You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Linux LPIC-1 (102-500) Practice Test 3 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Linux LPIC-1 (102-500)
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
In which configuration file is it possible to determine a user‘s primary group?
Correct
A user‘s primary group (GID) is defined by the fourth field of the /etc/passwd file.
Incorrect
A user‘s primary group (GID) is defined by the fourth field of the /etc/passwd file.
Unattempted
A user‘s primary group (GID) is defined by the fourth field of the /etc/passwd file.
Question 2 of 60
2. Question
What can be determined from the following entry in the /etc/shadow file? (Select 3 answers) test2:!$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ:17473:0:10:3:::
Correct
test2:!$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ:17473:0:10:3::: based on this structure:
test2: The login name. !$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ: The password field. The ! at the beginning indicates that the user account is locked. This confirms “User login is locked“ is correct. 17473: Number of days since January 1, 1970, that the password was last changed. (This specific date calculation isn‘t part of the options to evaluate, but it‘s the last change date). 0: Minimum number of days between password changes. This means the user can change their password immediately after the previous change (0 days). This makes “The user can only change his password after 3 days of the previous exchange“ incorrect. 10: Maximum number of days the password is valid. This means the user must change their password every 10 days at most. This confirms “The user must change their password every 10 days at the most“ is correct. 3: Number of days before the password expires that the user will be warned. This confirms “User will be alerted 3 days before your password expires“ is correct. :::: The remaining fields (days for account inactivity after password expires, account expiration date, and a reserved field) are empty or not explicitly set. The option “No description, or full name, has been defined for the user test2“ refers to information typically found in /etc/passwd (the GECOS field), not directly in the /etc/shadow entry provided. While often true in practice if not set in /etc/passwd, this specific shadow entry doesn‘t directly convey that information. The question asks what can be determined from the given entry. Therefore, this statement is not directly derivable from the shadow entry itself.
Incorrect
test2:!$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ:17473:0:10:3::: based on this structure:
test2: The login name. !$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ: The password field. The ! at the beginning indicates that the user account is locked. This confirms “User login is locked“ is correct. 17473: Number of days since January 1, 1970, that the password was last changed. (This specific date calculation isn‘t part of the options to evaluate, but it‘s the last change date). 0: Minimum number of days between password changes. This means the user can change their password immediately after the previous change (0 days). This makes “The user can only change his password after 3 days of the previous exchange“ incorrect. 10: Maximum number of days the password is valid. This means the user must change their password every 10 days at most. This confirms “The user must change their password every 10 days at the most“ is correct. 3: Number of days before the password expires that the user will be warned. This confirms “User will be alerted 3 days before your password expires“ is correct. :::: The remaining fields (days for account inactivity after password expires, account expiration date, and a reserved field) are empty or not explicitly set. The option “No description, or full name, has been defined for the user test2“ refers to information typically found in /etc/passwd (the GECOS field), not directly in the /etc/shadow entry provided. While often true in practice if not set in /etc/passwd, this specific shadow entry doesn‘t directly convey that information. The question asks what can be determined from the given entry. Therefore, this statement is not directly derivable from the shadow entry itself.
Unattempted
test2:!$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ:17473:0:10:3::: based on this structure:
test2: The login name. !$6$eWDJHU5C$OLDNPq/Z6Rf4kY7GQUzzwbJpzJ: The password field. The ! at the beginning indicates that the user account is locked. This confirms “User login is locked“ is correct. 17473: Number of days since January 1, 1970, that the password was last changed. (This specific date calculation isn‘t part of the options to evaluate, but it‘s the last change date). 0: Minimum number of days between password changes. This means the user can change their password immediately after the previous change (0 days). This makes “The user can only change his password after 3 days of the previous exchange“ incorrect. 10: Maximum number of days the password is valid. This means the user must change their password every 10 days at most. This confirms “The user must change their password every 10 days at the most“ is correct. 3: Number of days before the password expires that the user will be warned. This confirms “User will be alerted 3 days before your password expires“ is correct. :::: The remaining fields (days for account inactivity after password expires, account expiration date, and a reserved field) are empty or not explicitly set. The option “No description, or full name, has been defined for the user test2“ refers to information typically found in /etc/passwd (the GECOS field), not directly in the /etc/shadow entry provided. While often true in practice if not set in /etc/passwd, this specific shadow entry doesn‘t directly convey that information. The question asks what can be determined from the given entry. Therefore, this statement is not directly derivable from the shadow entry itself.
Question 3 of 60
3. Question
How can a user define through a command the shell that he will use after each login?
Correct
The chsh command will ask the user which shell it wants to use by default and this setting will be included in the /etc/passwd file, taking effect at the next user login.
Incorrect
The chsh command will ask the user which shell it wants to use by default and this setting will be included in the /etc/passwd file, taking effect at the next user login.
