Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

102-500 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

102-500 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: LPIC-1 Exam 102, Part 2 of 2, version 5.0
  • Last Update: May 7, 2024
  • Questions and Answers: 197
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

102-500 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

102-500 Practice Exam Questions with Answers LPIC-1 Exam 102, Part 2 of 2, version 5.0 Certification

Question # 6

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Full Access
Question # 7

What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.)

A.

The user bob is removed from the system's user database.

B.

The user bob's home directory is removed.

C.

The locate database is updated to drop files owned by bob.

D.

All files owned by bob are remove from all mounted filesystems.

E.

In case bob was the last member of a group, that group is deleted.

Full Access
Question # 8

The correct crontab entry to execute the script chklog three times per month between 3 p.m. and 5 p.m.:

A.

* 3,4,5 1 * * chklog

B.

3 3,4,5 1 * * chklog

C.

3 15,16,17 * * * chklog

D.

0 15,16,17 1 * * chklog

E.

* 15,16,17 1 * * chklog

Full Access
Question # 9

What is NOT contained in the locale setting of the operating system?

A.

currency symbol

B.

language

C.

timezone

D.

thousands separator

Full Access
Question # 10

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Full Access
Question # 11

Which command can be used to delete a group from a Linux system?

A.

groupdel

B.

groupmod

C.

groups

D.

groupedit

Full Access
Question # 12

Which of the following steps prevents a user from obtaining an interactive login session?

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Full Access
Question # 13

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 14

Which file used by XDM specifies the default wallpaper?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 15

How is a display manager started?

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Full Access
Question # 16

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access
Question # 17

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 18

Why is the xhost program considered dangerous to use?

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Full Access
Question # 19

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Full Access
Question # 20

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

A.

lpd

B.

lpp

C.

lpq

D.

lpr

Full Access
Question # 21

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?

A.

*.* /dev/tty12

B.

/var/log/messages | /dev/tty12

C.

| /dev/tty12

D.

syslog tty12

E.

mail.* /dev/tty12

Full Access
Question # 22

What command should be used to print a listing of email in the system's mail queue?

A.

lpq

B.

mailq

C.

mlq

D.

sendmail –l

Full Access
Question # 23

What is true about the ntpdate command?

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Full Access
Question # 24

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Full Access
Question # 25

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Full Access
Question # 26

Why is the correct configuration of a system's time zone important?

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Full Access
Question # 27

Which of the following is observed and corrected by a NTP client?

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Full Access
Question # 28

With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)

Full Access
Question # 29

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Full Access
Question # 30

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Full Access
Question # 31

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)

A.

2001:db8::15 www.example.com www

B.

www.example.com www 203.0.13.15

C.

203.0.113.15 www.example.com www

D.

www.example.com,www 203.0.13.15,2001:db8::15

E.

2003.0.113.15,2001:db8::15 www.example.com www

Full Access
Question # 32

Given the following routing table:

102-500 question answer

How would an outgoing packet to the destination 192.168.2.150 be handled?

A.

It would be passed to the default router 192.168.178.1 on wlan0.

B.

It would be directly transmitted on the device eth0.

C.

It would be passed to the default router 255.255.255.0 on eth0.

D.

It would be directly transmitted on the device wlan0.

E.

It would be passed to the router 192.168.1.1 on eth0.

Full Access
Question # 33

Which of the following is a valid IPv6 address?

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Full Access
Question # 34

Which of the following programs can be used to determine the routing path to a given destination?

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Full Access
Question # 35

Which of the following details is NOT provided in any output from the netstat utility?

A.

broadcast services

B.

interface statistics

C.

masquerading connections

D.

network connections

E.

routing tables

Full Access
Question # 36

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Full Access
Question # 37

Which of the following commands lists all defined variables and functions within Bash?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 38

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Full Access
Question # 39

Which of the following configuration files should be modified to set default shell variables for all users?

A.

/etc/bashrc

B.

/etc/profile

C.

~/.bash_profile

D.

/etc/.bashrc

Full Access
Question # 40

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Full Access
Question # 41

Which command allows you to make a shell variable visible to subshells?

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Full Access
Question # 42

Which directory in /etc is used to keep a sample copy of files and directories for when a new user has a home directory created? (Please provide the full path)

Full Access
Question # 43

Which command makes the shell variable named VARIABLE visible to subshells?

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Full Access
Question # 44

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

Full Access
Question # 45

What keyword is missing from this code sample of a shell script?

____ i in *.txt; do

echo $i

done

A.

for

B.

loop

C.

until

D.

while

Full Access
Question # 46

Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/maillog and sends all critical events to the remote server logger.example.com?

A.

mail.*/var/log/maillogmail,crit@logger.example.org

B.

mail.*/var/log/maillogmail.critsyslog://logger.example.org

C.

mail/var/log/maillogmail.crit@logger.example.org

D.

mail.*/var/log/maillogmail.crit@logger.example.org

E.

mail */var/log/maillogmail crit@logger.example.org

Full Access
Question # 47

Which of the following nmcli subcommands exist? (Choose two.)

A.

nmcli ethernet

B.

nmcli device

C.

nmcli wifi

D.

nmcli address

E.

nmcli connection

Full Access
Question # 48

Which of the following connection types, as seen in unroll connection show, may exist in Network Manager? (Choose THREE correct answers.)

A.

tcp

B.

Ethernet

C.

wifi

D.

ipv6

E.

bridge

Full Access
Question # 49

Given the following excerpt of the sudo configuration:

jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk

Which of the following statements are true? (Choose three.)

A.

Jane can run /bin/id only after specifying her password.

B.

Jane can run /sbin/fdisk after specifying root’s password.

C.

Jane can run /sbin/fdisk after specifying her password.

D.

Jane can run /bin/kill without specifying a password.

E.

Jane can run /bin/id without specifying her password.

Full Access
Question # 50

Which of the following tasks can the date command accomplish? (Choose two.)

A.

Set the system’s date and time.

B.

Set the system’s date but not the time.

C.

Calculate the time span between two dates.

D.

Print a calendar for a month or a year.

E.

Display time in a specific format.

Full Access
Question # 51

Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.)

Full Access
Question # 52

What output is produced by the following command sequence?

echo ‘1 2 3 4 5 6’ | while read a b c; do

echo result $c $b $a;

done

A.

result: 6 5 4

B.

result: 1 2 3 4 5 6

C.

result: 3 4 5 6 2 1

D.

result: 6 5 4 3 2 1

E.

result: 3 2 1

Full Access
Question # 53

Which of the following commands can identify the PID od a process which opened a TCP port?

A.

ptrace

B.

strace

C.

debug

D.

lsof

E.

nessus

Full Access
Question # 54

Which of the following commands lists all queued print jobs?

A.

lpd

B.

lpr

C.

lp

D.

lsq

E.

lpq

Full Access
Question # 55

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

A.

core

B.

edquota

C.

ulimit

D.

quota

Full Access
Question # 56

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

Full Access
Question # 57

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Full Access
Question # 58

What is a purpose of an SSH host key?

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Full Access
Question # 59

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

A.

ssh --port 2222 example.com

B.

ssh -p 2222 example.com

C.

ssh -o Port=2222 example.com

D.

ssh -o GatewayPort=2222 example.com

E.

ssh example.com:2222

Full Access