PdfPrep.com

201-450 Lpi Free Practice Test

Many IT professionals are finding it hard to pass the Lpi 201-450 exam. It’s a challenging task, but that alone should not make you not showcase your skills. It would be best if you considered getting yourself a solid 201-450 prep questions to enable you to pass the 201-450 exam. Pdfprep offers the best Lpi 201-450 prep questions that have been carefully crafted to resemble the LPIC-2 Exam 201, Part 1 of 2, version 4.5 exam. If you use the Pdfprep 201-450 prep questions, you get the assurance of success in your first trial of the Lpi exam.

Page 1 of 15

Loading... Loading...
1. The following is an excerpt from the output of tcpdump -nli eth1:

13:03:17.277327 IP 192.168.123.5.1065 > 192.168.5.112.21: Flags [.], ack 1 (truncated)

13:03:17.598624 IP 192.168.5.112.21 > 192.168.123.5.1065: Flags [P.], seq (truncated)

Which network service or protocol was used?

Loading... Loading...
2. Running tcpdump -nli eth1 'tcp' shows the following output:

14:41:53.694538 IP 10.1.52.145.51738 > 24.215.7.162.143: Flags [.], ack 33051, win 1002, options [nop,nop,TS val 36789130 ecr 1746004159], length 0

What is the source IP address of this packet? (Please specify the answer in digits and dots ONLY.)

Loading... Loading...
3. Which of the following commands can be used to script interactions with various TCP or UDP services?

Loading... Loading...
4. A correctly formatted entry has been added to /etc/hosts.deny to prevent certain clients from connecting to a service but this is having no effect.

What could be the cause of this? (Choose TWO correct answers.)

Loading... Loading...
5. Which /etc/hosts.allow entries will permit access to sshd for users from the 192.168.1.0/24 subnet? (Choose TWO correct answers.)

Loading... Loading...
6. A network client has an ethernet interface (eth0) configured with an IP address in the subnet 192.168.0.0/24. This subnet has a router, with the IP address 192.168.0.1, that connects this subnet to the Internet.

What needs to be done on the client to enable it to use the router as its default gateway? (Choose TWO correct answers.)

Loading... Loading...
7. What should be done to ensure a client machine uses the recursive nameserver running on the IP address 192.168.0.1? (Choose TWO correct answers.)

Loading... Loading...
8. The users of the local network complain that name resolution is not fast enough. Enter the command, without the path or any options, that shows the time taken to resolve a DNS query.

Loading... Loading...
9. What should be done after updating the configuration file for syslogd in order to make the changes become effective? (Choose TWO correct answers.)

Loading... Loading...
10. What does the -p3 option to the patch command do?

Page 2 of 15

Loading... Loading...
11. When a makefile is included in a source code package, what are commonly defined targets in the file?

Loading... Loading...
12. Which of the following files will be looked for and used by GNU make, if one of them exists, unless a different file is specified on the command line when trying to compile software from source code? (Choose TWO correct answers.)

Loading... Loading...
13. A regular user, joe, has just run:

./configure && make && make install

to build and install a program.

However, the installation fails.

What could be done to install the program? (Choose TWO correct answers.)

Loading... Loading...
14. Which of the following commands will securely copy the directory ./fyf/ to /var/tmp/ on the remote host deltaur using the remote user account kevin?

Loading... Loading...
15. What is the device name for the first SCSI tape drive on a system when used without automatic rewinding after each write operation? (Please specify the full path to the device.)

Loading... Loading...
16. Which of the following are common backup systems used in Linux? (Choose TWO correct answers.)

Loading... Loading...
17. Which of the following commands will erase the contents of the /dev/sdb3 partition?

Loading... Loading...
18. Which file contains the text message that is displayed after logging into the console? (Specify the full name of the file, including path.)

Loading... Loading...
19. Which file contains the message that is displayed above the login prompt of the system console? (Specify the full name of the file, including path.)

Loading... Loading...
20. What mechanism does collectd use to gather monitoring information on systems?

Page 3 of 15

Loading... Loading...
21. What option in the collectd configuration file is required in order to define what to start monitoring?

Loading... Loading...
22. How is the source code for the main Linux kernel modules distributed?

Loading... Loading...
23. What is the functionality that PXE provides?

Loading... Loading...
24. What are the main network services used by the PXE protocol? (Choose TWO correct answers.)

Loading... Loading...
25. What is the purpose of the smartd daemon?

Loading... Loading...
26. What component of a system does smartd monitor?

Loading... Loading...
27. Which of the following are common Linux filesystem types used for root partitions? (Choose THREE correct answers.)

Loading... Loading...
28. Where would fsck put any unreferenced file or file fragments on a ext4 filesystem?

Loading... Loading...
29. What is the main template file used by autofs?

Loading... Loading...
30. The main configuration file for autofs has this entry:

/home /etc/auto.home

What is the meaning of the /etc/auto.home file?

Page 4 of 15

Loading... Loading...
31. Which of the following is an example path to a Linux software RAID array?

Loading... Loading...
32. What mount option must be used in /etc/fstab when mounting an iSCSI target?

Loading... Loading...
33. What are the options to node.startup in the iscsid.conf file? (Choose TWO correct answers.)

Loading... Loading...
34. What command is used to make an exact copy, at a single point in time, of a logical volume for backup purposes?

Loading... Loading...
35. What action should be performed after increasing the size of a logical volume?

Loading... Loading...
36. Which command can be used to scan a specified network looking for IP addresses that appear to be in use?

Loading... Loading...
37. Which of the following filter keywords for tcpdump specify the transfer direction for network packets? (Choose TWO correct answers.)

Loading... Loading...
38. What is incorrect about these entries in /etc/hosts which could be causing host name lookup problems with host2?

host1 192.168.1.12

host2 192.168.1.12

Loading... Loading...
39. Under which of the following circumstances would the command ping output the string (DUP!)?

Loading... Loading...
40. Which one of these directories should not be backed up?

Page 5 of 15

Loading... Loading...
41. The following command has just been run successfully:

cd /opt; tar xvf /dev/nst0;

What will happen if the command sequence is run again?

Loading... Loading...
42. In order to gather performance data with sar over a longer period of time, which command should be run periodically from cron?

Loading... Loading...
43. In which directory tree are files modified when changing kernel parameters using the command sysctl?

Loading... Loading...
44. What information is found in the following excerpt from the file /proc/mdstat? (Choose two.)



Loading... Loading...
45. Which command is used to make an exact copy, at a single point in time, of a logical volume while still allowing the original logical volume to be updated?

Loading... Loading...
46. Which of the following commands shows capabilities and usable frequencies for the wireless interface wlan0?

Loading... Loading...
47. What effect does the -f option to the update-rc.d command have on files in the /etc/rcX.d/ and /etc/init.d/ directories?

Loading... Loading...
48. Which of the following commands lists IPv4 addresses and MAC addresses of network nodes that the local system has seen on its directly connected IP networks?

Loading... Loading...
49. Which of the following commands restores only those files containing lpi in their name from the archive lpifiles.tar.gz?

Loading... Loading...
50. Which sub command to crypsetup shows information about an encrypted LUKS partition?

Page 6 of 15

Loading... Loading...
51. In the output of sar -b, what does tps stand for?

Loading... Loading...
52. Which of the following properties should be recorded in order to monitor the quality of a network link? (Choose two.)

Loading... Loading...
53. A web application server contains 64GB of RAM and two swap partitions on normal hard disk drives, each with a size of 64 GB. Within the last month, the average number of user sessions on this server has grown by 20 percent. At the same time, the average usage of RAM increased from 65 to 75 percent, while the swap space is almost not used at all. It is expected that the number of user sessions will continue to increase by about 15 to 20 percent each month.

Which of the following reactions would be appropriate in response to these observations? (Choose two.)

Loading... Loading...
54. Which of the following commands displays the physical path of the kernel module named dummy?

Loading... Loading...
55. Which command is used to install a GRUB boot loader into the master boot record?

Loading... Loading...
56. After manually compiling and installing a new kernel, what has to be done regarding the initramfs?

Loading... Loading...
57. Which of the following is a userspace application used to modify EFI entries on a Linux system?

Loading... Loading...
58. On a Linux node with multiple active networks interfaces, each having a default route to the Internet, which default route is preferred?

Loading... Loading...
59. Which of the following commands creates a Btrfs subvolume named volume in/mnt?

Loading... Loading...
60. Which of the filter keywords below could be used in the following command:

tcpdump i eth0 ____________ 203.0.113.8 (Choose three.)