Unattempted
The chsh command will ask the user which shell it wants to use by default and this setting will be included in the /etc/passwd file, taking effect at the next user login.
Question 4 of 60
4. Question
When logging in to Bash, what is the correct order for running the environment definition personal files?
Correct
Personal environment files run in sequence, .bash_profile, .bash_login, and .profile, so only the first found script will run.
Incorrect
Personal environment files run in sequence, .bash_profile, .bash_login, and .profile, so only the first found script will run.
Unattempted
Personal environment files run in sequence, .bash_profile, .bash_login, and .profile, so only the first found script will run.
Question 5 of 60
5. Question
The sysadmin wants to include a new directory in the PATH environment variable. This change must be defined at the time of the login of all system users. Users can not permanently remove this setting. What is the best way to do this?
Correct
The /etc/profile file runs in the login process of all users but can only be edited by the system administrator (root) user.
Incorrect
The /etc/profile file runs in the login process of all users but can only be edited by the system administrator (root) user.
Unattempted
The /etc/profile file runs in the login process of all users but can only be edited by the system administrator (root) user.
Question 6 of 60
6. Question
What is the function of the command: test -x /opt/exercise1.sh?
Correct
The -x option, besides verifying that the file exists, verifies that it has the execute permission, similar function of the -r (read/read) and -w (write/write) options. Other important options for files are -f that checks whether the file exists and whether it is a regular file (not a directory or device) and the -e option that only checks to see if the file exists.
Incorrect
The -x option, besides verifying that the file exists, verifies that it has the execute permission, similar function of the -r (read/read) and -w (write/write) options. Other important options for files are -f that checks whether the file exists and whether it is a regular file (not a directory or device) and the -e option that only checks to see if the file exists.
Unattempted
The -x option, besides verifying that the file exists, verifies that it has the execute permission, similar function of the -r (read/read) and -w (write/write) options. Other important options for files are -f that checks whether the file exists and whether it is a regular file (not a directory or device) and the -e option that only checks to see if the file exists.
Question 7 of 60
7. Question
The author of a script wants that during its execution the user informs its age that will be assigned to the variable AGE. Which instruction should be used?
Correct
At the moment the script arrives at the “read AGE“ statement, the script will wait for the user entry, which will be assigned to the variable AGE.
Incorrect
At the moment the script arrives at the “read AGE“ statement, the script will wait for the user entry, which will be assigned to the variable AGE.
Unattempted
At the moment the script arrives at the “read AGE“ statement, the script will wait for the user entry, which will be assigned to the variable AGE.
Question 8 of 60
8. Question
Regarding the conditional and loop statements used in shell scripts, which statements are true? (Select 3 answers)
Correct
After the statement if a command must be informed, it can be either the test command to generate a condition, or a normal command, like a grep for example, the execution of this command will generate an exit code, 0 is considered true, and different from 0 false. The while statement executes the loop while the given condition is true, the until statement executes the loop until the informed statement is true.
Incorrect
After the statement if a command must be informed, it can be either the test command to generate a condition, or a normal command, like a grep for example, the execution of this command will generate an exit code, 0 is considered true, and different from 0 false. The while statement executes the loop while the given condition is true, the until statement executes the loop until the informed statement is true.
Unattempted
After the statement if a command must be informed, it can be either the test command to generate a condition, or a normal command, like a grep for example, the execution of this command will generate an exit code, 0 is considered true, and different from 0 false. The while statement executes the loop while the given condition is true, the until statement executes the loop until the informed statement is true.
Question 9 of 60
9. Question
Which of the following commands can be used to assign the result of the “hostname“ command to the variable NAME? (Select 2 answers)
Correct
Replacing commands can be done by using the command between statements ′command′, or within $(command).
Incorrect
Replacing commands can be done by using the command between statements ′command′, or within $(command).
Unattempted
Replacing commands can be done by using the command between statements ′command′, or within $(command).
Question 10 of 60
10. Question
Which component of a Desktop Environment is responsible for the interface that enables users to log in to the graphical environment?
Correct
The Display Manager is responsible for controlling the graphic login interface in the graphical environment, the initial screen where the user is informed and the password. As an example we have LightDM, GDM, XDM, LXDM and etc.
Incorrect
The Display Manager is responsible for controlling the graphic login interface in the graphical environment, the initial screen where the user is informed and the password. As an example we have LightDM, GDM, XDM, LXDM and etc.
Unattempted
The Display Manager is responsible for controlling the graphic login interface in the graphical environment, the initial screen where the user is informed and the password. As an example we have LightDM, GDM, XDM, LXDM and etc.
Question 11 of 60
11. Question
What commands can be used to view and edit authorization information for X server access? (Select 2)
Correct
xhost is used to list, add and remove IP, Networks, or Host that may or may not have remote access to the X server. xauth allows this control based on hashs, or magic cookies, that are stored in the ~/.Xauthority file .
