Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

LPIC-1 Exam 102, Part 2 of 2, version 5.0 Question and Answers

LPIC-1 Exam 102, Part 2 of 2, version 5.0

Last Update Nov 30, 2025
Total Questions : 235

We are offering FREE 102-500 LPI exam questions. All you do is to just go and sign up. Give your details, prepare 102-500 free exam questions and then go for complete pool of LPIC-1 Exam 102, Part 2 of 2, version 5.0 test questions that will help you more.

102-500 pdf

102-500 PDF

$36.75  $104.99
102-500 Engine

102-500 Testing Engine

$43.75  $124.99
102-500 PDF + Engine

102-500 PDF + Testing Engine

$57.75  $164.99
Questions 1

What is the main difference between the batch and at commands?

Options:

A.  

The batch command will run multiple times.The at command will only run once.

B.  

The batch command will run when system load is low. The at command runs at a specific time.

C.  

The at command reads commands from standard input. The batch command requires a command line argument.

D.  

The at command e-mails results to the user. The batch command logs results to syslog.

Discussion 0
Questions 2

Which of the following commands can be used to convert text files in one character encoding to another character encoding?

Options:

A.  

cat

B.  

convert

C.  

dd

D.  

iconv

E.  

utf2utf

Discussion 0
Questions 3

Which command is used to add an empty group to the system? (Specify ONLY the command without any path or parameters.)

Options:

Discussion 0
Questions 4

Which of the following files assigns a user to its primary group?

Options:

A.  

/etc/pgroup

B.  

/etc/shadow

C.  

/etc/group

D.  

/etc/passwd

E.  

/etc/gshadow

Discussion 0
Questions 5

Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)?

Options:

A.  

export LANGUAGE="pt"

B.  

export MESSAGE="pt"

C.  

export UI_MESSAGES="pt"

D.  

export LC_MESSAGES="pt"

E.  

export ALL_MESSAGES="pt"

Discussion 0
Questions 6

In which file, if present, must all users be listed that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Options:

Discussion 0
Questions 7

Where are user specific crontabs stored?

Options:

A.  

In the database file /etc/crontab.db which is shared by all users.

B.  

As individual per-user files within /var/spool/cron.

C.  

As individual per-user files in /etc/cron.user.d.

D.  

In the .crontab file in the user's home directory.

E.  

In the file /var/cron/user-crontab which is shared by all users.

Discussion 0
Questions 8

Which of the following commands shows all active systemd timers?

Options:

A.  

systemctl-timer show

B.  

timectl list

C.  

systemctl –t

D.  

systemctl list-timers

E.  

timeq

Discussion 0
Questions 9

Which of the following tasks can the date command accomplish? (Choose two.)

Options:

A.  

Set the system’s date and time.

B.  

Set the system’s date but not the time.

C.  

Calculate the time span between two dates.

D.  

Print a calendar for a month or a year.

E.  

Display time in a specific format.

Discussion 0
Questions 10

Which of the following files is not read directly by a Bash login shell?

Options:

A.  

-/.bashrc

B.  

-/.bash_profile

C.  

-/.bash_login

D.  

-/.profile

E.  

/etc/profile

Discussion 0
Questions 11

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.  

The encrypted passwords are still subject to brute force attacks.

B.  

This is just for historical reasons.

C.  

There is other information in the file that needs to be kept secret.

D.  

The passwords can be decrypted by anyone with root access.

Discussion 0
Questions 12

What information related to a user account is modified using the change command?

Options:

A.  

Default ownership for new files

B.  

Group membership

C.  

Set of commands available to the user

D.  

Password expiry information

E.  

Default permissions for new files

Discussion 0
Questions 13

Which of the following commands can identify the PID od a process which opened a TCP port?

Options:

A.  

ptrace

B.  

strace

C.  

debug

D.  

lsof

E.  

nessus

Discussion 0
Questions 14

What is the conventional purpose of Linux UIDs that are lower than 100?

Options:

A.  

They are reserved for super user accounts.

B.  

They are reserved for the system admin accounts.

C.  

They are reserved for system accounts.

D.  

They are unused, aside from 0, because they are targets of exploits.

E.  

They are used to match with GIDs in grouping users.

Discussion 0
Questions 15

What is true about the file .profile in a user's home directory?