Page 7 of 15

Loading... Loading...
61. Which of the following commands adds a static IPv6 address to the network interface eth0?

Loading... Loading...
62. A Linux server running systemd booted to rescue.target for maintenance.

Which commands are used to restore the server to its usual target? (Choose two.)

Loading... Loading...
63. What is the purpose of an initramfs during the Linux system start?

Loading... Loading...
64. Which of the following commands erases the contents of the /dev/sdb3 partition?

Loading... Loading...
65. Which of the following configuration files are used by tcpwrapper?

Loading... Loading...
66. What is the purpose of a system mount unit?

Loading... Loading...
67. After the downloading patch-4.6.4.xz from http://kernel.org, what are the next steps to prepare the build of a version 4.6.4 Linux kernel? (Choose two.)

Loading... Loading...
68. Which of the following init systems comes along with an own UEFI boot loader?

Loading... Loading...
69. What command discards unused blocks on a mounted file system in order to support SSD devices? (Specify ONLY the command without any path or parameters.)

Loading... Loading...
70. What command ensures that the file systems are written to disk after a lot of write operations? (Specify ONLY the command without any path or parameters.)

Page 8 of 15

Loading... Loading...
71. Which directory contains system-specific systemd unit files? (Specify the full path to the directory.)

Loading... Loading...
72. Which is the main configuration file for the SystemV init process? (Specify the full name of the file, including path.)

Loading... Loading...
73. What command is used to send messages to all users currently logged in? (Specify ONLY the command without any path or parameters.)

Loading... Loading...
74. What command must be used to create an ext3 file-system?

Loading... Loading...
75. What needs to be done to enable 32 bit I/O transfer mode for (E)IDE disks, on a system running a 2.4 series Linux kernel?

Loading... Loading...
76. DNSSEC is used for?

Loading... Loading...
77. Which of these commands allows you to use shared libraries that are in /usr/local/lib?

Loading... Loading...
78. Which TWO archiving formats are used to create an initramfs image?

Loading... Loading...
79. After unpacking the source code for a Linux kernel, what is the first make command that should be run which will delete any current configuration and all generated files?

This command will ensure that no inappropriate files were left in the kernel archive by the maintainer.

Loading... Loading...
80. Which script, in the linux/scripts directory, can be used to add up grades or updated code to the 2.6.xx kernel source code?

Page 9 of 15

Loading... Loading...
81. What tool can you use to print shared library dependencies?

Loading... Loading...
82. Which of the following commands will copy one disk partition /dev/sda3 to /dev/sdb3?

Loading... Loading...
83. After unpacking source code, what file is used by configure to create a final Makefile?

Loading... Loading...
84. User Joseph has successfully extracted and compiled a program from source code. Installing the binaries produces errors.

What is the most likely reason?

Loading... Loading...
85. You have finished updating and resolving dependencies for some source code.

What command should you run before recompiling the code into binary form?

Loading... Loading...
86. How can you manually add an entry to your system's ARP cache?

Loading... Loading...
87. You find that a host (192.168.1.4) being used on one of your client's networks has been compromised with a backdoor program listening on port 31337.

Your client requests a list of originating IP addresses connecting to that port.

Using a Linux workstation as traffic analyzer, which of the following commands would gather the data requested by the client?

Loading... Loading...
88. Which tool can be used to control the runtime behavior of udev?

Loading... Loading...
89. Which of the following entries are NOT valid in /etc/raidtab?

Loading... Loading...
90. A pre-compiled module has been moved to /lib/modules/<kernel-version>, but 'modprobe -a <module-name>' fails to load it.

What needs to be done to enable usage of this module?

Page 10 of 15

Loading... Loading...
91. Which of the following commands should be used in a bash script that needs a variable containing the IP address of the eth0 interface?

The output for the command ifconfig eth0 is shown below:

eth0 Link encap:Ethernet HWaddr 00:0C:29:CB:FA:30

inet addr:192.168.246.11 Bcast:192.168.246.255 Mask:255.255.255.0 UP BROADCAST

RUNNING MULTICAST MTU:1500 Metric:1

RX packets:4721 errors:0 dropped:0 overruns:0 frame:0 TX packets:3216 errors:0

dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000

RX bytes:445184 (434.7 Kb) TX bytes:512968 (500.9 Kb) Interrupt:185 Base address:0x1080

Loading... Loading...
92. You have elected to use the automounter and the autofs script.

Your /etc/auto.master file contains the following:

/home /etc/auto.home

/project /etc/auto.project

/data yp:data.map

If you change the contents of /etc/auto.project to include a new source path what must be done to access the new path?

Loading... Loading...
93. In order to find all library dependencies of /usr/bin/foo, which of the following statement is true?

Loading... Loading...
94. How can DMA be enabled for the device /dev/hda?

Loading... Loading...
95. To restore the kernel source to the previous, unpatched, version, which of the following commands could be used?

Loading... Loading...
96. If the current directory is /root and the kernel source is located in /usr/src/linux, which of the following commands should be used to apply the patch /tmp/foopatch?

Loading... Loading...
97. A 2.6.9-ac1 kernel would be

Loading... Loading...
98. What command should be used to find out what PCI devices can be seen, without querying the

kernel?

Loading... Loading...
99. Considering that a 2.4 series Linux kernel is being used, which kernel module must be loaded to enable CD burning with an IDE CD writer?

Loading... Loading...
100. What command must be used to create an ext3 filesystem?

Page 11 of 15

Loading... Loading...
101. The Linux kernel is loaded successfully by the boot loader.

However, straight after the kernel mounts the root filesystem, the boot process stops and an error message regarding init is shown.

Which of the following actions is the best one to be used in order to identify and fix the problem?

Loading... Loading...
102. A machine is running in single user mode and, as such, not all file-systems are accessible.

What command must be run to make all of the other file-systems listed in /etc/fstab accessible?

Loading... Loading...
103. What command is used to force a file-system check, when rebooting?

Loading... Loading...
104. What command can be used on an existing (formatted) partition, to configure the interval between disk checks when mounting partitions?

Loading... Loading...
105. 168.192.in-addr.arpa. 600 IN NS linuserv.example.net.

;; ADDITIONAL SECTION:

linuserv.example.net. 600 IN A 192.168.123.5

What might be wrong in the zone definition?

Loading... Loading...
106. Which of the following commands will securely copy the directory ./fyf/ to /var/tmp/ on the remote host deltaur using the remote user account kevin?

Loading... Loading...
107. Journalling doesn't appear to be working on an ext3 file-system.

When booting, the following line appears:

VFS: Mounted root (ext2 filesystem) read only.

What could be causing the problem?

Loading... Loading...
108. Your routing configuration relies on eth0 being a 3com card that requires the 3c59x module.

What line must be added to modules configuration file, to ensure that eth0 always uses this module?

Loading... Loading...
109. What backup arrangement should be used for an intranet web server the contents of which is updated fairly regularly by different staff?

Loading... Loading...
110. During which stage of the boot process would this message be seen?

Ide0: BM-DMA at 0xff00-0xff07, BIOS settings: hda: DMA, hdb: DMA

Page 12 of 15

Loading... Loading...
111. Which of the following commands can be used to access the content of a ramdisk file (/boot/initrd) used by the kernel at boot time?

Loading... Loading...
112. A BIND server should be upgraded to use TSIG.

Which configuration parameters should be added, if the server should use the algorithm hmac-md5 and the key skrKc4DoTzi/tAkllPi7JZA== ?

Loading... Loading...
113. Which of the following sentences is true for the shown BIND9 configuration?

options {

directory "/var/named";

allow-query { any; };

allow-recursion {127.0.0.1; 10.0.0.0/24; };

forwarders {192.168.0.4; };

forward first;

};

zone"." {

type hint;

file "named.ca";

};

Loading... Loading...
114. What is a significant difference between host and zone keys generated by dnssec-keygen?

Loading... Loading...
115. A system is running out of swap space. To initialise 5GB of additional swap space, which combination of commands should be used?

Loading... Loading...
116. Hundreds of people log in to a server from remote locations per day.

Which of the following commands show remote SSH, FTP & telnet sessions for a particular day?

Loading... Loading...
117. What command is used to mount a floppy disk image under /mnt/floppy?

Loading... Loading...
118. What information can be found in the log file specified by the status parameter in OpenVPN's server.conf? (Select TWO correct answers)

Loading... Loading...
119. After changing the default runlevel in the init configuration file, the system boots in a different than the intended runlevel.

Where else could be this different runlevel be defined?

Loading... Loading...
120. A BIND server should never answer queries from certain networks or hosts.