Incorrect
xhost is used to list, add and remove IP, Networks, or Host that may or may not have remote access to the X server. xauth allows this control based on hashs, or magic cookies, that are stored in the ~/.Xauthority file .
Unattempted
xhost is used to list, add and remove IP, Networks, or Host that may or may not have remote access to the X server. xauth allows this control based on hashs, or magic cookies, that are stored in the ~/.Xauthority file .
Question 12 of 60
12. Question
Among the options below, what are Desktop Environments used with Linux? (Select 3)
Correct
GNOME, KDE and Xfce are Desktop Environments, besides these we have LXDE, MATE, Cinnamon and several others. XDM is a Display Manager and Mint comes from the Linux Mint distribution, which is different from an DE.
Incorrect
GNOME, KDE and Xfce are Desktop Environments, besides these we have LXDE, MATE, Cinnamon and several others. XDM is a Display Manager and Mint comes from the Linux Mint distribution, which is different from an DE.
Unattempted
GNOME, KDE and Xfce are Desktop Environments, besides these we have LXDE, MATE, Cinnamon and several others. XDM is a Display Manager and Mint comes from the Linux Mint distribution, which is different from an DE.
Question 13 of 60
13. Question
Which Graphic Environment Accessibility setting prevents repeated keystrokes from being printed repeatedly in a document if the same key is repeatedly pressed?
Correct
With “Bounce Keys“ enabled, if the user presses the same keys two or more times quickly, the key will be registered only once. The “Sticky Keys“ is used in case the user is not able to press two keys at the same time.
Incorrect
With “Bounce Keys“ enabled, if the user presses the same keys two or more times quickly, the key will be registered only once. The “Sticky Keys“ is used in case the user is not able to press two keys at the same time.
Unattempted
With “Bounce Keys“ enabled, if the user presses the same keys two or more times quickly, the key will be registered only once. The “Sticky Keys“ is used in case the user is not able to press two keys at the same time.
Question 14 of 60
14. Question
Which configuration file can be queried to see which groups a user belongs to?
Correct
In the /etc/group file you can see both the primary group and the additional groups of each user. /etc/passwd will only show the primary group.
Incorrect
In the /etc/group file you can see both the primary group and the additional groups of each user. /etc/passwd will only show the primary group.
Unattempted
In the /etc/group file you can see both the primary group and the additional groups of each user. /etc/passwd will only show the primary group.
Question 15 of 60
15. Question
What commands and options can be used to get an account out of the lock state? (Select 2 answers)
Correct
Both usermod and passwd can be used to remove lock from an account.
Incorrect
Both usermod and passwd can be used to remove lock from an account.
Unattempted
Both usermod and passwd can be used to remove lock from an account.
Question 16 of 60
16. Question
Which option of the gpg command is required to confirm that the signature inserted in a file is valid?
Correct
The –verify option has the function of analyzing the signature entered in a file, and verifying that it is valid based on the keys that the system has.
Incorrect
The –verify option has the function of analyzing the signature entered in a file, and verifying that it is valid based on the keys that the system has.
Unattempted
The –verify option has the function of analyzing the signature entered in a file, and verifying that it is valid based on the keys that the system has.
Question 17 of 60
17. Question
Which directory contains the configuration files used by the rsyslog log management service?
Correct
The main configuration file is /etc/rsyslog.conf but most of the settings are referenced in the files in the /etc/rsyslog.d/ directory.
Incorrect
The main configuration file is /etc/rsyslog.conf but most of the settings are referenced in the files in the /etc/rsyslog.d/ directory.
Unattempted
The main configuration file is /etc/rsyslog.conf but most of the settings are referenced in the files in the /etc/rsyslog.d/ directory.
Question 18 of 60
18. Question
Which command should be used by the administrator (root) to define that the user “analyst1“ should change his password every 30 days?
Correct
In the chage command, the -M option sets the maximum number of days that the password can be kept before it is changed.
Incorrect
In the chage command, the -M option sets the maximum number of days that the password can be kept before it is changed.
Unattempted
In the chage command, the -M option sets the maximum number of days that the password can be kept before it is changed.
Question 19 of 60
19. Question
What command is used to remove a schedule made by at?
Correct
A job scheduled by at can be removed by the atrm command, however the “at -r“ and “at -d“ options are also supported.
Incorrect
A job scheduled by at can be removed by the atrm command, however the “at -r“ and “at -d“ options are also supported.
Unattempted
A job scheduled by at can be removed by the atrm command, however the “at -r“ and “at -d“ options are also supported.
Question 20 of 60
20. Question
What command can a regular user use to list their active settings in cron?
Correct
The “crontab -l“ command lists the schedules of the current user. The root user can also use the -u option to view schedules for a specific user.
Incorrect
The “crontab -l“ command lists the schedules of the current user. The root user can also use the -u option to view schedules for a specific user.
Unattempted
The “crontab -l“ command lists the schedules of the current user. The root user can also use the -u option to view schedules for a specific user.
Question 21 of 60
21. Question
A user wants to schedule the /opt/system/report.sh script to run every Monday at 7 o‘clock in the morning. How should the crontab record be done?
Correct
The 5 fields of a crontab schedule are: minute hour day-of-month month day-of-week. The * indicates all values (in all minutes, all hours, every day of the month). The last field is referring to the day of the week, 0 and 7 indicate Sunday, 1 = Monday, 2 = Tuesday, 3 = Wednesday, 4 = Thursday, 5 = Friday and 6 = Saturday.
Incorrect
The 5 fields of a crontab schedule are: minute hour day-of-month month day-of-week. The * indicates all values (in all minutes, all hours, every day of the month). The last field is referring to the day of the week, 0 and 7 indicate Sunday, 1 = Monday, 2 = Tuesday, 3 = Wednesday, 4 = Thursday, 5 = Friday and 6 = Saturday.
Unattempted
The 5 fields of a crontab schedule are: minute hour day-of-month month day-of-week. The * indicates all values (in all minutes, all hours, every day of the month). The last field is referring to the day of the week, 0 and 7 indicate Sunday, 1 = Monday, 2 = Tuesday, 3 = Wednesday, 4 = Thursday, 5 = Friday and 6 = Saturday.
Question 22 of 60
22. Question
Which command can be used to run the /opt/software/report.sh script 10 minutes after its execution?
Correct
The systemd-run command creates a job in systemd-timers according to the options used. The –on-active option is equivalent to OnActiveSec and sets a time from running the timer itself.
Incorrect
The systemd-run command creates a job in systemd-timers according to the options used. The –on-active option is equivalent to OnActiveSec and sets a time from running the timer itself.
Unattempted
The systemd-run command creates a job in systemd-timers according to the options used. The –on-active option is equivalent to OnActiveSec and sets a time from running the timer itself.
Question 23 of 60
23. Question
Which environment variable can be set so that a specific user uses a different timezone than the one configured on the Linux machine?
Correct
A user can manually configure the TZ environment variable, or set it in any of the environment definition files (.profile, .bashrc) so that your session uses a different time zone than the machine default.
Incorrect
A user can manually configure the TZ environment variable, or set it in any of the environment definition files (.profile, .bashrc) so that your session uses a different time zone than the machine default.
Unattempted
A user can manually configure the TZ environment variable, or set it in any of the environment definition files (.profile, .bashrc) so that your session uses a different time zone than the machine default.
Question 24 of 60
24. Question
With regard to time zone settings, which statements are true? (Select 3 answers)
Correct
The /etc/localtime file can be either a link to one of the /usr/share/zoneinfo/ files, or a copy of one of those files. The tzselect command only shows the timezone corresponding to a region, but does not make any settings. The /etc/localtime file will have a binary content and can be viewed by the command “zdump -v“
Incorrect
The /etc/localtime file can be either a link to one of the /usr/share/zoneinfo/ files, or a copy of one of those files. The tzselect command only shows the timezone corresponding to a region, but does not make any settings. The /etc/localtime file will have a binary content and can be viewed by the command “zdump -v“
Unattempted
The /etc/localtime file can be either a link to one of the /usr/share/zoneinfo/ files, or a copy of one of those files. The tzselect command only shows the timezone corresponding to a region, but does not make any settings. The /etc/localtime file will have a binary content and can be viewed by the command “zdump -v“
Question 25 of 60
25. Question
What is the encoding format used by default in today‘s Linux environments?
Correct
Linux systems by default use UTF-8. ISO-8859-1 is normally associated with Windows systems. The iconv command can be used to convert from one format to another.
Incorrect
Linux systems by default use UTF-8. ISO-8859-1 is normally associated with Windows systems. The iconv command can be used to convert from one format to another.
Unattempted
Linux systems by default use UTF-8. ISO-8859-1 is normally associated with Windows systems. The iconv command can be used to convert from one format to another.
Question 26 of 60
26. Question
Which parameters should be used in the date command so that the system time is displayed in the following format: “15:33“
Correct
To set the date and time display format of the date command, there are several options that must be included after the + prompt. Among them we have %H = hour in the format 0-23, %M = minutes, %m = month, %I = time in the formed 01-12, among several others.
Incorrect
To set the date and time display format of the date command, there are several options that must be included after the + prompt. Among them we have %H = hour in the format 0-23, %M = minutes, %m = month, %I = time in the formed 01-12, among several others.
Unattempted
To set the date and time display format of the date command, there are several options that must be included after the + prompt. Among them we have %H = hour in the format 0-23, %M = minutes, %m = month, %I = time in the formed 01-12, among several others.
