Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

102-500 Questions and Answers

Question # 6

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Full Access
Question # 7

On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem?

A.

date -d '+ 1 day'

B.

hwclock --systohc --localtime

C.

ntpdate pool.ntp.org

D.

time hwclock

Full Access
Question # 8

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 9

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this?

A.

cupsreject -c -r hello HPLaserjet4

B.

cupsreject -p -m hello HPLaserjet4

C.

cupsdisable -c -r hello HPLaserjet4

D.

cupsdisable -p -m hello HPLaserjet4

Full Access
Question # 10

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

A.

sshd

B.

ssh-agent

C.

ssh-keygen

D.

ssh-add

Full Access
Question # 11

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

A.

core

B.

edquota

C.

ulimit

D.

quota

Full Access
Question # 12

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

A.

debug

B.

lsof

C.

nessus

D.

strace

E.

traceroute

Full Access
Question # 13

Which of the following commands can be used to limit the amount of memory a user may use?

A.

umask

B.

usermod

C.

ulimit

D.

passwd

E.

chage

Full Access
Question # 14

What is a purpose of an SSH host key?

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Full Access
Question # 15

Which configuration file would be edited to change default options for the OpenSSH server?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/server

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_server

Full Access
Question # 16

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Full Access
Question # 17

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

A.

ssh --port 2222 example.com

B.

ssh -p 2222 example.com

C.

ssh -o Port=2222 example.com

D.

ssh -o GatewayPort=2222 example.com

E.

ssh example.com:2222

Full Access
Question # 18

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

A.

find /usr -uid 0 -perm +4000

B.

find -user root +mode +s /usr

C.

find -type suid -username root -d /usr

D.

find /usr -ls \*s\* -u root

E.

find /usr -suid -perm +4000

Full Access
Question # 19

Which of the following statements about sytemd-journald are true? (Choose three.)

A.

It is incompatible with syslog and cannot be installed on a system using regular syslog.

B.

It only processes messages of systemd and not messages of any other tools.

C.

It can pass log messages to syslog for further processing.

D.

It maintains metadata such as _UID or _PID for each message.

E.

It supports syslog facilities such as kern, user, and auth.

Full Access
Question # 20

Which of the following features are provided by SPICE? (Choose two.)

A.

Connecting local USB devices to remote applications.

B.

Accessing graphical applications on a remote host.

C.

Replacing Xorg as local X11 server.

D.

Downloading and locally installing applications from a remote machine.

E.

Uploading and running a binary program on a remote machine.

Full Access
Question # 21

What is the purpose of TCP wrapper?

A.

Manage and adjust bandwidth used by TCP services.

B.

Bind a network service to a TCP port.

C.

Encapsulate TCP messages in IP packets.

D.

Add SSL support to plain text TCP services.

E.

Limit access to a network service.

Full Access
Question # 22

Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/maillog and sends all critical events to the remote server logger.example.com?

A.

mail.*/var/log/maillogmail,crit@logger.example.org

B.

mail.*/var/log/maillogmail.critsyslog://logger.example.org

C.

mail/var/log/maillogmail.crit@logger.example.org

D.

mail.*/var/log/maillogmail.crit@logger.example.org

E.

mail */var/log/maillogmail crit@logger.example.org

Full Access
Question # 23

Which of the following information is stored in /etc/shadow for each user?

A.

The timestamp of the user’s last login

B.

The user’s private SSH keys

C.

The hashed password of the user

D.

The numerical user ID (UID)

E.

The path to the user’s home directory

Full Access
Question # 24

Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization?

A.

iburst

B.

quickstart

C.

fast

D.

D. fsync

E.

flood

Full Access
Question # 25

What can be specified with useradd? (Choose two.)

A.

Commands the user can run using sudo.

B.

The absolute path to the user’s home directory.

C.

Which printers are available for the new user.

D.

The SSH keys used to login to the new account.

E.

The numeric user ID (UID) of the user.

Full Access
Question # 26

What output is produced by the following command sequence?

echo ‘1 2 3 4 5 6’ | while read a b c; do

echo result $c $b $a;

done

A.

result: 6 5 4

B.

result: 1 2 3 4 5 6

C.

result: 3 4 5 6 2 1

D.

result: 6 5 4 3 2 1

E.

result: 3 2 1

Full Access
Question # 27

Which of the following statements is true regarding systemd timer units?

A.

Timer units can only be defined within a service unit’s file.

B.

The command executed by the timer is specified in the timer unit’s [Cmd] section.

C.