Options:

A.  

It must be executable.

B.  

It must call the binary of the login shell.

C.  

It must use a valid shell script syntax.

D.  

It must start with a shebang.

E.  

It must be readable for its owner only.

Discussion 0
Questions 16

Which of the following nmcli subcommands exist? (Choose two.)

Options:

A.  

nmcli ethernet

B.  

nmcli device

C.  

nmcli wifi

D.  

nmcli address

E.  

nmcli connection

Discussion 0
Questions 17

What output does the command seq 1 5 20 produce?

Options:

A.  

1

5

10

15

B.  

1

6

11

16

C.  

1

2

3

4

D.  

2

3

4

5

E.  

5

10

15

20

Discussion 0
Questions 18

How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?

Options:

A.  

6

B.  

14

C.  

30

D.  

62

E.  

126

Discussion 0
Questions 19

Which of the following statements about sytemd-journald are true? (Choose three.)

Options:

A.  

It is incompatible with syslog and cannot be installed on a system using regular syslog.

B.  

It only processes messages of systemd and not messages of any other tools.

C.  

It can pass log messages to syslog for further processing.

D.  

It maintains metadata such as _UID or _PID for each message.

E.  

It supports syslog facilities such as kern, user, and auth.

Discussion 0
Questions 20

In an xinetd configuration file, which attribute specifies the network address that will be used to provide the service?

Options:

Discussion 0
Questions 21

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

Options:

A.  

tcpd

B.  

inetd

C.  

fingerd

D.  

mountd

E.  

xinetd

Discussion 0
Questions 22

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

Options:

A.  

unset -v FOOBAR;./myscript

B.  

set -a FOOBAR="";./myscript

C.  

env -u FOOBAR./myscript

D.  

env -i FOOBAR./myscript

Discussion 0
Questions 23

Which of the following files, when existing, affect the behavior of the Bash shell? (Choose TWO correct answers.)

Options:

A.  

~/.bashconf

B.  

~/.bashrc

C.  

~/.bashdefaults

D.  

~/.bash_etc

E.  

~/.bash_profile

Discussion 0
Questions 24

What output will the following command sequence produce?

echo '1 2 3 4 5 6' | while read a b c; do

echo result: $c $b $a;

done

Options:

A.  

result: 3 4 5 6 2 1

B.  

result: 1 2 3 4 5 6

C.  

result: 6 5 4

D.  

result: 6 5 4 3 2 1

E.  

result: 3 2 1

Discussion 0
Questions 25

What output will the following command produce?

seq 1 5 20

Options:

A.  

1

6

1

1

1

6

B.  

1

5

10

15

C.  

1

2

3

4

D.  

2

3

4

5

E.  

5

10

15

20

Discussion 0
Questions 26

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

Options:

A.  

The user issuing the command must be in the group script.

B.  

The script file must be found in the $PATH.

C.  

The script file must have the executable permission bit set.

D.  

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.  

The file system on which the script resides must be mounted with the option scripts.

Discussion 0
Questions 27

Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?

Options:

A.  

SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;

B.  

SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;

C.  

COUNT(SELECT order_type FROM orders);

D.  

SELECT COUNT(*) FROM orders ORDER BY order_type;

E.  

SELECT AUTO_COUNT FROM orders COUNT order_type;

Discussion 0
Questions 28

Which of the following configuration files should be modified to set default shell variables for all users?

Options:

A.  

/etc/bashrc

B.  

/etc/profile

C.  

~/.bash_profile

D.  

/etc/.bashrc

Discussion 0
Questions 29

What is the purpose of the file /etc/profile?

Options:

A.  

It contains the welcome message that is displayed after login.

B.  

It contains security profiles defining which users are allowed to log in.

C.  

It contains environment variables that are set when a user logs in.

D.  

It contains default application profiles for users that run an application for the first time.

Discussion 0
Questions 30

Which of the following is the best way to list all defined shell variables?

Options:

A.  

env

B.  

set

C.  

env -a

D.  

echo $ENV

Discussion 0
Questions 31

What benefit does an alias in bash provide?

Options:

A.  

It provides faster lookups for commands in the system directory.

B.  

It creates a local copy of a file from another directory.

C.  

It hides what command you are running from others.

D.  

