Pre-Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

LFCS PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

LFCS PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Linux Foundation Certified System Administrator
  • Last Update: Mar 22, 2025
  • Questions and Answers: 260
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

LFCS Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

LFCS Practice Exam Questions with Answers Linux Foundation Certified System Administrator Certification

Question # 6

What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

A.

To create RAID 9 arrays.

B.

To dynamically change the size of logical volumes.

C.

To encrypt logical volumes.

D.

To create snapshots.

E.

To dynamically create or delete logical volumes.

Full Access
Question # 7

Which of the following commands lists the dependencies of a given dpkg package?

A.

apt-cache depends-on package

B.

apt-cache dependencies package

C.

apt-cache depends package

D.

apt-cache requires package

Full Access
Question # 8

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Full Access
Question # 9

In the vi editor, how can commands such as moving the cursor or copying lines into the buffer be issued multiple times or applied to multiple rows?

A.

By using the command :repeat followed by the number and the command.

B.

By specifying the number right in front of a command such as 4l or 2yj.

C.

By selecting all affected lines using the shift and cursor keys before applying the command.

D.

By issuing acommand such as :set repetition=4 which repeats every subsequent command 4 times.

Full Access
Question # 10

Which of the following files, located in the user home directory, is used to store the Bash history?

A.

.bash_history

B.

.bash_histfile

C.

.history

D.

.bashrc_history

E.

.history_bash

Full Access
Question # 11

When running the command

sed -e "s/a/b/" /tmp/file >/tmp/file

While /tmp/file contains data, why is /tmp/file empty afterwards?

A.

The file order is incorrect. The destination file must be mentioned before the command to ensure redirection.

B.

The command sed did not match anything in that file therefore the output is empty.

C.

When the shell establishes the redirection it overwrites the target file before the redirected command starts and opens it for reading.

D.

Redirection for shell commands do not work using the > character. It only works using the | character instead.

Full Access
Question # 12

Which of the following commands will change the quota for a specific user?

A.

edquota

B.

repquota

C.

quota -e

D.

quota

Full Access
Question # 13

Which of the following is observed and corrected by a NTP client?

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Full Access
Question # 14

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

A.

sshd

B.

ssh-agent

C.

ssh-keygen

D.

ssh-add

Full Access
Question # 15

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Full Access
Question # 16

Regarding the command:

nice -5 /usr/bin/prog

Which of the following statements is correct?

A.

/usr/bin/prog is executed with a nice level of -5.

B.

/usr/bin/prog is executed with a nice level of 5.

C.

/usr/bin/prog is executed with a priority of -5.

D.

/usr/bin/prog is executed with a priority of 5.

Full Access
Question # 17

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Full Access
Question # 18

Which file contains the date of the last change of a user's password?

A.

/etc/gshadow

B.

/etc/passwd

C.

/etc/pwdlog

D.

/etc/shadow

E.

/var/log/shadow

Full Access
Question # 19

Which of the following characters can be combined with a separator string in order to read from the current input source until the separator string, which is on a separate line and withoutany trailing spaces, is reached?

A.

<<

B.

<|

C.

!<

D.

&<

Full Access
Question # 20

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Full Access
Question # 21

Whenremoving a package, which of the following dpkg options will completely remove the files including configuration files?

A.

--clean

B.

--delete

C.

--purge

D.

–remove

Full Access
Question # 22

Which command will display the last line of the file foo.txt?

A.

head -n 1 foo.txt

B.

tail foo.txt

C.

last -n 1 foo.txt

D.

tail -n 1 foo.txt

Full Access
Question # 23

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Full Access
Question # 24

What does the exit status 0 indicate about a process?

A.

The process ended without any problems.

B.

The process was terminated by the user.

C.

The process couldn't finish correctly.

D.

The process waited for an input but got none.

E.

The process finished in time.

Full Access
Question # 25

Which umask value will result in the default access permissions of 600 (rw-------) for files and 700 (rwx------) for directories? (Specify only the numerical umask value.)

Full Access
Question # 26

When starting a program with the nice command without any additional parameters, which nice level is set for the resulting process?

A.

-10

B.

0

C.

10

D.

20

Full Access
Question # 27

What is the purpose of the Bash built-in export command?

A.

It allows disks to be mounted remotely.

B.

It runs a command as a process in a subshell.

C.

It makes the command history available to subshells.

D.

It sets up environment variables for applications.

E.

It shares NFS partitions for use by other systems on the network.

Full Access
Question # 28

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

A.

New name servers may be added to the resolver configuration.

B.

Network interfaces may become active or inactive.

C.

The routing table may change.

D.

IP addresses may change.

E.

The system's host name may change.

Full Access
Question # 29

Which of the following statements is correct regarding the command foo 1> bar?

A.

The stdout from the command foo is appended to the file bar.

B.

The stdout from the command foo overwrites the file bar.

C.

The commandfoo receives its stdin from the file bar.

D.

The command foo receives its stdin from the stdout of the command bar.

E.

The stderr from the command foo is saved to the file bar.

Full Access
Question # 30

What is the output of the following command?

echo "Hello World" | tr -d aieou

A.

Hello World

B.

eoo

C.

Hll Wrld

D.

eoo Hll Wrld

Full Access
Question # 31

Which of the following commands redirects the output of cmd to the file foo.txt, in which an existing file is overwritten?

A.

cmd || foo.txt

B.

cmd | foo.txt

C.

cmd && foo.txt

D.

cmd >> foo.txt

E.

cmd > foo.txt

Full Access
Question # 32

Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)

A.

shutdown -r now

B.

shutdown -r "rebooting"

C.

telinit 6

D.

telinit 0

E.

shutdown -k now "rebooting"

Full Access
Question # 33

The script, script.sh, consists of the following lines:

#!/bin/bash

echo $2 $1

Which output will appear if the command, ./script.sh test1 test2, is entered?

A.

test1 test2

B.

test2 test1

C.

script.sh test2

D.

script.sh test1

E.

test1 script.sh

Full Access
Question # 34

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Full Access
Question # 35

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Full Access
Question # 36

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

Full Access
Question # 37

Which of the following information is stored within the BIOS? (Choose TWO correct answers.)

A.

Boot device order

B.

Linux kernel version

C.

Timezone

D.

Hardware configuration

E.

The system's hostname

Full Access
Question # 38

Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 39

What information can the lspci command display about the system hardware? (Choose THREE correct answers.)

A.

Device IRQ settings

B.

PCI bus speed

C.

System battery type

D.

Device vendor identification

E.

Ethernet MAC address

Full Access
Question # 40

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Full Access
Question # 41

Which of the following commands creates an ext3 filesystem on /dev/sdb1? (Choose TWO correct answers.)

A.

/sbin/mke2fs -j /dev/sdb1

B.

/sbin/mkfs -t ext3 /dev/sdb1

C.

/sbin/mkfs -c ext3 /dev/sdb1

D.

/sbin/mke3fs -j/dev/sdb1

Full Access
Question # 42

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.)

A.

The list of users that belong to the group.

B.

The home directory of the group.

C.

The name of the group.

D.

The description of the group.

E.

The password of the group.

Full Access
Question # 43

Which of the following commands changes the ownership of file.txt to the user dan and the group staff?

A.

chown dan/staff file.txt

B.

chown dan:staff file.txt

C.

chown -u dan -g staff file.txt

D.

chown dan -g staff file.txt

Full Access
Question # 44

Whichof the following commands displays the contents of a gzip compressed tar archive?

A.

gzip archive.tgz | tar xvf -

B.

tar ztf archive.tgz

C.

gzip -d archive.tgz | tar tvf -

D.

tar cf archive.tgz

Full Access
Question # 45

Which of the following commands will output all of the lines with the name Fred in upper or lower case but not the word red from the file data_file?(Choose two)

A.

grep -v fred data_file

B.

grep '[f]red' data_file

C.

egrep fred data_file

D.

grep '[Ff]red' data_file

E.

grep -i fred data_file

Full Access
Question # 46

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Full Access
Question # 47

Which of the following options for the kernel's command line changes the systemd boot target to rescue.target instead of the default target?

A.

systemd.target=rescue.target

B.

systemd.runlevel=rescue.target

C.

systemd.service=rescue.target

D.

systemd.default=rescue.target

E.

systemd.unit=rescue.target

Full Access
Question # 48

Creating a hard link to an ordinary file returns an error. What could be the reason for this?

A.

The source file is hidden.

B.

The source file is read-only.

C.

The source file is a shell script.

D.

The source file is already a hard link.

E.

The source and the target are on different filesystems.

Full Access
Question # 49

Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel? (Specify the file name only without any path.)

Full Access
Question # 50

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Full Access
Question # 51

Which of the following commands can be used to search for the executable file foo when it has been placed in a directory not included in $PATH?

A.

apropos

B.

which

C.

find

D.

query

E.

whereis

Full Access
Question # 52

What is the purpose of a screen reader?

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Full Access
Question # 53

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

A.

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.

COUNT(SELECT order_type FROM orders);

D.

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.

SELECT AUTO_COUNT FROM orders COUNT order_type;

Full Access
Question # 54

What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)

A.

route del default

B.

ifconfig unset default

C.

netstat -r default

D.

ip route del default

E.

sysctl ipv4.default_gw=0

Full Access
Question # 55

Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?