A dedicated system service, systemd-cron, handles the execution of timer units.

D.

Timer units only exist in the system scope and are not available for users.

E.

Each systemd timer unit controls a specific systemd service unit.

Full Access
Question # 28

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.)

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Full Access
Question # 29

How is the file format of /etc/crontab different from a normal crontab file? (Select TWO correct answers)

A.

The /etc/crontab file can specify a year field.

B.

A normal crontab file must be installed with the crontab command.

C.

A normal crontab file allows for environment variable substitution.

D.

The /etc/crontab file has a user field for commands.

Full Access
Question # 30

What is true about the file /etc/localtime?

A.

It is a plain text file containing a string such as Europe/Berlin

B.

It is created and maintained by the NTP service based on the location of the system’s IP address.

C.

It is a symlink to /sys/device/clock/ltime and always contains the current local time.

D.

After changing this file, newtzconfig has to be run to make the changes effective.

E.

It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

Full Access
Question # 31

Which of the following fields are available in both the global /etc/crontab file as well as in user-specific crontab files? (Select TWO correct answers)

A.

Year

B.

Minute

C.

Username

D.

Command

Full Access
Question # 32

What is NOT contained in the locale setting of the operating system?

A.

currency symbol

B.

language

C.

timezone

D.

thousands separator

Full Access
Question # 33

Where are user specific crontabs stored?

A.

In the database file /etc/crontab.db which is shared by all users.

B.

As individual per-user files within /var/spool/cron.

C.

As individual per-user files in /etc/cron.user.d.

D.

In the .crontab file in the user's home directory.

E.

In the file /var/cron/user-crontab which is shared by all users.

Full Access
Question # 34

What is the purpose of the iconv command?

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Full Access
Question # 35

Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.)

A.

The list of users that belong to the group.

B.

The home directory of the group.

C.

The name of the group.

D.

The description of the group.

E.

The password of the group.

Full Access
Question # 36

What is the conventional purpose of Linux UIDs that are lower than 100?

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Full Access
Question # 37

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Full Access
Question # 38

Which of the following SQL statements will select the fields name and address from the contacts table?

A.

SELECT (name, address) FROM contacts;

B.

SELECT (name address) FROM contacts;

C.

SELECT name, address FROM contacts;

D.

SELECT name address FROM contacts;

Full Access
Question # 39

What is the purpose of the file /etc/profile?

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Full Access
Question # 40

When the command echo $ outputs 1, which of the following statements is true?

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the exit value of the command executed immediately before echo.

D.

It is the exit value of the echo command.

Full Access
Question # 41

When the command echo $$ outputs 12942, what is the meaning of 12942?

A.

It is the process ID of the echo command.

B.

It is the process ID of the current shell.

C.

It is the process ID of the last command executed.

D.

It is the process ID of the last command which has been placed in the background.

Full Access
Question # 42

What output will the following command sequence produce?

echo '1 2 3 4 5 6' | while read a b c; do

echo result: $c $b $a;

done

A.

result: 3 4 5 6 2 1

B.

result: 1 2 3 4 5 6

C.

result: 6 5 4

D.

result: 6 5 4 3 2 1

E.

result: 3 2 1

Full Access
Question # 43

After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?

A.

A B

B.

A B C

C.

A C

D.

B C

E.

C B A

Full Access
Question # 44

Which of the following commands lists all defined variables and functions within Bash?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 45

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Full Access
Question # 46

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 47

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Full Access
Question # 48

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Full Access
Question # 49

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 50

Why is the xhost program considered dangerous to use?

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Full Access
Question # 51

What is the purpose of the Sticky Keys feature in X?

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Full Access
Question # 52

For accessibility assistance, which of the following programs is an on-screen keyboard?

A.

xkb

B.

atkb

C.

GOK

D.

xOSK

Full Access
Question # 53

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Full Access
Question # 54

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Full Access
Question # 55

Which of the following is true about IPv6?

A.

With IPv6, the TCP port numbers of most services have changed.

B.

IPv6 no longer supports broadcast addresses.

C.

IPv4 addresses can be used without any change with IPv6.

D.

IPv6 no longer supports multicast addresses.

E.

For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.

Full Access
Question # 56

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Full Access
Question # 57

What is the purpose of the nsswitch.conf file?

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Full Access
Question # 58

Which of the following is a valid IPv6 address?

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Full Access
Question # 59

Which of the following commands will help identify a broken router between the local and the remote machine?

A.

ps

B.

netstat

C.

nslookup

D.

ifconfig

E.

traceroute

Full Access