ExamGecko
Home / LPI / 102-500 / List of questions
Ask Question

LPI 102-500 Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

Which configuration file would be edited to change default options for the OpenSSH server?

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/- SXesH19Ido/s46-c-k-no/photo.jpg

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

What is a purpose of an SSH host key?

Become a Premium Member for full access
  Unlock Premium Member
Total 235 questions
Go to page: of 24
Search