option
Questions
ayuda
daypo
search.php

secreto 102 parte

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
secreto 102 parte

Description:
Lpic 1 102-500 parte 2

Creation Date: 2025/05/30

Category: Others

Number of questions: 60

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

What is the systemd journal stored?. /var/jlog/ and /var/jlogd/. /proc/log/ and /proc/klog/. /run/log/journal/ or /var/log/journal/. /var/log/syslog.bin or /var/log/syslog.jrn. /etc/systemd/journal/ or /usr/lib/systemd/journal/.

Which of the following is true regarding the command sendmail?. With any MTA, the sendmail command must be run periodically by the cron daemon. When using systemd, sendmail is an alias to relayctl. The sendmail command prints the MTA’s queue history of which mails have been sent successfully. It is only available when the sendmail MTA is installed. All common MTAs, including Postfix and Exim, provide a sendmail command.

Which file inside the CUPS configuration directory contains the settings of the printers?. cups-devices.conf. snmp.conf. printers.conf. printcap.conf. cupsd.conf.

FILL BLANK Which file is processed by newaliases? (Specify the full name of the file, including path.).

Which of the following are syslog facilities? (Choose two.). local5. accounting. mail. postmaster. remote.

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose two.). --since=. --from=. --until=. --upto=. --date=.

What is true regarding the file ~/.forward?. When configured correctly ~/.forward can be used to forward each incoming mail to one or more other recipients. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses. As ~/.forward is owned by the MTA and not writable by the user, it must be edited using the editaliases command. By default, only ~/.forward files of users in the group mailq are processed while all other user’s ~/ .forward files are ignored.

Which of the following commands display a list of jobs in the print queue? (Choose two.). cups --list. lprm -l. lpstat. lpr -q. lpq.

On a system using systemd-journald, which of the following commands add the message Howdy to the system log? (Choose two.). append Howdy. logger Howdy. systemd-cat echo Howdy. echo Howdy > /dev/journal. journalctl add Howdy.

Which of the following options in the chrony configuration file define remote time sources? (Choose two.). source. clock. remote. pool. server.

FILL BLANK Which command is used to sync the hardware clock to the system clock? (Specify only the command without any path or parameters.).

Which of the following situations is observed and corrected by an NTP client?. The skew in time between the system clock and the computer’s hardware clock. The physical location and the timezone configuration. Changes in the time zone of the current computer’s location. Adjustment needed to support Daylight Saving Time. The skew in time between the system clock and the reference clock.

If an alias ls exists, which of the following commands updates the alias to point to the command ls -l instead of the alias’s current target?. set ls=’ls -l’. alias ls=’ls -l’. alias --force ls=’ls -l’. alias --update ls ls=’ls -l’. realias ls=’ls -l’.

Which of the following commands puts the output of the command date into the shell variable mydate?. mydate=”date”. mydate=”exec date”. mydate=”$((date))”. mydate=”$(date)”. mydate=”${date}”.

What information is shown by the echo $? command?. The process ID of the echo command. The exit value of the command executed immediately before echo. The process ID which will be used for the next command. The exit value of the echo command. The process ID of the current shell.

Which of the following files is not read directly by a Bash login shell?. ~/.bashrc. ~/.bash_profile. ~/.bash_login. ~/.profile. /etc/profile.

What is true about the file .profile in a user’s home directory?. It must be executable. It must call the binary of the login shell. It must use a valid shell script syntax. It must start with a shebang. It must be readable for its owner only.

What is true regarding the statement beginning with #! that is found in the first line of script? (Choose two.). It prevents the scripts from being executed until the ! is removed. it triggers the installation of the script’s interpreter. It specifies the path and the arguments of the interpreter used to run the script. It defines the character encoding of the script. It is a comment that is ignored by the script interpreter.

What output does the command seq 1 5 20 produce?. 1 5 10 15. 1 6 11 16. 1 2 3 4. 2 3 4 5. 5 10 15 20.

Which of the following commands lists all defines variables and functions within Bash?. env. export. env -a. set. echo $ENV.

What information related to a user account is modified using the chage command?. Default ownership for new files. Group membership. Set of commands available to the user. Password expiry information. Default permissions for new files.

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?. core. edquota. quota. ulimit. ktrace.

