Deck 6: LPI Level 1
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/90
Play
Full screen (f)
Deck 6: LPI Level 1
1
Which of the following protocols is related to the term open relay?
A) SMTP
B) POP3
C) NTP
D) IMAP
E) LDAP
A) SMTP
B) POP3
C) NTP
D) IMAP
E) LDAP
SMTP
2
Which of the following steps prevents a user from obtaining an interactive login session?
A) Setting the UID for the user to 0 . Setting the UID for the user to 0 .
B) Running the command chsh -s /bin/false with the user name. Running the command chsh -s /bin/false with the user name.
C) Removing the user from the group staff. Removing the user from the group staff.
D) Adding the user to /etc/noaccess . Adding the user to /etc/noaccess
E) Creating a .nologin file in the user's home directory. Creating a .nologin file in the user's home directory.
A) Setting the UID for the user to 0 . Setting the UID for the user to 0 .
B) Running the command chsh -s /bin/false with the user name. Running the command chsh -s /bin/false with the user name.
C) Removing the user from the group staff. Removing the user from the group staff.
D) Adding the user to /etc/noaccess . Adding the user to /etc/noaccess
E) Creating a .nologin file in the user's home directory. Creating a .nologin file in the user's home directory.
Running the command chsh -s /bin/false with the user name. Running the command chsh -s /bin/false with the user name.
3
What is true about the file /etc/localtime ?
A) It is a plain text file containing a string such as Europe/Berlin It is a plain text file containing a string such as Europe/Berlin
B) It is created and maintained by the NTP service based on the location of the system's IP address.
C) It is a symlink to /sys/device/clock/ltime and always contains the current local time. It is a symlink to /sys/device/clock/ltime and always contains the current local time.
D) After changing this file, newtzconfig has to be run to make the changes effective. After changing this file, newtzconfig has to be run to make the changes effective.
E) It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin . It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin .
A) It is a plain text file containing a string such as Europe/Berlin It is a plain text file containing a string such as Europe/Berlin
B) It is created and maintained by the NTP service based on the location of the system's IP address.
C) It is a symlink to /sys/device/clock/ltime and always contains the current local time. It is a symlink to /sys/device/clock/ltime and always contains the current local time.
D) After changing this file, newtzconfig has to be run to make the changes effective. After changing this file, newtzconfig has to be run to make the changes effective.
E) It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin . It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin .
It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin . It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin .
4
Which of the following statements about sytemd-journald are true?
A) It is incompatible with syslog and cannot be installed on a system using regular syslog.
B) It only processes messages of systemd and not messages of any other tools.
C) It can pass log messages to syslog for further processing.
D) It maintains metadata such as _UID or _PID for each message. It maintains metadata such as _UID or _PID for each message.
E) It supports syslog facilities such as kern , user , and auth . It supports syslog facilities such as kern , user , and auth .
A) It is incompatible with syslog and cannot be installed on a system using regular syslog.
B) It only processes messages of systemd and not messages of any other tools.
C) It can pass log messages to syslog for further processing.
D) It maintains metadata such as _UID or _PID for each message. It maintains metadata such as _UID or _PID for each message.
E) It supports syslog facilities such as kern , user , and auth . It supports syslog facilities such as kern , user , and auth .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a valid IPv6 address?
A) 2001:db8:0g21::1
B) 2001::db8:4581::1
C) 2001:db8:3241::1
D) 2001%db8%9990%%1
E) 2001.db8.819f..1
A) 2001:db8:0g21::1
B) 2001::db8:4581::1
C) 2001:db8:3241::1
D) 2001%db8%9990%%1
E) 2001.db8.819f..1
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
6
Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization?
A) iburst
B) quickstart
C) fast
D) fsync
E) flood
A) iburst
B) quickstart
C) fast
D) fsync
E) flood
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following commands is used to rotate, compress, and mail system logs?
A) logrotate
B) striplog
C) syslogd --rotate
D) rotatelog
E) logger
A) logrotate
B) striplog
C) syslogd --rotate
D) rotatelog
E) logger
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)?
A) export LANGUAGE="pt"
B) export LC_MESSAGES="pt"
C) export UI_MESSAGES="pt"
D) export MESSAGE="pt"
E) export ALL_MESSAGES="pt"
A) export LANGUAGE="pt"
B) export LC_MESSAGES="pt"
C) export UI_MESSAGES="pt"
D) export MESSAGE="pt"
E) export ALL_MESSAGES="pt"
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files?
A) Year
B) Minute
C) Username
D) Effective group ID
E) Command
A) Year
B) Minute
C) Username
D) Effective group ID
E) Command
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following connection types, as seen in nmcli connection show , may exist in NetworkManager?
A) tcp
B) ethernet
C) wifi
D) ipv6
E) bridge
A) tcp
B) ethernet
C) wifi
D) ipv6
E) bridge
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following commands configure network interfaces based on the system's existing distribution-specific configuration files?
A) ifconf
B) ifdown
C) ifpause
D) ifstart
E) ifup
A) ifconf
B) ifdown
C) ifpause
D) ifstart
E) ifup
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
12
Which command makes the shell variable named VARIABLE visible to subshells?
A) export $VARIABLE
B) env VARIABLE
C) set $VARIABLE
D) set VARIABLE
E) export VARIABLE
A) export $VARIABLE
B) env VARIABLE
C) set $VARIABLE
D) set VARIABLE
E) export VARIABLE
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following statements is valid in the file /etc/nsswitch.conf ?
A) multi on
B) 192.168.168.4 dns-server
C) namespaces: net mount procs
D) include /etc/nsswitch.d/
E) hosts: files dns
A) multi on
B) 192.168.168.4 dns-server
C) namespaces: net mount procs
D) include /etc/nsswitch.d/
E) hosts: files dns
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following comparison operators for test work on elements in the file system?
A) -z
B) -eq
C) -d
D) -f
E) -lt
A) -z
B) -eq
C) -d
D) -f
E) -lt
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following nmcli subcommands exist?
A) nmcli ethernet
B) nmcli device
C) nmcli wifi
D) nmcli address
E) nmcli connection
A) nmcli ethernet
B) nmcli device
C) nmcli wifi
D) nmcli address
E) nmcli connection
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
16
What information is provided by the echo $$ command?
A) The process ID of the current shell.
B) The process ID for the following command.
C) The process ID of the last command executed.
D) The process ID of the last command which has been placed in the background.
E) The process ID of the echo command. The process ID of the echo command.
A) The process ID of the current shell.
B) The process ID for the following command.
C) The process ID of the last command executed.
D) The process ID of the last command which has been placed in the background.
E) The process ID of the echo command. The process ID of the echo command.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following tasks can the date command accomplish?
A) Set the system's date and time.
B) Set the system's date but not the time.
C) Calculate the time span between two dates.
D) Print a calendar for a month or a year.
E) Display time in a specific format.
A) Set the system's date and time.
B) Set the system's date but not the time.
C) Calculate the time span between two dates.
D) Print a calendar for a month or a year.
E) Display time in a specific format.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following statements is true if the UID of a regular user is identical to the GID of a group?
A) UID have precedence over GIDs, therefore the user is available while the group doesn't.
B) The user as well as the group are not available to avoid ambiguity due to the ID conflict.
C) UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.
D) The user is the only member of the group, even if the group configuration contains other members.
E) GIDs have precedence over UIDs, therefore the group is available while the user isn't.
A) UID have precedence over GIDs, therefore the user is available while the group doesn't.
B) The user as well as the group are not available to avoid ambiguity due to the ID conflict.
C) UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.
D) The user is the only member of the group, even if the group configuration contains other members.
E) GIDs have precedence over UIDs, therefore the group is available while the user isn't.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following commands displays all environment and shell variables?
A) getargs
B) lsenv
C) ls
D) env
E) lsshell
A) getargs
B) lsenv
C) ls
D) env
E) lsshell
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
20
What is true about the Hop Limit field in the IPv6 header?
A) The field is not changed during the transport of a package.
B) The field is transmitted within a hop-by-hop extension header.
