option
Questions
ayuda
daypo
search.php

ERASED TEST, YOU MAY BE INTERESTED ON secreto part2

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
secreto part2

Description:
Dump Lpi 1 101-500 segunda parte

Author:
allisson_al
Other tests from this author

Creation Date: 13/12/2024

Category: Computers

Number of questions: 60
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
Instead of supplying an explicit device in /etc/fstab for mounting, what other options may be used to identify the intended partition? (Choose two A. LABEL B. ID C. FIND D. NAME E. UUID .
A yum repository can declare sets of related packages. Which yum command installs all packages belonging to the group admintools? A. yum pkgsel --install admintools B. yum install admintools/* C. yum groupinstall admintools D. yum taskinstall admintools E. yum collection install admintools .
FILL BLANK What directory contains configuration files for additional yum repositories? (Specify the full path to the directory.).
Which of the following commands installs the GRUB boot files into the currently active file systems and the boot loader into the first partition of the first disk? A. grub-install /dev/sda B. grub-install /dev/sda1 C. grub-install current /dev/sda0 D. grub-install /dev/sda0 E. grub-install current /dev/sda1 .
Which of the following files are found in the /boot/ file system? (Choose two.) A. Linux kernel images B. Bash shell binaries C. systemd target and service units D. Initial ramdisk images E. fsck binaries .
Which file defines the network locations from where the Debian package manager downloads software packages? A. /etc/dpkg/dpkg.cfg B. /etc/apt/apt.conf.d C. /etc/apt/apt.conf D. /etc/dpkg/dselect.cfg E. /etc/apt/sources.list .
When removing a package on a system using dpkg package management, which dpkg option ensures configuration files are removed as well? A. --clean B. --purge C. --vacuum D. --remove E. --declare .
Which of the following statements are correct when comparing Linux containers with traditional virtual machines (e.g. LXC vs. KVM)? (Choose three.) A. Containers are a lightweight virtualization method where the kernel controls process isolation and resource management B. Fully virtualized machines can run any operating system for a specific hardware architecture within the virtual machine. C. Containers are completely decoupled from the host system’s physical hardware and can only use emulated virtual hardware devices D. The guest environment for fully virtualized machines is created by a hypervisor which provides virtual and emulated hardware devices. E. Containers on the same host can use different operating systems, as the container hypervisor creates separate kernel execution. .
The installation of a local Debian package failed due to unsatisfied dependencies. Which of the following commands installs missing dependencies and completes the interrupted package installation? A. dpkg --fix --all B. apt-get autoinstall C. dpkg-reconfigure --all D. apt-get all E. apt-get install -f .
Which of the following commands lists all currently installed packages when using RPM package management? A. yum --query --all B. yum --list --installed C. rpm --query --list D. rpm --list --installed E. rpm --query --all .
Which of the following commands are valid in the GRUB 2 configuration file? (Choose two.) A. menuentry B. uefi C. pxe-ifconfig D. insmod E. kpartx .
What is the purpose of the ldd command? A. It lists which shared libraries a binary needs to run. B. It installs and updates installed shared libraries. C. It turns a dynamically linked binary into a static binary. D. It defines which version of a library should be used by default. E. It runs a binary with an alternate library search path. .
What can the Logical Volume Manager (LVM) be used for? (Choose three.) A. To create snapshots. B. To dynamically change the size of logical volumes. C. To dynamically create or delete logical volumes. D. To create RAID 9 arrays. E. To encrypt logical volumes. .
What are the main differences between GPT and MBR partition tables regarding maximum number and size of partitions? (Choose two.) A. MBR can handle partition sizes up to 4 TB, whereas GPT supports partition sizes up to 128 ZB. B. By default, GPT can manage up to 128 partitions while MBR only supports four primary partitions. C. By default, GPT can manage up to 64 partitions while MBR only supports 16 primary partitions. D. MBR can handle partition sizes up to 2.2 TB, whereas GPT supports sizes up to 9.4 ZB. E. Both GPT and MBR support up to four primary partitions, each with up to 4096 TB. .
A backup software heavily uses hard links between files which have not been changed in between two backup runs. Which benefits are realized due to these hard links? (Choose two.) A. The old backups can be moved to slow backup media, such as tapes, while still serving as hard link target in new backups. B. The backup runs faster because hard links are asynchronous operations, postponing the copy operation to a later point in time. C. The backup is guaranteed to be uncharged because a hard linked file cannot be modified after its creation. D. The backup consumes less space because the hard links point to the same data on disk instead of storing redundant copies. E. The backup runs faster because, instead of copying the data of each file, hard links only change file system meta data. .
FILL BLANK Which file from the /proc/ file system contains a list of all currently mounted devices? (Specify the full name of the file, including path.).
