LX0-104 CompTIA Linux+ [Powered by LPI] Exam Set 4

What is true about the file /etc/localtime?


Options are :

  • It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin. (Correct)
  • It is created and maintained by the NTP service based on the geolocation of the system's IP address.
  • It is a symlink to /sys/device/clock/ltime and always contains the current local time.
  • It is a plain text file containing a string such as Europe/Berlin.

Answer : It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

When issuing the command ifconfig eth0 192.168.1.20/24 up, which of the following happens? (Choose TWO correct answers.)


Options are :

  • 192.168.1.1 is probed for router functionality and, in case of success, it is added to the list of default routers.
  • The address 192.168.1.20 is associated with the interface eth0.
  • A network route to 192.168.1.0 with the netmask 255.255.255.0 pointing directly to eth0 is created.
  • A,B (Correct)
  • If eth0 was configured with a previous IP address, it is retained in addition to adding the new address.
  • The addresses from 192.168.1.20 to 192.168.1.24 are activated on the interface eth0.

Answer : A,B

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)


Options are :

  • hwclock, /sbin/hwclock, /usr/sbin/hwclock (Correct)
  • None

Answer : hwclock, /sbin/hwclock, /usr/sbin/hwclock

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 3

What is the assigned port number for the HTTP service? (Specify the port number using digits.)


Options are :

  • None
  • 80 (Correct)

Answer : 80

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)


Options are :

  • 1024 (Correct)
  • None

Answer : 1024

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?


Options are :

  • mail.* /dev/tty12
  • | /dev/tty12
  • *.* /dev/tty12 (Correct)
  • syslog tty12
  • /var/log/messages | /dev/tty12

Answer : *.* /dev/tty12

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 2

Which of the following commands lists all queued print jobs?


Options are :

  • lpr
  • lpq (Correct)
  • lp
  • lpd

Answer : lpq

What is not contained in the locale setting of the operating system?


Options are :

  • thousands separator
  • currency symbol
  • timezone (Correct)
  • language

Answer : timezone

Which command, available with all MTAs, is used to list the contents of the MTA's mail queue? (Specify ONLY the command without any path or parameters.)


Options are :

  • mailq, /usr/bin/mailq, sendmail -bp, /usr/sbin/sendmail -bp, /usr/lib/sendmail -bp, sendmail, /usr/sbin/sendmail, /usr/lib/sendmail (Correct)
  • None

Answer : mailq, /usr/bin/mailq, sendmail -bp, /usr/sbin/sendmail -bp, /usr/lib/sendmail -bp, sendmail, /usr/sbin/sendmail, /usr/lib/sendmail

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 7

Which of the following is a legacy program provided by CUPS for sending files to the printer queues on the command line?


Options are :

  • lpd
  • lpr (Correct)
  • lpp
  • lpq

Answer : lpr

How do shadow passwords improve the password security in comparison to standard passwd passwords?


Options are :

  • Shadow passwords are stored in plain text and can be checked for weak passwords.
  • Regular users do not have access to the password hashes of shadow passwords. (Correct)
  • Every shadow password is valid for 45 days and must be changed afterwards.
  • The system's host key is used to strongly encrypt all shadow passwords.
  • Shadow passwords are always combined with a public key that has to match the user's private key.

Answer : Regular users do not have access to the password hashes of shadow passwords.

CompTIA JK0-022 Security Cryptography Certification Exam Set 8

Which environment variable will override all LC_* variables?


Options are :

  • LC_COLLATE
  • LOCALE
  • LANG
  • LC_ALL (Correct)

Answer : LC_ALL

For accessibility assistance, which of the following programs is an on-screen keyboard?


Options are :

  • GOK (Correct)
  • atkb
  • xOSK
  • xkb

Answer : GOK

Which configuration file would be edited to change default options for the OpenSSH server?


Options are :

  • /etc/ssh/ssh_config
  • /etc/ssh/ssh
  • /etc/ssh/ssh_server
  • /etc/ssh/sshd_config (Correct)
  • /etc/ssh/server

Answer : /etc/ssh/sshd_config

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 6

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.)


Options are :

  • usermod
  • chsh
  • chage
  • A,B,D (Correct)
  • chattr
  • passwd

Answer : A,B,D

Which of the following commands will convert files from one character encoding to another?


Options are :

  • iconv (Correct)
  • convert
  • transcode
  • enc2utf

Answer : iconv

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?


