Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views21 pages

Lpic 5022

Uploaded by

rdeleonp95
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views21 pages

Lpic 5022

Uploaded by

rdeleonp95
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 21

1.What output will the following command reproduce?

Seq 1 5 20

A 1 6 11 16
B 1 5 10 15
C 1 2 3 4
D 2 3 4 5
E 5 10 15 20

2-What word is missing from the following SQL statement?

___________ count (*) from tablename;

Select
3. Which command makes the shell variable named VARIABLE visible to subshells?
A. export $VARIABLE
B. export VARIABLE
C. set $VARIABLE
D. set VARIABLE
E. env Variable

4.Which of the following SQL statements will select the fields name and address
from the contact table?
A. SELECT (name, address) FROM contacts;
B. SELECT (name address) FROM contacts;
C. SELECT name, address FROM contacts;
D. SELECT name address FROM contacts;
5. How can the existing environment variable FOOBAR be suppressed for the execution
of the script./myscript only ?

A. Unset -v FOOBAR;./myscript
B. Set -a FOOBAR=��;./myscript
C. Env -u FOOBAR./myscript
D. Env -i FOOBAR./myscript
6.What output will the command seq 10 produce?
A. A continuous stream of numbers increasing of 10 until stopped
B. The number 1 through 10 with one number per line
C. the number 0 through 9 with one number per line
D. The number 10 to standard output
7.What is the purpose of the file /etc/profile?
A. It contains the welcome message that is displayed after login
B. It contains security profiles defining which users are allowed to login in
C. It contains environment variables that are set when a user logs in
D. It contains default application profiles for users that run an application for
the first time.
8.You are looking into a new script you received received from your senior
administrator. In the very first line you notice a #! Followed by a file path. This
indicates that:
A. The file at that location was used to make the script
B. This script provides identical functionality as the file at that location
C. This script will self-extract into a file at that location.
D. The program at that location will be used to process the script
9.Which of the following SQL queries counts the number of occurrences for each
value of the field order_type in the table orders?
* A.�SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;
* B.�SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;
* C.�COUNT(SELECT order_type FROM orders);
* D.�SELECT COUNT(*) FROM orders ORDER BY order_type;
* E.�SELECT AUTO_COUNT FROM orders COUNT order_type;
10.Which of the following files, when existing, affect the behavior of the bash
shell?
* A.�~/.bashconf
* B.�~/.bashrc
* C.�~/.bashdefaults
* D.�~/.bash_etc
* E.�~/.bash_profile
11. Which of the following configuration files should be modified to set default
shell variables for all users?
A. /etc/bashrc
B. /etc/profile
C. ~/.bash_profile
D. /etc.bashrc

12.What keyword is missing from this code sample of a shell script?


_____i in *.txt; do
Echo $i
Done
A. For
B. Loop
C. Until
D. While
13.What is the difference between the commands test -e path and test -f path?

* A.�They are equivalent options with the same behavior.


* B.�The -f option tests for a regular file. The -e option tests for an empty file.
* C.�Both options check the existence of the path. The -f option also confirms that
it is a regular file.
* D.�The -f option tests for a regular file. The -e option tests for an executable
file.
14.What benefit does an alias in bash provide?
A. It provides faster lookups for commands in the system directory
B. It creates a local copy of a file from another directory
C. It hides what command you are running from others
D. It allows a string to be substituted for the first word of a simple command.
15. Which directory in /etc is used to keep a sample copy of files and directories
for when a new user has a home directory created?
/etc/skel, /etc/skel/

16.When the command echo $$ output 12942, what is the meaning of 12942?
* A.�It is the process ID of the echo command.
* B.�It is the process ID of the current shell.
* C.�It is the process ID of the last command executed.
* D.�It is the process ID of the last command which has been placed in the
background.
17. Which command allows you to make a shell variable visible to subshells?
* A.�export $VARIABLE
* B.�env VARIABLE
* C.�set $VARIABLE
* D.�set VARIABLE
* E.�export VARIABLE
18.Which of the following is the best way to list all defined variables?
* A.�env
* B.�set
* C.�env -a
* D.�echo $ENV
19.Which of the following words is used to restrict the records that are returned
from a SELECT SQL query based on a supplied criteria for the values in the records?
A. CASE
B.FROM
C.WHERE.
D.IF
20.What command display all aliases defined in the current shell?
Alias, alias -p
21. Which of the following words is used to restrict the records that are returned
from a SELECT SQL query based on a supplied criteria for the values in the records?
A. CASE
B.FROM
C.WHERE.
D.IF
22.when the command echo $? outputs 1, which of the following statements is true?
* A.�It is the process ID of the echo command.
* B.�It is the process ID of the current shell.
* C.�It is the exit value of the command executed immediately before echo.
* D.�It is the exit value of the echo command.
23. After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?
* A.�A B
* B.�A B C
* C.�A C
* D.�B C
* E.�C B A
24.By default, the contents of which directory will be copied to a new users home
directory when the account is created by passing the -m option to the useradd
command?
/etc/skel

25.Which of the following are requirements in order to run a shell script like a
regular command from anywhere in the filesystem?
A. The user issuing the command must be in the group script
B. The script file must be found in the $PATH
C. The script file must have the executable permission bit set.
D. The script must begin with a shebang-line (#!) that point to the correct
interpreter
E. The file system on which the script resides must be mounted with the option
scripts
26. What output will the following command sequence produce?
echo '1 2 3 4 5 6' | while read a b c; do
echo result $c $b $a;
done
* A.�result: 6 5 4
* B.�result: 1 2 3 4 5 6
* C.�result: 3 4 5 6 2 1
* D.�result: 6 5 4 3 2 1
* E.�result: 3 2 1

27.Which of the following commands puts the output of the command date into the
shell variable mydate?
* A.�mydate="date"
* B.�mydate="exec date"
* C.�mydate="$((date))"
* D.�mydate="$(date)"
* E.�mydate="${date}"

28.Which of the following commands lists all defined variables and functions with
bash?
* A.�env
* B.�set
* C.�env -a
* D.�echo $ENV
29.An administrator wants to determine the geometry of a particular windows in X so
she issue s the ______-metric command and the clicks on the window.
/usr/bim/xwininfo,xwininfo
30.What is the name of the simple graphical login manager that comes with a vanilla
x11 installation?
Xdm
31. Your senior administrator asked you to change the default background of his
machine, which uses XDM. Which file would you editto achieve this?
A.
/etc/X11/xdm/Xsetup
B.
/etc/X11/xdift.conf
C.
/etc/X11/xdm/Defaults
D.
/etc/X11/defaults.confis machine, which uses XDM. Which file would you editto
achieve this?

32.Which of the following are tasks handled by a display manager like XDM or KDM?
* A.�Configure additional devices like new monitors or projectors when they are
attached.
* B.�Start and prepare the desktop environment for the user.
* C.�Create an X11 configuration file for the current graphic devices and monitors.
* D.�Lock the screen when the user was inactive for a configurable amount of time.
* E.�Handle the login of a user.
33.Which command can be used to investigate the properties for a particular window
in X by clicking that window?
/usr/bin/xwininfo, xwininfo
34.For accessibility assistance which of the following programs is an on-screen
keyboard?
A. xkb
B. atkb
C.GOK
D.xOSK
35.The X11 configuration file xorg.conf is grouped into sections. How is the
content of the section SectionName associated with that section?
* A.�It is placed in curly brackets as in Section SectionName {...}.
* B.�It is placed between a line containing Section "SectionName" and a line
containing EndSection.
* C.�It is placed between the tags and Section
* D.�It is placed after the row [SectionName].
* E.�It is placed after an initial unindented Section "SectionName" and must be
indented by exactly one tab character.
Example:
Section "Files"
FontPath "/usr/share/fonts/win7fonts"
FontPath "/usr/share/fonts/corefonts"
FontPath "/usr/share/fonts/dejavu"
FontPath "/usr/share/fonts/liberation-fonts"
FontPath "/usr/share/fonts/droid"
FontPath "/usr/share/fonts/ttf-bitstream-vera"
FontPath "/usr/share/fonts/bitstream-cyberbit"
FontPath "/usr/share/fonts/rphicfonts"
FontPath "/usr/share/fonts/encodings"
FontPath "/usr/share/fonts/ja-ipafonts"
FontPath "/usr/share/fonts/wqy-microhei"
FontPath "/usr/share/fonts/ipamonafont"
FontPath "/usr/share/fonts/urw-fonts"
FontPath "/usr/share/fonts/wqy-zenhei"
EndSection
35.- How is a display manager started?
A. It is started by a user using the command startx.
B. It is started like any other system service by the init system.
C. It is started by inetd when a remote hosts connects to the X11 port.
D. It is started automatically when a X11 user logs in to the system console.
36.On a system running the KDE Display Manager, when is the /etc/kde4/kdm/xreset
script automatically executed?
A. When KDM starts
B. When a users X session exits
C. When KDM crashes
D. When X is restarted
E. When X crashes
37.Which file used by XDM specifies the default wallpaper?
A. /etc/X11/xdm/Xsetup
B. /etc/X11/xdm.conf
C. /etc/X11/xdm/Defaults
D. /etc/X11/defaults.conf
38.What is the default name of the configuration file for the xorg x11 server?

xorg.conf
39.-Why is the xhost program considered dangerous to use?
A. It makes it difficult to uniquely identify a computer on the network.
B. It allows easy access to your X server by other users.
C. It logs sensitive information to syslog.
D. It makes your computer share network resources without any authentication.
E. It is a graphical DNS tool with known exploits.
40.Which of the following commands shows the current color depth of the x server?
* A.�xcd
* B.�xcdepth
* C.�xwininfo
* D.�xcolordepth
* E.�cat /etc/X11
41.What is the purpose of the sticky key feature in X?
* A.�To assist users who have difficulty holding down multiple keys at once.
* B.�To prevent repeated input of a single character if the key is held down.
* C.�To ignore brief keystrokes according to a specified time limit.
* D.�To repeat the input of a single character
42.What is the purpose of a screen reader?
* A.�It manages virtual keyboards on touch screen displays.
* B.�It reads the parameters of the attached monitors and creates an appropriate
X11 configuration.
* C.�It displays lines and markers to help people use speed reading techniques.
* D.�It manages and displays files that contain e-books.
* E.�It reads displayed text to accommodate the needs of blind or visually impaired
people.
43-Which of the following lines is an example of a correct setting ofr the DISPLAY
environment variable?
A. hostname:displayname
B. hostname:displaynumber
C. hostname/displayname
D. hostname/displaynumber
E. hostname
44.Which of the following fields can be found in the /etc/group file?
* A.�The list of users that belong to the group.
* B.�The home directory of the group.
* C.�The name of the group.
* D.�The description of the group.
* E.�The password of the group.
45.The /etc/group file is a text file that defines the groups and their members
on the system. Each line in the file represents a single group, with the following
format:
group_name:password:GID:user_list
46.The system timezone may be set by linking /etc/localtime to an appropriate file
in which directory?
/usr/share/zoneinfo
47.What is NOT contained in the locale setting of the operating system?
A. currency symbol
B. language
C. timezone
D. thousands separator
47.On a system using shadowed password, the most correct permission for
/etc/password are____ and the most correct permission for /etc/shadow
are__________
A. -rw-r-----, -r--------
B.-rw-r--r--, -r--r--r--
C. -rw-r--r--, -r--------
D. -rw-r--rw-, -r-----r--
C. -rw-------, -r--------
48.Which environment variable should be set in order to change the timezone for
the commands run within the environment scope?
TZ
49. Of the ways listed, which is the best way to temporarily suspend a single users
ability to interactively login?
A. Add the user name to /etc/nologin.
B. Change the user�s password.
C. Change the user name in /etc/passwd.
D. Use chage to expire the user account.
E. Place the command logout in the user�s profile.
50.In case neither cron.allow nor cron.deny exist in /etc/, which of the following
is true?
* A.�Without additional configuration, all users may create user specific crontabs.
* B.�Without additional configuration, only root may create user specific crontabs.
* C.�The cron daemon will refuse to start and report missing files in the system's
logfile.
* D.�When a user creates a user specific crontab the system administrator must
approve it explicitly.
* E.�The default settings of /etc/crond.conf define whether or not user specific
crontabs are generally allowed or not.
51.The___________ command is used to add a group to the the system.
groupadd, /usr/sbin/groupadd
52. What is the conventional purpose of Linux UIDs that are lower than 100?
A . They are reserved for super user accounts.
B . They are reserved for the system admin accounts.
C . They are reserved for system accounts.
D . They are unused, aside from 0, because they are targets of exploits.
E . They are used to match with GIDs in grouping users.
53.Which commands can you use to change a users account aging information?
A.usermod
B.passwd
C.chattr
D.chage
E.chsh
54.What is the purpose of the iconv command?
A. It converts bitmaps images from one format to another such as PNG to JPEG
B. It verifies that the root directory tree complies to all conventions from the
Filesystem Hierarchy Standard (FHS)
C. It display additional meta information from icon filed ending in .icoo
D. It changes the mode of an inode in the ext4 file system
E. It converts files from one character encoding to another
55.Which of the following commands can be used to convert text files in one
character encoding to another character encoding?
A.cat
B.convert
C.dd
D.iconv
E.utf2utf
56.What is the main difference between the batch and at commands?
A. The batch command will run multiple times. The at command will only run once.
B. The batch command will run when system load is low . The at command runs at a
specific time
C. The at command reads commands from standard input .The batch command requires a
command line argument.
D. The at command e-mails results to the user. The batch command logs results to
syslog.
57.Which of the following can the chage command NOT change?
A. The number of days since January 1, 1970 after which the users account will no
longer be accessible.
B. The number of days since January 1, 1970 after which the password can change.
C. The number of days since January 1, 1970 since the password was last changed.
D. The maximum number of days during which a password is valid.
E. The number of days of inactivity after password has expired before the account
is locked
This parameter is controlled by the -I or �inactive option of the usermod command.
58.How is the file format of /etc/crontab different from a normal crontab file?
A. The /etc/crontab file can specify a year field
B. A normal crontab file must be installed with the crontab command.
C. A normal crontab file allows for environment variable substitution.
D. The /etc/crontab file has a user field for commands.
59. Which command can be used to delete a group from a Linux system?
A. groupdel
B. groupmod
C. groups
D. groupedit
60.Which of the following commands should be added to /etc/bash_profile in order to
change the language for messages for an internationalized program to Portuguese
(pt)?
A. export LANGUAGE=�pt�
B. export MESSAGE=�pt�
C. export US_MESSAGES=�pt�
D. export LC_MESSAGES=�pt�
E. export ALL_MESSAGES=�pt�

