Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

102-400 Exam Dumps - LPI Level 1 Exam 102 - Junior Level Linux Certification - Part 2 of 2

Question # 4

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Full Access
Question # 5

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Full Access
Question # 6

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

A.

New name servers may be added to the resolver configuration.

B.

Network interfaces may become active or inactive.

C.

The routing table may change.

D.

IP addresses may change.

E.

The system's host name may change.

Full Access
Question # 7

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Full Access
Question # 8

What is true about the file /etc/localtime?

A.

It is a plain text file containing a string such as Europe/Berlin.

B.

It is created and maintained by the NTP service based on the geolocation of the system's IP address.

C.

It is a symlink to /sys/device/clock/ltime and always contains the current local time.

D.

It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

Full Access
Question # 9

Which of the following steps prevents a user from obtaining an interactive login session?

A.

Run the command chsh -s /bin/false with the user name.

B.

Set the UID for the user to 0.

C.

Remove the user from the group staff.

D.

Add the user to /etc/noaccess.

E.

Create a .nologin file in the user's home directory.

Full Access
Question # 10

Which configuration file would be edited to change default options for the OpenSSH server?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/server

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_server

Full Access
Question # 11

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

A.

find /usr -uid 0 -perm +4000

B.

find -user root +mode +s /usr

C.

find -type suid -username root -d /usr

D.

find /usr -ls \*s\* -u root

E.

find /usr -suid -perm +4000

Full Access
Question # 12

What is true regarding the file ~/.forward?

A.

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Full Access
Question # 13

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Full Access
Question # 14

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 15

Which of the following commands shows the current color depth of the X Server?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access
Question # 16

How is a display manager started?

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Full Access
Question # 17

Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)

A.

Start and prepare the desktop environment for the user.

B.

Configure additional devices like new monitors or projectors when they are attached.

C.

Handle the login of a user.

D.

Lock the screen when the user was inactive for a configurable amount of time.

E.

Create an X11 configuration file for the current graphic devices and monitors.

Full Access
Question # 18

Which of the following is a valid IPv6 address?

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Full Access