Options are :

  • mountd
  • xinetd
  • tcpd (Correct)
  • inetd

Answer : tcpd

SK0-004 CompTIA Server+ Certification Practice Exam Set 3

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)


Options are :

  • The script must begin with a shebang-line (#!) that points to the correct interpreter.
  • The file system on which the script resides must be mounted with the option scripts.
  • The script file must be found in the $PATH.
  • The user issuing the command must be in the group script.
  • B,C,D (Correct)
  • The script file must have the executable permission bit set.

Answer : B,C,D

What is true about UIDs and GIDs?


Options are :

  • UIDs and GIDs share a common number space. Each time a new user or group is created, the next free ID is assigned.
  • The number space is split up. UIDs usually reside in the range from 0 to 32767 while GIDs reside in the range from 32768 to 65535.
  • The GID of a group is always the sum of the UIDs of its members.
  • The first four digits of each UID are the GID of the primary group of that user.
  • There are distinct number spaces for UIDs and GIDs, i.e. the same number may be used as both a UID and a GID. (Correct)

Answer : There are distinct number spaces for UIDs and GIDs, i.e. the same number may be used as both a UID and a GID.

Why should a regular user edit his personal crontab by using the command crontab instead of just editing his crontab file manually?


Options are :

  • Because crontab collects information about all users crontabs and recommends similar commands used by other users of the system.
  • Because user specific crontab entries are stored in a special directory which is maintained by the cron daemon and not writable for regular users. (Correct)
  • Because crontab starts the cron daemon in case it is not running due to no other crontab entries existing.
  • Because user specific crontab entries are stored in a common database and must be extracted before editing.

Answer : Because user specific crontab entries are stored in a special directory which is maintained by the cron daemon and not writable for regular users.

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 14

Which of the following actions prevents a specific user from scheduling tasks using at or batch?


Options are :

  • Add the specific user to the [deny] section in the /etc/atd.conf file.
  • Add the specific user to the /etc/at.deny file. (Correct)
  • Add the specific user to the /etc/at.allow file.
  • Add the specific user to the nojobs group.
  • Run atd --deny followed by the name of the specific user.

Answer : Add the specific user to the /etc/at.deny file.

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)


Options are :

  • None
  • I (Correct)

Answer : I

Which of the following files assigns a user to its primary group?


Options are :

  • /etc/passwd (Correct)
  • /etc/shadow
  • /etc/pgroup
  • /etc/gshadow
  • /etc/group

Answer : /etc/passwd

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 13

The presence of what file will temporarily prevent all users except root from logging into the system? (Specify the full name of the file, including path.)


Options are :

  • None
  • /etc/nologin (Correct)

Answer : /etc/nologin

What is not contained in the locale setting of the operating system?


Options are :

  • thousands separator
  • language
  • currency symbol
  • timezone (Correct)

Answer : timezone

What is the purpose of the xhost program?


Options are :

  • Install all packages and video drivers required to run X11 on a host.
  • Start the X11 server and announce its availability within the local network.
  • Grant or revoke access to a X11 session. (Correct)
  • Send informational messages to all users logged into a host using X11.
  • Display the MOTD and other important information when a user logs in via X11.

Answer : Grant or revoke access to a X11 session.

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 11

Which of the following commands can modify or set the password expiration for a user? (Choose TWO correct answers.)


Options are :

  • passwd
  • shadowconfig
  • A,D (Correct)
  • chage
  • userconf
  • chexpiration

Answer : A,D

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?


Options are :

  • files (Correct)
  • None

Answer : files

What is true regarding the time in a Linux system?


Options are :

  • When the system time changes, running processes must be restarted in order to get the correct time.
  • The BIOS clock of a computer always indicates the current local time and time zone.
  • When the system is on the network, each query for the current time leads to a new network connection to a time server.
  • Each application must convert the Unix time to the current time zone which is usually done by using standard libraries. (Correct)

Answer : Each application must convert the Unix time to the current time zone which is usually done by using standard libraries.

BR0-001 CompTIA Bridge Security+ Certification Practice Exam Set 1

What happens if the password of a user in the /etc/shadow file is prepended with the ! character?


Options are :

  • The user is disabled and all login methods, including but not limited to password based logins, are disabled.
  • Upon the next log in, the user is forced to change his password.
  • When logging in, the user automatically gets root privileges in addition to his regular privileges.
  • The password becomes invalid which disables password based logins although other login methods remain usable. (Correct)
  • The password is inverted which allows the user to log in with any password other than the current password.

Answer : The password becomes invalid which disables password based logins although other login methods remain usable.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions