Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

102-400 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

102-400 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: LPI Level 1 Exam 102 - Junior Level Linux Certification - Part 2 of 2
  • Last Update: Apr 29, 2024
  • Questions and Answers: 120
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

102-400 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

102-400 Practice Exam Questions with Answers LPI Level 1 Exam 102 - Junior Level Linux Certification - Part 2 of 2 Certification

Question # 6

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Full Access
Question # 7

Which file inside the CUPS configuration directory contains the definition of the printers?

A.

cups-devices.conf

B.

snmp.conf

C.

printcap.conf

D.

printers.conf

E.

cupsd.conf

Full Access
Question # 8

Which environment variable should be set in order to change the time zone for the commands run from within the environment variable's scope? (Specify the variable name only.)

Full Access
Question # 9

What is the purpose of a screen reader?

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Full Access
Question # 10

Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays?

A.

0 * * * 30 myscript

B.

30 * * * 6 myscript

C.

30 0 * * 0 myscript

D.

30 0-23 * * 0 myscript

E.

0 0-23 * * 30 myscript

Full Access
Question # 11

What is true regarding the file ~/.forward?

A.

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Full Access
Question # 12

Which file used by XDM specifies the default wallpaper?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 13

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 14

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Full Access
Question # 15

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Full Access
Question # 16

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

A.

New name servers may be added to the resolver configuration.

B.

Network interfaces may become active or inactive.

C.

The routing table may change.

D.

IP addresses may change.

E.

The system's host name may change.

Full Access
Question # 17

What is a purpose of an SSH host key?

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Full Access
Question # 18

Which command makes the shell variable named VARIABLE visible to subshells?

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Full Access