Victor Santillan
Quiz by , created more than 1 year ago

LPIC-1 101-500 Linux Quiz on 101-500, created by Victor Santillan on 27/03/2020.

50
0
0
Victor Santillan
Created by Victor Santillan about 4 years ago
Close

101-500

Question 1 of 32

1

When given the following command line. echo "foo bar" | tee bar | cat
Which of the following output is created?

Select one of the following:

  • cat

  • foo bar

  • tee bar

  • bar

  • foo

Explanation

Question 2 of 32

1

Which of the following files, located in the user home directory, is used to store the Bash history?

Select one of the following:

  • .bash_history

  • .bash_histfile

  • .history

  • .bashrc_history

  • .history_bash

Explanation

Question 3 of 32

1

What command will generate a list of user names from /etc/passwd along with their login shell?

Select one of the following:

  • column -s : 1,7 /etc/passwd

  • chop -c 1,7 /etc/passwd

  • colrm 1,7 /etc/passwd

  • cut -d: -f1,7 /etc/passwd

Explanation

Question 4 of 32

1

Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, which single character command will insert the deleted content below the current line?

Select one of the following:

  • i (lowercase)

  • P (uppercase)

  • p (lowercase)

  • U (uppercase)

  • u (lowercase)

Explanation

Question 5 of 32

1

What is the default action of the split command on an input file?

Select one of the following:

  • It will break the file into new files of 1,024 byte pieces each

  • It will break the file into new files of 1,000 line pieces each

  • It will break the file into new files of 1,024 kilobyte pieces each

  • It will break the file into new files that are no morethan 5% of the size of the original file

Explanation

Question 6 of 32

1

Which of the following commands lists the dependencies of a given dpkg package?

Select one of the following:

  • apt-cache depends-onpackage

  • apt-cache dependencies package

  • apt-cache depends package

  • apt-cache requires package

Explanation

Question 7 of 32

1

Which option to the yum command will update the entire system? (Specify ONLY the option name without any additional parameters)

Select one of the following:

  • Mastered

  • Not Mastered

Explanation

Question 8 of 32

1

Which of the following environment variables overrides or extends the list of directories holding shared libraries?

Select one of the following:

  • LD_LOAD_PATH

  • LD_LIB_PATH

  • LD_LIBRARY_PATH

  • LD_SHARE_PATH

  • LD_RUN_PATH

Explanation

Question 9 of 32

1

Which of the following commands can be used to determine how long the system has been running? (Choose TWO correct answers.)

Select one or more of the following:

  • uptime

  • up

  • top

  • uname -u

  • time –up

Explanation

Question 10 of 32

1

What is the maximum niceness value that a regular user can assign to a process with the nice command when executing a new process?

Select one of the following:

  • 9

  • 19

  • 49

  • 99

Explanation

Question 11 of 32

1

Regarding the command: nice -5 /usr/bin/prog
Which of the following statements is correct?

Select one of the following:

  • /usr/bin/prog is executed with a nice level of -5

  • /usr/bin/prog is executed with a nice level of 5

  • /usr/bin/prog is executed with a priority of -5

  • /usr/bin/prog is executed with a priority of 5

Explanation

Question 12 of 32

1

When starting a program with the nice command without any additional parameters, which nice level is set for the resulting process?

Select one of the following:

  • -10

  • 0

  • 10

  • 20

Explanation

Question 13 of 32

1

Which of the following commands kills the process with the PID 123 but allows the process to "clean up" before exiting?

Select one of the following:

  • kill -PIPE 123

  • kill -KILL 123

  • kill -STOP 123

  • kill -TERM 123

Explanation

Question 14 of 32

1

What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)

Select one or more of the following:

  • Entries for all possible devices get created on boot even if those devices are not connected

  • Additional rules for udev can be created by adding them to /etc/udev/rules.d/

  • When using udev, it is not possible to create block orcharacter devices in /dev/ using mknod

  • The /dev/ directory is a filesystem of type tmpfs and is mounted by udev during system startup

  • The content of /dev/ is stored in /etc/udev/dev and is restored during system startup

Explanation

Question 15 of 32

1

What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

Select one or more of the following:

  • To create RAID 9 arrays

  • To dynamically change the size of logical volumes

  • To encrypt logical volumes

  • To create snapshots

  • To dynamically create or delete logical volumes

Explanation

Question 16 of 32

1

What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?

Select one of the following:

  • /lib/init.so

  • /sbin/init

  • /etc/rc.d/rcinit

  • /proc/sys/kernel/init

  • /boot/init

Explanation

Question 17 of 32

1

During a system boot cycle, what is the program that is run after the BIOS completes its tasks?

Select one of the following:

  • The bootloader

  • The inetd program

  • The init program

  • The kernel

Explanation

Question 18 of 32

1

You are having some trouble with a disk partition and you need to do maintenance on this partition but your users home directories are on it and several are logged in. Which command would disconnect the users and allow you to safely execute maintenance tasks?

Select one of the following:

  • telinit 1

  • shutdown -r now

  • killall -9 inetd

  • /bin/netstop --maint

  • /etc/rc.d/init.d/network stop

Explanation

Question 19 of 32

1

Which of the following information is stored within the BIOS? (Choose TWO correct answers.)

Select one or more of the following:

  • Boot device order

  • Linux kernel version

  • Timezone

  • Hardware configuration

  • the system's hostname

Explanation

Question 20 of 32

1

The system is having trouble and the engineer wants to bypass the usual /sbin/init start up and run /bin/sh. What is the usual way to pass this change to the kernel from your boot loader?

Select one of the following:

  • Start in runlevel 1

  • Pass init=/bin/sh on the kernel parameter line

  • Pass /bin/sh on the kernel parameter line

  • Pass start=/bin/sh on the kernel parameter line

Explanation

Question 21 of 32

1

Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)

Select one or more of the following:

  • shutdown -r now

  • shutdown -r "rebooting"

  • telinit 6

  • telinit 0

  • shutdown -k now "rebooting"

Explanation

Question 22 of 32

1

Which command displays the contents of the Kernel Ring Buffer on the command line? (Provide only the command name without any options or path information)

Select one of the following:

  • Mastered

  • No mastered

Explanation

Question 23 of 32

1

Which of the following options for the kernel's command line changes the systemd boot target to rescue.target instead of the default target?

Select one of the following:

  • systemd.target=rescue.target

  • systemd.runlevel=rescue.target

  • systemd.service=rescue.target

  • systemd.default=rescue.target

  • systemd.unit=rescue.target

Explanation

Question 24 of 32

1

After modifying GNU GRUB's configuration file, which command must be run for the changes to take effect?

Select one of the following:

  • kill -HUP $(pidof grub)

  • grub-install

  • grub

  • No action is required

Explanation

Question 25 of 32

1

Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?

Select one of the following:

  • hidemenu

  • splash

  • timeout

  • showmenu

Explanation

Question 26 of 32

1

Which of the following shell redirections will write standard output and standard error output to a file named filename?

Select one of the following:

  • 2>&1 >filename

  • >filename 2>&1

  • 1>&2>filename

  • >>filename

  • 1&2>filename

Explanation

Question 27 of 32

1

Which of the following commands is used to modify quota settings? (Choose two.)

Select one or more of the following:

  • editquota

  • setquota

  • edquota

  • quotaedit

  • quotaset

Explanation

Question 28 of 32

1

What does the command mount -a do?

Select one of the following:

  • It mounts all available filesystems onto the current directory

  • It shows all mounted filesystems

  • It mounts all user mountable filesystems for the current user

  • It mounts all filesystems listed in /etc/fstab which have the option auto set

  • It mounts all filesystems listed in /etc/fstab which have the option no auto set

Explanation

Question 29 of 32

1

Which of the following statements describes a difference between GNU GRUB Legacy and GRUB 2?

Select one of the following:

  • GRUB 2 no longer requires a configuration file

  • Partition numbers start at 0 in GRUB Legacy and1in GRUB 2

  • grub-mk config only works with GRUB Legacy if the--version 1option is used

  • The configuration filemenu.lst(andgrub.conf) have been replaced withgrub.config

Explanation

Question 30 of 32

1

What do the permissions -rwSr-xr-x mean for a binary file when it is executed as a command?

Select one of the following:

  • The command is SetUID and it will be executed with the effective rights of the owner

  • The command will be executed with the effective rights of the group instead of the owner

  • The execute flag is not set for the owner

  • Therefore the SetUID flag is ignored

  • The command will be executed with the effective rights of the owner and group

Explanation

Question 31 of 32

1

What is the purpose of the Filesystem Hierarchy Standard?

Select one of the following:

  • It is a security model used to ensure files are organized according to their permissions and accessibility

  • It provides unified tools to create, maintain and manage multiple filesystems in a common way

  • It defines a common internal structure of inodes for all compliant filesystems

  • It is a distribution neutral description of locations of files and directories

Explanation

Question 32 of 32

1

Which of the following commands set the sticky bit for the directory /tmp? (Choose TWO correct answers.)

Select one or more of the following:

  • chmod +s /tmp

  • chmod +t /tmp

  • chmod 1775 /tmp

  • chmod 4775 /tmp

  • chmod 2775 /tmp

Explanation