Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

101-500 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

101-500 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: LPIC-1 Exam 101, Part 1 of 2, version 5.0
  • Last Update: Oct 30, 2025
  • Questions and Answers: 293
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

101-500 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

101-500 Practice Exam Questions with Answers LPIC-1 Exam 101, Part 1 of 2, version 5.0 Certification

Question # 6

Which of the following commands changes the ownership of file.txt to the user dan and the group staff?

A.

chown dan/staff file.txt

B.

chown dan:staff file.txt

C.

chown -u dan -g staff file.txt

D.

chown dan -g staff file.txt

Full Access
Question # 7

What does the command mount -a do?

A.

It ensures that all file systems listed with the option noauto in /etc/fstab are mounted.

B.

It shows all mounted file systems that have been automatically mounted.

C.

It opens an editor with root privileges and loads /etc/fstab for editing.

D.

It ensures that all file systems listed with the option auto in /etc/fstab are mounted.

E.

It ensures that all file systems listed in /etc/fstab are mounted regardless of their options.

Full Access
Question # 8

Which of the following statements is correct for a command line ending with a & character?

A.

The command’s output is redirected to/dev/null.

B.

The result of the command defines if the next command will be run.

C.

Thecommand is run in background of the current shell.

D.

The command is run as a direct child of theinitprocess.

Full Access
Question # 9

Which variable defines the directories in which a Bash shell searches for executable commands?

A.

BASHEXEC

B.

BASHRC

C.

PATH

D.

EXECPATH

E.

PATHRC

Full Access
Question # 10

Which of the following commands changes all CR-LF line breaks in the text file userlist.txt to Linux standard LF line breaks and stores the result in newlist.txt?

A.

tr –d ‘\r’ < userlist.txt > newlist.txt

B.

tr –c ‘\n\r’ ‘’ userlist.txt

C.

tr ‘\r\n’ ‘’ newlist.txt

D.

tr ‘\r’ ‘\n’ userlist.txt newlist.txt

E.

tr –s ‘/^M/^J/’ userlist.txt newlist.txt

Full Access
Question # 11

When using rpm --verify to check files created during the installation of RPM packages, which of the following information is taken into consideration? (Choose THREE correct answers.)

A.

Timestamps

B.

MD5 checksums

C.

Inodes

D.

File sizes

E.

GnuPG signatures

Full Access
Question # 12

Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, which single character command will insert the deleted content below the current line?

A.

i (lowercase)

B.

P (uppercase)

C.

p (lowercase)

D.

U (uppercase)

E.

u (lowercase)

Full Access
Question # 13

Which of the following commands can be used to create a USB storage media from a disk image?

A.

gdisk

B.

dd

C.

cc

D.

fdisk

E.

mount

Full Access
Question # 14

What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?

A.

/lib/init.so

B.

/sbin/init

C.

/etc/rc.d/rcinit

D.

/proc/sys/kernel/init

E.

/boot/init

Full Access
Question # 15

Which command will display messages from the kernel that were output during the normal boot sequence?

Full Access
Question # 16

Which of the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)

A.

shutdown -R 1 now

B.

shutdown -single now

C.

init 1

D.

telinit 1

E.

runlevel 1

Full Access
Question # 17

Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel? (Specify the file name only without any path.)

Full Access
Question # 18

You suspect that a new ethernet card might be conflicting with another device. Which file should you check within the /proc tree to learn which IRQs are being used by which kernel drivers?

Full Access
Question # 19

Which of the following information is stored within the BIOS? (Choose TWO correct answers.)

A.

Boot device order

B.

Linux kernel version

C.

Timezone

D.

Hardware configuration

E.

The system's hostname

Full Access
Question # 20

Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)

A.

shutdown -r now

B.

shutdown -r "rebooting"

C.

telinit 6

D.

telinit 0

E.

shutdown -k now "rebooting"

Full Access
Question # 21

What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)

A.

Entries for all possible devices get created on boot even if those devices are not connected.

B.