How do shadow passwords improve the password security in comparison to standard no-shadow password?. Regular users do not have access to the password hashes of shadow passwords. Every shadow password is valid for 45 days and must be changed afterwards. The system’s host key is used to encrypt all shadow passwords. Shadow passwords are always combined with a public key that has to match the user’s private key. Shadow passwords are stored in plain text and can be checked for weak passwords.

After editing the TCP wrapper configuration to grant specific hosts access to a service, when do these changes become effective?. The new configuration becomes effective after restarting the respective service. The new configuration becomes effective at the next system reboot. The new configuration becomes effective when the last established connection to the service is closed. The new configuration becomes effective after restarting the tcpd service. The new configuration becomes effective immediately for all new connections.

What is true regarding public and private SSH keys? (Choose two.). For each user account, there is exactly one key pair that can be used to log into that account. The private key must never be revealed to anyone. Several different public keys may be generated for the same private key. To maintain the private key’s confidentiality, the SSH key pair must be created by its owner. To allow remote logins, the user’s private key must be copied to the remote server.

Which of the following commands finds all files owned by root that have the SetUID bit set?. find / -user root -perm -4000. find / -user 0 -mode +s. find / -owner root -setuid. find / -owner 0 -permbits 0x100000000. find / --filter uid=1 --filter pers=u+s.

FILL BLANK What command is used to add OpenSSH private keys to a running ssh-agent instance? (Specify the command name only without any path.).

FILL BLANK Which directory holds configuration files for xinetd services? (Specify the full path to the directory.).

Which mechanism does ssh use to interact with the SSH agent?. Connecting to port 2222 which is used by the system-wide SSH agent. Using the fixed socket .ssh-agent/ipc. Creating an alias replacing ssh with calls to ssh-agent. Starting ssh-agent as a child process for each ssh invocation. Evaluating environment variables such as SSH_AUTH_SOCK.

FILL BLANK Which parameter of the ssh command specifies the location of the private key used for login attempts? (Specify only the option name without any values or parameters.).

Which of the following is true about IPv6?. IPv6 no longer supports broadcast addresses. With IPv6, the TCP port numbers of most services have changed. IPv4 addresses can be used without any change with IPv6. IPv6 no longer supports multicast addresses. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.

What is true about the following command? nmcli device wifi connect WIFIoI. NetworkManager opens a new public hotspot with the SSID WIFIoI. NetworkManager creates an unconfigured new virtual network interface named WIFIoI. NetworkManager creates a new wifi connection WIFIoI and activates it. NetworkManager returns an error in case the connection WIFIoI does not exist. NetworkManager returns an error because WIFIoI is an invalid wifi device.

Which of the commands below might have produced the following output?. dig -t mx www.example.org. dig www.example.org. dig -t ns www.example.org. dig -t a www.example.org. dig -t soa www.example.org.

FILL BLANK Which parameter is missing in the command ip link set ____ dev eth0 to activate the previously inactive network interface eth0? (Specify the parameter only without any command, path or additional options.).

Which of the following states can NetworkManager show regarding the system’s network connectivity? (Choose two.). up. portal. full. login-required. firewalled.

Which of the following are valid host addresses for the subnet 203.0.113.64/28? (Choose two.). 203.0.113.64. 203.0.113.78. 203.0.113.65. 203.0.113.80. 203.0.113.81.

Which of the following keywords can be used in the file /etc/resolv/conf? (Choose two.). substitute. lookup. search. nameserver. method.

How does the ping command work by default?. Is sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return. It sends an ARP request to a remote host and waits to receive an ARP response in return. It sends a TCP SYN packet to a remote host and waits to receive an TCP ACK response in return. Is sends a broadcast packet to all hosts on the net and waits to receive, among others, a response from the target system. It sends a UDP packet to port 0 of the remote host and waits to receive a UDP error response in return.

Which of the following commands display the number of bytes transmitted and received via the eth0 network interface? (Choose two.). route -v via eth0. ip stats show dev eth0. netstat -s -i eth0. ifconfig eth0. ip -s link show eth0.

Given the following routing table: How would an outgoing packet to the destination 192.168.2.150 be handled?. It would be passed to the default router 192.168.178.1 on wlan0. It would be directly transmitted on the device eth0. It would be passed to the default router 255.255.255.0 on eth0. It would be passed to the router 192.168.1.1 on eth0. It would be directly transmitted on the device wlan0.

Which of the following commands will delete the default gateway from the system’s IP routing table? (Choose two.). ifconfig unset default. route del default. ip route del default. netstat -r default. sysctl ipv4.default_gw=0.

FILL BLANK What command enables a network interface according to distribution-specific configuration, such as /etc/ network/interfaces or /etc/sysconfig/network-scripts/ifcfg-eth0? (Specify only the command without any path or parameters.).

What is true about NetworkManager on a Linux system that uses its distribution’s mechanisms to configure network interfaces? (Choose two.). NetworkManager reconfigures all network interfaces to use DHCP unless they are specifically managed by NetworkManager. NetworkManager must be explicitly enabled for each interface it should manage. NetworkManager by default does not change interfaces which are already configured. NetworkManager disables all interfaces which were not configured by NetworkManager. NetworkManager can be configured to use the distribution’s network interface configuration.

Which standardized TCP port is used by HTTPS services?. 25. 80. 8080. 443. 636.

Which of the following environment variables can be defined in locale.conf? (Choose two.). LC_ALL. LC_USERNAME. LC_UTF8. LC_GEOGRAPHY. LC_TIME.

Which of the following commands sets the system’s time zone to the Canadian Eastern Time?. localegen -t -f /usr/share/zoneinfo/Canada/Eastern > /etc/locate.tz. tzconf /etc/localtime. sysctl -w clock.tz=’Canada/Eastern’. modprobe tz_ca_est. ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime.

FILL BLANK What option to useradd creates a new user’s home directory and provisions it with a set of standard files? (Specify only the option name without any values or parameters.).

How can a specific user be prevented from scheduling tasks with at?. By adding the specific user to the /etc/at.allow file. By adding the specific user to the [deny] section in the /etc/atd.conf file. By adding the specific user to the nojobs group. By adding the specific user to the /etc/at.deny file. By executing the atd --deny [user] command.

Which file contains the data of the last change of a user’s password?. /etc/gshadow. /etc/passwd. /etc/pwdlog. /var/log/shadow. /etc/shadow.

Which of the following fields can be found in the /etc/group file? (Choose two.). The home directory of the group. The list of users that belong to the group. The name of the group. The default group ACL. The description of the group.

Which of the following sections exists in a systemd timer unit?. [Events]. [Timer]. [cron]. [Schedule]. [Trigger].

Which of the following getent invocations lists all existing users?. getent homes. getent uids. getent passwd. getent users. getent logins.

Given the following user’s crontab entry: 15 14 * * 1-5 /usr/local/bin/example.sh When will the script /usr/local/bin/example.sh be executed?. At 14:15 local time, January till May. At 15:14 local time, 1st to 5th day of month. At 14:15 local time, February till June. At 14:15 local time, 1st to 5th day of month. At 14:15 local time, Monday to Friday.

If neither cron.allow nor cron.deny exist in /etc/, which of the following is true?. Without additional configuration, all users may create user specific crontabs. Without additional configuration, only root may create user specific crontabs. The cron daemon will refuse to start and report missing files in the system’s logfile. When a user creates a user specific crontab the system administrator must approve it explicitly. The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not.

What is the purpose of the iconv command?. It converts bitmap images from one format to another such as PNG to JPEG. It verifies that the root directory tree compiles to all conventions from the Filesystem Hierarchy Standard (FHS). It converts files from one character set to an other. It changes the mode of an inode in the ext4 filesystem. It displays additional meta information from icon files ending in .ico.

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?. *. -. s. #. x.

What does the term Braille Display refer to?. A standardized high contract graphical theme for desktop applications?. A Linux desktop environment similar to KDE and GNOME. A legacy display technology superseded by LCD. A physical representation of characters using small dots. A standard file format for data exchange, similar to XML.

FILL BLANK Which environment variable is used by an X11 client to determine the X Server to connect to? (Specify only the variable name without any preceding commands or values.).

Which of the following tasks are handled by a display manager like XDM or KMD? (Choose two.). Configure additional devices like new monitors or projectors when they are attached. Start and prepare the desktop environment for the user. Create an X11 configuration file for the current graphic devices and monitors. Lock the screen when the user was inactive for a configurable amount of time. Handle the login of a user.

Which of the following protocols is designed to access the video card output of a virtual machine?. KDE. X11. Xfce. SPICE. XDMCP.

Report abuse