Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

102-500 Sample Questions Answers

Questions 4

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.)

Options:

A.

The list of users that belong to the group.

B.

The home directory of the group.

C.

The name of the group.

D.

The description of the group.

E.

The password of the group.

Buy Now
Questions 5

Where are user specific crontabs stored?

Options:

A.

In the database file /etc/crontab.db which is shared by all users.

B.

As individual per-user files within /var/spool/cron.

C.

As individual per-user files in /etc/cron.user.d.

D.

In the .crontab file in the user's home directory.

E.

In the file /var/cron/user-crontab which is shared by all users.

Buy Now
Questions 6

Which file specifies the user accounts that can NOT submit jobs via at or batch? (Provide the full path and filename)

Options:

Buy Now
Questions 7

Which commands can you use to change a user's account aging information? (Choose THREE correct answers.)

Options:

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Buy Now
Questions 8

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Options:

Buy Now
Questions 9

Which command can be used to delete a group from a Linux system?

Options:

A.

groupdel

B.

groupmod

C.

groups

D.

groupedit

Buy Now
Questions 10

The ________ command is used to add a group to the system.

Options:

Buy Now
Questions 11

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

Options:

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Buy Now
Questions 12

What is true about the ntpdate command?

Options:

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Buy Now
Questions 13

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 14

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Options:

Buy Now
Questions 15

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Options:

Buy Now
Questions 16

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.)

Options:

A.

--from=

B.

--since=

C.

--until=

D.

--upto=

E.

--date=

Buy Now
Questions 17

Which of the following commands is used to rotate, compress, and mail system logs?

Options:

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Buy Now
Questions 18

What command should be used to print a listing of email in the system's mail queue?

Options:

A.

lpq

B.

mailq

C.

mlq

D.

sendmail –l

Buy Now
Questions 19

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 20

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

Options:

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Buy Now
Questions 21

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Options:

Buy Now
Questions 22

What is pool.ntp.org?

Options:

A.

A deprecated feature for maintaining system time in the Linux kernel

B.

A website which provides binary and source packages for the OpenNTPD project

C.

A virtual cluster of various timeservers

D.

A community website used to discuss the localization of Linux

Buy Now
Questions 23

What is true regarding a default route?

Options:

A.

The default route is always used first. When the default route is not available more specific routes are tried.

B.

When a default route is set, all other routes are disabled until the default route is deleted.

C.

The default route is only used if there is not a more specific route to a destination host or network.

D.

Without a default route, no network communication even in directly attached networks is possible.

Buy Now
Questions 24

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Options:

Buy Now
Questions 25

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

Options:

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Buy Now
Questions 26

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

Options:

A.

The local routing information may be corrupted and must be re-validated using a routing protocol.

B.

One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.

C.

There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.

D.

DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

Buy Now
Questions 27

With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)

Options:

Buy Now
Questions 28

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

Options:

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Buy Now
Questions 29

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Buy Now
Questions 30

Which of the following programs can be used to determine the routing path to a given destination?

Options:

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Buy Now
Questions 31

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)

Options:

A.

2001:db8::15 www.example.com www

B.

www.example.com www 203.0.13.15

C.

203.0.113.15 www.example.com www

D.

www.example.com,www 203.0.13.15,2001:db8::15

E.

2003.0.113.15,2001:db8::15 www.example.com www

Buy Now
Questions 32

Which of the following statements is valid in the file /etc/nsswitch.conf?

Options:

A.

multi on

B.

192.168.168.4 dns-server

C.

hosts: files dns

D.

include /etc/nsswitch.d/

Buy Now
Questions 33

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

Options:

A.

resolve

B.

dns

C.

remote

D.

files

E.

hosts

Buy Now
Questions 34

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

Options:

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Buy Now
Questions 35

What output will the following command produce?

seq 1 5 20

Options:

A.

1

6

1

1

1

6

B.

1

5

10

15

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Buy Now
Questions 36

What is the purpose of the file /etc/profile?

Options:

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Buy Now
Questions 37

When the command echo $$ outputs 12942, what is the meaning of 12942?

Options:

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the process ID of the last command executed.

D.

It is the process ID of the last command which has been placed in the background.

Buy Now
Questions 38

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Options:

Buy Now
Questions 39

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Buy Now
Questions 40

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Options:

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Buy Now
Questions 41

After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?

Options:

A.

A B

B.

A B C

C.

A C

D.

B C

E.

C B A

Buy Now
Questions 42

Which of the following commands lists all defined variables and functions within Bash?

Options:

A.

env

B.

set

C.

env -a

D.

echo $ENV

Buy Now
Questions 43

What output will the command seq 10 produce?

Options:

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Buy Now
Questions 44

Which command makes the shell variable named VARIABLE visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Buy Now
Questions 45

Which command allows you to make a shell variable visible to subshells?

Options:

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Buy Now
Questions 46

What is the difference between the commands test -e path and test -f path?

Options:

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Buy Now
Questions 47

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

Options:

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Buy Now
Questions 48

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Buy Now
Questions 49

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Buy Now
Questions 50

What is the purpose of the Sticky Keys feature in X?

Options:

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Buy Now
Questions 51

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Buy Now
Questions 52

Why is the xhost program considered dangerous to use?

Options:

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Buy Now
Questions 53

What is the purpose of a screen reader?

Options:

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Buy Now
Questions 54

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Buy Now
Questions 55

Which of the following commands shows the current color depth of the X Server?

Options:

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Buy Now
Questions 56

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Options:

Buy Now
Questions 57

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Buy Now
Questions 58

How is a display manager started?

Options:

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Buy Now
Questions 59

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Buy Now
Questions 60

What command is used to add OpenSSH private keys to a running ssh-agen . instance? (Specify the command name only without any path.)

Options:

Buy Now
Questions 61

Which of the following statements is true regarding systemd timer units?

Options:

A.

Timer units can only be defined within a service unit’s file.

B.

The command executed by the timer is specified in the timer unit’s [Cmd] section.

C.

A dedicated system service, systemd-cron, handles the execution of timer units.

D.

Timer units only exist in the system scope and are not available for users.

E.

Each systemd timer unit controls a specific systemd service unit.

Buy Now
Questions 62

Which of Ihe following commands will delete Ihe defaull gateway from the system's IP touting table? (Choose TWO correct answers.)

Options:

A.

Ifconfig unaet default

B.

Route del default

C.

Ip route del default

D.

Netstat –r default

E.

Sysct1 ipv1default_gw=0

Buy Now
Questions 63

Which file is processed by newaliases? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 64

After editing the TCP wrapper configuration to grant specific hosts access to a service. When do these changes become effective?

Options:

A.

The new configuration becomes effective after restarting the respective service.

B.

The new configuration becomes effective at the next system reboot.

C.

The new configuration becomes effective when the last established connection to the service is closed.

D.

The new configuration becomes effective after restarting the tcpd service.

E.

The new configuration becomes effective immediately for all new connections.

Buy Now
Questions 65

What is the purpose of TCP wrapper?

Options:

A.

Manage and adjust bandwidth used by TCP services.

B.

Bind a network service to a TCP port.

C.

Encapsulate TCP messages in IP packets.

D.

Add SSL support to plain text TCP services.

E.

Limit access to a network service.

Buy Now
Questions 66

How do shadow passwords improve the password security in comparison to standard non-shadow passwords?

Options:

A.

Regular users do not have access to the password hashes of shadow passwords.

B.

Every shadow password is valid tor 45 days and must be changed afterwards.

C.

The system's host key is used to encrypt all shadow passwords.

D.

Shadow passwords are always combined with a public key that has to match the user's private key.

E.

Shadow passwords are stored in plain text and can be checked for weak passwords.

Buy Now
Questions 67

Depending on a system's configuration, which of the following files can be used to enable and disable network services running on this host?

Options:

A.

/etc/profile

B.

/etc/xinetd.conf

C.

/etc/ports

D.

/et/host.conf

E.

/etc/host.conf

Buy Now
Questions 68

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Options:

Buy Now
Questions 69

What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the directory.)

Options:

Buy Now
Questions 70

Which of the following commands displays all environment and shell variables?

Options:

A.

getargs

B.

lsenv

C.

ls

D.

env

E.

lsshell

Buy Now
Exam Code: 102-500
Exam Name: LPIC-1 Exam 102, Part 2 of 2, version 5.0
Last Update: Mar 27, 2025
Questions: 235
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 102-500