Additional rules for udev can be created by adding them to /etc/udev/rules.d/.

C.

When using udev, it is not possible to create block orcharacter devices in /dev/ using mknod.

D.

The /dev/ directory is a filesystem of type tmpfs and is mounted by udev during system startup.

E.

The content of /dev/ is stored in /etc/udev/dev and is restored during system startup.

Full Access
Question # 22

Which of the following kernel parameters instructs the kernel to suppress most boot messages?

A.

silent

B.

verbose=0

C.

nomesg

D.

quiet

Full Access
Question # 23

Which run levels should never be declared as the default run level when using SysV init? (Choose TWO correct answers.)

A.

0

B.

1

C.

3

D.

5

E.

6

Full Access
Question # 24

During a system boot cycle, what is the program that is run after the BIOS completes its tasks?

A.

The bootloader

B.

The inetd program

C.

The init program

D.

The kernel

Full Access
Question # 25

Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?

A.

/etc/keys

B.

/proc/keys

C.

/etc/inittab

D.

/proc/inittab

E.

/etc/reboot

Full Access
Question # 26

Which of the following statements is correct when talking about /proc/?

A.

All changes to files in /proc/ are stored in /etc/proc.d/ and restored on reboot.

B.

All files within /proc/ are read-only and their contents cannot be changed.

C.

All changes to files in /proc/ are immediately recognized by the kernel.

D.

All files within /proc/ are only readable by the root user.

Full Access
Question # 27

What information can the lspci command display about the system hardware? (Choose THREE correct answers.)

A.

Device IRQ settings

B.

PCI bus speed

C.

System battery type

D.

Device vendor identification

E.

Ethernet MAC address

Full Access
Question # 28

Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)

A.

startd

B.

systemd

C.

Upstart

D.

SysInit

E.

SysV init

Full Access
Question # 29

Which shell command is used to continue background execution of a suspended command?

A.

&

B.

bg

C.

cont

D.

exec

E.

:&

Full Access
Question # 30

What does the? symbol within regular expressions represent?

A.

Match the preceding qualifier one or more times.

B.

Match the preceding qualifier zero or more times.

C.

Match the preceding qualifier zero or one times.

D.

Match a literal? character.

Full Access
Question # 31

What is the purpose of the Bash built-in export command?

A.

It allows disks to be mounted remotely.

B.

It runs a command as a process in a subshell.

C.

It makes the command history available to subshells.

D.

It sets up environment variables for applications.

E.

It shares NFS partitions for use by other systems on the network.

Full Access
Question # 32

Which of the following characters can be combined with a separator string in order to read from the current input source until the separator string, which is on a separate line and without any trailing spaces, is reached?

A.

<<

B.

<|

C.

!<

D.

&<

Full Access
Question # 33

The dpkg-____ command will ask configuration questions for a specified package, just as if the package were being installed for the first time.

Full Access
Question # 34

Which command creates a swap space on a block device or a file? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 35

A Debian package creates several files during its installation. Which of the following commands searches for packages owning the file /etc/debian_version?

A.

apt-get search /etc/debian_version

B.

apt –r /etc/debian_version

C.

find /etc/debian_version -dpkg

D.

dpkg –S /etc/debian_version

E.

apt-file /etc/debian_version

Full Access
Question # 36

In Bash, inserting 1>&2 after a command redirects

A.

standard error to standard input.

B.

standard input to standard error.

C.

standard output to standard error.

D.

standard error to standard output.

E.

standard output to standard input.

Full Access
Question # 37

What command will generate a list of user names from /etc/passwd along with their login shell?

A.

column -s : 1,7 /etc/passwd

B.

chop -c 1,7 /etc/passwd

C.

colrm 1,7 /etc/passwd

D.

cut -d: -f1,7 /etc/passwd

Full Access
Question # 38

When given the following command line.

echo "foo bar" | tee bar | cat

Which of the following output is created?

A.

cat

B.

foo bar

C.

tee bar

D.

bar

E.

foo

Full Access
Question # 39

What is the effect of the egrep command when the -v option is used?