C) Each router forwarding the packet increases the field's value.
D) Each router forwarding the packet decreases the field's value.
E) For multicast packages, the field's value is always 1 . For multicast packages, the field's value is always 1 .
A) The field is not changed during the transport of a package.
B) The field is transmitted within a hop-by-hop extension header.
C) Each router forwarding the packet increases the field's value.
D) Each router forwarding the packet decreases the field's value.
E) For multicast packages, the field's value is always 1 . For multicast packages, the field's value is always 1 .
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
21
What output is produced by the following command sequence? echo '1 2 3 4 5 6' | while read a b c; do echo result $c $b $a; done
A) result: 6 5 4
B) result: 1 2 3 4 5 6
C) result: 3 4 5 6 2 1
D) result: 6 5 4 3 2 1
E) result: 3 2 1
A) result: 6 5 4
B) result: 1 2 3 4 5 6
C) result: 3 4 5 6 2 1
D) result: 6 5 4 3 2 1
E) result: 3 2 1
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
22
Which if the following tools, used for DNS debugging, reports not only the response from the name sever but also details about the query?
A) dnsq
B) hostname
C) dig
D) dnslookup
E) zoneinfo
A) dnsq
B) hostname
C) dig
D) dnslookup
E) zoneinfo
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following configuration files should be modified to globally set shell variables for all users?
A) /etc/profile
B) /etc/bashrc
C) ~/.bash_profile
D) /etc/.bashrc
E) /etc/shellenv
A) /etc/profile
B) /etc/bashrc
C) ~/.bash_profile
D) /etc/.bashrc
E) /etc/shellenv
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
24
What output does the command seq 10 produce?
A) A continuous stream of numbers increasing in increments of 10 until the command is stopped.
B) It creates no output because a second parameter is missing.
C) The number 0 through 9 with one number per line.
D) The number 10 to standard output.
E) The numbers 1 through 10 with one number per line.
A) A continuous stream of numbers increasing in increments of 10 until the command is stopped.
B) It creates no output because a second parameter is missing.
C) The number 0 through 9 with one number per line.
D) The number 10 to standard output.
E) The numbers 1 through 10 with one number per line.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
25
What is the purpose of TCP wrapper?
A) Manage and adjust bandwidth used by TCP services.
B) Bind a network service to a TCP port.
C) Encapsulate TCP messages in IP packets.
D) Add SSL support to plain text TCP services.
E) Limit access to a network service.
A) Manage and adjust bandwidth used by TCP services.
B) Bind a network service to a TCP port.
C) Encapsulate TCP messages in IP packets.
D) Add SSL support to plain text TCP services.
E) Limit access to a network service.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
26
Given the following excerpt of the sudo configuration: jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk Which of the following statements are true?
A) Jane can run /bin/id only after specifying her password. Jane can run /bin/id only after specifying her password.
B) Jane can run /sbin/fdisk after specifying root 's password. /sbin/fdisk after specifying root 's password.
C) Jane can run /sbin/fdisk after specifying her password. /sbin/fdisk after specifying her password.
D) Jane can run /bin/kill without specifying a password. /bin/kill without specifying a password.
E) Jane can run /bin/id without specifying her password. without specifying her password.
A) Jane can run /bin/id only after specifying her password. Jane can run /bin/id only after specifying her password.
B) Jane can run /sbin/fdisk after specifying root 's password. /sbin/fdisk after specifying root 's password.
C) Jane can run /sbin/fdisk after specifying her password. /sbin/fdisk after specifying her password.
D) Jane can run /bin/kill without specifying a password. /bin/kill without specifying a password.
E) Jane can run /bin/id without specifying her password. without specifying her password.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following files assigns a user to its primary group?
A) /etc/pgroup
B) /etc/shadow
C) /etc/passwd
D) /etc/group
E) /etc/gshadow
A) /etc/pgroup
B) /etc/shadow
C) /etc/passwd
D) /etc/group
E) /etc/gshadow
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following changes may occur as a consequence of using the command ip ?
A) Network interfaces may become active or inactive.
