Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

101-400 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

101-400 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: LPI Level 1 Exam 101, Junior Level Linux Certification, Part 1 of 2
  • Last Update: Sep 12, 2025
  • Questions and Answers: 177
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

101-400 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

101-400 Practice Exam Questions with Answers LPI Level 1 Exam 101, Junior Level Linux Certification, Part 1 of 2 Certification

Question # 6

Which of the following commands determines the type of a file by using a definition database file which contains information about all common file types?

A.

magic

B.

type

C.

file

D.

pmagic

E.

hash

Full Access
Question # 7

Which of the following commands replaces each occurrence of 'bob' in the file letter with 'Bob' and writes the result to the file newletter?

A.

sed '/bob/Bob' letter > newletter

B.

sed s/bob/Bob/ letter < newletter

C.

sed's/bob/Bob' letter > newletter

D.

sed 's/bob/Bob/g' letter > newletter

E.

sed 's/bob, Bob/' letter > newletter

Full Access
Question # 8

Which of the following commands displays the contents of a gzip compressed tar archive?

A.

gzip archive.tgz | tar xvf -

B.

tar ztf archive.tgz

C.

gzip -d archive.tgz | tar tvf -

D.

tar cf archive.tgz

Full Access
Question # 9

In the vi editor, how can commands such as moving the cursor or copying lines into the buffer be issued multiple times or applied to multiple rows?

A.

By using the command :repeat followed by the number and the command.

B.

By specifying the number right in front of a command such as 4l or 2yj.

C.

By selecting all affected lines using the shift and cursor keys before applying the command.

D.

By issuing a command such as :set repetition=4 which repeats every subsequentcommand 4 times.

Full Access
Question # 10

Which of the following commands will print the last 10 lines of a text file to the standard output?

A.

cat -n 10 filename

B.

dump -n 10 filename

C.

head -n 10 filename

D.

tail -n 10 filename

Full Access
Question # 11

What is the output of the following command?

echo "Hello World" | tr -d aieou

A.

Hello World

B.

eoo

C.

Hll Wrld

D.

eoo Hll Wrld

Full Access
Question # 12

Which of the following are valid stream redirection operators within Bash? (Choose THREE correct answers.)

A.

<

B.

<<<

C.

>

D.

>>>

E.

%>

Full Access
Question # 13

Which command displays a list of all background tasks running in the current shell? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 14

Which of the following statements is correct regarding the command foo 1> bar?

A.

The stdout from the command foo is appended to the file bar.

B.

The stdout from the command foo overwrites the file bar.

C.

The command foo receives its stdin from the file bar.

D.

The command foo receives its stdin from the stdout of the command bar.

E.

The stderr from the command foo is saved to the file bar.

Full Access
Question # 15

Which of the following commands will reduce all consecutive spaces down to a single space?

A.

tr '\s' ' ' < a.txt > b.txt

B.

tr -c ' ' < a.txt > b.txt

C.

tr -d ' ' < a.txt > b.txt

D.

tr -r ' ' '\n' < a.txt > b.txt

E.

tr -s ' ' < a.txt > b.txt

Full Access
Question # 16

After modifying GNU GRUB's configuration file, which command must be run for the changes to take effect?

A.

kill -HUP $(pidof grub)

B.

grub-install

C.

grub

D.

No action is required

Full Access
Question # 17

What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

A.

To create RAID 9 arrays.

B.

To dynamically change the size of logical volumes.

C.

To encrypt logical volumes.

D.

To create snapshots.

E.

To dynamically create or delete logical volumes.

Full Access
Question # 18

Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?

A.

hidemenu

B.

splash

C.

timeout

D.

showmenu

Full Access
Question # 19

When removing a package, which of the following dpkg options will completely remove the files including configuration files?

A.

--clean

B.

--delete

C.

--purge

D.

–remove

Full Access
Question # 20

What command will generate a list of user names from /etc/passwd along with their login shell?

A.

column -s : 1,7 /etc/passwd

B.

chop -c 1,7 /etc/passwd

C.

colrm 1,7 /etc/passwd

D.

cut -d: -f1,7 /etc/passwd

Full Access
Question # 21

Which of the following commands kills the process with the PID 123 but allows the process to "clean up" before exiting?

A.

kill -PIPE 123

B.

kill -KILL 123

C.

kill -STOP 123

D.

kill -TERM 123

Full Access
Question # 22

Which of the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)

A.

shutdown -R 1 now

B.

shutdown -single now

C.

init 1

D.

telinit 1

E.

runlevel 1

Full Access
Question # 23

During a system boot cycle, what program is executed after the BIOS completes its tasks?

A.

The bootloader

B.

The inetd program

C.

The init program

D.

The kernel

Full Access
Question # 24

Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?

A.

/etc/keys

B.

/proc/keys

C.

/etc/inittab

D.

/proc/inittab

E.

/etc/reboot

Full Access
Question # 25

What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?

A.

/lib/init.so

B.

/sbin/init

C.

/etc/rc.d/rcinit

D.

/proc/sys/kernel/init

E.

/boot/init

Full Access
Question # 26

Which of the following kernel parameters instructs the kernel to suppress most boot messages?

A.

silent

B.

verbose=0

C.

nomesg

D.

quiet

Full Access
Question # 27

Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)

A.

shutdown -r now

B.

shutdown -r "rebooting"

C.

telinit 6

D.

telinit 0

E.

shutdown -k now "rebooting"

Full Access
Question # 28

Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel? (Specify the file name only without any path.)