How many fields are in a syntactically correct line of /etc/fstab? A. 3 B. 4 C. 5 D. 6 E. 7 .
Running chmod 640 filea.txt as a regular user doesn’t update filea.txt’s permission. What might be a reason why chmod cannot modify the permissions? (Choose two.) A. filea.txt is owned by another user and a regular user cannot change the permissions of another user’s file. B. filea.txt is a symbolic link whose permissions are a fixed value which cannot be charged. C. filea.txt has the sticky bit set and a regular user cannot remove this permission. D. filea.txt is a hard link whose permissions are inherited from the target and cannot be set directly. E. filea.txt has the SetUID bit set which imposes the restriction that only the root user can make changes to the file. .
Which of the following Linux filesystems preallocate a fixed number of inodes when creating a new filesystem instead of generating them as needed? (Choose two.) A. JFS B. ext3 C. XFS D. ext2 E. procfs .
Which of the following commands sets the SetUID permission on the executable /bin/foo? A. chmod 4755 /bin/foo B. chmod 1755 /bin/foo C. chmod u-s /bin/foo D. chmod 755+s /bin/foo E. chmod 2755 /bin/foo .
Which of the following commands can be used to display the inode number of a given file? (Choose two.) A. inode B. ln C. ls D. cp E. stat .
Which of the following settings for umask ensures that new files have the default permissions -rw-r-----? A. 0017 B. 0640 C. 0038 D. 0227 E. 0027 .
After a power outage, the XFS file system of /dev/sda3 is inconsistent. How can the existing file system errors be fixed? A. By using mount -f to force a mount of the file system B. By running xfsck on the file system C. By mounting the file system with the option xfs_repair D. By running xfsadmin repair on the file system E. By running xfs_repair on the file system.
Which of the following properties of an existing file changes when a hard link pointing to that file is created? A. File size B. Link count C. Modify timestamp D. Inode number E. Permissions .
FILL BLANK Following the Filesystem Hierarchy Standard (FHS), where should binaries that have been compiled by the system administrator be placed in order to be made available to all users on the system? (Specify the full path to the directory.) .
Which of the following commands show how the shell handles a specific command? A. where B. type C. stat D. case E. fileinfo .
When in Normal mode in vi, which character can be used to begin a reverse search of the text? A. r B. / C. F D. ? E. s .
Which of the following commands displays the manual page command from section 1? A. man command(1) B. man command@1 C. man 1 command D. man 1.command E. man -s 1 command .
Which of the following commands creates or, in case it already exists, overwrites a file called data with the output of ls? A. ls 3> data B. ls >& data C. ls > data D. ls >> data E. ls >>> data .
Which of the following commands is used to change options and positional parameters within a running Bash shell? A. history B. setsh C. bashconf D. set E. envsetup .
Which of the following commands display the IDs of all processes owned by root? (Choose two.) A. pgrep -c root B. pgrep -u root C. pgrep -f root D. pgrep -U 0 E. pgrep -c 0 .
Which of the following sequences in the vi editor saves the opened document and exits the editor? (Choose two.) A. Ctrl XX B. Ctrl :W C. Esc zz D. Esc :wq E. Esc ZZ .
What is the effect of the -v option for the grep command? A. It enables color to highlight matching parts. B. It shows the command’s version information. C. It only outputs non-matching lines. D. It changes the output order showing the last matching line first. E. It outputs all lines and prefixes matching lines with a+. .
Which of the following tools can show the complete path of an executable file that the current shell would execute when starting a command without specifying its complete path? (Choose two.) A. find B. pwd C. which D. locate E. type .
Which of the following signals is sent to a process when the key combination Ctrl+Z is pressed on the keyboard? A. SIGTERM B. SIGCONT C. SIGSTOP SIGKILL E. SIGINT .
What is the output when the regular expression s/[ABC] [abc]/xx/ is applied to the following string? ABCabc A. ABxxbc B. xxCxxc C. xxxxxx D. ABCabc E. Axxaxx .
Which of the following commands print the current working directory when using a Bash shell? (Choose two.) A. echo “${PWD}” B. echo “${WD}” C. printwd D. pwd E. echo “${pwd}” .
Which of the following commands outputs test to the shell? A. cat <!EOT test EOT B. cat <|EOT test EOT C. cat !<EOT test EOT D. cat &<EOT test EOT E. cat <<EOT test EOT .
What is the default nice level when a process is started using the nice command? A. -10 B. 0 C. 10 D. 15 E. 20 .
A user accidentally created the subdirectory \dir in his home directory. Which of the following commands will remote that directory? A. rmdir ~/\\dir B. rmdir “~/\dir” C. rmdir ~/’dir’ D. rmdir ~/\dir E. rmdir ‘~/\dir’ .
Which of the following commands can perform searches on file contents using regular expressions? A. find B. locate C. grep D. reggrep E. pgrep .
In a nested directory structure, which find command line option would be used to restrict the command to searching down a particular number of subdirectories? A. -maxdepth B. -dirmax C. -maxlevels D. -s E. -n .
Which of the following commands determines a file’s format by using a definition database file which contains information about all common file types? A. type B. file C. magic D. pmagic E. hash .
