CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 4

Which of the following is the purpose of the dig command?


Options are :

  • To adjust a directory's hidden permissions
  • To perform hostname lookups
  • To search for files on the filesystem
  • To adjust a file's hidden permissions

Answer : To perform hostname lookups

Which of the following is NOT contained in the locale setting of the operating system?


Options are :

  • Currency symbol
  • .Language
  • Thousands separator
  • Timezone

Answer : Timezone

The legacy program for sending files to the printer queues from the command line is which of the following?


Options are :

  • lpr
  • lpq
  • lpp
  • lpd

Answer : lpr

Which of the following SQL statements will select the fields name and address from the contacts table?


Options are :

  • SELECT name, address FROM contacts;
  • SELECT (name, address) FROM contacts;
  • SELECT name address FROM contacts;
  • SELECT (name address) FROM contacts;

Answer : SELECT name, address FROM contacts;

Which of the following configuration files would an administrator edit to change default options for outbound ssh sessions?


Options are :

  • /etc/ssh/ssh_config
  • /etc/ssh/client
  • /etc/ssh/ssh
  • /etc/ssh/sshd_config

Answer : /etc/ssh/ssh_config

Which of the following bash options will prevent an administrator from overwriting a file with a ">"?


Options are :

  • set -o noglob
  • set -o safe
  • set -o noclobber
  • set -o append

Answer : set -o noclobber

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 1

The files in the /etc/skel directory are used by the:


Options are :

  • useradd command
  • passwd command
  • pwunconv command
  • pwconv command

Answer : useradd command

Which of the following commands will set the local machine's timezone to UTC?


Options are :

  • ln -s /usr/share/zoneinfo/UTC /etc/localtime
  • date --timezone=UTC
  • mv /usr/timezone/UTC /etc
  • cat UTC > /etc/timezone

Answer : ln -s /usr/share/zoneinfo/UTC /etc/localtime

Which of the following bash option will prevent an administrator from overwriting a file with a ">"?


Options are :

  • set -o append
  • set -o noclobber
  • set -o noglob
  • set -o safe

Answer : set -o noclobber

Which of the following is NOT a Mail Transport Agent?


Options are :

  • sendmail
  • postfix
  • exim
  • qmail
  • mail

Answer : mail

On a dual boot system, every time the system is booted back into Linux the time has been set backward by two hours. Which of the following commands will correct the problem so it will not occur again?


Options are :

  • hwclock --hctosys --localtime
  • ntpdate pool.ntp.org
  • time hwclock
  • date -d 'two hours'

Answer : hwclock --hctosys --localtime

A senior executive asked an administrator to change the default background of the executive machine, which uses XDM. Which of the following filesA senior executive asked an administrator to change the default background of the executive? machine, which uses XDM. Which of the following files would the administrator edit to achieve this?


Options are :

  • /etc/X11/xdm/Xsetup
  • /etc/X11/xdm/Defaults
  • /etc/X11/xdm.conf
  • /etc/X11/defaults.conf

Answer : /etc/X11/xdm/Xsetup

Which of the following lines would an administrator find in the file /etc/resolv.conf?


Options are :

  • order hosts,bind
  • domain mycompany.com
  • hosts: files,dns
  • 192.168.168.4 dns-server

Answer : domain mycompany.com

Each entry in a crontab must end with which of the following characters?


Options are :

  • tab
  • space
  • newline
  • backslash

Answer : newline

220-701 A+ Essentials Certification Practice Exam Set 1

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Select THREE)


Options are :

  • procmail
  • sendmail
  • postfix
  • exim

Answer : sendmail postfix exim

Which of the following commands can be used to activate a specific network interface?


Options are :

  • ifup
  • ipup
  • net
  • netup

Answer : ifup

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?


Options are :

  • The encrypted passwords are still subject to brute force attacks.
  • The passwords can be decrypted by anyone with root access
  • There is other information in the file that needs to be kept secret
  • This is just for historical reasons.

Answer : The encrypted passwords are still subject to brute force attacks.

Which of the following characters in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?


Options are :

  • -
  • s
  • *
  • x

Answer : x

Of the ways listed, which is the best way to temporarily suspend a single user's ability to interactively login?


Options are :

  • Use chage to expire the user account
  • Change the user's password
  • Change the user name in /etc/passwd.
  • Add the user name to /etc/nologin

Answer : Use chage to expire the user account

An administrator is looking into a new script that they have just received from a senior administrator. In the very first line the administrator notices a #! followed by a path to a binary. Linux will:


Options are :

  • ignore the script.
  • be replaced by that binary.
  • use that binary to compile the script.
  • use that binary to interpret the script.

Answer : use that binary to interpret the script.

220-701 A+ Essentials Certification Practice Exam Set 10

Which crontab entry could be used to set the system time at regular intervals?


Options are :

  • 1 0 * * * ntpdate ntp1.digex.net
  • 1 0 * * * runcron date ntp1.digex.net
  • 1 0 * * * date $d $t $24
  • 1 0 * * * date ntp1.digex.net

Answer : 1 0 * * * ntpdate ntp1.digex.net

Which of the following commands should be used to print a listing of emails in the system's mail queue?


Options are :

  • mailq
  • sendmail -l
  • mlq
  • lpq

Answer : mailq

Which of the following outputs will the command seq 10 produce?


Options are :

  • A continuous stream of numbers increasing in increments of 10 until stopped.
  • The number 10 to standard output.
  • The numbers 1 through 10 with one number per line.
  • The numbers 0 though 9 with one number per line

Answer : The numbers 1 through 10 with one number per line.

Which of the following commands can be used to convert text files in one character encoding to another character encoding?


Options are :

  • dd
  • cat
  • iconv
  • convert

Answer : iconv

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?


Options are :

  • hostname/displaynumber
  • hostname:displaynumber
  • hostname/displayname
  • hostname:displayname

Answer : hostname:displaynumber

Which of the following commands can be used to change a user's account aging information? (Select THREE).


Options are :

  • chattr
  • chage
  • usermod
  • passwd

Answer : chage usermod passwd

220-701 A+ Essentials Certification Practice Exam Set 11

A department decided to change the Gnome Display Manager's greeting. Which of the following configuration files should an administrator edit?


Options are :

  • /etc/X11/gdm/Init/Default
  • /opt/gnome/share/greeting
  • /etc/X11/gmd.conf
  • /etc/gnome/greeting

Answer : /etc/X11/gdm/Init/Default

Which of the following files, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?


Options are :

  • /etc/alias
  • /etc/mail/forwarders
  • ~/.forward
  • ~/.alias

Answer : ~/.forward

Which of the following is the purpose of the Sticky Keys feature in X?


Options are :

  • To assist users who have difficulty holding down multiple keys at once
  • To prevent repeated input of a single character if the key is held down
  • To repeat the input of a single character
  • To ignore brief keystrokes according to a specified time limit

Answer : To assist users who have difficulty holding down multiple keys at once

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions