ExamGecko
Home Home / LPI / 102-500

LPI 102-500 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Which of the following commands can be used to limit the amount of memory a user may use?

A.
umask
A.
umask
Answers
B.
usermod
B.
usermod
Answers
C.
ulimit
C.
ulimit
Answers
D.
passwd
D.
passwd
Answers
E.
chage
E.
chage
Answers
Suggested answer: C

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

A.
/etc/shadow
A.
/etc/shadow
Answers
Suggested answer: A

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

A.
ssh --port 2222 example.com
A.
ssh --port 2222 example.com
Answers
B.
ssh -p 2222 example.com
B.
ssh -p 2222 example.com
Answers
C.
ssh -o Port=2222 example.com
C.
ssh -o Port=2222 example.com
Answers
D.
ssh -o GatewayPort=2222 example.com
D.
ssh -o GatewayPort=2222 example.com
Answers
E.
ssh example.com:2222
E.
ssh example.com:2222
Answers
Suggested answer: B, C

Explanation:

Topic 7, Misc Questions New

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

A.
nmtui
A.
nmtui
Answers
Suggested answer: A

What is true about the Hop Limit field in the IPv6 header?

A.
The field is not changed during the transport of a package.
A.
The field is not changed during the transport of a package.
Answers
B.
The field is transmitted within a hop-by-hop extension header.
B.
The field is transmitted within a hop-by-hop extension header.
Answers
C.
Each router forwarding the packet increases the field's value.
C.
Each router forwarding the packet increases the field's value.
Answers
D.
Each router forwarding the packet decreases the field's value.
D.
Each router forwarding the packet decreases the field's value.
Answers
E.
For multicast packages, the field's value is always 1.
E.
For multicast packages, the field's value is always 1.
Answers
Suggested answer: D

Which of the following nmcli subcommands exist? (Choose two.)

A.
nmcli ethernet
A.
nmcli ethernet
Answers
B.
nmcli device
B.
nmcli device
Answers
C.
nmcli wifi
C.
nmcli wifi
Answers
D.
nmcli address
D.
nmcli address
Answers
E.
nmcli connection
E.
nmcli connection
Answers
Suggested answer: B, E

Which of the following changes may occur as a consequence of using the command ip? (Choose three.)

A.
Network interfaces may become active or inactive.
A.
Network interfaces may become active or inactive.
Answers
B.
New name servers may be added to the resolver configuration.
B.
New name servers may be added to the resolver configuration.
Answers
C.
The system's host name may change.
C.
The system's host name may change.
Answers
D.
IP addresses may change.
D.
IP addresses may change.
Answers
E.
The routing table may change.
E.
The routing table may change.
Answers
Suggested answer: A, D, E

How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?

A.
6
A.
6
Answers
B.
14
B.
14
Answers
C.
30
C.
30
Answers
D.
62
D.
62
Answers
E.
126
E.
126
Answers
Suggested answer: D

Which of the following commands configure network interfaces based on the system's existing distribution-specific configuration files? (Choose two.)

A.
ifconf
A.
ifconf
Answers
B.
ifdown
B.
ifdown
Answers
C.
ifpause
C.
ifpause
Answers
D.
ifstart
D.
ifstart
Answers
E.
ifup
E.
ifup
Answers
Suggested answer: B, E

Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

A.
UID have precedence over GIDs, therefore the user is available while the group doesn't.
A.
UID have precedence over GIDs, therefore the user is available while the group doesn't.
Answers
B.
The user as well as the group are not available to avoid ambiguity due to the ID conflict.
B.
The user as well as the group are not available to avoid ambiguity due to the ID conflict.
Answers
C.
UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.
C.
UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.
Answers
D.
The user is the only member of the group, even if the group configuration contains other members.
D.
The user is the only member of the group, even if the group configuration contains other members.
Answers
E.
GIDs have precedence over UIDs, therefore the group is available while the user isn't.
E.
GIDs have precedence over UIDs, therefore the group is available while the user isn't.
Answers
Suggested answer: C
Total 194 questions
Go to page: of 20