protocol (SMTP) service. It is through this port that the messages are typically sent by the MTA.
Question 44 of 60
44. Question
In which directory are the files sent to the CUPS print queue stored?
Correct
The /var/spool/cups directory stores all files sent to the cupsd print queue.
Incorrect
The /var/spool/cups directory stores all files sent to the cupsd print queue.
Unattempted
The /var/spool/cups directory stores all files sent to the cupsd print queue.
Question 45 of 60
45. Question
From the options below, which ones will send a job to some of the CUPS print queues?
Correct
The lpr command can be used by directly informing the file to be printed or by receiving the contents to be printed via | (pipe). Without arguments the job is sent to the default queue, to specify a queue the -P option should be used.
Incorrect
The lpr command can be used by directly informing the file to be printed or by receiving the contents to be printed via | (pipe). Without arguments the job is sent to the default queue, to specify a queue the -P option should be used.
Unattempted
The lpr command can be used by directly informing the file to be printed or by receiving the contents to be printed via | (pipe). Without arguments the job is sent to the default queue, to specify a queue the -P option should be used.
Question 46 of 60
46. Question
Of the commands below, which ones will display the queue of emails regardless of the MTA used? (Select 2)
Correct
The mailq and “sendmail -bp“ commands, despite the name, can be used with any mail server, not just sendmail. They show the queue of mail being processed or waiting for the mail server, emails that have not yet been delivered.
Incorrect
The mailq and “sendmail -bp“ commands, despite the name, can be used with any mail server, not just sendmail. They show the queue of mail being processed or waiting for the mail server, emails that have not yet been delivered.
Unattempted
The mailq and “sendmail -bp“ commands, despite the name, can be used with any mail server, not just sendmail. They show the queue of mail being processed or waiting for the mail server, emails that have not yet been delivered.
Question 47 of 60
47. Question
Of the following IP addresses, which one is not part of a private network?
Correct
IP 191.12.40.50 is considered a Public IP. The tracks reserved for Private IPs are: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255 e 169.254.0.0 – 169.254.255.255
Incorrect
IP 191.12.40.50 is considered a Public IP. The tracks reserved for Private IPs are: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255 e 169.254.0.0 – 169.254.255.255
Unattempted
IP 191.12.40.50 is considered a Public IP. The tracks reserved for Private IPs are: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255 e 169.254.0.0 – 169.254.255.255
Question 48 of 60
48. Question
What is the port used to effectively send data from the files over an FTP connection?
Correct
The FTP protocol works with 2 ports, port 20 is used for file transfer and port 21 is used for sending commands and controlling the connection. 22 is the port used by SSH and 23 by the Telnet service.
Incorrect
The FTP protocol works with 2 ports, port 20 is used for file transfer and port 21 is used for sending commands and controlling the connection. 22 is the port used by SSH and 23 by the Telnet service.
Unattempted
The FTP protocol works with 2 ports, port 20 is used for file transfer and port 21 is used for sending commands and controlling the connection. 22 is the port used by SSH and 23 by the Telnet service.
Question 49 of 60
49. Question
Which of the following has a valid IPV6 address format?
Correct
An IPv6 address consists of 128 bits, separated into 8 sets of 16 bits, usually represented in hexadecimal format, and each group separated by “:“. However, when groups are in sequence with 0000 values, these can be abbreviated and omitted, which is indicated by the indication “::“.
Incorrect
An IPv6 address consists of 128 bits, separated into 8 sets of 16 bits, usually represented in hexadecimal format, and each group separated by “:“. However, when groups are in sequence with 0000 values, these can be abbreviated and omitted, which is indicated by the indication “::“.
Unattempted
An IPv6 address consists of 128 bits, separated into 8 sets of 16 bits, usually represented in hexadecimal format, and each group separated by “:“. However, when groups are in sequence with 0000 values, these can be abbreviated and omitted, which is indicated by the indication “::“.
Question 50 of 60
50. Question
Which of the following lines in the /etc/nsswitch.conf file indicates that a machine name must be resolved first from the /etc/hosts file settings and then the DNS results?
