102-500 : LPI Level 1 : Part 03

  1. What information is provided by the echo $$ command?

    • The process ID of the current shell.
    • The process ID for the following command.
    • The process ID of the last command executed.
    • The process ID of the last command which has been placed in the background.
    • The process ID of the echo command.
  2. Which command makes the shell variable named VARIABLE visible to subshells?

    • export $VARIABLE
    • env VARIABLE
    • set $VARIABLE
    • set VARIABLE
    • export VARIABLE
  3. What output is produced by the following command sequence?

    echo ‘1 2 3 4 5 6’ | while read a b c; do
    
    echo result $c $b $a;
    
    done
    • result: 6 5 4
    • result: 1 2 3 4 5 6
    • result: 3 4 5 6 2 1
    • result: 6 5 4 3 2 1
    • result: 3 2 1
  4. Which of the following configuration files should be modified to globally set shell variables for all users?

    • /etc/profile
    • /etc/bashrc
    • ~/.bash_profile
    • /etc/.bashrc
    • /etc/shellenv
  5. What output does the command seq 10 produce?

    • A continuous stream of numbers increasing in increments of 10 until the command is stopped.
    • It creates no output because a second parameter is missing.
    • The number 0 through 9 with one number per line.
    • The number 10 to standard output.
    • The numbers 1 through 10 with one number per line.
  6. FILL BLANK

    What command list the aliases defined in the current Bash shell? (Specify only the command without any path or parameters.)

    • alias
  7. Which of the following commands can be used to limit the amount of memory a user may use?

    • umask
    • usermod
    • passwd
    • ulimit
    • chage
  8. What is a purpose of an SSH host key?

    • It must be sent by any SSH client in addition to a user key in order to identify the client’s host.
    • It is root key by which all user SSH keys must be signed.
    • It provides the server’s identity information to connecting SSH clients.
    • It authenticates any user that logs into a remote machine from the key’s host.
    • It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
  9. What is the purpose of TCP wrapper?

    • Manage and adjust bandwidth used by TCP services.
    • Bind a network service to a TCP port.
    • Encapsulate TCP messages in IP packets.
    • Add SSL support to plain text TCP services.
    • Limit access to a network service.
  10. Given the following excerpt of the sudo configuration:
    jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk

    Which of the following statements are true? (Choose three.)

    • Jane can run /bin/id only after specifying her password.
    • Jane can run /sbin/fdisk after specifying root’s password.
    • Jane can run /sbin/fdisk after specifying her password.
    • Jane can run /bin/kill without specifying a password.
    • Jane can run /bin/id without specifying her password.
  11. Which configuration file contains the default options for SSH clients?

    • /etc/ssh/sshd_config
    • /etc/ssh/ssh
    • /etc/ssh/ssh_config
    • /etc/ssh/client
    • /etc/ssh/ssh_client
  12. Depending on a system’s configuration, which of the following files can be used to enable and disable network services running on this host?

    • /etc/profile
    • /etc/xinetd.conf
    • /etc/ports
    • /etc/services
    • /etc/host.conf
  13. Which of the following commands can identify the PID od a process which opened a TCP port?

    • ptrace
    • strace
    • debug
    • lsof
    • nessus
  14. FILL BLANK

    When using X11 forwarding in SSH, what environment variable is automatically set in the remote shell in order to help applications to connect to the correct X11 server? (Specify only the environment variable without any additional commands or values.)

    • DISPLAY
  15. FILL BLANK

    The presence of what file will temporarily prevent all users except root from logging into a system? (Specify the full name of the file, including path.)

    • /sbin/nologin
  16. Which of the following commands preloads and manages existing SSH keys that are used for automatic authentication while logging in to order machines using SSH?

    • sshd
    • ssh-keyring
    • ssh-keygen
    • ssh-pki
    • ssh-agent
  17. On a machine running several X servers, how do programs identify the different instances of the X11 server?

    • By a fixed UUID that is defined in the X11 configuration file.
    • By a display name like: 1.
    • By the name of the user that runs the X server like x11:bob.
    • By a device name like /dev/X11/xservers/1.
    • By a unique IPv6 address from the fe80::/64 subnet.
  18. What is the purpose of a screen reader?

    • It manages virtual keyboards on touch screen displays.
    • It reads the parameters of the attached monitors and creates an appropriate X11 configuration.
    • It displays lines and markers to help people use speed reading techniques.
    • It manages and displays files that contain e-books.
    • It reads displayed text to accommodate the needs of blind or visually impaired people.
  19. The X11 configuration file xorg.conf is grouped into section. How is the content of the section Section​​ Name represented?

    • It is placed in curly brackets as in Section SectionName {…}.
    • It is placed between the tags <Section name=“SectionName”> and </Section>.
    • It is placed between a line containing Section “SectionName” and a line containing EndSection.
    • It is placed after the row [SectionName].
    • It is placed after an initial unindented Section “SectionName” and must be indented by exactly one tab character.
  20. Which of the following features are provided by SPICE? (Choose two.)

    • Connecting local USB devices to remote applications.
    • Accessing graphical applications on a remote host.
    • Replacing Xorg as local X11 server.
    • Downloading and locally installing applications from a remote machine.
    • Uploading and running a binary program on a remote machine.
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments