Home

LPI Linux Certification in a Nutshell Part 45

LPI Linux Certification in a Nutshell - novelonlinefull.com

You’re read light novel LPI Linux Certification in a Nutshell Part 45 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

Questions 1. What environment variable holds the list of all directories that are searched by the sh.e.l.l when you type a command name?

1. $LIST 2. $VIEW 3. $PATH 4. $ENV 5. None of the above 2. In the bash bash sh.e.l.l, entering the sh.e.l.l, entering the !! !! command has the same effect as which one of the following (a.s.suming command has the same effect as which one of the following (a.s.suming bash bash is in emacs mode)? is in emacs mode)?

1. Ctrl-P and Enter 2. Ctrl-N and Enter 3. Ctrl-U and Enter 4. !-2 5. !2 3. Name the command that displays pages from the online user's manual and command reference.

4. Which of the following commands displays the comments from a bash bash script? Select all that apply. script? Select all that apply.

1. find "^#" /etc/rc.d/rc.local 2. sed '/^#/ !d' /etc/init.d/httpd 3. grep ^# /etc/init.d/httpd 4. grep ^# /etc/pa.s.swd 5. locate "^#" /etc/skel/.bashrc 5. Which one of the following answers creates an environment variable VAR1 VAR1, present in the environment of a bash bash child process? child process?

1. VAR1="fail" ; export VAR1 2. VAR1="fail" export VAR1 3. VAR1="fail"

4. set VAR1="fail" ; enable VAR1 5. export VAR1 VAR1="fail"

6. What SQL command is used to modify data present in a table?

1. INSERT 2. WHERE 3. UPDATE 4. OVERWRITE 5. JOIN 7. What output will the following command generate: seq -s";" -w 1 10 seq -s";" -w 1 10 1. 01;02;03;04;05;06;07;08;09;10 2. 1;2;3;4;5;6;7;8;9;10 3. 1;10 4. 01;02;03;04;05;06;07;08;09;010 5. None of the above 8. Adam wants to protect himself from inadvertently overwriting files when copying them, so he wants to alias cp cp to prevent overwrite. How should he go about this? Select one. to prevent overwrite. How should he go about this? Select one.

1. Put alias cp='cp -i' alias cp='cp -i' in in ~/.bashrc ~/.bashrc 2. Put alias cp='cp -i' alias cp='cp -i' in in ~/.bash_profile ~/.bash_profile 3. Put alias cp='cp -p' alias cp='cp -p' in in ~/.bashrc ~/.bashrc 4. Put alias cp='cp -p' alias cp='cp -p' in in ~/.bash_profile ~/.bash_profile 5. Put alias cp = 'cp -I' alias cp = 'cp -I' in in ~/.bashrc ~/.bashrc 9. Consider the following script, stored in a file with proper modes for execution:#!/bin/bash for$v1ina1a2 do echo$v1 done Which one of the following best represents the output produced on a terminal by this script?

1. ina1a2 2. a1a2 3. $v1$v1$v1 4. No output is produced, but the script executes correctly.

5. No output is produced, because the script has an error.

10. Monica consults the /etc/pa.s.swd /etc/pa.s.swd file expecting to find encrypted pa.s.swords for all of the users on her system. She sees the following: file expecting to find encrypted pa.s.swords for all of the users on her system. She sees the following:jdoe:x:500:500::/home/jdoe:/bin/bash bsmith:x:501:501::/home/bsmith:/bin/tcsh Which of the following is true? Select one.

1. Accounts jdoe jdoe and and bsmith bsmith have no pa.s.swords. have no pa.s.swords.

2. Accounts jdoe jdoe and and bsmith bsmith are disabled. are disabled.

3. The pa.s.swords are in /etc/pa.s.swd- /etc/pa.s.swd-.

4. The pa.s.swords are in /etc/shadow /etc/shadow.

5. The pa.s.swords are in /etc/shadow- /etc/shadow-.

11. What is the main configuration file for X Windows?

1. /etc/xorg.conf 2. /etc/x11.conf 3. /etc/X11/x11.conf 4. /etc/X11/xorg.conf 5. None of the above 12. What file in the user's home directory will an X Windows application look to for configuration settings such as color and video mode?

1. ~/.xinitrc 2. ~/.xconfig 3. ~/.Xresources 4. ~/.xorg.conf 5. ~/.bashrc 13. What is the protocol XDMCP used for?

