ExamGecko
Home Home / LPI / 102-500

LPI 102-500 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Question 161

Report
Export
Collapse

Which of the following commands can be used to limit the amount of memory a user may use?

A.
umask
A.
umask
Answers
B.
usermod
B.
usermod
Answers
C.
ulimit
C.
ulimit
Answers
D.
passwd
D.
passwd
Answers
E.
chage
E.
chage
Answers
Suggested answer: C
asked 18/09/2024
Edwin Lebron
38 questions

Question 162

Report
Export
Collapse

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

A.
/etc/shadow
A.
/etc/shadow
Answers
Suggested answer: A
asked 18/09/2024
Kanta Prasad
38 questions

Question 163

Report
Export
Collapse

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

A.
ssh --port 2222 example.com
A.
ssh --port 2222 example.com
Answers
B.
ssh -p 2222 example.com
B.
ssh -p 2222 example.com
Answers
C.
ssh -o Port=2222 example.com
C.
ssh -o Port=2222 example.com
Answers
D.
ssh -o GatewayPort=2222 example.com
D.
ssh -o GatewayPort=2222 example.com
Answers
E.
ssh example.com:2222
E.
ssh example.com:2222
Answers
Suggested answer: B, C

Explanation:

Topic 7, Misc Questions New

asked 18/09/2024
Rolf Johannesen
43 questions

Question 164

Report
Export
Collapse

Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 165

Report
Export
Collapse

What is true about the Hop Limit field in the IPv6 header?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 166

Report
Export
Collapse

Which of the following nmcli subcommands exist? (Choose two.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 167

Report
Export
Collapse

Which of the following changes may occur as a consequence of using the command ip? (Choose three.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 168

Report
Export
Collapse

How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 169

Report
Export
Collapse

Which of the following commands configure network interfaces based on the system's existing distribution-specific configuration files? (Choose two.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 170

Report
Export
Collapse

Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 235 questions
Go to page: of 24