It allows a string to be substituted for the first word of a simple command.

Discussion 0
Questions 32

What is the difference between the commands test -e path and test -f path?

Options:

A.  

They are equivalent options with the same behaviour.

B.  

The -f option tests for a regular file. The -e option tests for an empty file.

C.  

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.  

The -f option tests for a regular file. The -e option tests for an executable file.

Discussion 0
Questions 33

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Options:

Discussion 0
Questions 34

When the command echo $ outputs 1, which of the following statements is true?

Options:

A.  

It is the process ID of the echo command.

B.  

It is the process ID of the current shell.

C.  

It is the exit value of the command executed immediately before echo.

D.  

It is the exit value of the echo command.

Discussion 0
Questions 35

Which of the following details is NOT provided in any output from the netstat utility?

Options:

A.  

broadcast services

B.  

interface statistics

C.  

masquerading connections

D.  

network connections

E.  

routing tables

Discussion 0
Questions 36

What is true regarding a default route?

Options:

A.  

The default route is always used first. When the default route is not available more specific routes are tried.

B.  

When a default route is set, all other routes are disabled until the default route is deleted.

C.  

The default route is only used if there is not a more specific route to a destination host or network.

D.  

Without a default route, no network communication even in directly attached networks is possible.

Discussion 0
Questions 37

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

Options:

A.  

dnsq

B.  

dig

C.  

hostname

D.  

dnslookup

E.  

zoneinfo

Discussion 0
Questions 38

Given the following routing table:

How would an outgoing packet to the destination 192.168.2.150 be handled?

Options:

A.  

It would be passed to the default router 192.168.178.1 on wlan0.

B.  

It would be directly transmitted on the device eth0.

C.  

It would be passed to the default router 255.255.255.0 on eth0.

D.  

It would be directly transmitted on the device wlan0.

E.  

It would be passed to the router 192.168.1.1 on eth0.

Discussion 0
Questions 39

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

Options:

A.  

ifconfig

B.  

dig

C.  

netstat

D.  

route

E.  

trackroute

Discussion 0
Questions 40

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)

Options:

A.  

2001:db8::15 www.example.com www

B.  

www.example.com www 203.0.13.15

C.  

203.0.113.15 www.example.com www

D.  

www.example.com,www 203.0.13.15,2001:db8::15

E.  

2003.0.113.15,2001:db8::15 www.example.com www

Discussion 0
Questions 41

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

Options:

A.  

Set a network interface active or inactive.

B.  

Specify the kernel module to be used with a network interface.

C.  

Allow regular users to change the network configuration of a network interface.

D.  

Change the netmask used on a network interface.

E.  

Specify which network services are available on a network interface.

Discussion 0
Questions 42

What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)

Options:

A.  

route del default

B.  

ifconfig unset default

C.  

netstat -r default

D.  

ip route del default

E.  

sysctl ipv4.default_gw=0

Discussion 0
Questions 43

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Options:

Discussion 0
Questions 44

Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)

Options:

A.  

New name servers may be added to the resolver configuration.

B.  

Network interfaces may become active or inactive.

C.  

The routing table may change.

D.  

IP addresses may change.

E.  

The system's host name may change.

Discussion 0
Questions 45

Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.)

Options:

A.  

substitute

B.  

nameserver

C.  

search

D.  

lookup

E.  

method

Discussion 0
Questions 46

What is true regarding the command sendmail?

Options:

A.  

With any MTA, the sendmail command must be run periodically by the cron daemon.

B.  

All MTAs, including Postfix and Exim, provide a sendmail command.

C.  

The sendmail command prints the MTAs queue history of which mails have been sent successfully.

D.  

It is only available when the sendmail MTA is installed.

Discussion 0
Questions 47

Please specify the top directory containing the configuration files for the CUPS printing system. (Specify the full path to the directory.)

Options:

Discussion 0
Questions 48

What command should be used to print a listing of email in the system's mail queue?

Options:

A.  

lpq

B.  

mailq

C.  

mlq

D.  

sendmail –l

Discussion 0
Questions 49

What is pool.ntp.org?

Options:

A.  

A deprecated feature for maintaining system time in the Linux kernel

B.  

A website which provides binary and source packages for the OpenNTPD project

C.  

A virtual cluster of various timeservers

D.  