Correct
The order of the host parameter list indicates the search order of a name, “files“ indicates that /etc/hosts should be queried first, if nothing is found the system then look for the DNS configured in /etc/resolv. conf.
Incorrect
The order of the host parameter list indicates the search order of a name, “files“ indicates that /etc/hosts should be queried first, if nothing is found the system then look for the DNS configured in /etc/resolv. conf.
Unattempted
The order of the host parameter list indicates the search order of a name, “files“ indicates that /etc/hosts should be queried first, if nothing is found the system then look for the DNS configured in /etc/resolv. conf.
Question 51 of 60
51. Question
When NetworkManager is in use, which command should be used to enable the use of the connection named “internal-network“?
Correct
In the nmcli tool, every operation based on a connection must be performed with the “connection“ option, or “con“ or “c“. To enable or disable a connection are used up or down respectively.
Incorrect
In the nmcli tool, every operation based on a connection must be performed with the “connection“ option, or “con“ or “c“. To enable or disable a connection are used up or down respectively.
Unattempted
In the nmcli tool, every operation based on a connection must be performed with the “connection“ option, or “con“ or “c“. To enable or disable a connection are used up or down respectively.
Question 52 of 60
52. Question
What is the behavior of the system if the /etc/at.allow file exists but is empty?
Correct
The /etc/at.allow file indicates which users can use at. If it exists and is empty, no user is authorized to use the at. If the file does not exist, the file /etc/at.deny will be queried and the listed users will be blocked. If neither of the 2 files exists, or both are blank, only root can use at.
Incorrect
The /etc/at.allow file indicates which users can use at. If it exists and is empty, no user is authorized to use the at. If the file does not exist, the file /etc/at.deny will be queried and the listed users will be blocked. If neither of the 2 files exists, or both are blank, only root can use at.
Unattempted
The /etc/at.allow file indicates which users can use at. If it exists and is empty, no user is authorized to use the at. If the file does not exist, the file /etc/at.deny will be queried and the listed users will be blocked. If neither of the 2 files exists, or both are blank, only root can use at.
Question 53 of 60
53. Question
Which environment setting file runs for all users after the login process?
Correct
The /etc/profile file runs for all users after a login event. The /etc/bash.bashrc file runs at each new session. If after login a new session is started, only /etc/bash.bashrc is executed.
Incorrect
The /etc/profile file runs for all users after a login event. The /etc/bash.bashrc file runs at each new session. If after login a new session is started, only /etc/bash.bashrc is executed.
Unattempted
The /etc/profile file runs for all users after a login event. The /etc/bash.bashrc file runs at each new session. If after login a new session is started, only /etc/bash.bashrc is executed.
Question 54 of 60
54. Question
Considering the following function declared in bash: $ function sum() { > VALOR=′expr $1 + $2′; > echo “The sum of $1 + $2 is $VALOR“; > } How can the sum function be performed?
Correct
A function can be used in the same way as a command, just by stating its name and its arguments.
Incorrect
A function can be used in the same way as a command, just by stating its name and its arguments.
Unattempted
A function can be used in the same way as a command, just by stating its name and its arguments.
Question 55 of 60
55. Question
What command can the user use to display all the alias settings of his/her bash session?
Correct
Aliases are displayed when typing aliases with no arguments. A new alias should be defined as: alias name=‘command-arguments‘
Incorrect
Aliases are displayed when typing aliases with no arguments. A new alias should be defined as: alias name=‘command-arguments‘
Unattempted
Aliases are displayed when typing aliases with no arguments. A new alias should be defined as: alias name=‘command-arguments‘
Question 56 of 60
56. Question
What instruction can be used so that the /opt/report/ directory is created only if the /etc/status file exists?
Correct
In the test command, or [], -e indicates whether the specified file or directory exists, -f has the same effect but only for files. The use of && causes the second command to be executed only if the first one is executed successfully, || is the opposite, the second command is executed only if the first one has error return, other than 0.
Incorrect
In the test command, or [], -e indicates whether the specified file or directory exists, -f has the same effect but only for files. The use of && causes the second command to be executed only if the first one is executed successfully, || is the opposite, the second command is executed only if the first one has error return, other than 0.