61.Which of the following fields are available in both the global /etc/crontab file
as well as in user-specific crontab files?
A. Year
B. Minute
C. Username
D. Command
62.Which character in the password field of /etc/passwd is used to indicate that
the encrypted password is stored in /etc/shadow?
A. *
B. �
C. s
D. x
63. In which file, if present, must all users be listed that are allowed to use the
cron scheduling system?
/etc/cron.allow
64.Which of the following steps prevents a user from obtaining an interactive login
session?
A. Run the command chsh -s /bin/false with the user name
B. Set the UID for the user to 0.
C. Remove the user from the group staff
D. Add the user to /etc/noaccess
E. Create a .nologin file in the users home directory
65.Of the ways listed, which is the best method to temporarily suspend a user
ability to interactively login?
A. Use passwd -d username to give the user an empty password.
B. Use chage to expire the user account.
C. Change the users password.
D. Add the command exit to the users .login file
66.Where are user specific crontabs stored?
A. In the database file /etc/crontab.db which is shared by all users
B. As individual per-user files within /var/spool/cron
C. As individual per-user files in /etc/cron.user.d
D. In the .crontab file in the users home directory.
E. in the file /var/cron/user-crontab which is shared by all users
67.Which file contains the date of the last change of a user�s password?
A. /etc/gshadow
B. /etc/passwd
C. /etc/pwdlog
D. /etc/shadow
E. /var/log/shadow
68.Which command should be added to /etc/bash profile to change the language of
messages from an internationalized program to Portuguese (pt)?
A. export LANGUAGE=�pt�
B. export MESSAGE=�pt�
C. export LANG=�pt�
D. export LC_MESSAGES=�pt�
E. export ALL_MESSAGES=�pt�
69. Which TWO statements about crontab are true?
A. Every user may have their own crontab.
B. Changing a crontab requires a reload/restart of the cron daemon.
C. The cron daemon reloads crontab files automatically when necessary.
D. hourly is the same as �0 * * * * �
E. A cron daemon must run for each existing crontab
70.A French user has installed the French language pack, but currencies are still
being displayed with a leading �$� sign in his spreadsheets. What must be done to
fix this?
A. Alter the locale
B. Set the timezone correctly
C. Edit /etc/currency
D. Reinstall the French Language pack
71.To prevent a specific user from scheduling tasks with at, what should the
administrator do?
A. Add the specific user to /etc/at.allow file.
B. Add the specific user to [deny] section in the /etc/atd.conf file
C. Add the specific user to /etc/at.deny file
D. Add the specific user to nojobs group.
E. Run the following: atd �deny [user]
72.Which commands can be used to change a user�s account aging information?
A. usermod
B. passwd
C. chattr
D. chage
E. chsh
73.What is true regarding the command userdel �force �remove bob?
A. The user bob is removed from the systems user database.
B. The user bobs home directory is removed.
C. The locate database is update to drop file owned by bob.
D. All files owned by bob are remove from all mounted filesystems.
E. In case bob was the last member of a group that is deleted.
74.A user was notgiven permission to use the CRON schedulingsystem. What file needs
to be modified to provide that access?
/etc/cron.allow
75.What command will display the group names and GIDs to which a user belongs?
Id,/usr/bin/id
76.Which command will set the local machine timezone to UTC?
A. cat UTC > /etc/timezone
B. ln -s /usr/share/zoneinfo/UTC /etc/localtime
C. date �timezone=UTC
D. mv /usr/timezone/UTC /etc
77-Which of the following crontab entries will execute myscript at 30 minutes past
every hour on Sundays?
* A.�0 * * * 30 myscript
* B.�30 * * * 6 myscript
* C.�30 0 * * 0 myscript
* D.�30 0-23 * * 0 myscript
* E.�0 0-23 * * 30 myscript
78-Which of the following files assigns a user to its primary group?
* A.�/etc/pgroup
* B.�/etc/shadow
* C.�/etc/group
* D.�/etc/passwd
* E.�/etc/gshadow
79-Which crontab entry could be used to set the system time at regular intervals?
A. 10 * * * date $d $t $24
B. 10 * * * ntpdate ntp1.digex.net
C. 10 * * * date ntp1.digext.net
D. 10 * * * runcron date ntp1.digex.net
E. 10 * * * settime $d $t $24
80-What is true about the file /etc/localtime?
* A.�It is a plain text file containing a string such as Europe/Berlin
* B.�It is created and maintained by the NTP service based on the location of the
system's IP address.
* C.�It is a symlink to /sys/device/clock/ltime and always contains the current
local time.
* D.�After changing this file, newtzconfig has to be run to make the changes
effective.
* E.�It is either a symlink to or a copy of a timezone information file such as
/usr/share/zoneinfo/Europe/Berlin.
81-Which command is used to add an empty group to the system?
groupadd, /usr/sbin/groupadd
82-The correct contrab entry to execute the script chklog three times per month
between 3 p.m. and 5 p.m.:
A. * 3,4,5 1 * * chklog
B. 3 3,4,5 1 * * chklog
C. 3 15,16,17 * * * chklog
D. 0 15,16,17 1 * * chklog
E. * 15,16,17 1 * * chklog
83-Which of the following commands can remove a user from a group?
A.grouprm
B.groupmod
C.passwd
D.usergroups
E.usermod
84-Why is /etc/shadow not world readable if the passwords are stored in an
encrypted fashion?
A.The encrypted password are still subject to brute force attacks
B.This is just for historical reasons
C.There is other information in the file that needs to be kept secret
D. The password can de decrypted by anyone with root access

85-Each entry in a crontab must end with what character?