A community website used to discuss the localization of Linux

Discussion 0
Questions 50

Which file inside the CUPS configuration directory contains the definition of the printers?

Options:

A.  

cups-devices.conf

B.  

snmp.conf

C.  

printcap.conf

D.  

printers.conf

E.  

cupsd.conf

Discussion 0
Questions 51

After adding a new email alias to the configuration, which command must be run in order to ensure the MTA knows about it? (Specify the command without any path but including all required parameters.)

Options:

Discussion 0
Questions 52

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Options:

Discussion 0
Questions 53

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Options:

Discussion 0
Questions 54

What is true regarding the file ~/.forward?

Options:

A.  

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.  

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.  

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.  

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Discussion 0
Questions 55

Which of the following is observed and corrected by a NTP client?

Options:

A.  

The skew in time between the system clock and the hardware clock.

B.  

The skew in time between the system clock and the reference clock.

C.  

Changes in the time zone of the current computer's location.

D.  

Adjustments needed to support Daylight Saving Time.

Discussion 0
Questions 56

On a dual boot system, every time the system is booted back into Linux the time has been set backward by one day. Which of the following commands will correct the problem?

Options:

A.  

date -d '+ 1 day'

B.  

hwclock --systohc --localtime

C.  

ntpdate pool.ntp.org

D.  

time hwclock

Discussion 0
Questions 57

Which of the following are syslog facilities? (Choose TWO correct answers.)

Options:

A.  

local5

B.  

mail

C.  

advanced

D.  

postmaster

E.  

remote

Discussion 0
Questions 58

On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are _________.

Options:

A.  

-rw-r-----, -r--------

B.  

-rw-r--r--, -r--r--r--

C.  

-rw-r--r--, -r--------

D.  

-rw-r--rw-, -r-----r--

E.  

-rw-------, -r--------

Discussion 0
Questions 59

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Options:

A.  

Without additional configuration, no users may have user specific crontabs.

B.  

Without additional configuration, all users may have user specific crontabs.

C.  

The cron daemon will refuse to start and report missing files in the system's logfile.

D.  

When a user creates a user specific crontab the system administrator must approve it explicitly.

Discussion 0
Questions 60

What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.)

Options:

A.  

The user bob is removed from the system's user database.

B.  

The user bob's home directory is removed.

C.  

The locate database is updated to drop files owned by bob.

D.  

All files owned by bob are remove from all mounted filesystems.

E.  

In case bob was the last member of a group, that group is deleted.

Discussion 0
Questions 61

Which of the following commands shows the current color depth of the X Server?

Options:

A.  

xcd

B.  

xcdepth

C.  

xwininfo

D.  

xcolordepth

E.  

cat /etc/X11

Discussion 0
Questions 62

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Options:

Discussion 0
Questions 63

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

Options:

A.  

/etc/X11/xdm/Xsetup

B.  

/etc/X11/xdm.conf

C.  

/etc/X11/xdm/Defaults

D.  

/etc/X11/defaults.conf

Discussion 0
Questions 64

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Options:

Discussion 0
Questions 65

An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.

Options:

Discussion 0
Questions 66

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

Options:

A.  

It is placed in curly brackets as in Section SectionName { ... }.

B.  

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.  

It is placed between the tags

and

D.  

It is placed after the row [SectionName].

E.  

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Discussion 0
Questions 67

What is the purpose of the Sticky Keys feature in X?

Options:

A.  

To assist users who have difficulty holding down multiple keys at once

B.  

To prevent repeated input of a single character if the key is held down

C.  

To ignore brief keystrokes according to a specified time limit

D.  

To repeat the input of a single character

Discussion 0
Questions 68

How is a display manager started?

Options:

A.  

It is started by a user using the command startx.

B.  

It is started like any other system service by the init system.

C.  

It is started by inetd when a remote hosts connects to the X11 port.

D.  

It is started automatically when a X11 user logs in to the system console.

Discussion 0
Questions 69

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Options:

Discussion 0
Questions 70

Which file used by XDM specifies the default wallpaper?

Options:

A.  

/etc/X11/xdm/Xsetup

B.  

/etc/X11/xdm.conf

C.  

/etc/X11/xdm/Defaults

D.  

/etc/X11/defaults.conf

Discussion 0