New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

101-500 Questions and Answers

Question # 6

What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)

A.

To create RAID 9 arrays.

B.

To dynamically change the size of logical volumes.

C.

To encrypt logical volumes.

D.

To create snapshots.

E.

To dynamically create or delete logical volumes.

Full Access
Question # 7

Which of the following commands is used to update the list of available packages when using dpkg based package management?

A.

apt-get update

B.

apt-get upgrade

C.

apt-cache update

D.

apt-get refresh

E.

apt-cache upgrade

Full Access
Question # 8

Which of the following commands can be used to perform a full text search on all available packages on a Debian system?

A.

apt

B.

apt-cache

C.

apt-get

D.

apt-search

E.

dpkg

Full Access
Question # 9

Typically, which top level system directory is used for files and data that change regularly while the system is running and are to be kept between reboots? (Specify only the top level directory)

A.

/var

B.

/var/,

C.

Var

D.

var/

Full Access
Question # 10

Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?

A.

hidemenu

B.

splash

C.

timeout

D.

showmenu

Full Access
Question # 11

When removing a package, which of the following dpkg options will completely remove the files including configuration files?

A.

--clean

B.

--delete

C.

--purge

D.

–remove

Full Access
Question # 12

Which of the following commands updates the linker cache of shared libraries?

A.

mkcache

B.

soconfig

C.

mkldconfig

D.

lddconfig

E.

ldconfig

Full Access
Question # 13

Which option to the yum command will update the entire system? (Specify ONLY the option name without any additional parameters.)

  • uk.co.certification.simulator.questionpool.PList@190e5930
Full Access
Question # 14

In which directory must definition files be placed to add additional repositories to yum?

  • /etc/yum.repos.d
  • /etc/yum.repos.d/
  • yum.repos.d
  • yum.repos.d/

Full Access
Question # 15

Which world-writable directory should be placed on a separate partition in order to prevent users from being able to fill up the / filesystem? (Specify the full path to the directory.)

Full Access
Question # 16

When using regular expressions, which of the following characters match the beginning of a line?

A.

^

B.

?

C.

*

D.

+

E.

$

Full Access
Question # 17

Which chown command will change the ownership to dave and the group to staff on a file named data.txt?

A.

chown dave/staff data.txt

B.

chown –u dave –g staff data.txt

C.

chown --user dave --group staff data.txt

D.

chown dave:staff data.txt

Full Access
Question # 18

Which of the following apt-get commands will install the newest versions of all currently installed packages?

A.

auto-update

B.

full-upgrade

C.

dist-upgrade

D.

install

E.

update

Full Access
Question # 19

After running the command umount /mnt, the following error message is displayed:

umount: /mnt: device is busy.

What is a common reason for this message?

A.

The kernel has not finished flushing disk writes to themounted device.

B.

A user has a file open in the /mnt directory.

C.

Another file system still contains a symlink to a file inside /mnt.

D.

The files in /mnt have been scanned and added to the locate database.

E.

The kernel thinks that a process is about to open a file in /mnt for reading.

Full Access
Question # 20

Which of the following commands will produce the following output?

A.

jobs

B.

proclist

C.

netstat

D.

ps

Full Access
Question # 21

Which option to the tee command will cause the output to be concatenated on the end of the output file instead of overwriting the existing file contents?

A.

–a

B.

–c

C.

--no-clobber

D.

--continue

Full Access
Question # 22

Which command is used to query information about the available packages on a Debian system?

A.

apt-cache

B.

apt-get

C.

apt-search

D.

dpkg

E.

dpkg-search

Full Access
Question # 23

Which of the following are filesystems which can be used on Linux root partitions? (Choose two.)

A.

NTFS

B.

ext3

C.

XFS

D.

VFAT

E.

swap

Full Access
Question # 24

Which of the following commands will load a kernel module along with any required dependency modules?

A.

depmod

B.

insmod

C.

modprobe

D.

module_install

E.

loadmod

Full Access
Question # 25

Which command is used to create and initialize the files used to store quota information? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 26

How is a symbolic link called bar.conf pointing to foo.conf created?

A.

ln –s foo.conf bar.conf

B.

ln foo.conf bar.conf

C.

ln –s bar.conf foo.conf

D.

ln bar.conffoo.conf

Full Access
Question # 27

What does the command grub-install /dev/sda do?