A. Tab
B. Space
C. Backslash
D. Newline

86.Which file specified the user accounts that can NOT submit jobs via at or batch?
/etc/at.deny
87. Which of the following parameters are used for journalctl to limit the time
frame of the output?
A. --from=
B. --since=
C. �until=
D. �upto=
E. �date=
88.What is true about the ntpdate command?
A. It is the primary management command for the NTP time server
B. It updates the local system,s date (i.e. day, month and year) but not the time
(i.e. hours, minutes,seconds).
C. It queries one or more NTP time servers and adjust the system time accordingly.
D. It sends the local system time to one or many remote NTP time servers for
redistribution.
E. It can be used by any user to set the user clock independently of system clock.
89.What entry can you add to syslog.conf file to have all syslog messages generated
by your system go to virtual console 12?
A. *.* /dev/tty12
B. /var/log/messages | /dev/tty12
C. | /dev/tty12
D. syslog tty12
E. mail.* /dev/tty12
90.What is the purpose of the command mailq?
A. It fetches new emails from a remote server using POP3 or IMAP
B. It is a multi-user mailing list manager
C. It is a proprietary tool contained only in the qmail MTA
D. It queries the mail queue of the local MTA.
E.It is a command-line based tool for reading and writing emails.
91.Which of the following tasks can be accomplished using the command date?
A. Synchronize the hardware and system clocks.
B. Output date and time in different formats.
C. Set the system clock
D. Set the hardware clock
E. Update the time via NTP
92.What is pool.ntp.org?
A. A deprecated feature for maintaining system time in the Linux Kernel
B. A website which provides binary and source packages for the OpenNTPD project
C. A virtual cluster of various timeservers
D. A community website used to discuss the localization of Linux
93.Which option in the /etc/ntp.conf file specifies an external NTP source to be
queried for time information?
Server
94.What entry can be added to the syslog.conf file to have all syslog messages
generated by a system displayed on console 12?
A. *.* /dev/tty12
B. /var/log/messages | /dev/tty12
C. | /dev/tty12
D. syslog tty12
E. mail.* /dev/tty12
95.Which of the following are commonly used Mail Transfer Agent (MTA)
applications?
A.Postfix
B.Procmail
C.Sendmail
D.Exim
E.SMTPd
96.You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print
jobs with a message, �hello�. Which command will do this?
A. cupsreject -c -r hello HPLaserjet4
B. cupsreject -p -m hello HPLaserjet4
C. cupsdisable -c -r hello HPLaserjet4
D. cupsdisable -p -m hello HPLaserjet4
97.Which command, available with all MTAs is used to list the contests of the MTAs
mailqueue?
mailq,sendmail -bp
98.To exclude all logs of a given logging facility you should use a logging
priority of _____
None
99.What command should be used to print a listing of email in the systems mail
queue?
A. lpq
B. mailq
C. mlq
D. sendmail�l
100.After adding a new email alias to the configuration which command must be run
in order to ensure the MTA knows about it?
newaliases, sendmail -bi
101. Which command is used to sync the hardware clock to the system clock?
hwclock
102- What is true regarding the command sendmail?
A. With any MTA, the sendmail command must be run periodically by the cron daemon.
B. All MTAs, including postfix and exim, provide a sendmail command
C. The sendmail command print the MTAs queue history of which mails have been sent
successfully
D. It is only available when the sendmail MTA is installed
103. Please specify the top directory containing the configuration files for the
CUPS printing system.
/etc/cups
104.Why is the correct configuration of a systems zone important?
A. Because the conversion of Unix timestamps to local time relies on the time zone
configuration.
B. Because the time zone is saved as part of the modification times of files and
cannot be changed after a file is created
C. Because the environment variables LANG and LC_MESSAGES are by default set
according the time zone
D. Because the NTP chooses server nearby based on the configured time zone
105- After configuring printing on a linux server, the administrator sends a test
file to one of the printers and it fails to print. What command can used to display
the status of the printers queue?
lpq, lpstat
105-Which of the following is observed and corrected by a NTP client?
A. The skew in time between the system clock and the hardware clock
B. The skew in time between the system clock and the reference clock
C. Changes in the time zone of the current computers location
D. Adjustments needed to support Daylight Saving Time.
106-Which of the following is a legacy program provided by CUPS for sending files
to the printer queue on the command line?
A. Lpd
B. Lpp
C. Lpq
D. Lpr
107-Which of the following commands is used to rotate, compress, and mail system
logs?
A. rotatelog
B. striplog
C. syslogd �rotate
D. logrotate
E. logger
108-On a dual boot system, every time the system is booted back into Linux the time
has been set backward by one day. Which of the following commands will correct the
problem?
A. date -d �+ 1 day�
B. hwclock �systohc �localtime
C. ntpdate pool.ntp.org
D. time hwclock
109-What command can be used to generate syslog entries of any facility and
priority?
logger
110-Which of the following are syslog facilities?
A. local7
B. mail
C. advanced
D. postmaster
E. remote
111-What is true regarding the file ~/.forward?
A. As it is owned by the MTA and no writable by the user, it must be edited using
the editaliases command
B. After editing ~/.forward the user must run newaliases to make the email server
aware of the changes.
C. Using ~/.forward, root may configure any email address whereas all other uses
may configure only their own addresses.
D. When configured correctly, ~/.forward can be used to forward each incoming mail
to more than one other recipient.
112-Which file inside the CUPS configuration directory contains the definition of
the printers?
A.cups-devices.conf
B.snmp.conf
C.printcap.conf
D.printers.conf
E.cupsd.conf