A.

It enables color to highlight matching parts.

B.

It only outputs non-matching lines.

C.

It shows the command's version information.

D.

It changes the output order showing the last matching line first.

Full Access
Question # 40

Which of the following commands changes the number of days before the ext3 filesystem on /dev/sda1 has to run through a full filesystem check while booting?

A.

tune2fs -d 200 /dev/sda1

B.

tune2fs -c 200 /dev/sda1

C.

tune2fs -i 200 /dev/sda1

D.

tune2fs -n 200 /dev/sda1

E.

tune2fs --days 200 /dev/sda1

Full Access
Question # 41

Which of the following commands can be used to determine how long the system has been running? (Choose TWO correct answers.)

A.

uptime

B.

up

C.

top

D.

uname -u

E.

time –up

Full Access
Question # 42

Which of the following commands will display the inode usage of each mounted filesystem?

A.

du –i

B.

df –i

C.

lsfs –i

D.

printfs –i

Full Access
Question # 43

Which of the following is a limitation of the cut command?

A.

Thecutcommand can only select output by field position.

B.

Thecutcommand cannot reorder fields.

C.

Thecutcommand only works on ASCII text.

D.

Thecutcommand cannot use different input and output delimiters.

Full Access
Question # 44

After moving data to a new filesystem, how can the former path of the data be kept intact in order to avoid reconfiguration of existing applications? (Choose TWO correct answers.)

A.

By creating an ACL redirection from the old to the new path of the data.

B.

By creating a hard link from the old to the new path of the data.

C.

By creating a symbolic link from the old to the new path of the data.

D.

By running the command touch on the old path.

E.

By mounting the new filesystem on the original path of the data.

Full Access
Question # 45

In the vi editor, what vi command will copy (but not paste) from the current line at the cursor and the following 16 lines (17 lines total)? Specify the correct vi command without spaces.

Full Access
Question # 46

Which of the following commands can be used to create a new file that is 100kB in size?

A.

dd

B.

file

C.

mkfile

D.

touch

Full Access
Question # 47

When using regular expressions, which of the following characters match the beginning of a line?

A.

^

B.

?

C.

*

D.

+

E.

$

Full Access
Question # 48

Which program updates the database that is used by the locate command?

Full Access
Question # 49

In the vi editor, which of the following commands will copy the current line into the vi buffer?

A.

c

B.

cc

C.

1c

D.

yy

E.

1y

Full Access
Question # 50

Which grep command will print only the lines that do not end with a / in the file foo?

A.

grep'/$' foo

B.

grep '/#' foo

C.

grep -v '/$' foo

D.

grep -v '/#' foo

Full Access
Question # 51

Which command will disable swapping on a device? (Specify ONLY the command without any path or parameters.)

    Swapoff

    /sbin/swapoff

Full Access
Question # 52

Which of the following commands can be used to perform a full text search on all available packages on a Debian system?

A.

apt

B.

apt-cache

C.

apt-get

D.

apt-search

E.

dpkg

Full Access
Question # 53

Which option to the tee command will cause the output to be concatenated on the end of the output file instead of overwriting the existing file contents?

A.

–a

B.

–c

C.

--no-clobber

D.

--continue

Full Access
Question # 54

Which program runs a command in specific intervals and refreshes the display of the program’s output? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 55

Pressing the Ctrl-C combination on the keyboard while a command is executing in the foreground sends which of the following signal codes?

A.

1(SIGHUP)

B.

2(SIGINT)

C.

3(SIGQUIT)

D.

9(SIGKILL)

E.

15(SIGTERM)

Full Access
Question # 56

Which umask value will result in the default access permissions of 600 (rw-------) for files and 700 (rwx------) for directories? (Specify only the numerical umask value.)

Full Access
Question # 57

Which command shows all shared libraries required by a binary executable or another shared library? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 58

Which command will uninstall a package but leave its configuration files in case the package is re-installed?

A.

dpkg –s pkgname

B.

dpkg –L pkgname

C.

dpkg –P pkgname

D.

dpkg –r pkgname

Full Access
Question # 59

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

A.

core

B.

edquota

C.

quota

D.

ulimit

E.

ktrace

Full Access
Question # 60

Which command uninstalls a package but keeps its configuration files in case the package is re-installed?

A.

dpkg –s pkgname

B.

dpkg –L pkgname

C.

dpkg –P pkgname

D.

dpkg –v pkgname

E.

dpkg –r pkgname

Full Access
Question # 61

Which of the following commands installs GRUB 2 into the master boot record on the third hard disk?

A.

grub2 install /dev/sdc

B.

grub-mkrescue /dev/sdc

C.

grub-mbrinstall /dev/sdc

D.

grub-setup /dev/sdc

E.

grub-install /dev/sdc

Full Access
Question # 62

Which of the following commands redirects the output of ls to standard error?

A.

ls >-1

B.

ls <

C.

ls >&2

D.

ls >>2

E.

ls |error

Full Access
Question # 63

What is true about the following command?

Nmcli device wifi connect WIFIoI

A.

NetworkManager opens a new public hotspol with the SSID wifioi

B.

NetworkManager creates an unconfigured new virtual network interface named wifioi.

C.

NetworkManager creates a new wifi connection wifioi and activates it

D.

NetworkManager returns an error in case the connection wifioi does not exist

E.

NetworkManager reports an error because wifioi is an invalid wifi device

Full Access
Question # 64

What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?

A.

The command is SetUID and it will be executed with the effective rights of the owner.

B.

The command will be executed with the effective rights of the group instead of the owner.

C.

The execute flag is not set for the owner. Therefore, the SetUID flag is ignored.

D.

The command will be executed with the effective rights of the owner and group.

Full Access
Question # 65

Which of the following files is not read directly by a Bash login shell?

A.

-/.bashrc

B.

-/.bash_profile

C.

-/.bash_login

D.

-/.profile

E.

/etc/profile

Full Access
Question # 66

Which of the following files, located in a user’s home directory, contains the Bash history?

A.

.bashrc_history

B.

.bash_histfile

C.

.history

D.

.bash_history

E.

.history_bash

Full Access
Question # 67

Which of the following tasks are handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

A.

Configure additional devices like new monitors or projectors when they are attached

B.

Start and prepare the desktop environment for the user

C.

Create an X11 configuration file for the current graphic devices and monitors

D.

Lock the screen when the user was inactive for a configurable amount of time

E.

Handle the login of a user

Full Access
Question # 68

Consider the following directory:

drwxrwxr-x 2 root sales 4096 Jan 1 15:21 sales

Which command ensures new files created within the directory sales are owned by the group sales? (Choose two.)

A.

chmod g+s sales

B.

setpol –R newgroup=sales sales

C.

chgrp –p sales sales

D.

chown --persistent *.sales sales

E.

chmod 2775 sales

Full Access
Question # 69

What option to useradd creates a new user's home directory and provisions it with a set of standard files'? (Specify ONLY the option name without any values or parameters.)

Full Access
Question # 70

An administrator has issued the following command:

grub-install --root-directory=/custom-grub /dev/sda

In which directory will new configuration files be found? (Provide the full directory path only without the filename)

A.

/custom-grub/boot/grub/

B.

/custom-grub/boot/grub

Full Access
Question # 71

Which of the following statements is correct regarding the command foo 1> bar?

A.

The stdout from the command foo is appended to the file bar.

B.

The stdout from the command foo overwrites the file bar.

C.

The command foo receives its stdin from the file bar.

D.

The command foo receives its stdin from the stdout of the command bar.

E.

The stderr from the command foo is saved to the file bar.

Full Access
Question # 72

How do shadow passwords improve the password security in comparison to standard non-shadow passwords'?

A.

Regular users do not have access to the password hashes of shadow passwords

B.

Every shadow password is valid for 45 days and must be changed afterwards

C.

The system's host key is used to encrypt all shadow passwords.

D.

Shadow passwords are always combined with a public key that has to match the user's private key

E.

Shadow passwords are stored in plain text and can be checked for weak passwords

Full Access
Question # 73

What is true about NetworkManager on a Linux system that uses its distnbution's mechanisms to configure network interfaces? (Choose TWO correct answers )

A.

NetworkManager reconfigures all network interfaces to use DHCP unless they are specifically managed by NetworkManager

B.

NetworkManager must be explicitly enabled for each interface it should manage

C.

NetworkManager by default does not change interfaces which are already configured

D.

NetworkManager disables all interfaces which were not configured by NetworkManager

E.

NetworkManager can be configured to use the distribution's network interface configuration

Full Access
Question # 74

When removing a package, which of the following dpkg options will completely remove the files including configuration files?

A.

--clean

B.

--delete

C.

--purge

D.

–remove

Full Access
Question # 75

How can a specific user be prevented from scheduling tasks with at?

A.

By adding the specific user to the/etc/at.allow file

B.

By adding the specific user to the 'deny] section in the/etc/atd.conf lile

C.

By adding the specific user to the no jobs group

D.

By adding the specific user to the /etc/at. deny file

E.

By executing the atd —deny [user] command

Full Access
Question # 76

What is the purpose of the iccnv command?

A.

It converts bitmap images from one format to another such as PNG to JPEG

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS)

C.

It converts files from one character set to an other

D.

It changes the mode of an inode in the ext4 filesystem

E.

It displays additional meta information from icon files ending in .ico

Full Access
Question # 77

In which directory must definition files be placed to add additional repositories to yum?

    /etc/yum.repos.d

    /etc/yum.repos.d/

    yum.repos.d

    yum.repos.d/

Full Access
Question # 78

Which of the following apt-get commands will install the newest versions of all currently installed packages without removing any packages or installing new packages that are not already installed?

A.

auto-update

B.

upgrade

C.

dist-upgrade

D.

install

E.

update

Full Access
Question # 79

Which RPM command will output the name of the package which supplied the file /etc/exports?

A.

rpm -F /etc/exports

B.

rpm -qf /etc/exports

C.

rpm -Kl /etc/exports

D.

rpm -qp /etc/exports

E.

rpm -qi/etc/exports

Full Access
Question # 80

Typically, which top level system directory is used for files and data that change regularly while the system is running and are to be kept between reboots? (Specify only the top level directory)

A.

/var

B.

/var/,

C.

Var

D.

var/

Full Access
Question # 81

Which function key is used to start Safe Mode in Windows NT?

A.

F10

B.

F8

C.

F6

D.

Windows NT does not support Safe Mode

Full Access
Question # 82

Which option to the yum command will update the entire system? (Specify ONLY the option name without any additional parameters.)

      update

      upgrade

Full Access
Question # 83

Which of the following commands overwrites the bootloader located on /dev/sda without overwriting the partition table or any data following it?

A.

dd if=/dev/zero of=/dev/sda bs=512

B.

dd if=/dev/zero of=/dev/sda bs=512 count=1

C.

dd if=/dev/zero of=/dev/sda bs=440 count=1

D.

dd if=/dev/zero of=/dev/sda bs=440

Full Access
Question # 84

Which of the following commands lists the dependencies of a given dpkg package?

A.

apt-cache depends-onpackage

B.

apt-cache dependencies package

C.

apt-cache depends package

D.

apt-cache requires package

Full Access
Question # 85

Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?

A.

hidemenu

B.

splash

C.

timeout

D.

showmenu

Full Access
Question # 86

Which Debian package management tool asks the configuration questions for a specific already installed package just as if the package were being installed for the first time? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 87

What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

A.

To create RAID 9 arrays.

B.

To dynamically change the size of logical volumes.

C.

To encrypt logical volumes.

D.

To create snapshots.

E.

To dynamically create or delete logical volumes.

Full Access