CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 1

Which of the following lines would an administrator find in the file /etc/nsswitch.conf?


Options are :

  • 192.168.168.4 dns-server
  • hosts: files dns
  • domain mycompany.com
  • order hosts,bind

Answer : hosts: files dns

Which of the following outputs will the below command produce? seq 1 5 20


Options are :

  • 2 3 4 5
  • 1 6 11 16
  • 1 2 3 4
  • 1 5 10 15

Answer : 1 6 11 16

Which of the following is the conventional purpose of Linux UIDs that are lower than 100?


Options are :

  • They are unused, aside from 0, because they are targets of exploits.
  • They are reserved for the system admin accounts.
  • They are reserved for super user accounts.
  • They are reserved for system accounts

Answer : They are reserved for system accounts

Which of the following is the BEST way to temporarily suspend a user's ability to interactively login?


Options are :

  • Changing the user's password.
  • Changing the user's shell to /bin/false.
  • Changing the user's UID.
  • Removing the user's entry in /etc/passwd.

Answer : Changing the user's shell to /bin/false.

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 7

An administrator has just set up the X Display Manager as the default display manager. Which of the following files should be edited to change the default background for it?


Options are :

  • /etc/X11/xorg.conf
  • /etc/X11/prefdm
  • /etc/X11/xdm.conf
  • /etc/X11/xdm/Xsetup

Answer : /etc/X11/xdm/Xsetup

An administrator is running an email server configured with the default settings. In which directory will the administrator commonly find the delivered mail for the user foo?


Options are :

  • /var/mail/spool
  • /home/foo/mail
  • /var/users/mail
  • /var/spool/mail

Answer : /var/spool/mail

For accessibility assistance, which of the following programs is an on-screen keyboard?


Options are :

  • xOSK
  • GOK
  • xkb
  • atkb

Answer : GOK

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?


Options are :

  • Change the user's password.
  • Use chage to expire the user account
  • Add the command exit to the user's .login file.
  • Use passwd -d username to give the user an empty password.

Answer : Use chage to expire the user account

Which of the following commands is used to display user resource limits?


Options are :

  • ulimit
  • .uname
  • usrlmt
  • .limit -a

Answer : ulimit

On a system running the K Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?


Options are :

  • When a user's X session exists
  • When KDM starts
  • When KDM crashes
  • When X is restarted

Answer : When a user's X session exists

CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 2

Which of the following crontab entries could be used to set the system time at regular intervals?


Options are :

  • 1 0 * * * settime $d $t $24
  • 1 0 * * * date $d $t $24
  • 1 0 * * * /usr/sbin/runcron date
  • 1 0 * * * /usr/sbin/ntpdate ntp1.digex.net > /dev/null 2>&1
  • 1 0 * * * date

Answer : 1 0 * * * /usr/sbin/ntpdate ntp1.digex.net > /dev/null 2>&1

Which of the following statements are true regarding the below syslog.conf configuration directive? (Select THREE) *.err;kern.notice;auth.notice /dev/console


Options are :

  • Severity notice messages from the auth facility will be directed to /dev/console
  • Severity err messages from the mail facility will be directed /dev/console
  • Severity crit messages from all facilities will be directed to /dev/console
  • Severity notice messages from the kern facility will be directed to /dev/console

Answer : Severity notice messages from the auth facility will be directed to /dev/console Severity err messages from the mail facility will be directed /dev/console Severity notice messages from the kern facility will be directed to /dev/console

Which of the folloli>this script provides identical functionality as the file at that location.
  • the program at that location will be used to process the script.
  • the file at that location was used to make the script.
  • this script will self-extract into a file at that location.
  • Answer : the program at that location will be used to process the script.

    When using ssh, which of the following can an administrator do to recover a lost passphrase for a DSA or RSA authentication key?


    Options are :

    • Decrypt the authentication key with gpg.
    • Run the ssh --recover command.
    • A lost passphrase cannot be recovered
    • Run the ssh-keygen command

    Answer : A lost passphrase cannot be recovered

    Which of the following entries can an administrator add to syslog.conf file to have all syslog messages generated by the administrator system go file to have all syslog messages generated by the administrator? system go to virtual console 12?