A.

GRUB creates partitions on the device/dev/sdato be used with Linux.

B.

GRUB sets the default BIOS boot device to/dev/sda.

C.

GRUB installs all required files and configures the boot loader on device/dev/sda.

D.

GRUB recompiles the Linux Kernel and installs it on the Master Boot Record of device/dev/sda.

Full Access
Question # 28

Which of the following commands creates an ext3 filesystem on /dev/sdb1? (Choose TWO correct answers.)

A.

/sbin/mke2fs -j /dev/sdb1

B.

/sbin/mkfs -t ext3 /dev/sdb1

C.

/sbin/mkfs -c ext3 /dev/sdb1

D.

/sbin/mke3fs -j /dev/sdb1

Full Access
Question # 29

Which of the following commands prints a list of available package updates when using RPM-based package management?

A.

dpkg list

B.

yum list

C.

dpkg check-update

D.

yum check-update

E.

yum list-update

Full Access
Question # 30

Instead of supplying an explicit device in /etc/fstab for mounting, what other options may be used to identify the intended partition? (Choose TWO correct answers.)

A.

FIND

B.

ID

C.

LABEL

D.

NAME

E.

UUID

Full Access
Question # 31

Which run levels should never be declared as the default run level when using SysV init? (Choose TWO correct answers.)

A.

0

B.

1

C.

3

D.

5

E.

6

Full Access
Question # 32

What information can the lspci command display about the system hardware? (Choose THREE correct answers.)

A.

Device IRQ settings

B.

PCI bus speed

C.

System battery type

D.

Device vendor identification

E.

Ethernet MAC address

Full Access
Question # 33

What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)

A.

Entries for all possible devices get created on boot even if those devices are not connected.

B.

Additional rules for udev can be created by adding them to /etc/udev/rules.d/.

C.

When using udev, it is not possible to create block orcharacter devices in /dev/ using mknod.

D.

The /dev/ directory is a filesystem of type tmpfs and is mounted by udev during system startup.

E.

The content of /dev/ is stored in /etc/udev/dev and is restored during system startup.

Full Access
Question # 34

Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)

A.

startd

B.

systemd

C.

Upstart

D.

SysInit

E.

SysV init

Full Access
Question # 35

Which of the following commands will write a message to the terminals of all logged in users?

A.

bcast

B.

mesg

C.

print

D.

wall

E.

yell

Full Access
Question # 36

Which file in the /proc filesystem lists parameters passed from the bootloader to the kernel? (Specify the file name only without any path.)

Full Access
Question # 37

The message "Hard Disk Error" is displayed on the screen during Stage 1 of the GRUB boot process. What does this indicate?

A.

The kernel was unable to execute /bin/init

B.

The next Stage cannot be read from the hard disk because GRUB was unable to determine the size and geometry of the disk

C.

One or more of the filesystems on the hard disk has errors and a filesystem check should be run

D.

The BIOS was unable to read the necessary data from the Master Boot Record to begin the boot process

Full Access
Question # 38

Which of the following kernel parameters instructs the kernel to suppress most boot messages?

A.

silent

B.

verbose=0

C.

nomesg

D.

quiet

Full Access
Question # 39

Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?

A.

/etc/keys

B.

/proc/keys

C.

/etc/inittab

D.

/proc/inittab

E.

/etc/reboot

Full Access
Question # 40

Which of the following information is stored within the BIOS? (Choose TWO correct answers.)

A.

Boot device order

B.

Linux kernel version

C.

Timezone

D.

Hardware configuration

E.

The system's hostname

Full Access
Question # 41

Which of the following options for the kernel's command line changes the systemd boot target to rescue.target instead of the default target?

A.

systemd.target=rescue.target

B.

systemd.runlevel=rescue.target

C.

systemd.service=rescue.target

D.

systemd.default=rescue.target

E.

systemd.unit=rescue.target

Full Access
Question # 42

Which command displays the contents of the Kernel Ring Buffer on the command line? (Provide only the command name without any options or path information)

Full Access
Question # 43

What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?

A.

/lib/init.so

B.

/sbin/init

C.

/etc/rc.d/rcinit

D.

/proc/sys/kernel/init

E.

/boot/init

Full Access
Question # 44

Which of the following statements is correct when talking about /proc/?

A.

All changes to files in /proc/ are stored in /etc/proc.d/ and restored on reboot.

B.

All files within /proc/ are read-only and their contents cannot be changed.

C.

All changes to files in /proc/ are immediately recognized by the kernel.

D.

All files within /proc/ are only readable by the root user.

Full Access
Question # 45

The USB device filesystem can be found under /proc/______/usb/. (Please fill in the blank with the single word only)

Full Access
Question # 46

Which of the following directories on a 64-bit Linux system typically contain shared libraries? (Choose two.)

A.

~/.lib64/

B.

/usr/lib64/

C.

/var/lib64/

D.

/lib64/

E.

/opt/lib64/

Full Access
Question # 47

Which of the following vi commands deletes two lines, the current and the following line?

A.

d2

B.

2d

C.

2dd

D.

dd2

E.

de12

Full Access
Question # 48

Which of the following properties of a Linux system should be changed when a virtual machine is cloned? (Choose two.)

A.

The partitioning scheme

B.

The file system

C.

The D-Bus Machine ID

D.

The permissions of /root/

E.

The SSH host keys

Full Access
Question # 49

Which of the following commands installs GRUB 2 into the master boot record on the third hard disk?

A.

grub2 install /dev/sdc

B.

grub-mkrescue /dev/sdc

C.

grub-mbrinstall /dev/sdc

D.

grub-setup /dev/sdc

E.

grub-install /dev/sdc

Full Access
Question # 50

Consider the following output from the command ls –i:

How would a new file named c.txt be created with the same inode number as a.txt (Inode 525385)?

A.

ln –h a.txt c.txt

B.

ln c.txt a.txt

C.

ln a.txt c.txt

D.

ln –f c.txt a.txt

E.

ln –i 525385 c.txt

Full Access
Question # 51

What is true regarding the command

ls > files

if files do not exist?

A.

The output of ls is printed to the terminal

B.

files is created and contains the output of ls

C.

An error message is shown and ls is not executed

D.

The command files is executed and receives the output of ls

E.

Any output of ls is discarded

Full Access
Question # 52

Which of the following commands installs all packages with a name ending with the string foo?

A.

zypper get “*foo”

B.

zypper update “foo?”

C.

zypper force “foo*”

D.

zypper install “*foo”

E.

zypper add “.*foo”

Full Access
Question # 53

When considering the use of hard links, what are valid reasons not to use hard links?

A.

Hard links are not available on all Linux systems because traditional filesystems, such as ext4, do not support them

B.

Each hard link has individual ownership, permissions and ACLs which can lead to unintended disclosure of file content

C.

Hard links are specific to one filesystem and cannot point to files on another filesystem

D.

If users other than root should be able to create hard links, suln has to be installed and configured

E.

When a hard linked file is changed, a copy of the file is created and consumes additional space

Full Access
Question # 54

A faulty kernel module is causing issues with a network interface card. Which of the following actions ensures that this module is not loaded automatically when the system boots?

A.

Using lsmod --remove --autoclean without specifying the name of a specific module

B.

Using modinfo –k followed by the name of the offending module

C.

Using modprobe –r followed by the name of the offending module

D.

Adding a blacklist line including the name of the offending module to the file /etc/modprobe.d/blacklist.conf

E.

Deleting the kernel module’s directory from the file system and recompiling the kernel, including its modules

Full Access
Question # 55

Which of the following files exist in a standard GRUB 2 installation? (Choose two.)

A.

/boot/grub/stages/stage0

B.

/boot/grub/i386-pc/1vm.mod

C.

/boot/grub/fstab

D.

/boot/grub/grub.cfg

E.

/boot/grub/linux/vmlinuz

Full Access
Question # 56

Which umask value ensures that new directories can be read, written and listed by their owning user, read and listed by their owning group and are not accessible at all for everyone else?

A.

0750

B.

0027

C.

0036

D.

7640

E.

0029

Full Access
Question # 57

Consider the following directory:

drwxrwxr-x 2 root sales 4096 Jan 1 15:21 sales

Which command ensures new files created within the directory sales are owned by the group sales? (Choose two.)

A.

chmod g+s sales

B.

setpol –R newgroup=sales sales

C.

chgrp –p sales sales

D.

chown --persistent *.sales sales

E.

chmod 2775 sales

Full Access
Question # 58

When redirecting the output of find to the xargs command, what option to find is useful if the filenames contain spaces?

A.

–rep-space

B.

-printnul

C.

-nospace

D.

–ignore-space

E.

–print0

Full Access
Question # 59

Given a log file loga.log with timestamps of the format DD/MM/YYYY:hh:mm:ss, which command filters out all log entries in the time period between 8:00 am and 8:59 am?

A.

grep –E ‘:08:[09]+:[09]+’ loga.log

B.

grep –E ‘:08:[00]+’ loga.log

C.

grep –E loga.log ‘:08:[0-9]+:[0-9]+’

D.

grep loga.log ‘:08:[0-9]:[0-9]’

E.

grep –E ‘:08:[0-9]+:[0-9]+’ loga.log

Full Access
Question # 60

Which of the following commands list all files and directories within the /tmp/ directory and its subdirectories which are owned by the user root? (Choose two.)

A.

find /tmp –user root -print

B.

find –path /tmp –uid root

C.

find /tmp –uid root -print

D.

find /tmp –user root

E.

find –path /tmp –user root -print

Full Access
Question # 61

What command will generate a list of user names from /etc/passwd along with their login shell?

A.

column -s : 1,7 /etc/passwd

B.

chop -c 1,7 /etc/passwd

C.

colrm 1,7 /etc/passwd

D.

cut -d: -f1,7 /etc/passwd

Full Access
Question # 62

In Bash, inserting 1>&2 after a command redirects

A.

standard error to standard input.

B.

standard input to standard error.

C.

standard output to standard error.

D.

standard error to standard output.

E.

standard output to standard input.

Full Access
Question # 63

What is the purpose of the Bash built-in export command?

A.

It allows disks to be mounted remotely.

B.

It runs a command as a process in a subshell.

C.

It makes the command history available to subshells.

D.

It sets up environment variables for applications.

E.

It shares NFS partitions for use by other systems on the network.

Full Access
Question # 64

Which of the following commands will reduce all consecutive spaces down to a single space?

A.

tr '\s' ' ' < a.txt > b.txt

B.

tr -c ' ' < a.txt > b.txt

C.

tr -d ' ' < a.txt > b.txt

D.

tr -r ' ' '\n' < a.txt > b.txt

E.

tr -s ' ' < a.txt > b.txt

Full Access
Question # 65

Which of the following commands will print the last 10 lines of a text file to the standard output?

A.

cat -n 10 filename

B.

dump -n 10 filename

C.

head -n 10 filename

D.

tail -n 10 filename

Full Access
Question # 66

Which command displays a list of all background tasks running in the current shell? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 67

In a nested directory structure, which find command line option would be used to restrict the command to searching down a particular number of subdirectories?

A.

-dirmax

B.

-maxdepth

C.

-maxlevels

D.

-n

E.

-s

Full Access
Question # 68

When running the command

sed -e "s/a/b/" /tmp/file >/tmp/file

While /tmp/file contains data, why is /tmp/file empty afterwards?

A.

The file order is incorrect. The destination file must be mentioned before the command to ensure redirection.

B.

The command sed did not match anything in that file therefore the output is empty.

C.

When the shell establishes the redirection it overwrites the target file before the redirected command starts and opens it for reading.

D.

Redirection for shell commands do not work using the > character. It only works using the | character instead.

Full Access
Question # 69

Which grep command will print only the lines that do not end with a / in the file foo?

A.

grep'/$' foo

B.

grep '/#' foo

C.

grep -v '/$' foo

D.

grep -v '/#' foo

Full Access
Question # 70

Which of the following commands can be used to create a USB storage media from a disk image?

A.

gdisk

B.

dd

C.

cc

D.

fdisk

E.

mount

Full Access
Question # 71

What is the maximum niceness value that a regular user can assign to a process with the nice command when executing a new process?

A.

9

B.

19

C.

49

D.

99

Full Access
Question # 72

What happens after issuing the command vi without any additional parameters?

A.

vi starts and loads the last file used andmoves the cursor to the position where vi was when it last exited.

B.

vi starts and requires the user to explicitly either create a new or load an existing file.

C.

vi exits with an error message as it cannot be invoked without a file name to operate on.

D.

vi starts in command mode and opens a new empty file.

E.

vi starts and opens a new file which is filled with the content of the vi buffer if the buffer contains text.

Full Access