1. Remote logging of X Windows events.

2. Remote control of a running X Windows display.

3. Graphical login support for the local host.

4. Graphical login support for remote hosts on the network.

5. None of the above.

14. Which of the following are not not commonly used display managers for X Windows? Choose two. commonly used display managers for X Windows? Choose two.

1. xdm 2. gdm 3. kdm 4. xfce 5. X11 15. Emacspeak is: 1. A popular text editor for Linux.

2. A window manager.

3. An a.s.sistive technology that handles screen reading for a number of console applications.

4. An a.s.sistive technology that provides a user with an on-screen keyboard.

5. None of the above.

16. Which one of the following outcomes results from the following command?#chmodg+s/home/software 1. The SUID bit will be set for /home/software /home/software.

2. The SGID bit will be set for /home/software /home/software, preventing access by those not a member of the software software group. group.

3. The SGID bit will be set for /home/software /home/software, to keep group membership of the directory consistent for all files created.

4. The sticky bit will be set for /home/software /home/software.

5. The sticky bit will be applied to all files in /home/software /home/software.

17. Which one of these files determines how messages are stored using syslogd syslogd?

1. /etc/sysconfig/logger.conf 2. /etc/syslog.conf 3. /etc/syslogd.conf 4. /etc/conf.syslog 5. /etc/conf.syslogd 18. Which MTA was designed specifically with security in mind?

1. Sendmail 2. Postfix 3. Qmail 4. Exim 5. None of the above 19. Where are mail logs usually stored in a standard syslog syslog setup? setup?

1. /var/log/messages 2. /var/log/secure 3. /var/log/dmesg 4. /var/log/maillog 5. /var/maillog 20. How many hosts can exist on a subnet with mask 255.255.255.128? Select one.

1. 512 2. 256 3. 128 4. 127 5. 126 21. For an Internet workstation with a single network interface, what routes must be added to interface eth0 eth0 after it is initialized? Select one. after it is initialized? Select one.

1. None 2. Interface 3. Interface and default gateway 4. Interface, local network, and default gateway 22. On a Linux server, what service is most likely "listening" on port 25? Select one.

1. Apache 2. SSHd 3. Postfix 4. Samba 5. FTP 23. Which one of these protocols is a Layer 4 connection-oriented protocol? Select one.

1. TCP 2. IP 3. UDP 4. ICMP 24. Which command will display information about Ethernet interface eth0 eth0? Select one.

1. cat /proc/eth/0 2. ifconfig eth0 3. ipconfig eth0 4. ipconfig /dev/eth0 5. cat /etc/eth0.conf 25. What does the printcap printcap entry entry sd sd indicate? Select one. indicate? Select one.

1. The system default printer 2. A printer's spool directory 3. A device file for the printer 4. A location where errors are stored 5. The printer driver 26. Which of the following is a valid entry in /etc/fstab /etc/fstab for a remote NFS mount from server for a remote NFS mount from server fs1 fs1? Select one.

1. fs1:/proc /mnt/fs1 nfs defaults 9 9 2. /mnt/fs1 fs1:/proc nfs defaults 0 0 3. fs1:/home /mnt/fs1 nfs defaults 0 0 4. /mnt/fs1 fs1:/home nfs defaults 0 0 5. /home:fs1 /mnt/fs1 nfs defaults 0 0 27. Which network protocol is used by SSH and FTP? Select one.

1. ICMP 2. UDP 3. TCP 4. DHCP 5. PPP 28. Which of the following programs will display DNS information for a host? Choose all that apply.

1. host 2. nslookup 3. nsstat 4. dig 5. ping 29. Which of the following statements regarding the ICMP protocol is not not true? Select one. true? Select one.

1. ICMP is connectionless.

2. ICMP provides network flow control.

3. ICMP is also known as UDP.

4. ICMP is used by ping ping.

30. What server daemon resolves domain names to IP addresses for requesting hosts?

31. What function does a print filter serve? Select one.

1. It collates output from multiple users.

2. It translates various data formats into a page description language.

3. It rejects print requests from unauthorized users.

4. It rejects print requests from unauthorized hosts.

5. It a.n.a.lyzes print data and directs print requests to the appropriate lpd lpd.

32. Consider the following excerpt from the file /etc/resolv.conf /etc/resolv.conf on a Linux workstation: on a Linux workstation:nameserver127.0.0.1 nameserver192.168.1.5 nameserver192.168.250.2 What can be said about this configuration? Select one.

1. Two DNS servers on the public network are being used for resolution.

2. One DNS server on the local network is being used for resolution.

3. The configuration contains errors that will prevent the resolver from functioning.

4. A caching-only nameserver is the first nameserver queried.

5. The resolver library will consult nameserver 192.168.250.2 nameserver 192.168.250.2 first. first.

33. Name the file that contains simple mappings between IP addresses and system names.

34. What program can be used to interactively change the behavior of a print queue? Select one.

1. lpd 2. lpr 3. lpq 4. lprm 5. lpc 35. What program will display a list of each hop across the network to a specified destination? Select one.

1. tracert 2. rttrace 3. traceroute 4. routetrace 5. init 36. What is the system-wide bash bash configuration file called? Include the entire path. configuration file called? Include the entire path.

37. How can a nonprivileged user configure sendmail sendmail to forward mail to another account? Select one. to forward mail to another account? Select one.

1. She can add a new entry in /etc/aliases /etc/aliases.

2. She can create a .forward .forward file containing the new address. file containing the new address.

3. She can create an .alias .alias file containing the new address. file containing the new address.

4. She can create a sendmail.cf sendmail.cf file containing the new address. file containing the new address.

5. She cannot forward mail without a.s.sistance from the administrator.

38. How does a process indicate to the controlling sh.e.l.l that it has exited with an error condition? Select one.

1. It prints an error message to stderr stderr.

2. It prints an error message to stdout stdout.

3. It sets an exit code with a zero value.

4. It sets an exit code with a nonzero value.

5. It causes a segmentation fault.

39. Consider the following trivial script called myscript myscript:#!/bin/bash echo"h.e.l.lo"

echo$myvar Also consider this command sequence and result: #setmyvar='World'

#./myscript h.e.l.lo The script ran without error but didn't echo echo World World. Why not? Select one.

1. The syntax of the set set command is incorrect. command is incorrect.

2. The script executes in a new sh.e.l.l, and myvar myvar wasn't exported. wasn't exported.

3. The #!/bin/bash #!/bin/bash syntax is incorrect. syntax is incorrect.

4. The $myvar $myvar syntax is incorrect. syntax is incorrect.

5. The script is sourced by the current sh.e.l.l, and myvar myvar is available only to new sh.e.l.ls. is available only to new sh.e.l.ls.

40. Consider the following line from /etc/pa.s.swd /etc/pa.s.swd:adamh:x:500:1000:AdamHaeder:/home/adamh:/bin/bash What does the number 1000 mean?

1. User adamh adamh has a UID of 1000. has a UID of 1000.

2. The primary group that adamh adamh belongs to is group 1000. belongs to is group 1000.

3. User adamh adamh was the 1000th user created on this system was the 1000th user created on this system 4. The pa.s.sword for adamh adamh expires in 1000 days. expires in 1000 days.

5. The secondary group that adamh adamh belongs to is group 1000. belongs to is group 1000.

Answers 1. c. $PATH $PATH 2. a. The The !! !! command history expansion executes the previous command. Entering the Ctrl-P keystroke uses the Emacs key-binding command history expansion executes the previous command. Entering the Ctrl-P keystroke uses the Emacs key-binding bash bash to move up one line in the history; pressing Enter executes that command. to move up one line in the history; pressing Enter executes that command.

3. The man man command displays manpages. command displays manpages.

4. b AND AND c. c. find find and and locate locate do not search the contents of files. do not search the contents of files. /etc/pa.s.swd /etc/pa.s.swd is not a script. is not a script.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

Cultivating In Secret Beside A Demoness

Cultivating In Secret Beside A Demoness

Cultivating In Secret Beside A Demoness Chapter 1274 - Chapter 1374: Should I Kill the Sect Master Too? (2) Author(s) : Red Chilli Afraid Of Spiciness, Red Pepper Afraid Of Spicy, Pà Là De Hóngjiāo, 怕辣的红椒 View : 477,064

LPI Linux Certification in a Nutshell Part 45 summary

You're reading LPI Linux Certification in a Nutshell. This manga has been translated by Updating. Author(s): Adam Haeder. Already has 1000 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

NovelOnlineFull.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to NovelOnlineFull.com