B) New name servers may be added to the resolver configuration.
C) The system's host name may change.
D) IP addresses may change.
E) The routing table may change.
A) Network interfaces may become active or inactive.
B) New name servers may be added to the resolver configuration.
C) The system's host name may change.
D) IP addresses may change.
E) The routing table may change.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
29
What is the purpose of a screen reader?
A) It manages virtual keyboards on touch screen displays.
B) It reads the parameters of the attached monitors and creates an appropriate X11 configuration.
C) It displays lines and markers to help people use speed reading techniques.
D) It manages and displays files that contain e-books.
E) It reads displayed text to accommodate the needs of blind or visually impaired people.
A) It manages virtual keyboards on touch screen displays.
B) It reads the parameters of the attached monitors and creates an appropriate X11 configuration.
C) It displays lines and markers to help people use speed reading techniques.
D) It manages and displays files that contain e-books.
E) It reads displayed text to accommodate the needs of blind or visually impaired people.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
30
What can be specified with useradd ?
A) Commands the user can run using sudo . Commands the user can run using sudo .
B) The absolute path to the user's home directory.
C) Which printers are available for the new user.
D) The SSH keys used to login to the new account.
E) The numeric user ID (UID) of the user.
A) Commands the user can run using sudo . Commands the user can run using sudo .
B) The absolute path to the user's home directory.
C) Which printers are available for the new user.
D) The SSH keys used to login to the new account.
E) The numeric user ID (UID) of the user.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following information is stored in /etc/shadow for each user?
A) The timestamp of the user's last login
B) The user's private SSH keys
C) The hashed password of the user
D) The numerical user ID (UID)
E) The path to the user's home directory
A) The timestamp of the user's last login
B) The user's private SSH keys
C) The hashed password of the user
D) The numerical user ID (UID)
E) The path to the user's home directory
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following features are provided by SPICE?
A) Connecting local USB devices to remote applications.
B) Accessing graphical applications on a remote host.
C) Replacing Xorg as local X11 server.
D) Downloading and locally installing applications from a remote machine.
E) Uploading and running a binary program on a remote machine.
A) Connecting local USB devices to remote applications.
B) Accessing graphical applications on a remote host.
C) Replacing Xorg as local X11 server.
D) Downloading and locally installing applications from a remote machine.
E) Uploading and running a binary program on a remote machine.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following commands preloads and manages existing SSH keys that are used for automatic authentication while logging in to order machines using SSH?
A) sshd
B) ssh-keyring
C) ssh-keygen
D) ssh-pki
E) ssh-agent
A) sshd
B) ssh-keyring
C) ssh-keygen
D) ssh-pki
E) ssh-agent
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following statements is true regarding systemd timer units?
A) Timer units can only be defined within a service unit's file.
B) The command executed by the timer is specified in the timer unit's [Cmd] section. The command executed by the timer is specified in the timer unit's [Cmd] section.
C) A dedicated system service, systemd-cron , handles the execution of timer units. A dedicated system service, systemd-cron , handles the execution of timer units.
D) Timer units only exist in the system scope and are not available for users.
E) Each systemd timer unit controls a specific systemd service unit.
A) Timer units can only be defined within a service unit's file.
B) The command executed by the timer is specified in the timer unit's [Cmd] section. The command executed by the timer is specified in the timer unit's [Cmd] section.
C) A dedicated system service, systemd-cron , handles the execution of timer units. A dedicated system service, systemd-cron , handles the execution of timer units.
D) Timer units only exist in the system scope and are not available for users.
E) Each systemd timer unit controls a specific systemd service unit.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
35
Depending on a system's configuration, which of the following files can be used to enable and disable network services running on this host?
A) /etc/profile
B) /etc/xinetd.conf
C) /etc/ports
D) /etc/services
E) /etc/host.conf
A) /etc/profile
B) /etc/xinetd.conf
C) /etc/ports
D) /etc/services
E) /etc/host.conf
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following commands can identify the PID od a process which opened a TCP port?