    Options are :

    • syslog tty12
    • /var/log/messages | /dev/tty12
    • | /dev/tty12
    • *.* /dev/tty12

    Answer : *.* /dev/tty12

    CompTIA SY0-401 Security Certification Practice Exam Set 6

    Which of the following commands can an administrator use to change a user's password expiry information? (Select THREE).


    Options are :

    • chattr
    • passwd
    • chage
    • usermod

    Answer : passwd chage usermod

    Why is the xhost program considered dangerous to use?


    Options are :

    • It logs sensitive information to syslog
    • It allows easy access to your X server by other users.
    • It makes it difficult to uniquely identify a computer on the network.
    • It makes your computer share network resources without any authentication.

    Answer : It allows easy access to your X server by other users.

    Which of the following describes the Linux ping packet or datagram?


    Options are :

    • ICMP packet with a payload
    • ICMP packet with a message type
    • UDP datagram with a protocol type
    • IP packet with a packet type

    Answer : ICMP packet with a message type

    To test a shell script called myscript, the environment variable FOOBAR must be removed temporarily. How can this be done?


    Options are :

    • env -i FOOBAR myscript
    • unset -v FOOBAR
    • env -u FOOBAR myscript
    • set -a FOOBAR=""

    Answer : env -u FOOBAR myscript

    In the following command and its output, echo $$ 12942 which of the following is 12942?


    Options are :

    • The process ID of the current shell.
    • The process ID of the last command executed.
    • The process ID of the echo command.
    • The process ID of the last backgrounded command

    Answer : The process ID of the current shell.

    In xorg.conf, which of the following sections is concerned with fonts?


    Options are :

    • The Graphics section
    • The Files section
    • The xfsCodes section
    • The Fonts section

    Answer : The Files section

    Which of the following is pool.ntp.org?


    Options are :

    • A virtual cluster of various timeservers.
    • A website which provides binary and source packages for the OpenNTPD project
    • A deprecated feature for maintaining system time in the Linux kernel.
    • A community website used to discuss the localization of Linux.

    Answer : A virtual cluster of various timeservers.

    Which of the following benefits does an alias provide?


    Options are :

    • It prevents having to type long commands
    • It provides faster lookups for commands.
    • It hides from others the command that is being run.
    • It creates a local copy of a file from another directory.

    Answer : It prevents having to type long commands

    CompTIA MB0-001 Mobility+ Certification Practice Exam Set 6

    On a system using shadowed passwords, the correct permissions for /etc/passwd are ___ and the correct permissions for /etc/shadow are ___.


    Options are :

    • -rw-r--r--, -r--------
    • -rw-r--rw-, -r-----r--
    • -rw-r--r--, -r--r--r--
    • -rw-r-----, -r--------

    Answer : -rw-r--r--, -r--------

    What is NTP?


    Options are :

    • A protocol and system for maintaining time on computers
    • A simple tunneling protocol for computers behind firewalls.
    • A more secure protocol replacement for FTP.
    • A routing aid for finding next hops on a network.

    Answer : A protocol and system for maintaining time on computers

    Which of the following is the BEST way to list all defined shell variables?


    Options are :

    • set
    • env -a
    • echo $ENV
    • env

    Answer : set

    The legacy program, provided by CUPS for sending files to the printer queues on the command line is:


    Options are :

    • lpd
    • lpq
    • lpr
    • lpp

    Answer : lpr

    Which of the following Class B IPv4 networks are reserved by IANA for private address assignment and private routing? (Select TWO).


    Options are :

    • 172.20.0.0
    • 169.16.0.0
    • 128.0.0.0
    • 172.16.0.0
    • 169.254.0.0

    Answer : 172.20.0.0 172.16.0.0

    Which of the following words is used to restrict the records that are returned from a SELECT query based on supplied criteria for the values in the records?


    Options are :

    • FROM
    • IF
    • LIMIT
    • WHERE

    Answer : WHERE

    CompTIA N10-004 Network+ Certification Practice Test Set 5

    Comment / Suggestion Section
    Point our Mistakes and Post Your Suggestions