113-Which file , when using sendmail or a similar MTA system, will allow a user to
redirect all their mail to another address and is configurable by the user
themselves?
A. /etc/alias
B. ~/.alias
C. /etc/mail/forwarders
D. ~/.forward
E. ~/.vacation
114-Which of the following details is NOT provided in any output from the netstat
utility?
A. Broadcast services
B. Interface statistics
C. Masquerading connections
D. Network connections
E. Routing tables
115-Which keyword must be listed in the hosts option of the name service switch
configuration file in order to make host lookups consult the /etc/hosts file?
Files
116- On a regular users workstation the route command takes a long time before
printing out the routing table. Which of the following errors does that indicate?
A. The local routing information may be corrupted and must be re-validated using a
routing protocol
B. One of the routers in the routing table is not available which causes the
automatic router failure detection mechanism (ARF-D) to wait for a timeout.
C. There may accidentally be more than one default router in which case a default
router election has to be done on the network in order to choose one router as the
default
D. DNS resolution may not be working as route by default tries to resolve names of
routers and destinations and may run into a timeout
117-Which of the following lines are valid in the file /etc/hosts?
A. 2001:db8::15 www.example.com www
B. www.example.com www 203.0.13.15
C. 203.0.113.15 www.example.com www
D. www.example.com, www 203.0.13.15,2001:db8::15
E. 2003.0.113.15,2001:db8::15 www.example.com www
118-Which of the following commands can be used to display the local routing table?
A. Ifconfig
B. Dig
C. Netstat
D. Route
E. Trackroute
119-How many IP-addresses can be used for unique hosts inside the IPV4 subnet
192.168.2.128/28?
14
120-Which of the following statements is valid in the file /etc/nsswitch.conf?
A. Multi on
B. 192.168.168.4 dns-server
C. Hosts: files dns
D. Include /etc/nsswitch.d
121-Which command,depending on its options can display the open network
connections,the routing tables as well as interface statics
netstat, ss
122-What is the purpose of the nsswitch.conf file?
A. It is used to configure where the C library looks for system information such as
host name and user passwords.
B. It is used to configure network protocol port numbers such as for HTTP or SMTP
C. It is used to configure LDAP authentication services for the local system
D. It is used to configure which network services will be turned on during the next
system boot
123-Which of the following commands will help identify a broken router between the
local and the remote machine?
A. Ps
B. Netstat
C. Nslookup
D. Ifconfig
E. Traceroute
124-What of the following can be done by the command ifconfig?
A. Set a network interface active or inactive.
B. Specify the kernel module to be used with a network interface.
C. Allow regular users to change the network configuration of a network interface.
D. Change the netmask used on a network interface.
E. Specify which network services are available on a network interface
125-Which of the following tools used for DNS debugging , reports not only the
response from the name server but also details about the query?
A.dnsq
B.dig
C.hostname
D.dnslookup
E.zoneinfo
126-Which of the following keywords can be used in the file /etc/resolv.conf?
A.substitute
B.nameserver
C.search
D.lookup
E.method

127-Which command is used to set the hostname of the local system?


Hostname
128-Which of the following may occur as consequence of using the command ifconfig?
A. New name servers may be added to the resolver configuration
B. Network interfaces may become active or inactive.
C. The routing table may change
D. IP addresses may change
E. The system host name may change
129-With IPv6 how many bits have been used for the interface identifier of an
unicast address?
64
130-Which of the following is a valid IPv6 address?
A. 2001:db8:3241::1
B. 2001::db8:4581::1
C. 2001:db8:0g41::1
D. 2001%db8%9990%%1
E. 2001.db8.819f..1
131-What is the command to delete the default gateway from the system IP routing
table?
A. route del default
B. ifconfig unset default
C. netstat -r default
D. ip route del default
E. sysctl ipv4.default_gw=0
132-Which of the following programs can be used to determine the routing path to a
given destination?
A.dig
B.netstat
C.ping
D.route
E.traceroute
133-Which parameter must be passed to ifconfig to activate a previously inactive
network interface?
Up
134-Which port is the default server port for the HTTPS protocol?
443
135-Given the following routing table:
How would an outgoing packet to the destination 192.168.2.150 be handled?
A. It would be passed to the default router 192.168.178.1 on wlan0
B. It would be directly transmitted on the device eth0
C. It would be passed to the default router 255.255.255.0 on eth0.
D. It would be directly transmitted on the device wlan0.
E. It would be passed to the router 192.168.1.1 on eth0.
136-What is true regarding TCP port 23?
A. Port 23 is the well known port for the telnet service which is a plain text
protocol that should no longer be used.
B. Port 23 is the well known port for the SSH service which provides secure logins
C. Port 23 is the well known port for the rlogin service which is SSL secured by
default
D. Port 23 is the well known port for the system login services which are encrypted
when the user runs starttls commands in his login shell.
137-What is the lowest numbered unprivileged TCP port?
1024
138-Which of the following is true about IPV6?
A. With Ipv6, the TCP port numbers of most services have changed.
B. IPv6 no longer supports broadcast addresses.
C. IPv4 addresses can be used without nay change with IPV6
D. IPv6 no longer supports multicast addresses.
E. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.
139-Which of the following IPv4 network are reserved by IANA for private address
assignment and private routing?
A.127.0.0.0/8
B.10.0.0.0/8
C.168.255.0.0/16
D.172.16.0.0/12
E.192.168.0.0/16

139-What is true regarding a default route?


a. The default route is always used first. When the default route is not available
more specific routes are tried
b. When a default route is set all other roues are disabled until the default route
is deleted.
c. The default route is only used if there is not a more specific route to a
destination host or network.
d. Without a default route, no network communication even in directly attached
networks is possible
140-Which of the following keywords can be used in the file /etc/nsswitch.conf to
specify a source for host name lookup?
A.resolv
B.dns
C.remote
D.files
E.hosts
141.-Which of the following commands lists all queued print jobs?
A.lpd
B.lpr
C.lp
D.lsq
E.lpq
142.- Which of the following commands displays all environment and shell variables?
A.getargs
B.lsenv
C.ls
D.env
E.lsshell
143-. What output will the following command sequence produce?
echo '1 2 3 4 5 6' | while read a b c; do
echo result $c $b $a;
done
* A.�result: 6 5 4
* B.�result: 1 2 3 4 5 6
* C.�result: 3 4 5 6 2 1
* D.�result: 6 5 4 3 2 1
* E.�result: 3 2 1
144-Which file contains a set of services and hosts that will be allowed to connect
to servier by going through a TCP wrapper program such as tcpd?
/etc/hosts.allow
145-How many IP addresses can be used for unique hosts inside the IPv4 Subnet
192.168.2.128/26?
A.6
B.14
C.30
D.62
E.126
146-Which of the following commands preloads and manages keys that are used for
automatic authentication while logging in the other machines using SSH?
A.sshd
B.ssh-agent
C.ssh-keygen
D.ssh-add
147-Which command included in system supports selecting messages from the system
journal by criteria such as time or unit name?
journalctl
148-What is the purpose of TCP wrapper?
A.Manage and adjust bandwidth used by TCP services
B.Bind a network service to a TCP port
C. Encapsulate TCP messages in IP packets
D.Add SSL support to plain text TCP services.
E. Limit access to a network service.
149-Which option in the chrony configuration file changes the initial interval of
poll to a ntp server in order to speed up the initial synchronization?
A.iburst
B. quickstart
C.fast
D.fsync
E.flood
150-Which configuration file contains the default options for ssh clients?
A./etc/ssh/sshd_config
B./etc/ssh/ssh
C./etc/ssh/ssh_config
D./etc/ssh/client
E./etc/ssh/ssh_client
151-Which file, if present, must contain all users that are allowed to use the cron
scheduling system?
/etc/cron.allow

152-Which configuration file would be edited to change the default options for
outbound SSH sessions?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/client
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_client
153-Which of the following comparison operators for test work on elements in the
file system?
A.-z
B. -eq
C. -d
D. -f
E. -lt

154-Which configuration file would be edited to change default options for the
openssh server?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/server
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_server

155-Which of the following commands can be used to limit the amount of memory a
user may use?
A.umask
B.usermod
C.ulimit
D.passwd
E.chage
156-What can be specified with useradd?
A.Commands the user can run using sudo
B.The absolute path to the users home directory
C.Which printers are available for the new user
D. The SSH keys used to login to the new account
E. The number user ID (UID) of the user
157-Which command is used to set restrictions on the size of a core file that is
created for a user when a program crashes?
A.core
B.edquota
C.ulimit
D.quota
158-Which of the following fields are available in the standard format of both
global /etc/crontab file as well as in user-specific crontab file?
A. Year
B. Minute
C. Username
D. Effective group ID
E. Command
159-Depending on a systems configuration which of the following files can be used
to enable and disable network services running on this host?
A. /etc/profile
B. /etc/xinetd.conf
C. /etc/ports
D. /et/host.conf
E. /etc/hosts.conf
160-Which of the following commands shows all active systemd timers?
A. systemctl-timer show
B. timectl list
C. systemctl -t
D. systemctl list-timers
E. timeq
161-Given the following excerpt of sudo configuration
Jane ANY=NOPASSWD: /bin/kill, /bin/id PASSWD: /sbin/fidisk
A.Jane can run /bin/id only after specifying her password
B.Jane can run /sbin/fdisk after specifying roots password
C.Jane can run /sbin/fdisk after specifying her password
D. Jane can run /bin/kill without specifying a password
E. Jane can run /bin/id without specifying her password

162-Which of the following connection types as seen in unroll connection show may
exist in network manager?
A.tcp
B.Ethernet
C.wifi
D.ipv6
E.bridge
163-Which of the following nmcli subcommands exists?
A. nmcli ethernet
B. nmcli device
C. nmcli wifi
D. nmcli address
E. nmcli connection

164-Which of the following statements about system-journald are true?


A.It is incompatible with syslog and cannot be installed on a system using a
regular syslog
B.It only processes messages of system of system and not messages of any other
tools
C.It can pass log messages to syslog for further processing.
D.It maintains metadata such as _UID or _PID for each message.
E.It supports syslogs facilities such as kern,user and auth.
165-Which of the following protocols is related to the term open relay?
A. SMTP
B. POP3
C. NTP
D. IMAP
E. LDAP
166-Which of the following commands configure network interfaces based on the
systems existing distribution-specific configuration files?
A.ifconf
B.ifdown
C.ifpause
D.ifstart
E.ifup
167-What is the top-level directory which contains the configuration files for
CUPS?
/etc/cups

168-Which of the following entries in /etc/syslog.conf writes all mail related


events to the file -/var/log/maillog and sends all criticals events to the remote
server logger,example.com?
A. mail.*/var/log/maillogmail,[email protected]
B. mail.*/var/log/mailllogmmail.critsyslog://logger.example.org
C. mail/var/log/[email protected]
D. mail.*/var/log/[email protected]
E.mail*/var/log/maillogmail [email protected]
169-Which of the following commands can identify the PID od a process which opened
a TCP port?
A.ptrace
B.strace
C.debug
D.lsof
E.nessus
170-Which of the following statements is true if the UID of a regular user is
identical to the GID of a group?
A.UID have precedence over GIDs, therefore the user is available while the group
doesn�t
B. The user as well as the group are not available to avoid ambiguity due to the ID
conflict
C. UIDs and GIDs are independent of each other, therefore the user as well as the
group are still available.
D. The user is the only member of the group, even if the group configuration
contains other members
E.GIDs have precedence over UIDs, therefore the group is available while the user
isn�t
171-What argument to the -type option of find will match files that are sysmbolic
links?
l
172-Which of the following find commands will print out a list of files owned by
root and with the SUID bit set in /usr?
A.find /usr -uid 0 -perm +4000
B.find -user root +mode +s /usr
C.find -type suid -username root -d /usr
D.find /usr -ls \*s\* -u root
E.find /usr -suid -perm +4000
173-With X11 forwarding in ssh , what environment variable is automatically set in
the remote host shell that is not set when X11 forwarding is not enabled?
DISPLAY, $DISPLAY
174-Which of the following programs uses the host.allow file to perform its main
task of checking for access control restrictions to system services?
A.tcpd
B.inetd
C.fingerd
D.mountd
E.xinetd
175-Which of the following features are provided by SPICE?
A. Connecting local USB devices to remote applications
B. Accessing graphical applications on a remote host
C. Replacing Xorg as local X11 server.
D. Downloading and locally installing applications from a remote machine
E. Uploading and running a binary program on a remote machine
176-In an xinetd configuration file, which attribute specifies the network address
that will be used to provide the service?
Bind
177-What is true about the Hop Limit field in the IPv6 Header?
A. The field is not changed during the transport of a package
B. The field is transmitted within a hop-by-hop extension header
C. Each router forwarding the packet increases the fields value
D. Each router forwarding the packet decreases the fields value
E. For multicast packages the fields value is always 1
178-Which of the following changes may occur as a consequence of using the command
ip?
A. Network interfaces may become active or inactive
B. New name servers may be added to the resolver configuration
C. The systems host name may change
D. IP addresses may change
E. The routing table may change
179-Which of the following tasks can the date command accomplish?
A. Set the systems date and time
B. Set the systems date but not the time
C. Calculate the time span between two dates
D. Print a calendar for a month or a year
E. Display time in a specific format
180-Which of the following information is stored in /etc/shadow for each user?
A.The timestamp of the users last login
B.The users private SSH keys
C.The hashed password of the user
D.The numerical user ID (UID)
E.The path to the users home directory
181-When trying to unmount a device it is reported as being busy. Which of the
following commands could be used to determine which process is causing this?
A.debug
B.lsof
C.nessus
D.strace
E.traceroute
182-On a Linux system with shadow password enabled, which file in the file system
contains the password hashes of all local users?
/etc/shadow
183-Which of the following statements is true regarding system timer units?
A.Timer units can only be defined within a service units file
B. The command executed by the timer is specified in the timer unit�s [Cmd] section
C. A dedicated system service , system-cron,handles the execution of timer units.
D. Timer units only exist in the system scope and are not available for users.
E.Each system timer unit controls a specific system service unit
184-On a machine running several X servers. How do programs identify the different
instance of the X11 server?
A. By a fixed UUID that is defined in the X11 configuration file
B. By a display name like :1
C. By the name of the user that turns the X server like X11: bob
D. By a unique IPv6 address from the fc80:64 subnet

185-Which command included in NetworkManager is a curses application which provides


easy access to the network manager command line
Nmtui

186-Which directory holds the files that configure the xinetd service when using
several configuration files instead of an integrated configuration file?
/etc/xinetd.d
187-What the echo $$ command?
A. The process ID of the current shell
B. The process ID for the following command
C. The process ID of the last command executed
D. The process ID of the last command which has been placed in the background
E. The process ID of the echo command

188-The presence of what file will temporarily prevent all users except root from
logging into the system?
/etc/nologin
189-Which file lists which users can execute commands using sudo?
/etc/sudoers
190-Which of the following commands connects to the remote host example.com which
has open ssh listening on tcp port 2222?
A.ssh - -port 2222 example.com
B.ssh -p 2222 example.com
C.ssh -o Port=2222 example.com
D.ssh -o GatewayPort=2222 example.com
E.ssh example.com:2222
191-Which of the following commands should be executed when starting a login shell
in order to change the language of message for an internationalized program to
Portuguese (pt)?
A. Export LANGUAGE=�pt�
B. Export LC_MESSAGES=�pt�
C. Export UI_MESSAGES=�pt�
D. Export MESSAGE=�pt�
E. Export ALL_MESSAGES=�pt�
192-What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify
the client host.
B. It provides the server identity information to connecting SSH clients
C. It is the root key by which all user SSH keys must be signed.
D. It authenticates any user that logs into a remote machine from the keys host
E. It is used by system services like cron,syslog or a backup jobs to automatically
connect to remote hosts.

You might also like