A.

/etc/keys

B.

/proc/keys

C.

/etc/inittab

D.

/proc/inittab

E.

/etc/reboot

Full Access
Question # 56

Which command will disable swapping on a device? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 57

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

Full Access
Question # 58

What is the difference between the commands test -e path and test -f path?

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Full Access
Question # 59

Which of the following sequences in the vi editor saves the opened document and exits the editor?(Choose TWO correct answers.)

A.

esc ZZ

B.

ctrl :w!

C.

esc zz

D.

esc :wq!

E.

ctrl XX

Full Access
Question # 60

What is true regarding a default route?

A.

The default route is always used first. When the default route is not available more specific routes are tried.

B.

When a default route is set, all other routes are disabled until the default route is deleted.

C.

The default route is only used if there is not a more specific route to a destination host or network.

D.

Without a default route, no network communication even in directly attached networks is possible.

Full Access
Question # 61

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Full Access
Question # 62

Which signal is missing from the following command that is commonly used to instruct adaemon to reinitialize itself, including reading configuration files?

killall -s _______ daemon

Full Access
Question # 63

What is the effect of the egrep command when the -v option is used?

A.

It enables color to highlight matching parts.

B.

It only outputs non-matching lines.

C.

It shows the command's version information.

D.

It changes theoutput order showing the last matching line first.

Full Access
Question # 64

Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.)

A.

Synchronize the hardware and system clocks.

B.

Output date and time in different formats.

C.

Set the system clock.

D.

Set the hardware clock.

E.

Update the time via NTP.

Full Access
Question # 65

Which Bash environment variable defines in which file the user history is stored when exiting a Bash process? (Specify ONLY the variable name.)

Full Access
Question # 66

Which of the following commands will NOT update the modify timestamp on the file /tmp/myfile.txt?

A.

file /tmp/myfile.txt

B.

echo "Hello" >/tmp/myfile.txt

C.

sed -ie "s/1/2/" /tmp/myfile.txt

D.

echo -n "Hello" >>/tmp/myfile.txt

E.

touch /tmp/myfile.txt

Full Access
Question # 67

What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)

A.

Entries for all possible devices get created on boot even if those devicesare not connected.

B.

Additional rules for udev can be created by adding them to /etc/udev/rules.d/.

C.

When using udev, it is not possible to create block or character devices in /dev/ using mknod.

D.

The /dev/ directory is a filesystem of type tmpfs andis mounted by udev during system startup.

E.

The content of /dev/ is stored in /etc/udev/dev and is restored during system startup.

Full Access
Question # 68

Which of the following commands can be used to limit the amount of memory a user may use?

A.

umask

B.

usermod

C.

ulimit

D.

passwd

E.

chage

Full Access
Question # 69

Which of the following commands moves and resumes in the background the last stopped shell job?

A.

run

B.

bg

C.

fg

D.

back

Full Access
Question # 70

Which of the following commands will write a message to the terminals of all logged in users?

A.

bcast

B.

mesg

C.

print

D.

wall

E.

yell

Full Access
Question # 71

Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays?

A.

0 * * * 30 myscript

B.

30 * * * 6 myscript

C.

30 0 * * 0 myscript

D.

30 0-23 * * 0 myscript

E.

0 0-23 * * 30 myscript

Full Access
Question # 72

How can the current directory and its subdirectories be searched for the file named MyFile.xml?

A.

find . -name MyFile.xml

B.

grep MyFile.xml | find

C.

grep -r MyFile.xml .

D.

less MyFile.xml

E.

search Myfile.xml ./

Full Access
Question # 73

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

A.

lpd

B.

lpp

C.

lpq

D.

lpr

Full Access
Question # 74

Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file1.log?

A.

cat < myapp | cat > file1.log

B.

myapp 0>&1 | cat > file1.log

C.

myapp | cat > file1.log

D.

myapp | teefile1.log

E.

tee myapp file1.log

Full Access
Question # 75

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 76

Which of the following commands shows the current color depth of the X Server?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access
Question # 77

Which of the following commands is used to update the list of available packages when using dpkg based package management?

A.

apt-get update

B.

apt-get upgrade

C.

apt-cache update

D.

apt-get refresh

E.

apt-cache upgrade

Full Access
Question # 78

What is true regarding TCP port 23?

A.

Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used.

B.

Port 23 is the well known port for the SSH service which provides secure logins.

C.

Port 23 is the well known port for the rlogin service which is SSL secured by default.

D.

Port 23 is the well known port for the system login services which are encrypted when the user runs the starttls command in his login shell.

Full Access