Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONLPIC 1.2

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
LPIC 1.2

Description:
LPIC 1 parte 2 de 3

Author:
AVATAR

Creation Date:
13/03/2024

Category:
Others

Number of questions: 40
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Which of the following commands can be used to determine how long the system has been running? (Choose two.) uptime uname ""u time --up top up.
What is true regarding the command Is > files if files does not exist? files is created and contains the output of Is Any output of Is is discarded An error message is shown and Is is not executed The output of Is is printed to the terminal The command files is executed and receives the output of Is.
Which wildcards will match the following filenames? (Choose two.) ttySO ttyS1 ttyS2 tty[A-Z][012] tty?[0-5] ttyS[1-5] tty*2 tty[Ss][02].
Which of the following commands redirects the output of Is to standard error? Is >>2 Is |error Is <<ERR Is >-1 Is >&2.
Which of the following commands displays the contents of a gzip compressed tar archive? tar cf archive.tgz gzip ""d archive.tgz | tar tvf - tar ztf archive.tgz gzip archive.tgz | tar xvf - tar "''fzt archive.tgz.
Which of the following commands prints a list of usernames (first column) and their primary group (fourth column) from the /etc/passwd file? paste '''f 1,4 /etc/passwd split ""'c 1,4 /etc/passwd cut "'"d : -f 1,4 /etc/passwd fmt "''f 1,4 /etc/passwd sort "''t : -k 1,4 /etc/passwa.
Which of the following regular expressions represents a single upper-case letter? {AZ} !a-z :UPPER: %C [A-Z].
Which command is used to start another command with a given nice level? (Specify ONLY the command without any path or parameters.).
Given a log file loga.log with timestamps of the format DD/MM/YYYY:hh:mm:ss, which command filters out all log entries in the time period between 8:00 am and 8:59 am? grep '''E "~:08:[0-9]+:[0-9]+' loga.log grep "'"E "~ :08:[09]+:[09]+' loga.log grep '''E "~:08:[00]+' loga.log grep loga.log "~: 08: [0-9]:[0-9]' grep '''E loga.log "~ :08:[0-9]+:[0-9]+'.
Instead of supplying an explicit device in / etc/fstab for mounting, what other options may be used to identify the intended partition? (Choose two.) NAME UUID ID FIND LABEL.
A yum repository can declare sets of related packages. Which yum command installs all packages belonging to the group admintools? yum pkgsel --install admintools yum install admintools/* yum groupinstall admintools yum taskinstall admintools yum collection install admintools.
What directory contains configuration files for additional yum repositories? (Specify the full path to the directory.).
Which of the following commands installs the GRUB boot files into the currently active file systems and the boot loader into the first partition of the first disk? grub-install /dev/sda grub-install /dev/sda1 grub-install current /dev/sda0 grub-install /dev/sda0 grub-install current /dev/sda1.
Which of the following files are found in the /boot/ file system? (Choose two.) Linux kernel images Bash shell binaries systemd target and service units Initial ramdisk images fsck binaries.
Which file defines the network locations from where the Debian package manager downloads software packages? /etc/dpkg/dpkg.cfg /etc/apt/apt.conf.d /etc/apt/apt.conf /etc/dpkg/dselect.cfg /etc/apt/sources.list.
When removing a package on a system using dpkg package management, which dpkg option ensures configuration files are removed as well? --clean --purge --vacuum --remove --declare.
Which of the following statements are correct when comparing Linux containers with traditional virtual machines (e.g. LXC vs. KVM)? (Choose three.) Containers are a lightweight virtualization method where the kernel controls process isolation and resource management. Fully virtualized machines can run any operating system for a specific hardware architecture within the virtual machine. Containers are completely decoupled from the host system's physical hardware and can only use emulated virtual hardware devices. The guest environment for fully virtualized machines is created by a hypervisor which provides virtual and emulated hardware devices. Containers on the same host can use different operating systems, as the container hypervisor creates separate kernel execution.
The installation of a local Debian package failed due to unsatisfied dependencies. Which of the following commands installs missing dependencies and completes the interrupted package installation? dpkg --fix --all apt-get autoinstall dpkg-reconfigure --all apt-get all apt-get install -f.
Which of the following commands are valid in the GRUB 2 configuration file? (Choose two.) menuentry uefi pxe-ifconfig insmod kpartx.
What is the purpose of the ldd command? It lists which shared libraries a binary needs to run. It installs and updates installed shared libraries. It turns a dynamically linked binary into a static binary. It defines which version of a library should be used by default. It runs a binary with an alternate library search path.
What can the Logical Volume Manager (LVM) be used for? (Choose three.) To create snapshots. To dynamically change the size of logical volumes. To dynamically create or delete logical volumes. To create RAID 9 arrays. To encrypt logical volumes.
What are the main differences between GPT and MBR partition tables regarding maximum number and size of partitions? (Choose two.) MBR can handle partition sizes up to 4 TB, whereas GPT supports partition sizes up to 128 ZB. By default, GPT can manage up to 128 partitions while MBR only supports four primary partitions By default, GPT can manage up to 64 partitions while MBR only supports 16 primary partitions. MBR can handle partition sizes up to 2.2 TB, whereas GPT supports sizes up to 9.4 ZB. Both GPT and MBR support up to four primary partitions, each with up to 4096 TB.
A backup software heavily uses hard links between files which have not been changed in between two backup runs. Which benefits are realized due to these hard links? (Choose two.) The old backups can be moved to slow backup media, such as tapes, while still serving as hard link target in new backups. The backup runs faster because hard links are asynchronous operations, postponing the copy operation to a later point in time. The backup is guaranteed to be uncharged because a hard linked file cannot be modified after its creation. The backup consumes less space because the hard links point to the same data on disk instead of storing redundant copies. The backup runs faster because, instead of copying the data of each file, hard links only change file system meta dat.
Which file from the /proc/ file system contains a list of all currently mounted devices? (Specify the full name of the file, including path.).
How many fields are in a syntactically correct line of /etc/fstab? 7 6 4 3 5.
Running chmod 640 filea.txt as a regular user doesn't update filea.txt's permission. What might be a reason why chmod cannot modify the permissions? (Choose two.) filea.txt is owned by another user and a regular user cannot change the permissions of another user's file. filea.txt is a symbolic link whose permissions are a fixed value which cannot be charged. filea.txt has the sticky bit set and a regular user cannot remove this permission. filea.txt is a hard link whose permissions are inherited from the target and cannot be set directly. filea.txt has the SetUID bit set which imposes the restriction that only the root user can make changes to the file.
Which of the following Linux filesystems preallocate a fixed number of inodes when creating a new filesystem instead of generating them as needed? (Choose two.) JFS ext3 XFS ext2 procfs.
Which of the following commands sets the SetUID permission on the executable /bin/foo? chmod 4755 /bin/foo chmod 1755 /bin/foo chmod u-s /bin/foo chmod 755+s /bin/foo chmod 2755 /bin/foo.
Which of the following commands can be used to display the inode number of a given file? (Choose two.) inode ln ls stat cp.
After a power outage, the XFS file system of /dev/sda3 is inconsistent. How can the existing file system errors be fixed? By using mount -f to force a mount of the file system By running xfsck on the file system By mounting the file system with the option xfs_repair By running xfsadmin repair on the file system By running xfs_repair on the file system.
Which of the following properties of an existing file changes when a hard link pointing to that file is created? File size Link count Modify timestamp Inode number Permissions.
Following the Filesystem Hierarchy Standard (FHS), where should binaries that have been compiled by the system administrator be placed in order to be made available to all users on the system? (Specify the full path to the directory.).
Which of the following commands show how the shell handles a specific command? where type stat case fileinfo.
Which of the following commands displays the manual page command from section 1? man command(1) man command@1 man 1 command man 1.command man -s 1 command.
Which of the following commands creates or, in case it already exists, overwrites a file called data with the output of ls? ls 3> data ls >& data ls > data ls >> d ls >>> dataata.
Which of the following commands is used to change options and positional parameters within a running Bash shell? history setsh bashconf set envsetup.
Which of the following commands display the IDs of all processes owned by root? (Choose two.) pgrep -c root pgrep -u root pgrep -f root pgrep -U 0 pgrep -c 0.
Which of the following sequences in the vi editor saves the opened document and exits the editor? Ctrl XX Ctrl :W Esc zz Esc :wq Esc ZZ.
What is the effect of the -v option for the grep command? It enables color to highlight matching parts. It shows the command's version information. It only outputs non-matching lines. It changes the output order showing the last matching line first. It outputs all lines and prefixes matching lines with a+.
Which of the following signals is sent to a process when the key combination Ctrl+Z is pressed on the keyboard? SIGTERM SIGCONT SIGSTOP SIGKILL SIGINT.
Report abuse Consent Terms of use