PdfPrep.com

LPIC-1: System Administrator 102-500 Online Free Test

Many IT professionals are finding it hard to pass the Lpi 102-500 exam. It’s a challenging task, but that alone should not make you not showcase your skills. It would be best if you considered getting yourself a solid 102-500 prep questions to enable you to pass the 102-500 exam. Pdfprep offers the best Lpi 102-500 prep questions that have been carefully crafted to resemble the LPI Level 1 exam. If you use the Pdfprep 102-500 prep questions, you get the assurance of success in your first trial of the Lpi exam.

Page 1 of 13

Loading... Loading...
1. Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

Loading... Loading...
2. Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

Loading... Loading...
3. CORRECT TEXT

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

Loading... Loading...
4. Which configuration file would be edited to change default options for the OpenSSH server?

Loading... Loading...
5. Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Loading... Loading...
6. What is a purpose of an SSH host key?

Loading... Loading...
7. Which of the following commands can be used to limit the amount of memory a user may use?

Loading... Loading...
8. CORRECT TEXT

With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled? (Specify only the environment variable without any additional commands or values.)

Loading... Loading...
9. Which configuration file would be edited to change the default options for outbound SSH sessions?

Loading... Loading...
10. Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

Page 2 of 13

Loading... Loading...
11. CORRECT TEXT

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Loading... Loading...
12. Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

Loading... Loading...
13. When trying to unmount a device it is reported as being busy.

Which of the following commands could be used to determine which process is causing this?

Loading... Loading...
14. CORRECT TEXT

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.) https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Loading... Loading...
15. Which of the following commands displays all environment and shell variables?

Loading... Loading...
16. CORRECT TEXT

What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the directory.)

Loading... Loading...
17. Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)

Loading... Loading...
18. Which of the following tasks can the date command accomplish? (Choose two.)

Loading... Loading...
19. CORRECT TEXT

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Loading... Loading...
20. Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

Page 3 of 13

Loading... Loading...
21. Given the following excerpt of the sudo configuration:

jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk

Which of the following statements are true? (Choose three.)

Loading... Loading...
22. Which of the following features are provided by SPICE? (Choose two.)

Loading... Loading...
23. Which of the following commands can identify the PID od a process which opened a TCP port?

Loading... Loading...
24. Which of the following commands lists all queued print jobs?

Loading... Loading...
25. What the echo $$ command?

Loading... Loading...
26. Which configuration file contains the default options for SSH clients?

Loading... Loading...
27. Which of the following nmcli subcommands exist? (Choose two.)

Loading... Loading...
28. CORRECT TEXT

Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.)

Loading... Loading...
29. What is the purpose of TCP wrapper?

Loading... Loading...
30. Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization?

Page 4 of 13

Loading... Loading...
31. How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?

Loading... Loading...
32. Which of the following comparison operators for test work on elements in the file system? (Choose two.)

Loading... Loading...
33. What can be specified with useradd? (Choose two.)

Loading... Loading...
34. Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

Loading... Loading...
35. Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)?

Loading... Loading...
36. Which of the following information is stored in /etc/shadow for each user?

Loading... Loading...
37. What output is produced by the following command sequence?

echo ‘1 2 3 4 5 6’ | while read a b c; do

echo result $c $b $a;

done

Loading... Loading...
38. Which of the following statements is true regarding systemd timer units?

Loading... Loading...
39. Which of the following statements about sytemd-journald are true? (Choose three.)

Loading... Loading...
40. Which of the following commands shows all active systemd timers?

Page 5 of 13

Loading... Loading...
41. Which of the following protocols is related to the term open relay?

Loading... Loading...
42. CORRECT TEXT

Which file, if present, must contain all users that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Loading... Loading...
43. Which of the following changes may occur as a consequence of using the command ip? (Choose three.)

Loading... Loading...
44. Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/maillog and sends all critical events to the remote server logger.example.com?

Loading... Loading...
45. What is true about the Hop Limit field in the IPv6 header?

Loading... Loading...
46. Which command makes the shell variable named VARIABLE visible to subshells?

Loading... Loading...
47. Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Loading... Loading...
48. Which command allows you to make a shell variable visible to subshells?

Loading... Loading...
49. What is the purpose of the file /etc/profile?

Loading... Loading...
50. Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Page 6 of 13

Loading... Loading...
51. Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records?

Loading... Loading...
52. Which of the following configuration files should be modified to set default shell variables for all users?

Loading... Loading...
53. Which of the following commands lists all defined variables and functions within Bash?

Loading... Loading...
54. When the command echo $$ outputs 12942, what is the meaning of 12942?

Loading... Loading...
55. How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Loading... Loading...
56. Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

Loading... Loading...
57. Which of the following commands puts the output of the command date into the shell variable mydate?

Loading... Loading...
58. You are looking into a new script you received from your senior administrator. In the very first line you notice a #! followed by a file path.

This indicates that:

Loading... Loading...
59. What keyword is missing from this code sample of a shell script?

____ i in *.txt; do

echo $i

done

Loading... Loading...
60. Which of the following SQL statements will select the fields name and address from the contacts table?

Page 7 of 13

Loading... Loading...
61. CORRECT TEXT - (Topic 1)

What command displays all aliases defined in the current shell? (Specify the command without any path information)

Loading... Loading...
62. What output will the following command sequence produce?

echo '1 2 3 4 5 6' | while read a b c; do

echo result: $c $b $a;

done

Loading... Loading...
63. Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Loading... Loading...
64. CORRECT TEXT - (Topic 1)

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Loading... Loading...
65. What benefit does an alias in bash provide?

Loading... Loading...
66. CORRECT TEXT - (Topic 1)

Which directory in /etc is used to keep a sample copy of files and directories for when a new user has a home directory created? (Please provide the full path)

Loading... Loading...
67. When the command echo $ outputs 1, which of the following statements is true?

Loading... Loading...
68. What output will the following command produce?

seq 1 5 20

Loading... Loading...
69. What output will the command seq 10 produce?

Loading... Loading...
70. CORRECT TEXT - (Topic 1)

What word is missing from the following SQL statement?

insert into tablename ________(909, 'text');

(Please specify the missing word using lower-case letters only.)

Page 8 of 13

Loading... Loading...
71. What is the difference between the commands test -e path and test -f path?

Loading... Loading...
72. After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?

Loading... Loading...
73. Which of the following is the best way to list all defined shell variables?

Loading... Loading...
74. CORRECT TEXT

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

Loading... Loading...
75. How is a display manager started?

Loading... Loading...
76. CORRECT TEXT

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Loading... Loading...
77. Which of the following keywords can be used in the file /etc/resolv/conf? (Choose two.)

Loading... Loading...
78. How does the ping command work by default?

Loading... Loading...
79. Which of the following commands display the number of bytes transmitted and received via the eth0 network interface? (Choose two.)

Loading... Loading...
80. Given the following routing table:





How would an outgoing packet to the destination 192.168.2.150 be handled?

Page 9 of 13

Loading... Loading...
81. Which of the following commands will delete the default gateway from the system’s IP routing table? (Choose two.)

Loading... Loading...
82. FILL BLANK

What command enables a network interface according to distribution-specific configuration, such as /etc/network/interfacesor /etc/sysconfig/network-scripts/ifcfg-eth0? (Specify only the command without any path or parameters.)

Loading... Loading...
83. What is true about NetworkManager on a Linux system that uses its distribution’s mechanisms to configure network interfaces? (Choose two.)

Loading... Loading...
84. Which standardized TCP port is used by HTTPS services?

Loading... Loading...
85. Which of the following environment variables can be defined in locale.conf? (Choose two.)

Loading... Loading...
86. Which of the following commands sets the system’s time zone to the Canadian Eastern Time?

Loading... Loading...
87. FILL BLANK

What option to useradd creates a new user’s home directory and provisions it with a set of standard files? (Specify only the option name without any values or parameters.)

Loading... Loading...
88. How can a specific user be prevented from scheduling tasks with at?

Loading... Loading...
89. Which file contains the data of the last change of a user’s password?

Loading... Loading...
90. Which of the following fields can be found in the /etc/groupfile? (Choose two.)

Page 10 of 13

Loading... Loading...
91. Which of the following sections exists in a systemd timer unit?

Loading... Loading...
92. Which of the following getentinvocations lists all existing users?

Loading... Loading...
93. Given the following user’s crontab entry:

15 14 * * 1-5 /usr/local/bin/example.sh

When will the script /usr/local/bin/example.shbe executed?

Loading... Loading...
94. If neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Loading... Loading...
95. What is the purpose of the iconv command?

Loading... Loading...
96. Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

Loading... Loading...
97. What does the term Braille Display refer to?

Loading... Loading...
98. FILL BLANK

Which environment variable is used by an X11 client to determine the X Server to connect to? (Specify only the variable name without any preceding commands or values.)

Loading... Loading...
99. Which of the following tasks are handled by a display manager like XDM or KMD? (Choose two.)

Loading... Loading...
100. Which of the following protocols is designed to access the video card output of a virtual machine?

Page 11 of 13

Loading... Loading...
101. FILL BLANK

Which command is used to set the hostname of the local system? (Specify only the command without any path or parameters.)

Loading... Loading...
102. Which of the following is a valid IPv6 address?

Loading... Loading...
103. FILL BLANK

What command, depending on its options, can display the open TCP connections, the routing tables, as well as network interface statistics? (Specify only the command without any path or parameters.)

Loading... Loading...
104. FILL BLANK

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Loading... Loading...
105. Which if the following tools, used for DNS debugging, reports not only the response from the name sever but also details about the query?

Loading... Loading...
106. Which of the following statements is valid in the file /etc/nsswitch.conf?

Loading... Loading...
107. Which of the following connection types, as seen in nmcli connection show, may exist in NetworkManager? (Choose three.)

Loading... Loading...
108. On a Linux workstation, the route command takes a long time before printing out the routing table.

Which of the following errors does that indicate?

Loading... Loading...
109. What is true about the Hop Limit field in the IPv6 header?

Loading... Loading...
110. Which of the following nmcli subcommands exist? (Choose two.)

Page 12 of 13

Loading... Loading...
111. Which of the following changes may occur as a consequence of using the command ip? (Choose three.)

Loading... Loading...
112. How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?

B. 14

C. 30

D. 62

E. 126

Loading... Loading...
113. Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose three.)

Loading... Loading...
114. Which of the following commands configure network interfaces based on the system’s existing distribution-specific configuration files? (Choose two.)

Loading... Loading...
115. Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

Loading... Loading...
116. Which of the following information is stored in /etc/shadowfor each user?

Loading... Loading...
117. Which of the following commands shows all active systemd timers?

Loading... Loading...
118. Which of the following tasks can the date command accomplish? (Choose two.)

Loading... Loading...
119. FILL BLANK

Which file, if present, must contain all users that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Loading... Loading...
120. What can be specified with useradd? (Choose two.)

Page 13 of 13

Loading... Loading...
121. What is true about the file /etc/localtime?

Loading... Loading...
122. Which of the following statements is true regarding systemd timer units?

Loading... Loading...
123. Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.)

Loading... Loading...
124. Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)?

Loading... Loading...

 

Exit mobile version