A) ptrace
B) strace
C) debug
D) lsof
E) nessus
A) ptrace
B) strace
C) debug
D) lsof
E) nessus
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
37
On a machine running several X servers, how do programs identify the different instances of the X11 server?
A) By a fixed UUID that is defined in the X11 configuration file.
B) By a display name like : 1 . By a display name like : 1 .
C) By the name of the user that runs the X server like x11:bob. By the name of the user that runs the X server like x11:bob.
D) By a device name like /dev/X11/xservers/1 . By a device name like /dev/X11/xservers/1
E) By a unique IPv6 address from the fe80::/64 subnet. By a unique IPv6 address from the fe80::/64 subnet.
A) By a fixed UUID that is defined in the X11 configuration file.
B) By a display name like : 1 . By a display name like : 1 .
C) By the name of the user that runs the X server like x11:bob. By the name of the user that runs the X server like x11:bob.
D) By a device name like /dev/X11/xservers/1 . By a device name like /dev/X11/xservers/1
E) By a unique IPv6 address from the fe80::/64 subnet. By a unique IPv6 address from the fe80::/64 subnet.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
38
What is a purpose of an SSH host key?
A) It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B) It is root key by which all user SSH keys must be signed.
C) It provides the server's identity information to connecting SSH clients.
D) It authenticates any user that logs into a remote machine from the key's host.
E) It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
A) It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B) It is root key by which all user SSH keys must be signed.
C) It provides the server's identity information to connecting SSH clients.
D) It authenticates any user that logs into a remote machine from the key's host.
E) It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
39
Which configuration file contains the default options for SSH clients?
A) /etc/ssh/sshd_config
B) /etc/ssh/ssh
C) /etc/ssh/ssh_config
D) /etc/ssh/client
E) /etc/ssh/ssh_client
A) /etc/ssh/sshd_config
B) /etc/ssh/ssh
C) /etc/ssh/ssh_config
D) /etc/ssh/client
E) /etc/ssh/ssh_client
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
40
On a Linux workstation, the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?
A) The local routing information may be corrupted and must be re-validated using a routing protocol.
B) One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.
C) There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.
D) The Linux Kernel Routing Daemon (LKRD) is not running and should be started using its init script or systemd unit.
E) DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout. DNS resolution may not be working as by default tries to resolve names of routers and destinations and may run into a timeout.
A) The local routing information may be corrupted and must be re-validated using a routing protocol.
B) One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.
C) There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.
D) The Linux Kernel Routing Daemon (LKRD) is not running and should be started using its init script or systemd unit.
E) DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout. DNS resolution may not be working as by default tries to resolve names of routers and destinations and may run into a timeout.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
41
If an alias ls exists, which of the following commands updates the alias to point to the command ls -l instead of the alias's current target?
A) set ls='ls -l'
B) alias ls='ls -l'
C) alias --force ls='ls -l'
D) alias --update ls ls='ls -l'
E) realias ls='ls -l'
A) set ls='ls -l'
B) alias ls='ls -l'
C) alias --force ls='ls -l'
D) alias --update ls ls='ls -l'
E) realias ls='ls -l'
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
42
What is true regarding public and private SSH keys?
A) For each user account, there is exactly one key pair that can be used to log into that account.
B) The private key must never be revealed to anyone.
C) Several different public keys may be generated for the same private key.
D) To maintain the private key's confidentiality, the SSH key pair must be created by its owner.
E) To allow remote logins, the user's private key must be copied to the remote server.
A) For each user account, there is exactly one key pair that can be used to log into that account.
B) The private key must never be revealed to anyone.
C) Several different public keys may be generated for the same private key.
D) To maintain the private key's confidentiality, the SSH key pair must be created by its owner.
E) To allow remote logins, the user's private key must be copied to the remote server.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following parameters are used for journalctl to limit the time frame of the output?
A) --since=
B) --from=
C) --until=
D) --upto=
E) --date=
A) --since=
B) --from=
C) --until=
D) --upto=
E) --date=
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following are syslog facilities?
A) local5
B) accounting
C) mail
D) postmaster
E) remote
A) local5
B) accounting
C) mail
D) postmaster
E) remote
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following commands finds all files owned by root that have the SetUID bit set?
A) find / -user root -perm -4000
B) find / -user 0 -mode +s
C) find / -owner root -setuid
D) find / -owner 0 -permbits 0x100000000
E) find / --filter uid=1 --filter pers=u+s
A) find / -user root -perm -4000
B) find / -user 0 -mode +s
C) find / -owner root -setuid
D) find / -owner 0 -permbits 0x100000000
E) find / --filter uid=1 --filter pers=u+s
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
46
What information related to a user account is modified using the chage command?
A) Default ownership for new files
B) Group membership
C) Set of commands available to the user
D) Password expiry information
E) Default permissions for new files
A) Default ownership for new files
B) Group membership
C) Set of commands available to the user
D) Password expiry information
E) Default permissions for new files
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following situations is observed and corrected by an NTP client?
A) The skew in time between the system clock and the computer's hardware clock.
B) The physical location and the timezone configuration.
C) Changes in the time zone of the current computer's location.
D) Adjustment needed to support Daylight Saving Time.
E) The skew in time between the system clock and the reference clock.
A) The skew in time between the system clock and the computer's hardware clock.
B) The physical location and the timezone configuration.
C) Changes in the time zone of the current computer's location.
D) Adjustment needed to support Daylight Saving Time.
E) The skew in time between the system clock and the reference clock.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following commands can be used to limit the amount of memory a user may use?
A) umask
B) usermod
C) passwd
D) ulimit
E) chage
A) umask
B) usermod
C) passwd
D) ulimit
E) chage
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
49
After editing the TCP wrapper configuration to grant specific hosts access to a service, when do these changes become effective?
A) The new configuration becomes effective after restarting the respective service.
B) The new configuration becomes effective at the next system reboot.
C) The new configuration becomes effective when the last established connection to the service is closed.
D) The new configuration becomes effective after restarting the tcpd service. The new configuration becomes effective after restarting the tcpd service.
E) The new configuration becomes effective immediately for all new connections.
A) The new configuration becomes effective after restarting the respective service.
B) The new configuration becomes effective at the next system reboot.
C) The new configuration becomes effective when the last established connection to the service is closed.
D) The new configuration becomes effective after restarting the tcpd service. The new configuration becomes effective after restarting the tcpd service.
E) The new configuration becomes effective immediately for all new connections.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following files is not read directly by a Bash login shell?
A) ~/.bashrc
B) ~/.bash_profile
C) ~/.bash_login
D) ~/.profile
E) /etc/profile
A) ~/.bashrc
B) ~/.bash_profile
C) ~/.bash_login
D) ~/.profile
E) /etc/profile
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following commands lists all defines variables and functions within Bash?
A) env
B) export
C) env -a
D) set
E) echo $ENV
A) env
B) export
C) env -a
D) set
E) echo $ENV
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
52
What is true regarding the file ~/.forward ?
A) When configured correctly ~/.forward can be used to forward each incoming mail to one or more other recipients. When configured correctly ~/.forward can be used to forward each incoming mail to one or more other recipients.
B) After editing ~/.forward the user must run newaliases to make the mail server aware of the changes. After editing the user must run newaliases to make the mail server aware of the changes.
C) Using ~/.forward , root may configure any email address whereas all other users may configure only their own addresses. Using , root may configure any email address whereas all other users may configure only their own addresses.
D) As ~/.forward is owned by the MTA and not writable by the user, it must be edited using the editaliases command. As is owned by the MTA and not writable by the user, it must be edited using the editaliases command.
E) By default, only ~/.forward files of users in the group mailq are processed while all other user's ~/.forward files are ignored. By default, only files of users in the group mailq are processed while all other user's files are ignored.
A) When configured correctly ~/.forward can be used to forward each incoming mail to one or more other recipients. When configured correctly ~/.forward can be used to forward each incoming mail to one or more other recipients.
B) After editing ~/.forward the user must run newaliases to make the mail server aware of the changes. After editing the user must run newaliases to make the mail server aware of the changes.
C) Using ~/.forward , root may configure any email address whereas all other users may configure only their own addresses. Using , root may configure any email address whereas all other users may configure only their own addresses.
D) As ~/.forward is owned by the MTA and not writable by the user, it must be edited using the editaliases command. As is owned by the MTA and not writable by the user, it must be edited using the editaliases command.
E) By default, only ~/.forward files of users in the group mailq are processed while all other user's ~/.forward files are ignored. By default, only files of users in the group mailq are processed while all other user's files are ignored.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
53
What information is shown by the echo $? command?
A) The process ID of the echo command. The process ID of the echo command.
B) The exit value of the command executed immediately before echo. The exit value of the command executed immediately before echo.
C) The process ID which will be used for the next command.
D) The exit value of the echo command. The exit value of the echo command.
E) The process ID of the current shell.
A) The process ID of the echo command. The process ID of the echo command.
B) The exit value of the command executed immediately before echo. The exit value of the command executed immediately before echo.
C) The process ID which will be used for the next command.
D) The exit value of the echo command. The exit value of the echo command.
E) The process ID of the current shell.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
54
What is true about the file .profile in a user's home directory?
A) It must be executable.
B) It must call the binary of the login shell.
C) It must use a valid shell script syntax.
D) It must start with a shebang.
E) It must be readable for its owner only.
A) It must be executable.
B) It must call the binary of the login shell.
C) It must use a valid shell script syntax.
D) It must start with a shebang.
E) It must be readable for its owner only.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
55
On a system using systemd-journald, which of the following commands add the message Howdy to the system log?
A) append Howdy
B) logger Howdy
C) systemd-cat echo Howdy
D) echo Howdy > /dev/journal
E) journalctl add Howdy
A) append Howdy
B) logger Howdy
C) systemd-cat echo Howdy
D) echo Howdy > /dev/journal
E) journalctl add Howdy
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is true about IPv6?
A) IPv6 no longer supports broadcast addresses.
B) With IPv6, the TCP port numbers of most services have changed.
C) IPv4 addresses can be used without any change with IPv6.
D) IPv6 no longer supports multicast addresses.
E) For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.
A) IPv6 no longer supports broadcast addresses.
B) With IPv6, the TCP port numbers of most services have changed.
C) IPv4 addresses can be used without any change with IPv6.
D) IPv6 no longer supports multicast addresses.
E) For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
57
Why is the correct configuration of a system's time zone important?
A) Because the timezone is included in checksum calculations and timezone changes invalidate existing checksums.
B) Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.
C) Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.
D) Because NTP chooses servers nearby based on the configured time zone.
E) Because the conversion of Unix timestamps to local time relies on the time zone configuration.
A) Because the timezone is included in checksum calculations and timezone changes invalidate existing checksums.
B) Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.
C) Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.
D) Because NTP chooses servers nearby based on the configured time zone.
E) Because the conversion of Unix timestamps to local time relies on the time zone configuration.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
58
Which mechanism does ssh use to interact with the SSH agent?
A) Connecting to port 2222 which is used by the system-wide SSH agent.
B) Using the fixed socket .ssh-agent/ipc. Using the fixed socket .ssh-agent/ipc.
C) Creating an alias replacing ssh with calls to ssh-agent . Creating an alias replacing ssh with calls to ssh-agent .
D) Starting ssh-agent as a child process for each ssh invocation. Starting as a child process for each ssh invocation.
E) Evaluating environment variables such as SSH_AUTH_SOCK . Evaluating environment variables such as SSH_AUTH_SOCK
A) Connecting to port 2222 which is used by the system-wide SSH agent.
B) Using the fixed socket .ssh-agent/ipc. Using the fixed socket .ssh-agent/ipc.
C) Creating an alias replacing ssh with calls to ssh-agent . Creating an alias replacing ssh with calls to ssh-agent .
D) Starting ssh-agent as a child process for each ssh invocation. Starting as a child process for each ssh invocation.
E) Evaluating environment variables such as SSH_AUTH_SOCK . Evaluating environment variables such as SSH_AUTH_SOCK
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
59
The X11 configuration file xorg.conf is grouped into section. How is the content of the section SectionName represented?
