New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

LFCS Questions and Answers

Question # 6

What is the difference between the i and a commands of the vi editor?

A.

i (interactive) requires the user to explicitly switch between vi modes whereas a (automatic) switches modes automatically.

B.

i (insert) inserts text before the current cursor position whereas a (append) inserts text after the cursor.

C.

i (independent rows) starts every new line at the first character whereas a (aligned rows) keeps the indentation of the previous line.

D.

i (interrupt) temporarily suspends editing of a file to the background whereas a (abort) terminates editing.

Full Access
Question # 7

What output will the following command produce?

seq 1 5 20

A.

1

6

1

1

1

6

B.

1

5

10

15

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Full Access
Question # 8

Which of the following commands can be used to search for the executable file foo when it has been placed in a directory not included in $PATH?

A.

apropos

B.

which

C.

find

D.

query

E.

whereis

Full Access
Question # 9

Which run levels should never be declared as the default run level when using SysV init? (Choose TWO correct answers.)

A.

0

B.

1

C.

3

D.

5

E.

6

Full Access
Question # 10

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

A.

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.

COUNT(SELECT order_type FROM orders);

D.

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.

SELECT AUTO_COUNT FROM orders COUNT order_type;

Full Access
Question # 11

Which of the following commands redirects the output of cmd to the file foo.txt, in which an existing file is overwritten?

A.

cmd || foo.txt

B.

cmd | foo.txt

C.

cmd && foo.txt

D.

cmd >> foo.txt

E.

cmd > foo.txt

Full Access
Question # 12

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Full Access
Question # 13

What is the default nice level when a process is started using the nice command?

A.

-10

B.

10

C.

20

D.

0

Full Access
Question # 14

Instead of supplying an explicit device in /etc/fstab for mounting, what other options may be used to identify the intended partition? (Choose TWO correct answers.)

A.

FIND

B.

ID

C.

LABEL

D.

NAME

E.

UUID

Full Access
Question # 15

In which directory must definition files be placed to add additional repositories to yum?

Full Access
Question # 16

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

A.

debug

B.

lsof

C.

nessus

D.

strace

E.

traceroute

Full Access
Question # 17

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

A.

lpd

B.

lpp

C.

lpq

D.

lpr

Full Access
Question # 18

What is NOT contained in the locale setting of the operating system?

A.

currency symbol

B.

language

C.

timezone

D.

thousands separator

Full Access
Question # 19

What is the purpose of the file /etc/profile?

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Full Access
Question # 20

In order to display all currently mounted filesystems, which of the following commands could be used? (Choose TWO correct answers.)

A.

cat /proc/self/mounts

B.

free

C.

mount

D.

lsmounts

E.

cat /proc/filesystems

Full Access
Question # 21

Which of the following is observed and corrected by a NTP client?

A.

The skew in time between the system clock and the hardware clock.

B.

The skew in time between the system clock and the reference clock.

C.

Changes in the time zone of the current computer's location.

D.

Adjustments needed to support Daylight Saving Time.

Full Access
Question # 22

Which character starts a comment line in a shell script file?

A.

;

B.

*

C.

#

D.

/

Full Access
Question # 23

When running the command

sed -e "s/a/b/" /tmp/file >/tmp/file

While /tmp/file contains data, why is /tmp/file empty afterwards?

A.

The file order is incorrect. The destination file must be mentioned before the command to ensure redirection.

B.

The command sed did not match anything in that file therefore the output is empty.

C.

When the shell establishes the redirection it overwrites the target file before the redirected command starts and opens it for reading.

D.

Redirection for shell commands do not work using the > character. It only works using the | character instead.

Full Access
Question # 24

Which of the following commands prints a listof usernames (first column) and their primary group (fourth column) from the /etc/passwd file?

A.

fmt -f 1,4 /etc/passwd

B.

split -c 1,4 /etc/passwd

C.

cut -d : -f 1,4 /etc/passwd

D.

paste -f 1,4 /etc/passwd

Full Access
Question # 25

Whichof the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)

A.

shutdown -R 1 now

B.

shutdown -single now

C.

init 1

D.

telinit 1

E.

runlevel 1

Full Access
Question # 26

Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?

A.

/etc/keys

B.

/proc/keys

C.

/etc/inittab

D.

/proc/inittab

E.

/etc/reboot

Full Access
Question # 27

What is the correct command to extract the contents of the archive file download.bz2?

A.

unpack download.bz2

B.

unzip2 download.bz2

C.

bunzip2 download.bz2

D.

unzip download.bz2

E.

uncompress download.bz2

Full Access
Question # 28

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Full Access
Question # 29

Which command will display messages from the kernel that were output during the normal boot sequence?

Full Access
Question # 30

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 31

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

A.

New name servers may be added to the resolver configuration.

B.

Network interfaces may become active or inactive.

C.

The routing table may change.

D.

IP addresses may change.

E.

The system's host name may change.

Full Access
Question # 32

Regarding the command:

nice -5 /usr/bin/prog

Which of the following statements is correct?

A.

/usr/bin/prog is executed with a nice level of -5.

B.

/usr/bin/prog is executed with a nice level of 5.

C.

/usr/bin/prog is executed with a priority of -5.

D.

/usr/bin/prog is executed with a priority of 5.

Full Access
Question # 33

What is the purpose of the Filesystem Hierarchy Standard?

A.

It is a security modelused to ensure files are organized according to their permissions and accessibility.

B.

It provides unified tools to create, maintain and manage multiple filesystems in a common way.

C.

It defines a common internal structure of inodes for all compliant filesystems.

D.

It is a distribution neutral description of locations of files and directories.

Full Access
Question # 34

Which configuration file would be edited to change the default options for outbound SSH sessions?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/client

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_client

Full Access
Question # 35

Which of the following commands can be used to extract content from a tar file?

A.

tar -xvf

B.

tar -vf

C.

tar -e

D.

tar -c

E.

tar–v

Full Access
Question # 36

Which of the following commands can be used to create a USB storage media from a disk image?

A.

gdisk

B.

dd

C.

cc

D.

fdisk

E.

mount

Full Access
Question # 37

Which grep command will print only the lines that do not end with a / in the file foo?

A.

grep '/$' foo

B.

grep '/#' foo

C.

grep -v '/$' foo

D.

grep -v '/#' foo

Full Access
Question # 38

Which of the following commands kills the process with the PID 123 but allows the process to "clean up" before exiting?

A.

kill -PIPE 123

B.

kill -KILL 123

C.

kill -STOP 123

D.

kill -TERM 123

Full Access
Question # 39

By default, the contents of which directory will be copied to a new user's home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)

Full Access