Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

LPI Level 1 Exam 102, Junior Level Linux Certification, Part 2 of 2 Question and Answers

LPI Level 1 Exam 102, Junior Level Linux Certification, Part 2 of 2

Last Update May 18, 2024
Total Questions : 120

We are offering FREE 102-400 LPI exam questions. All you do is to just go and sign up. Give your details, prepare 102-400 free exam questions and then go for complete pool of LPI Level 1 Exam 102, Junior Level Linux Certification, Part 2 of 2 test questions that will help you more.

102-400 pdf

102-400 PDF

$35  $99.99
102-400 Engine

102-400 Testing Engine

$42  $119.99
102-400 PDF + Engine

102-400 PDF + Testing Engine

$56  $159.99
Questions 1

What is the purpose of a screen reader?

Options:

A.  

It reads text displayed on the screen to blind or visually impaired people.

B.  

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.  

It displays lines and markers to help people use speed reading techniques.

D.  

It manages and displays files that contain e-books.

Discussion 0
Questions 2

For accessibility assistance, which of the following programs is an on-screen keyboard?

Options:

A.  

xkb

B.  

atkb

C.  

GOK

D.  

xOSK

Discussion 0
Questions 3

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Discussion 0
Questions 4

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?

Options:

A.  

lpd

B.  

lpp

C.  

lpq

D.  

lpr

Discussion 0
Questions 5

Why is the correct configuration of a system's time zone important?

Options:

A.  

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.  

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.  

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.  

Because NTP chooses servers nearby based on the configured time zone.

Discussion 0
Questions 6

What is true regarding the file ~/.forward?

Options:

A.  

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.  

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.  

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.  

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Discussion 0
Questions 7

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)

Options:

Discussion 0
Questions 8

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Options:

Discussion 0
Questions 9

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Options:

Discussion 0
Questions 10

What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)

Options:

A.  

route del default

B.  

ifconfig unset default

C.  

netstat -r default

D.  

ip route del default

E.  

sysctl ipv4.default_gw=0

Discussion 0
Questions 11

Which of the following details is NOT provided in any output from the netstat utility?

Options:

A.  

broadcast services

B.  

interface statistics

C.  

masquerading connections

D.  

network connections

E.  

routing tables

Discussion 0
Questions 12

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Discussion 0
Questions 13

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Options:

A.  

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.  

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.  

COUNT(SELECT order_type FROM orders);

D.  

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.  

SELECT AUTO_COUNT FROM orders COUNT order_type;

Discussion 0
Questions 14

Which of the following commands lists all defined variables and functions within Bash?

Options:

A.  

env

B.  

set

C.  

env -a

D.  

echo $ENV

Discussion 0
Questions 15

What is the difference between the commands test -e path and test -f path?

Options:

A.  

They are equivalent options with the same behaviour.

B.  

The -f option tests for a regular file. The -e option tests for an empty file.

C.  

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.  

The -f option tests for a regular file. The -e option tests for an executable file.

Discussion 0
Questions 16

To prevent a specific user from scheduling tasks with at, what should the administrator do?

Options:

A.  

Add the specific user to /etc/at.allow file.

B.  

Add the specific user to [deny] section in the /etc/atd.conf file.

C.  

Add the specific user to /etc/at.deny file.

D.  

Add the specific user to nojobs group.

E.  

Run the following: atd --deny [user].

Discussion 0
Questions 17

Where are user specific crontabs stored?

Options:

A.  

In the database file /etc/crontab.db which is shared by all users.

B.  

As individual per-user files within /var/spool/cron.

C.  

As individual per-user files in /etc/cron.user.d.

D.  

In the .crontab file in the user's home directory.

E.  

In the file /var/cron/user-crontab which is shared by all users.

Discussion 0
Questions 18

Which of the following steps prevents a user from obtaining an interactive login session?

Options:

A.  

Run the command chsh -s /bin/false with the user name.

B.  

Set the UID for the user to 0.

C.  

Remove the user from the group staff.

D.  

Add the user to /etc/noaccess.

E.  

Create a .nologin file in the user's home directory.

Discussion 0