Limited-Time Offer: Enjoy 60% Savings! - Ends In 0d 00h 00m 00s Coupon code: 60OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Most Recent LPI 102-500 Exam Questions & Answers


Prepare for the LPIC-1 System Administrator Exam 102, Part 2 of 2, version 5.0 exam with our extensive collection of questions and answers. These practice Q&A are updated according to the latest syllabus, providing you with the tools needed to review and test your knowledge.

QA4Exam focus on the latest syllabus and exam objectives, our practice Q&A are designed to help you identify key topics and solidify your understanding. By focusing on the core curriculum, These Questions & Answers helps you cover all the essential topics, ensuring you're well-prepared for every section of the exam. Each question comes with a detailed explanation, offering valuable insights and helping you to learn from your mistakes. Whether you're looking to assess your progress or dive deeper into complex topics, our updated Q&A will provide the support you need to confidently approach the LPI 102-500 exam and achieve success.

The questions for 102-500 were last updated on Dec 22, 2024.
  • Viewing page 1 out of 47 pages.
  • Viewing questions 1-5 out of 234 questions
Get All 234 Questions & Answers
Question No. 1

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Show Answer Hide Answer
Correct Answer: A

The -type option of the find command allows you to specify the type of file you want to search for. The argument l (lowercase L) will match files that are symbolic links, which are special files that point to another file or directory. Symbolic links are also known as soft links or symlinks. For example, the commandfind /home -type lwill find all the symbolic links in the /home directory and its subdirectories.


Question No. 2

On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are _________.

Show Answer Hide Answer
Correct Answer: C

The /etc/passwd file stores local accounts of the system. It is a readable text file and uses colons (:) to separate the fields. This file helps with converting user IDs to names (and back). It is fine that all users can read this file, but they should not be able to change fields. Therefore, the most correct permissions for /etc/passwd are -rw-r--r--, which means that only the owner (root) can write to the file, and everyone can read it. The /etc/shadow file contains information about the system's users' passwords. It is owned by user root and group shadow, and has 640 permissions. The password is stored as a long string of characters, which is a combination of the hashing algorithm, optional salt applied, and the hashed password itself. Other users are not allowed to read the file directly, to prevent them from gathering hashed passwords of others. Therefore, the most correct permissions for /etc/shadow are -r--------, which means that only the owner (root) can read the file, and no one else can read or write to it.Reference:


Question No. 3

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

Show Answer Hide Answer
Correct Answer: D

The route command displays the kernel's routing table, which contains information about how packets are routed to different destinations. By default, route tries to resolve the IP addresses of the routers and destinations to their hostnames using DNS. If DNS is not working properly, this can cause a delay in displaying the routing table as route waits for the DNS queries to time out. To avoid this, route can be used with the -n option, which prevents DNS lookups and displays only numeric addresses.Reference:

LPI 102-500 Exam Objectives, Topic 109: Network Fundamentals, 109.3 Basic network troubleshooting

LPI 102-500 Study Guide, Chapter 9: Network Troubleshooting, Section 9.2: Troubleshooting Routing Problems


Question No. 5

Which of the following commands can be used to limit the amount of memory a user may use?

Show Answer Hide Answer
Correct Answer: C

The ulimit command can be used to limit the amount of memory a user may use. The ulimit command is a shell builtin that allows the user to view or modify the resource limits imposed by the operating system. The resource limits can affect the maximum size of files, the maximum number of processes, the maximum amount of CPU time, and the maximum amount of virtual memory a user can access.

To limit the amount of memory a user may use, the -v option can be used with the ulimit command. The -v option sets the maximum amount of virtual memory available to the current shell and its children in kilobytes. For example, the command ulimit -v 1000000 would limit the virtual memory to 1 GB. The -m option can also be used to set the maximum resident set size, which is the amount of physical memory used by a process, but this option is not supported by all systems.

The ulimit command can be used interactively in a shell session, or it can be placed in a shell initialization file, such as .bashrc or .profile, to apply the limits to all future shell sessions. The ulimit command can also be used in conjunction with the /etc/security/limits.conf file, which allows the system administrator to set global or per-user resource limits for all users and processes. The /etc/security/limits.conf file can specify hard and soft limits for each resource, as well as the scope of the limit, such as user, group, or domain.

The other commands listed are not related to limiting the amount of memory a user may use. The umask command sets the default file permissions for newly created files and directories. The usermod command modifies the user account information, such as the home directory, the login shell, or the password expiration date. The passwd command changes the user password. The chage command changes the password aging information, such as the minimum and maximum number of days between password changes, or the number of days before the password expires.Reference:

ulimit(1) - Linux manual page

How to limit user environment with ulimit Linux command

Control server access using hosts.allow and hosts.deny files


Unlock All Questions for LPI 102-500 Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 234 Questions & Answers