Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

LFCS Exam Dumps - Linux Foundation Certified System Administrator

Question # 4

Which of the following files, located in the user home directory, is used to store the Bash history?

A.

.bash_history

B.

.bash_histfile

C.

.history

D.

.bashrc_history

E.

.history_bash

Full Access
Question # 5

Which grep command will print only the lines that do not end with a / in the file foo?

A.

grep '/$' foo

B.

grep '/#' foo

C.

grep -v '/$' foo

D.

grep -v '/#' foo

Full Access
Question # 6

Which signal is missing from the following command that is commonly used to instruct adaemon to reinitialize itself, including reading configuration files?

killall -s _______ daemon

Full Access
Question # 7

What happens after issuing the command vi without any additional parameters?

A.

vi starts and loads the last file used and moves the cursor to the position where vi was when it last exited.

B.

vi starts and requires the user to explicitly either create a new or load an existing file.

C.

vi exits with an error message as it cannot be invoked without a file name to operate on.

D.

vi starts in command mode and opens a new empty file.

E.

vi starts and opens a new file which is filled with the content of the vi buffer if the buffer contains text.

Full Access
Question # 8

Which file contains the date of the last change of a user's password?

A.

/etc/gshadow

B.

/etc/passwd

C.

/etc/pwdlog

D.

/etc/shadow

E.

/var/log/shadow

Full Access
Question # 9

Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 10

Which of the following commands can be used to extract content from a tar file?

A.

tar -xvf

B.

tar -vf

C.

tar -e

D.

tar -c

E.

tar–v

Full Access
Question # 11

After moving data to a new filesystem, how can the former path of the data be kept intact in order to avoid reconfiguration of existing applications? (Choose TWO correct answers.)

A.

By creating an ACL redirection from the old to the new path of the data.

B.

By creating a hard link from the old to the new path of the data.

C.

By creating a symbolic link from the old to the new path of the data.

D.

By running the command touch on the old path.

E.

By mounting the new filesystem on the original path of the data.

Full Access
Question # 12

What is the output of the following command?

for token in a b c; do

echo -n ${token};

done

A.

anbncn

B.

abc

C.

$token$token$token

D.

{a}{b}{c}

E.

a b c

Full Access
Question # 13

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Full Access
Question # 14

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Full Access
Question # 15

When starting a program with the nice command without any additional parameters, which nice level is set for the resulting process?

A.

-10

B.

0

C.

10

D.

20

Full Access
Question # 16

Which of the following commands will write a message to the terminals of all logged in users?

A.

bcast

B.

mesg

C.

print

D.

wall

E.

yell

Full Access
Question # 17

Creating a hard link to an ordinary file returns an error. What could be the reason for this?

A.

The source file is hidden.

B.

The source file is read-only.

C.

The source file is a shell script.

D.

The source file is already a hard link.

E.

The source and the target are on different filesystems.

Full Access
Question # 18

Which of the following are valid stream redirection operators within Bash? (Choose THREE correct answers.)

A.

<

B.

<<<

C.

>

D.

>>>

E.

%>

Full Access
Question # 19

How many IP-addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/28? (Specify the number only without any additional information.)

Full Access
Question # 20

Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?

A.

/etc/keys

B.

/proc/keys

C.

/etc/inittab

D.

/proc/inittab

E.

/etc/reboot

Full Access
Question # 21

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Full Access
Question # 22

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Full Access
Question # 23

Which command is used in a Linux environment to create a new directory? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 24

Which of the following commands can be used to locate programs and their corresponding man pages and configuration files?

A.

dirname

B.

which

C.

basename

D.

query

E.

whereis

Full Access
Question # 25

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Full Access
Question # 26

To prevent a specific user from scheduling tasks with at, what should the administrator do?

A.

Add the specific user to /etc/at.allow file.

B.

Add the specific user to [deny] section in the /etc/atd.conf file.

C.

Add the specific user to /etc/at.deny file.

D.

Add the specific user to nojobs group.

E.

Run the following: atd --deny [user].

Full Access
Question # 27

Which of the followingcommand sets the Bash variable named TEST with the content FOO?

A.

set TEST="FOO"

B.

TEST = "FOO"

C.

var TEST="FOO"

D.

TEST="FOO"

Full Access
Question # 28

Which utility would be used to change how often a filesystem check is performed on an ext2 filesystem without losing any data stored on that filesystem?

A.

mod2fs

B.

fsck

C.

tune2fs

D.

mke2fs

E.

fixe2fs

Full Access
Question # 29

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Full Access
Question # 30

Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, which single character command will insert the deleted content below the current line?

A.

i (lowercase)

B.

P (uppercase)

C.

p (lowercase)

D.

U (uppercase)

E.

u (lowercase)

Full Access
Question # 31

Which of the following commands will print the last 10 lines of a text file to the standard output?

A.

cat -n 10 filename

B.

dump -n 10 filename

C.

head -n 10 filename

D.

tail -n 10 filename

Full Access
Question # 32

What does the exit status 0 indicate about a process?

A.

The process ended without any problems.

B.

The process was terminated by the user.

C.

The process couldn't finish correctly.

D.

The process waited for an input but got none.

E.

The process finished in time.

Full Access
Question # 33

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 34

Which of the following commands lists all currently installedpackages when using RPM package management?

A.

yum --query --all

B.

yum --list --installed

C.

rpm --query --all

D.

rpm --list –installed

Full Access
Question # 35

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Full Access
Question # 36

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 37

Given a file called birthdays containing lines like:

YYYY-MM-DD Name

1983-06-02 Tim

1995-12-17 Sue

Which command would you use to output the lines belonging to all people listed whose birthday is in May or June?

A.

grep '[56]' birthdays

B.

grep 05?6? birthdays

C.

grep '[0-9]*-0[56]-' birthdays

D.

grep 06 birthdays | grep 05

Full Access
Question # 38

What is the maximum niceness value that a regular user can assign to a process with the nice command when executinga new process?

A.

9

B.

19

C.

49

D.

99

Full Access
Question # 39

Which of the following characters can be combined with a separator string in order to read from the current input source until the separator string, which is on a separate line and withoutany trailing spaces, is reached?

A.

<<

B.

<|

C.

!<

D.

&<

Full Access