ExamGecko
Home Home / LPI / 102-500

LPI 102-500 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

A.
tcpd
A.
tcpd
Answers
B.
inetd
B.
inetd
Answers
C.
fingerd
C.
fingerd
Answers
D.
mountd
D.
mountd
Answers
E.
xinetd
E.
xinetd
Answers
Suggested answer: A

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

A.
core
A.
core
Answers
B.
edquota
B.
edquota
Answers
C.
ulimit
C.
ulimit
Answers
D.
quota
D.
quota
Answers
Suggested answer: C

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

A.
debug
A.
debug
Answers
B.
lsof
B.
lsof
Answers
C.
nessus
C.
nessus
Answers
D.
strace
D.
strace
Answers
E.
traceroute
E.
traceroute
Answers
Suggested answer: B

Which configuration file would be edited to change default options for the OpenSSH server?

A.
/etc/ssh/sshd_config
A.
/etc/ssh/sshd_config
Answers
B.
/etc/ssh/ssh
B.
/etc/ssh/ssh
Answers
C.
/etc/ssh/server
C.
/etc/ssh/server
Answers
D.
/etc/ssh/ssh_config
D.
/etc/ssh/ssh_config
Answers
E.
/etc/ssh/ssh_server
E.
/etc/ssh/ssh_server
Answers
Suggested answer: A

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

A.
find /usr -uid 0 -perm +4000
A.
find /usr -uid 0 -perm +4000
Answers
B.
find -user root +mode +s /usr
B.
find -user root +mode +s /usr
Answers
C.
find -type suid -username root -d /usr
C.
find -type suid -username root -d /usr
Answers
D.
find /usr -ls \*s\* -u root
D.
find /usr -ls \*s\* -u root
Answers
E.
find /usr -suid -perm +4000
E.
find /usr -suid -perm +4000
Answers
Suggested answer: A

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

A.
/etc/xinetd.d/,/etc/xinetd.d
A.
/etc/xinetd.d/,/etc/xinetd.d
Answers
Suggested answer: A

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

A.
/etc/sudoers
A.
/etc/sudoers
Answers
Suggested answer: A

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/- SXesH19Ido/s46-c-k-no/photo.jpg

A.
/etc/hosts.allow
A.
/etc/hosts.allow
Answers
Suggested answer: A

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

A.
sshd
A.
sshd
Answers
B.
ssh-agent
B.
ssh-agent
Answers
C.
ssh-keygen
C.
ssh-keygen
Answers
D.
ssh-add
D.
ssh-add
Answers
Suggested answer: B

What is a purpose of an SSH host key?

A.
It must be sent by any SSH client in addition to a user key in order to identify the client's host.
A.
It must be sent by any SSH client in addition to a user key in order to identify the client's host.
Answers
B.
It provides the server's identity information to connecting SSH clients.
B.
It provides the server's identity information to connecting SSH clients.
Answers
C.
It is the root key by which all user SSH keys must be signed.
C.
It is the root key by which all user SSH keys must be signed.
Answers
D.
It authenticates any user that logs into a remote machine from the key's host.
D.
It authenticates any user that logs into a remote machine from the key's host.
Answers
E.
It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
E.
It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Answers
Suggested answer: B
Total 194 questions
Go to page: of 20