Unattempted
In the test command, or [], -e indicates whether the specified file or directory exists, -f has the same effect but only for files. The use of && causes the second command to be executed only if the first one is executed successfully, || is the opposite, the second command is executed only if the first one has error return, other than 0.
Question 57 of 60
57. Question
What output will the following command produce? echo ‘a b c d e‘ | while read var1 var2 var3; do > echo $var3 $var2 $var1
Correct
Since 3 variables are being read by the read command, and we have 5 values being reported, “a“ will be associated with var1, “b“ will be associated with var2 and “cd e“ associated with var3. Warning because this is a behavior of the read command, the same does not happen with the parameters of a script.
Incorrect
Since 3 variables are being read by the read command, and we have 5 values being reported, “a“ will be associated with var1, “b“ will be associated with var2 and “cd e“ associated with var3. Warning because this is a behavior of the read command, the same does not happen with the parameters of a script.
Unattempted
Since 3 variables are being read by the read command, and we have 5 values being reported, “a“ will be associated with var1, “b“ will be associated with var2 and “cd e“ associated with var3. Warning because this is a behavior of the read command, the same does not happen with the parameters of a script.
Question 58 of 60
58. Question
What will be the result of the following statement in a shell script? for i in ′seq 0 3′ do echo Valor $i done
Correct
The seq 0 3 command generates numbers from 0 to 3, each on a new line. The for loop iterates over these values. In each iteration, the echo Valor $i command prints “Valor “ followed by the current value of i. Because seq outputs each number on a new line, the for loop processes them individually, resulting in each “Valor X“ statement also being printed on a new line.
Incorrect
The seq 0 3 command generates numbers from 0 to 3, each on a new line. The for loop iterates over these values. In each iteration, the echo Valor $i command prints “Valor “ followed by the current value of i. Because seq outputs each number on a new line, the for loop processes them individually, resulting in each “Valor X“ statement also being printed on a new line.
Unattempted
The seq 0 3 command generates numbers from 0 to 3, each on a new line. The for loop iterates over these values. In each iteration, the echo Valor $i command prints “Valor “ followed by the current value of i. Because seq outputs each number on a new line, the for loop processes them individually, resulting in each “Valor X“ statement also being printed on a new line.
Question 59 of 60
59. Question
Which command checks whether the value of variable VAR1 is greater than or equal to the value of variable VAR2?
Correct
The -ge option of the “test“ command means “greater or equal (greater or equal)“. The test command can be replaced by the [] syntax.
Incorrect
The -ge option of the “test“ command means “greater or equal (greater or equal)“. The test command can be replaced by the [] syntax.
Unattempted
The -ge option of the “test“ command means “greater or equal (greater or equal)“. The test command can be replaced by the [] syntax.
Question 60 of 60
60. Question
In which section of the X server configuration files are defined the properties applied to the Keyboard and Mouse set?
Correct
In the InputDevice section, specifications about the mouse and keyboard can be performed. Other important sections are: “Files“ – Paths to some important files, especially FontsPath. “ServerLayout“ – X Server General Settings. “Module“ – Loading extra modules. “Monitor“ – Configuration of the monitor used. “Device“ – Video card and driver configuration. “Screen“ – Combination of the Monitor with the Device, mainly setting the screen resolution.
Incorrect
In the InputDevice section, specifications about the mouse and keyboard can be performed. Other important sections are: “Files“ – Paths to some important files, especially FontsPath. “ServerLayout“ – X Server General Settings. “Module“ – Loading extra modules. “Monitor“ – Configuration of the monitor used. “Device“ – Video card and driver configuration. “Screen“ – Combination of the Monitor with the Device, mainly setting the screen resolution.
Unattempted
In the InputDevice section, specifications about the mouse and keyboard can be performed. Other important sections are: “Files“ – Paths to some important files, especially FontsPath. “ServerLayout“ – X Server General Settings. “Module“ – Loading extra modules. “Monitor“ – Configuration of the monitor used. “Device“ – Video card and driver configuration. “Screen“ – Combination of the Monitor with the Device, mainly setting the screen resolution.
X
Use Page numbers below to navigate to other practice tests