Full Access
Question # 29

Which command will display messages from the kernel that were output during the normal boot sequence?

Full Access
Question # 30

Which of the following examples for Bash file globbing matches a file named root-can-do-this.txt when used in the directory holding that file? (Choose three correct answers.)

A.

root*can?do-this.{txt,odt}

B.

r[oOoO]t-can-do*.txt

C.

{root,user,admin}-can-??-this.txt

D.

root*can*do??this.txt

E.

root***{can,may}-do-this.[tT][xX][tT]

Full Access
Question # 31

Which of the following pieces of information of an existing file is changed when a hard link pointing to that file is created?

A.

File size

B.

Modify timestamp

C.

Link count

D.

Inode number

E.

Permissions

Full Access
Question # 32

In Bash, inserting 2>&1 after a command redirects:

A.

standard error to standard input.

B.

standard input to standard error.

C.

standard output to standard error.

D.

standard error to standard output.

E.

standard outputto standard input.

Full Access
Question # 33

Which of the following is correct when talking about mount points?

A.

Every existing directory can be used as a mount point.

B.

Only empty directories can be used as a mount point.

C.

Directories need to have the SetUID flag set to be used as a mount point.

D.

Files within a directory are deleted when the directory is used as a mount point.

Full Access
Question # 34

Which of the following commands is used to update the list of available packages when using dpkg based package management?

A.

apt-get update

B.

apt-get upgrade

C.

apt-cache update

D.

apt-get refresh

E.

apt-cache upgrade

Full Access
Question # 35

Which world-writable directory should be placed on a separate partition in order to prevent users from being able to fill up the / filesystem? (Specify the full path to the directory.)

Full Access
Question # 36

Which function key is used to start Safe Mode in Windows NT?

A.

F10

B.

F8

C.

F6

D.

Windows NT does not support Safe Mode

Full Access
Question # 37

What is the name of the main configuration file for GNU GRUB? (Specify the file name only without any path.)

Full Access
Question # 38

Which of the following commands can be used to download the RPM package kernel without installing it?

A.

yum download --no-install kernel

B.

yumdownloader kernel

C.

rpm --download --package kernel

D.

rpmdownload kernel

Full Access
Question # 39

In which directory must definition files be placed to add additional repositories to yum?

Full Access
Question # 40

Which file should be edited to select the network locations from which Debian installation package files are loaded?

A.

/etc/dpkg/dpkg.cfg

B.

/etc/apt/apt.conf

C.

/etc/apt/apt.conf.d

D.

/etc/apt/sources.list

E.

/etc/dpkg/dselect.cfg

Full Access
Question # 41

Which of the following commands lists all currently installed packages when using RPM package management?

A.

yum --query --all

B.

yum --list --installed

C.

rpm --query --all

D.

rpm --list –installed

Full Access
Question # 42

Which of the following commands updates the linker cache of shared libraries?

A.

mkcache

B.

soconfig

C.

mkldconfig

D.

lddconfig

E.

ldconfig

Full Access
Question # 43

Which of the following is a limitation of the cut command?

A.

Thecutcommand can only select output by field position.

B.

Thecutcommand cannot reorder fields.

C.

Thecutcommand only works on ASCIItext.

D.

Thecutcommand cannot use different input and output delimiters.

Full Access
Question # 44

Which of the following commands enables the setuid (suid) permission on the executable /bin/foo?

A.

chmod 1755 /bin/foo

B.

chmod 4755 /bin/foo

C.

chmod u-s /bin/foo

D.

chmod 755+s /bin/foo

Full Access
Question # 45

Which of the following are modes of the vi editor? (Choose two.)

A.

edit mode

B.

insert mode

C.

change mode

D.

review mode

E.

command mode

Full Access
Question # 46

What is the purpose of the Filesystem Hierarchy Standard?

A.

It is a security model used to ensurefiles are organized according to their permissions and accessibility.

B.

It provides unified tools to create, maintain and manage multiple filesystems in a common way.

C.

It defines a common internal structure of inodes for all compliant filesystems.

D.

Itis a distribution neutral description of locations of files and directories.

Full Access
Question # 47

Which of the following commands can be used to locate programs and their corresponding man pages and configuration files?

A.

dirname

B.

which

C.

basename

D.

query

E.

whereis

Full Access
Question # 48

Which command is used to create and initialize the files used to store quota information? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 49

Which of the following commands set the sticky bit for the directory /tmp? (Choose TWO correct answers.)

A.

chmod +s /tmp

B.

chmod +t /tmp

C.

chmod 1775 /tmp

D.

chmod 4775 /tmp

E.

chmod 2775 /tmp

Full Access
Question # 50

Which of the following commands shows the definition of a given shell command?

A.

where

B.

stat

C.

type

D.

case

Full Access
Question # 51

Which of the following commands will change the quota for a specific user?

A.

edquota

B.

repquota

C.

quota -e

D.

quota

Full Access
Question # 52

Pressing the Ctrl-C combination on the keyboard while a command is executing in the foreground sends which of the following signal codes?

A.

1(SIGHUP)

B.

2(SIGINT)

C.

3(SIGQUIT)

D.

9(SIGKILL)

E.

15(SIGTERM)

Full Access
Question # 53

Which of the following commands will print important system information such as the kernel version and machine hardware architecture?

A.

sysinfo

B.

uname

C.

lspci

D.

arch

E.

info

Full Access