New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

102-500 Questions and Answers

Question # 6

What output does the command seq 1 5 20 produce?

A.

1

5

10

15

B.

1

6

11

16

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Full Access
Question # 7

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Full Access
Question # 8

What is the purpose of the Sticky Keys feature in X?

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Full Access
Question # 9

How is a display manager started?

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Full Access
Question # 10

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Full Access
Question # 11

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Full Access
Question # 12

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 13

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access
Question # 14

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 15

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Full Access
Question # 16

Which file used by XDM specifies the default wallpaper?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 17

What is the purpose of a screen reader?

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Full Access
Question # 18

For accessibility assistance, which of the following programs is an on-screen keyboard?

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Full Access
Question # 19

Why is the xhost program considered dangerous to use?

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Full Access
Question # 20

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Full Access
Question # 21

What is the purpose of the iconv command?

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Full Access
Question # 22

Of the ways listed, which is the best way to temporarily suspend a single user's ability to interactively login?

A.

Add the user name to /etc/nologin.

B.

Change the user's password.

C.

Change the user name in /etc/passwd.

D.

Use change to expire the user account.

E.

Place the command logout in the user's profile.

Full Access
Question # 23

Which file contains the date of the last change of a user's password?

A.

/etc/gshadow

B.

/etc/passwd

C.

/etc/pwdlog

D.

/etc/shadow

E.

/var/log/shadow

Full Access
Question # 24

To prevent a specific user from scheduling tasks with at, what should the administrator do?

A.

Add the specific user to /etc/at.allow file.

B.

Add the specific user to [deny] section in the /etc/atd.conf file.

C.

Add the specific user to /etc/at.deny file.

D.

Add the specific user to nojobs group.

E.

Run the following: atd --deny [user].

Full Access
Question # 25

Which of the following steps prevents a user from obtaining an interactive login session?

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Full Access
Question # 26

Which crontab entry could be used to set the system time at regular intervals?

A.

1 0 * * * date $d $t $24

B.

1 0 * * * ntpdate ntp1.digex.net

C.

1 0 * * * date ntp1.digex.net

D.

1 0 * * * runcron date ntp1.digex.net

E.

1 0 * * * settime $d $t $24

Full Access
Question # 27

Which commands can you use to change a user's account aging information? (Choose THREE correct answers.)

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Full Access
Question # 28

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?

A.

Use passwd -d username to give the user an empty password.

B.

Use chage to expire the user account.

C.

Change the user's password.

D.

Add the command exit to the user's .login file.

Full Access
Question # 29

What is the conventional purpose of Linux UIDs that are lower than 100?

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Full Access
Question # 30

After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?

A.

A B

B.

A B C

C.

A C

D.

B C

E.

C B A

Full Access
Question # 31

What benefit does an alias in bash provide?

A.

It provides faster lookups for commands in the system directory.

B.

It creates a local copy of a file from another directory.

C.

It hides what command you are running from others.

D.

It allows a string to be substituted for the first word of a simple command.

Full Access
Question # 32

Which of the following commands puts the output of the command date into the shell variable mydate?

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Full Access
Question # 33

What output will the following command sequence produce?

echo '1 2 3 4 5 6' | while read a b c; do

echo result: $c $b $a;

done

A.

result: 3 4 5 6 2 1

B.

result: 1 2 3 4 5 6

C.

result: 6 5 4

D.

result: 6 5 4 3 2 1

E.

result: 3 2 1

Full Access
Question # 34

What output will the following command produce?

seq 1 5 20

A.

1

6

1

1

1

6

B.

1

5

10

15

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Full Access
Question # 35

Which of the following is the best way to list all defined shell variables?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 36

Which command allows you to make a shell variable visible to subshells?

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Full Access
Question # 37

What is the purpose of the file /etc/profile?

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Full Access
Question # 38

What is the difference between the commands test -e path and test -f path?

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Full Access
Question # 39

Which directory in /etc is used to keep a sample copy of files and directories for when a new user has a home directory created? (Please provide the full path)

Full Access
Question # 40

What output will the command seq 10 produce?

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Full Access
Question # 41

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Full Access
Question # 42

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

Full Access
Question # 43

Which of the following programs can be used to determine the routing path to a given destination?

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Full Access
Question # 44

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Full Access
Question # 45

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Full Access
Question # 46

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Full Access
Question # 47

Given the following routing table:

How would an outgoing packet to the destination 192.168.2.150 be handled?

A.

It would be passed to the default router 192.168.178.1 on wlan0.

B.

It would be directly transmitted on the device eth0.

C.

It would be passed to the default router 255.255.255.0 on eth0.

D.

It would be directly transmitted on the device wlan0.

E.

It would be passed to the router 192.168.1.1 on eth0.

Full Access
Question # 48

What is true regarding a default route?

A.

The default route is always used first. When the default route is not available more specific routes are tried.

B.

When a default route is set, all other routes are disabled until the default route is deleted.

C.

The default route is only used if there is not a more specific route to a destination host or network.

D.

Without a default route, no network communication even in directly attached networks is possible.

Full Access
Question # 49

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Full Access
Question # 50

Which of the following details is NOT provided in any output from the netstat utility?

A.

broadcast services

B.

interface statistics

C.

masquerading connections

D.

network connections

E.

routing tables

Full Access
Question # 51

Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)

A.

127.0.0.0/8

B.

10.0.0.0/8

C.

169.255.0.0/16

D.

172.16.0.0/12

E.

192.168.0.0/16

Full Access
Question # 52

Which of the following commands will help identify a broken router between the local and the remote machine?

A.

ps

B.

netstat

C.

nslookup

D.

ifconfig

E.

traceroute

Full Access
Question # 53

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Full Access
Question # 54

Which of the following are syslog facilities? (Choose TWO correct answers.)

A.

local5

B.

mail

C.

advanced

D.

postmaster

E.

remote

Full Access
Question # 55

Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.)

A.

Synchronize the hardware and system clocks.

B.

Output date and time in different formats.

C.

Set the system clock.

D.

Set the hardware clock.

E.

Update the time via NTP.

Full Access
Question # 56

What is true about the ntpdate command?

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Full Access
Question # 57

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Full Access
Question # 58

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Full Access
Question # 59

After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer's queue? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 60

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

Full Access
Question # 61

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 62

What is pool.ntp.org?

A.

A deprecated feature for maintaining system time in the Linux kernel

B.

A website which provides binary and source packages for the OpenNTPD project

C.

A virtual cluster of various timeservers

D.

A community website used to discuss the localization of Linux

Full Access
Question # 63

What entry can you add to syslog.conf file to have all syslog messages generated by your system go to virtual console 12?

A.

*.* /dev/tty12

B.

/var/log/messages | /dev/tty12

C.

| /dev/tty12

D.

syslog tty12

E.

mail.* /dev/tty12

Full Access
Question # 64

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Full Access
Question # 65

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Full Access
Question # 66

Which of the following getent invocations lists all existing users?

A.

getent homco

B.

getent uids

C.

getent pmsswd

D.

getent users

E.

getent logins

Full Access
Question # 67

Which of the following commands can identify the PID od a process which opened a TCP port?

A.

ptrace

B.

strace

C.

debug

D.

lsof

E.

nessus

Full Access
Question # 68

Depending on a system's configuration, which of the following files can be used to enable and disable network services running on this host?

A.

/etc/profile

B.

/etc/xinetd.conf

C.

/etc/ports

D.

/et/host.conf

E.

/etc/host.conf

Full Access
Question # 69

Which file is processed by newaliases? (Specify the full name of the file, including path.)

Full Access
Question # 70

Which parameter of the ssh command specifies the location of the private key used for login attempts? (Specify ONLY the option name without any values or parameters.)

Full Access