Which of the following commands generates a list of user names from /etc/passwd along with their login shell? A. column -s : 1,7 /etc/passwd B. chop -c 1,7 /etc/passwd C. colrm 1,7 /etc/passwd D. sort -t: -k1,7 /etc/passwd E. cut -d: -f1,7 /etc/passwd .
If the gzip compressed tar archive texts.tgz contains the files a.txt and b.txt, which files will be present in the current directory after running gunzip texts.tgz? A. Only a.txt, b.txt, and texts.tgz B. Only texts.tar and texts.tgz C. Only a.txt.gz and b.txt.gz D. Only a.txt and b.txt E. Only texts.tar .
In the vi editor, how can commands such as moving the cursor or copying lines into the buffer be issued multiple times or applied to multiple rows? A. By using the command :repeat followed by the number and the command B. By specifying the number right in front of a command such as 41 or 2yj. C. By selecting all affected lines using the shit and cursor keys before applying the command. D. By issuing a command such as :set repetition=4 with repeats every subsequent command 4 times. E. By specifying the number after a command such as 14 or yj2 followed by escape. .
Which of the following statements is correct for a command ending with an & character? A. The command’s output is redirected to /dev/null. B. The command is run in background of the current shell. C. The command’s output is executed by the shell. D. The command is run as a direct child of the init process. E. The command’s input is read from /dev/null. .
Which of the following commands reads a file and creates separate chunks of a given size from the file’s contents? A. ar B. cat C. break D. split E. parted .
What is the purpose of the xargs command? A. It passes arguments to an X server. B. It repeats the execution of a command using different parameters for each invocation. C. It reads standard input and builds up commands to execute. D. It asks a question, graphically, and returns the answer to the shell. E. It allows specifying long options (like --help) for commands that normally only accept short options (like - h).
FILL BLANK Which command displays a list of all background tasks running in the current shell? (Specify ONLY the command without any path or parameters.) .
FILL BLANK Which command is used to change the priority of an already running process? (Specify ONLY the command without any path or parameters.).
In Bash, inserting 1>&2 after a command redirects… A. …standard error to standard input. B. …standard output to standard error. C. …standard input to standard error. D. …standard error to standard output. E. …standard output to standard input. .
When booting from the hard disk, a computer successfully loads the Linux kernel and initramfs but hangs during the subsequent startup tasks. The system is booted using a Linux based rescue CD to investigate the problem. Which of the following methods helps to identify the root cause of the problem? A. Using the dmesg command from the rescue CD’s shell to view the original system’s boot logs. B. Investigating the file /proc/kmsg on the computer’s hard disk for possible errors. C. Investigating the file /var/log on the computer’s hard disk for possible errors. D. Using chroot to switch to the file system on the hard disk and use dmesg to view the logs. E. Rebooting again from the hard drive since the system successfully booted from the rescue CD. .
Where is the bootloader stored on the hard disk of a UEFI system? A. In the EFI Boot Record (EBR). B. In the Master Boot Record (MBR). C. On the EFI System Partition (ESP). D. On the partition labeled boot. E. On the partition number 127. .
What is the correct way to set the default systemd boot target to multi-user? A. systemctl isolate multi-user.target B. systemctl set-runlevel multi-user.target C. systemctl set-boot multi-user.target D. systemctl set-default multi-user.target E. systemctl boot -p multi-user.target .
Which of the following statements are correct about the initial RAM disk involved in the boot process of Linux? (Choose two.) A. An initramfs is a compressed file system archive, which can be unpacked to examine its contents. B. An initramfs file contains the MBR, the bootloader and the Linux kernel. C. After a successful boot, the initramfs contents are available in /run/initramfs/. D. The kernel uses the initramfs temporarily before accessing the real root file system. E. An initramfs does not depend on a specific kernel version and is not changed after the initial installation. .
Which of the following commands loads a kernel module along with any required dependency modules? A. depmod B. modprobe C. module_install D. insmod E. loadmod .
What information can the lspci command display about the system hardware? (Choose three.) A. System battery type B. Device IRQ settings C. PCI bus speed D. Ethernet MAC address E. Device vendor identification .
FILL BLANK Which System V init configuration file is commonly used to set the default run level? (Specify the full name of the file, including path.).
Given the following two symbolic links in a System V init configuration: /etc/rc1.d/K01apache2 /etc/rc2.d/S02apache2 When are the scripts executed that are referenced by these links? (Choose two.) A. S02apache2 is run when runlevel 2 is entered. B. S02apache2 is run when runlevel 2 is left. C. K01apache2 is never run because K indicates a deactivated service. D. Both S02apache2 and K01apache2 are run during a system shutdown. E. K01apache2 is run when runlevel 1 is entered. .
Report abuse