Which configuration directive could be used for this purpose?

Page 13 of 15

Loading... Loading...
121. What is the purpose of a PTR record?

Loading... Loading...
122. What directive can be used in named.conf to restrict zone transfers to the 192.168.1.0/24 network?

Loading... Loading...
123. To securely use dynamic DNS updates, the use of TSIG is recommended.

Which TWO statements about TSIG are true?

Loading... Loading...
124. Which THREE statements concerning automounter are true?

Loading... Loading...
125. What are typical targets in a makefile?

Loading... Loading...
126. Which single command will extract data from the file abc.tar.bz2

Loading... Loading...
127. How would you run named inside a chroot jail as user nobody and group nogroup?

Loading... Loading...
128. Where should the LILO code reside, on a system with only one installation of Linux and no other operating systems?

Loading... Loading...
129. The Human Interface Device (HID) is being used, which of the following represents a USB mouse connected to the PC?

Loading... Loading...
130. Select the TWO correct alternatives regarding the kill -9 command:

Page 14 of 15

Loading... Loading...
131. The server has two network cards. The driver for the first card is the module 8139too and the driver for the second card is the module ne2k-pci.

How is it possible to ensure that the card using the 8139too driver is detected before the card using the ne2k-pci driver?

Loading... Loading...
132. Which of these would be the simplest way to configure BIND to return a different version number to queries?

Loading... Loading...
133. An administrator has placed an executable in the directory /etc/init.d, however it is not being executed when the system boots into runlevel 2.

What is the most likely cause of this?

Loading... Loading...
134. In order to generate a pair of asymmetric keys to use during an SSH connection, please choose the correct command to use?

Loading... Loading...
135. Consider the following output from df -i:

Filesystem Inodes IUsed IFree IUse% Mounted on

/dev/md0 1966080 45044 1921036 3% /

none 125731 712 125019 1% /dev

none 127729 1 127728 1% /dev/shm

none 127729 17 127712 1% /var/run

none 127729 2 127727 1% /var/lock

none 1966080 45044 1921036 3% /var/lib/ureadahead/debugfs

/dev/sde1 0 0 0 - /mnt

What filesystem does /dev/sde1 most likely use?

Loading... Loading...
136. Why shouldn't you use the options -z and -j when using tar with a magnetic tape backup?

Loading... Loading...
137. Using only commands included with named, what is the command, with options or parameters, to make named re-read its zone files?

Loading... Loading...
138. Which file contains configuration data for automount? Please enter the complete path.

Loading... Loading...
139. On a system with separate partitions for /, /usr, /var & /tmp, which filesystem can safely be mounted read-only?

Loading... Loading...
140. Which mount option must be used in the example /etc/fstab entry below, to ensure that a specific filesystem is not mounted when the system is booted?

/dev/hdd /media/cdrom iso9660 _____________________,ro 0 0

Page 15 of 15

Loading... Loading...
141. With which command can the reserved blocks on /dev/hda1 be displayed? (Enter the command with all parameters and/or options)

Loading... Loading...
142. After a lot of write operations, the changes should be written to the disk.

Please enter the appropriate command, without the path or any options or parameters, that would achieve this.

Loading... Loading...
143. What is the correct parameter to pass to the kernel at boot time to force it to use only one of the available processors?

Loading... Loading...
144. Consider the following /etc/fstab file:

/dev/hda1 swap swap defaults 0 0

/dev/hda2 / ext2 defaults 1 1

/dev/hda3 /home ext2 defaults 1 2

none /proc proc defaults 0 0

/dev/fd0 /media/floppy vfat user,noauto 0 0

What command can an ordinary (non-root) user use to mount a floppy disk in this system? (Please enter the command with all parameters and/or options)

Loading... Loading...
145. How can the label root be added to the ext2 file-system on /dev/sda1?

Please enter the command with all parameter(s) and/or option(s):

Loading... Loading...
146. How can a journal added, non-destructively, to the ext2 file-system on /dev/dg/lv05?

Please enter the command with all parameter(s):

Loading... Loading...
147. You want to change the file that contains the message which is used at the login prompt when users log in locally. Please enter the file including the path.

Loading... Loading...
148. Which program lists information about files and network connections opened by processes? (Specify ONLY the command without any path or parameters.)

Loading... Loading...

 

Exit mobile version