Question 27 of 60
27. Question
Which command is used to check the behavior of the ntpd service?
Correct
The ntpq command can be used in interactive mode or together with several options. As an example, the “ntpq -p“ command displays the status and statistics of each server queried by the service.
Incorrect
The ntpq command can be used in interactive mode or together with several options. As an example, the “ntpq -p“ command displays the status and statistics of each server queried by the service.
Unattempted
The ntpq command can be used in interactive mode or together with several options. As an example, the “ntpq -p“ command displays the status and statistics of each server queried by the service.
Question 28 of 60
28. Question
Which command can be used to check if the system is using some date and time synchronization service like the NTP protocol?
Correct
The timedatectl command displays among other information whether the system is in sync via NTP or another related service.
Incorrect
The timedatectl command displays among other information whether the system is in sync via NTP or another related service.
Unattempted
The timedatectl command displays among other information whether the system is in sync via NTP or another related service.
Question 29 of 60
29. Question
Based on the following configuration of the file /etc/logrotate.conf it is possible to state that: /var/log/syslog { rotate 7 daily missingok notifempty delaycompress compress }
Correct
The “daily“ option causes the file to be rotated daily. “Rotate 7“ indicates that 7-turn logs will be kept, in the case 7 days. The “compress“ option indicates that the files will be compressed, and by default gzip is used.
Incorrect
The “daily“ option causes the file to be rotated daily. “Rotate 7“ indicates that 7-turn logs will be kept, in the case 7 days. The “compress“ option indicates that the files will be compressed, and by default gzip is used.
Unattempted
The “daily“ option causes the file to be rotated daily. “Rotate 7“ indicates that 7-turn logs will be kept, in the case 7 days. The “compress“ option indicates that the files will be compressed, and by default gzip is used.
Question 30 of 60
30. Question
From the lists below, which one has the syslog/rsyslog priorities sorted in the correct way, starting from the most critical?
Correct
The order of priority, from the most critical is: emerg, alert, crit, err, warning, notice, info, debug, none
Incorrect
The order of priority, from the most critical is: emerg, alert, crit, err, warning, notice, info, debug, none
Unattempted
The order of priority, from the most critical is: emerg, alert, crit, err, warning, notice, info, debug, none
Question 31 of 60
31. Question
Which command will wait for connections on port 2244 on the local machine?
Correct
The -l option on netcat (or nc) causes it to go into listen mode and the -p option indicates the port to be activated.
Incorrect
The -l option on netcat (or nc) causes it to go into listen mode and the -p option indicates the port to be activated.
Unattempted
The -l option on netcat (or nc) causes it to go into listen mode and the -p option indicates the port to be activated.
Question 32 of 60
32. Question
What is the common characteristic of the tracepath6, ping6, and traceroute6 commands?
Correct
These are specific versions for testing hosts with IPs in IPV6 format. Ping uses ICMP, traceroute can use ICMP or UDP, and tracepath uses UDP.
Incorrect
These are specific versions for testing hosts with IPs in IPV6 format. Ping uses ICMP, traceroute can use ICMP or UDP, and tracepath uses UDP.
Unattempted
These are specific versions for testing hosts with IPs in IPV6 format. Ping uses ICMP, traceroute can use ICMP or UDP, and tracepath uses UDP.
Question 33 of 60
33. Question
In which file can the following configuration be found? postmaster: root webmaster: mary, paul admin: root hostmaster: mary
Correct
The configuration included in the /etc/aliases file of the statement says that messages sent to the email [email protected] will be forwarded to the users mary and paul, which really must exist in the system.
Incorrect
The configuration included in the /etc/aliases file of the statement says that messages sent to the email [email protected] will be forwarded to the users mary and paul, which really must exist in the system.
Unattempted
The configuration included in the /etc/aliases file of the statement says that messages sent to the email [email protected] will be forwarded to the users mary and paul, which really must exist in the system.
Question 34 of 60
34. Question
Which file should be configured by a regular user so that the messages sent to your internal account are also automatically forwarded to an external email?
Correct
Every user can create and configure the .forward file to perform this redirection. Only the root user can configure the /etc/aliases file.
Incorrect
Every user can create and configure the .forward file to perform this redirection. Only the root user can configure the /etc/aliases file.
Unattempted
Every user can create and configure the .forward file to perform this redirection. Only the root user can configure the /etc/aliases file.
Question 35 of 60
35. Question
In which directory are usually stored the messages received by users of the system?
Correct
The /var/mail/ directory contains a file with the name of each user that has received messages. Another directory that may have the same function is /var/spool/mail, but in general it is a link to the /var/mail/
Incorrect
The /var/mail/ directory contains a file with the name of each user that has received messages. Another directory that may have the same function is /var/spool/mail, but in general it is a link to the /var/mail/
Unattempted
The /var/mail/ directory contains a file with the name of each user that has received messages. Another directory that may have the same function is /var/spool/mail, but in general it is a link to the /var/mail/
Question 36 of 60
36. Question
What is the command used to display the print queue of all printers configured in CUPS?
Correct
The lpq command, without arguments shows the jobs of the default print queue, with the -P option you can see a specific print queue and with -a the print queues of all printers are displayed.
Incorrect
The lpq command, without arguments shows the jobs of the default print queue, with the -P option you can see a specific print queue and with -a the print queues of all printers are displayed.
Unattempted
The lpq command, without arguments shows the jobs of the default print queue, with the -P option you can see a specific print queue and with -a the print queues of all printers are displayed.
Question 37 of 60
37. Question
What command can a regular user use to remove all the print jobs he has sent?
Correct
Without arguments the lprm removes only the last job sent to the queue. Using – all that user‘s jobs are removed from the queue.
Incorrect
Without arguments the lprm removes only the last job sent to the queue. Using – all that user‘s jobs are removed from the queue.
Unattempted
Without arguments the lprm removes only the last job sent to the queue. Using – all that user‘s jobs are removed from the queue.
Question 38 of 60
38. Question
How many hosts can be configured on a subnet with mask /28?
Correct
CIDR /28 is equivalent to the mask 255.255.255.240, which divides a network into 16 subnets, each with 14 hosts. An example is the subnet with network address 192.168.1.0 and broadcast 192.168.1.15, with 0 and 15 not usable by hosts, with 14 addresses remaining. One tip is that it will always be an even number.
Incorrect
CIDR /28 is equivalent to the mask 255.255.255.240, which divides a network into 16 subnets, each with 14 hosts. An example is the subnet with network address 192.168.1.0 and broadcast 192.168.1.15, with 0 and 15 not usable by hosts, with 14 addresses remaining. One tip is that it will always be an even number.
Unattempted
CIDR /28 is equivalent to the mask 255.255.255.240, which divides a network into 16 subnets, each with 14 hosts. An example is the subnet with network address 192.168.1.0 and broadcast 192.168.1.15, with 0 and 15 not usable by hosts, with 14 addresses remaining. One tip is that it will always be an even number.
Question 39 of 60
39. Question
The administrator is using a network traffic monitoring tool and is scanning a lot of traffic over port 110 on one of the network machines. What is the most likely cause of this data flow on the network?
Correct
Port 110 is the port used by POP3, a protocol used to transfer messages from an e-mail server to a local machine through an e-mail client.
Incorrect
Port 110 is the port used by POP3, a protocol used to transfer messages from an e-mail server to a local machine through an e-mail client.
Unattempted
Port 110 is the port used by POP3, a protocol used to transfer messages from an e-mail server to a local machine through an e-mail client.
Question 40 of 60
40. Question
In which system file can the administrator find the main ports used and to which service or protocol is it associated?
Correct
The /etc/services file contains a list of all known ports and which service or protocol each is associated with.
Incorrect
The /etc/services file contains a list of all known ports and which service or protocol each is associated with.
Unattempted
The /etc/services file contains a list of all known ports and which service or protocol each is associated with.
Question 41 of 60
41. Question
Regarding data transmission protocols, it is correct to state that: (Select 3)
Correct
The main difference between the TCP and UDP protocols is that TCP controls the transmission of data, which means that applications that use UDP need to perform the necessary controls themselves. Another consequence is that transmissions that use UDP tend to be faster because there are no internal control processes to be followed.
Incorrect
The main difference between the TCP and UDP protocols is that TCP controls the transmission of data, which means that applications that use UDP need to perform the necessary controls themselves. Another consequence is that transmissions that use UDP tend to be faster because there are no internal control processes to be followed.
Unattempted
The main difference between the TCP and UDP protocols is that TCP controls the transmission of data, which means that applications that use UDP need to perform the necessary controls themselves. Another consequence is that transmissions that use UDP tend to be faster because there are no internal control processes to be followed.
Question 42 of 60
42. Question
Which file contains the name assigned to the local machine?
Correct
The /etc/hostname file simply contains the machine name information. The same information is returned by the command “hostname“.
Incorrect
The /etc/hostname file simply contains the machine name information. The same information is returned by the command “hostname“.
Unattempted
The /etc/hostname file simply contains the machine name information. The same information is returned by the command “hostname“.
Question 43 of 60
43. Question
Which command is used to list all available wireless networks when NetworkManager is in use?
Correct
In general, the operations related to wireless networks are made with the “device wifi“ options, in which case the list option displays the SSIDs visible to the network card. The rescan option can be used to search for new SSIDs.
Incorrect
In general, the operations related to wireless networks are made with the “device wifi“ options, in which case the list option displays the SSIDs visible to the network card. The rescan option can be used to search for new SSIDs.
Unattempted
In general, the operations related to wireless networks are made with the “device wifi“ options, in which case the list option displays the SSIDs visible to the network card. The rescan option can be used to search for new SSIDs.
Question 44 of 60
44. Question
What is the correct input to set the 8.8.8.8 DNS server in the /etc/resolv.conf file?
Correct
The namserver parameter is used to indicate one or more DNS servers.
Incorrect
The namserver parameter is used to indicate one or more DNS servers.
Unattempted
The namserver parameter is used to indicate one or more DNS servers.
Question 45 of 60
45. Question
Which command can be used to disable a network interface based on the /etc/network/interfaces file settings?
Correct
The ifup and ifdown commands can be used to enable or disable an interface based on the /etc/network/interfaces (Debian Standard) or /etc/sysconfig/network-scripts/ (RedHat Standard) settings.
Incorrect
The ifup and ifdown commands can be used to enable or disable an interface based on the /etc/network/interfaces (Debian Standard) or /etc/sysconfig/network-scripts/ (RedHat Standard) settings.
Unattempted
The ifup and ifdown commands can be used to enable or disable an interface based on the /etc/network/interfaces (Debian Standard) or /etc/sysconfig/network-scripts/ (RedHat Standard) settings.
Question 46 of 60
46. Question
What file in a user‘s HOME directory can be used to set shortcut keys in bash?
Correct
The .inputrc file can be used in configuring shortcut keys and how the shell responds to the keys.
Incorrect
The .inputrc file can be used in configuring shortcut keys and how the shell responds to the keys.
Unattempted
The .inputrc file can be used in configuring shortcut keys and how the shell responds to the keys.
Question 47 of 60
47. Question
In what directory are the logs generated by systemd-journal persistently stored?
Correct
Records are persistently stored in the /var/log/journal/ directory. When using volatile storage, the directory used is /run/log/journal/.
Incorrect
Records are persistently stored in the /var/log/journal/ directory. When using volatile storage, the directory used is /run/log/journal/.
Unattempted
Records are persistently stored in the /var/log/journal/ directory. When using volatile storage, the directory used is /run/log/journal/.
Question 48 of 60
48. Question
Which command will set the IP 192.168.1.1 as the system gateway?
Correct
The gateway, or also called the “default route,“ is essential for the system to have external access to your network, usually the Internet. The command “ip route add default via IP“ adds this route, you can also inform the interface at the end of the command as “dev iface“.
Incorrect
The gateway, or also called the “default route,“ is essential for the system to have external access to your network, usually the Internet. The command “ip route add default via IP“ adds this route, you can also inform the interface at the end of the command as “dev iface“.
Unattempted
The gateway, or also called the “default route,“ is essential for the system to have external access to your network, usually the Internet. The command “ip route add default via IP“ adds this route, you can also inform the interface at the end of the command as “dev iface“.
Question 49 of 60
49. Question
Which ping command option does it specify how many test packets will be sent to the destination?
Correct
By default ping will send packets until the command is canceled, with a Ctrl C for example. The -c option specifies how many packets to send, for example: ping -c4 destination
Incorrect
By default ping will send packets until the command is canceled, with a Ctrl C for example. The -c option specifies how many packets to send, for example: ping -c4 destination
Unattempted
By default ping will send packets until the command is canceled, with a Ctrl C for example. The -c option specifies how many packets to send, for example: ping -c4 destination
Question 50 of 60
50. Question
Which command will return all host and IP settings defined in the /etc/hosts file?
Correct
The getent command can be used to get various information referenced in the /etc/nsswitch.conf file, including host, user, group, and so on configurations.
Incorrect
The getent command can be used to get various information referenced in the /etc/nsswitch.conf file, including host, user, group, and so on configurations.
Unattempted
The getent command can be used to get various information referenced in the /etc/nsswitch.conf file, including host, user, group, and so on configurations.
Question 51 of 60
51. Question
Of the services below, what has the main function of resolving network names to the local applications of the system?
Correct
The systemd-resolved service uses the DNS servers configured to do name resolution for local applications, including implementing features such as caching and security validations.
Incorrect
The systemd-resolved service uses the DNS servers configured to do name resolution for local applications, including implementing features such as caching and security validations.
Unattempted
The systemd-resolved service uses the DNS servers configured to do name resolution for local applications, including implementing features such as caching and security validations.
Question 52 of 60
52. Question
Which command sets the expiration date of the user1 account to December 31, 2017?
Correct
In this case attention to the difference between account expiration and password. The usermod -e command sets the account expiration date. Chage -I sets account inactivation and passwd -e forces account expiration.
Incorrect
In this case attention to the difference between account expiration and password. The usermod -e command sets the account expiration date. Chage -I sets account inactivation and passwd -e forces account expiration.
Unattempted
In this case attention to the difference between account expiration and password. The usermod -e command sets the account expiration date. Chage -I sets account inactivation and passwd -e forces account expiration.
Question 53 of 60
53. Question
Which command will display all processes that are using port 80 for data exchange?
Correct
lsof is used to list the files opened by processes and with this it is possible to obtain the desired information. The netstat command can also be used but the syntax shown is not correct.
Incorrect
lsof is used to list the files opened by processes and with this it is possible to obtain the desired information. The netstat command can also be used but the syntax shown is not correct.
Unattempted
lsof is used to list the files opened by processes and with this it is possible to obtain the desired information. The netstat command can also be used but the syntax shown is not correct.
Question 54 of 60
54. Question
The administrator is investigating a security incident on a linux machine and wants a list of the last users who logged into the system. What is the best command to use?
Correct
The last command displays the last logins on the machine. Lastlog shows only the last login of each user on the system. Who displays the logged in users and lastb the last occurrences of login failures.
Incorrect
The last command displays the last logins on the machine. Lastlog shows only the last login of each user on the system. Who displays the logged in users and lastb the last occurrences of login failures.
Unattempted
The last command displays the last logins on the machine. Lastlog shows only the last login of each user on the system. Who displays the logged in users and lastb the last occurrences of login failures.
Question 55 of 60
55. Question
Which configuration line in the /etc/hosts.allow file will release all the network 172.16.10.0/24 access only to the SSH service available on the machine?
Correct
In the file /etc/hosts.allow or hosts.deny, the service will come at the beginning of the line or ALL is used for all, after the : (colon) are listed the IPs or Networks that can or can not use the resource.
Incorrect
In the file /etc/hosts.allow or hosts.deny, the service will come at the beginning of the line or ALL is used for all, after the : (colon) are listed the IPs or Networks that can or can not use the resource.
Unattempted
In the file /etc/hosts.allow or hosts.deny, the service will come at the beginning of the line or ALL is used for all, after the : (colon) are listed the IPs or Networks that can or can not use the resource.
Question 56 of 60
56. Question
Which parameter included in the /etc/xinetd.conf file can be used to disable a service on it?
Correct
In the settings of a service in the xinetd.conf file, the “disable = yes“ parameter will make the service unavailable even though it is configured.
Incorrect
In the settings of a service in the xinetd.conf file, the “disable = yes“ parameter will make the service unavailable even though it is configured.
Unattempted
In the settings of a service in the xinetd.conf file, the “disable = yes“ parameter will make the service unavailable even though it is configured.
Question 57 of 60
57. Question
Which command has the function of converting passwords to the shadow format?
Correct
The pwconv command creates the /etc/shadow file from the /etc/passwd file, leaving the passwords in the default shadow, which is the current Linux standard.
Incorrect
The pwconv command creates the /etc/shadow file from the /etc/passwd file, leaving the passwords in the default shadow, which is the current Linux standard.
Unattempted
The pwconv command creates the /etc/shadow file from the /etc/passwd file, leaving the passwords in the default shadow, which is the current Linux standard.
Question 58 of 60
58. Question
Which file contains the private RSA key of a user?
Correct
The keys are located in the $HOME/.ssh/directory. In the case of a key that uses the RSA algorithm, the id_rsa file contains the private key and the id_rsa.pub file the public key. Other algorithms (DSA, ECDSA, ED25519 and etc) will follow the same pattern of names.
Incorrect
The keys are located in the $HOME/.ssh/directory. In the case of a key that uses the RSA algorithm, the id_rsa file contains the private key and the id_rsa.pub file the public key. Other algorithms (DSA, ECDSA, ED25519 and etc) will follow the same pattern of names.
Unattempted
The keys are located in the $HOME/.ssh/directory. In the case of a key that uses the RSA algorithm, the id_rsa file contains the private key and the id_rsa.pub file the public key. Other algorithms (DSA, ECDSA, ED25519 and etc) will follow the same pattern of names.
Question 59 of 60
59. Question
In which file are the public keys of the gpg that the user owned?
Correct
The keys used by gpg are located in the $HOME/.gnupg/ directory and the pubring.gpg file contains public keys already received by the user.
Incorrect
The keys used by gpg are located in the $HOME/.gnupg/ directory and the pubring.gpg file contains public keys already received by the user.
Unattempted
The keys used by gpg are located in the $HOME/.gnupg/ directory and the pubring.gpg file contains public keys already received by the user.
Question 60 of 60
60. Question
Which option should be set to “yes“ in the /etc/ssh/sshd_config file so that another machine can access the SSH service and the X interface using the “ssh -X“ command?
Correct
The X11Fordwarding option enables the SSH server to receive connections that will access applications in the X Window System.
Incorrect
The X11Fordwarding option enables the SSH server to receive connections that will access applications in the X Window System.
Unattempted
The X11Fordwarding option enables the SSH server to receive connections that will access applications in the X Window System.
X
Use Page numbers below to navigate to other practice tests