Coursaly

LPI 101-500 LPIC-1 Linux Administrator Certify Practice Exam

Recent Courses

Sample Questions:

Which of the following commands lists the dependencies of a given dpkg package?

apt-cache depends-onpackage

apt-cache dependencies package

apt-cache depends package

apt-cache requires package

Which of the following commands can be used to download the RPM package kernel without installing it?

yum download –no-install kernel

yumdownloader kernel

rpm –download –package kernel

rpmdownload kernel

Given a log file loga.log with timestamps of the format DD/MM/YYYY:hh:mm:ss, which command filters out all log entries in the time period between 8:00 am and 8:59 am?

grep ­E `:08:[09]+:[09]+’ loga.log

grep ­E `:08:[00]+’ loga.log

grep ­E loga.log `:08:[0-9]+:[0-9]+’

grep loga.log `:08:[0-9]:[0-9]’

grep ­E `:08:[0-9]+:[0-9]+’ loga.log

Which of the following is true when a file system, which is neither listed in /etc/fstab nor known to system, is mounted manually?

systemd ignores any manual mounts which are not done using the systemctl mount command

The command systemctl mountsync can be used to create a mount unit based on the existing mount

systemd automatically generates a mount unit and monitors the mount point without changing it

Unless a systemd mount unit is created, systemd unmounts the file system after a short period of time

systemctl unmount must be used to remove the mount because system opens a file descriptor on the mount point

A faulty kernel module is causing issues with a network interface card. Which of the following actions ensures that this module is not loaded automatically when the system boots?

Using lsmod –remove –autoclean without specifying the name of a specific module

Using modinfo ­k followed by the name of the offending module

Using modprobe ­r followed by the name of the offending module

Adding a blacklist line including the name of the offending module to the file /etc/modprobe.d/blacklist.conf

Deleting the kernel module’s directory from the file system and recompiling the kernel, including its modules

In Bash, inserting 2>&1 after a command redirects:

standard error to standard input.

standard input to standard error.

standard output to standard error.

standard error to standard output.

standard outputto standard input.

After moving data to a new filesystem, how can the former path of the data be kept intact in order to avoid reconfiguration of existing applications? (Choose TWO correct answers.)

By creating an ACL redirection from the old to the new path of the data.

By creatinga hard link from the old to the new path of the data.

By creating a symbolic link from the old to the new path of the data.

By running the command touch on the old path.

By mounting the new filesystem on the original path of the data.

What is the purpose of the Filesystem Hierarchy Standard?

It is a security model used to ensurefiles are organized according to their permissions and accessibility.

It provides unified tools to create, maintain and manage multiple filesystems in a common way.

It defines a common internal structure of inodes for all compliant filesystems.

Itis a distribution neutral description of locations of files and directories.

 

 

 

 

GET ON UDEMY
Tags :
Share This :

Leave a Reply

Your email address will not be published. Required fields are marked *