A) It is placed in curly brackets as in Section SectionName {…}. It is placed in curly brackets as in Section SectionName {…}.
B) It is placed between the tags and . It is placed between the tags and .
C) It is placed between a line containing Section "SectionName" and a line containing EndSection . It is placed between a line containing Section "SectionName" and a line containing EndSection .
D) It is placed after the row [SectionName] . It is placed after the row [SectionName]
E) It is placed after an initial unindented Section "SectionName " and must be indented by exactly one tab character. It is placed after an initial unindented Section "SectionName " and must be indented by exactly one tab character.
A) It is placed in curly brackets as in Section SectionName {…}. It is placed in curly brackets as in Section SectionName {…}.
B) It is placed between the tags
C) It is placed between a line containing Section "SectionName" and a line containing EndSection . It is placed between a line containing Section "SectionName" and a line containing EndSection .
D) It is placed after the row [SectionName] . It is placed after the row [SectionName]
E) It is placed after an initial unindented Section "SectionName " and must be indented by exactly one tab character. It is placed after an initial unindented Section "SectionName " and must be indented by exactly one tab character.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
60
What is true about the following command? nmcli device wifi connect WIFIoI
A) NetworkManager opens a new public hotspot with the SSID WIFIoI . NetworkManager opens a new public hotspot with the SSID WIFIoI .
B) NetworkManager creates an unconfigured new virtual network interface named WIFIoI . NetworkManager creates an unconfigured new virtual network interface named
C) NetworkManager creates a new wifi connection WIFIoI and activates it. NetworkManager creates a new wifi connection and activates it.
D) NetworkManager returns an error in case the connection WIFIoI does not exist. NetworkManager returns an error in case the connection WIFIoI does not exist.
E) NetworkManager returns an error because WIFIoI is an invalid wifi device. NetworkManager returns an error because is an invalid wifi device.
A) NetworkManager opens a new public hotspot with the SSID WIFIoI . NetworkManager opens a new public hotspot with the SSID WIFIoI .
B) NetworkManager creates an unconfigured new virtual network interface named WIFIoI . NetworkManager creates an unconfigured new virtual network interface named
C) NetworkManager creates a new wifi connection WIFIoI and activates it. NetworkManager creates a new wifi connection and activates it.
D) NetworkManager returns an error in case the connection WIFIoI does not exist. NetworkManager returns an error in case the connection WIFIoI does not exist.
E) NetworkManager returns an error because WIFIoI is an invalid wifi device. NetworkManager returns an error because is an invalid wifi device.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following environment variables can be defined in locale.conf ?
A) LC_ALL
B) LC_USERNAME
C) LC_UTF8
D) LC_GEOGRAPHY
E) LC_TIME
A) LC_ALL
B) LC_USERNAME
C) LC_UTF8
D) LC_GEOGRAPHY
E) LC_TIME
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
62
Which file contains the data of the last change of a user's password?
A) /etc/gshadow
B) /etc/passwd
C) /etc/pwdlog
D) /var/log/shadow
E) /etc/shadow
A) /etc/gshadow
B) /etc/passwd
C) /etc/pwdlog
D) /var/log/shadow
E) /etc/shadow
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following commands lists all queued print jobs?
A) lpd
B) lpr
C) lp
D) lsq
E) lpq
A) lpd
B) lpr
C) lp
D) lsq
E) lpq
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following commands display the number of bytes transmitted and received via the eth0 network interface?
A) route -v via eth0
B) ip stats show dev eth0
C) netstat -s -i eth0
D) ifconfig eth0
E) ip -s link show eth0
A) route -v via eth0
B) ip stats show dev eth0
C) netstat -s -i eth0
D) ifconfig eth0
E) ip -s link show eth0
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following are valid host addresses for the subnet 203.0.113.64/28?
A) 203.0.113.64
B) 203.0.113.78
C) 203.0.113.65
D) 203.0.113.80
E) 203.0.113.81
A) 203.0.113.64
B) 203.0.113.78
C) 203.0.113.65
D) 203.0.113.80
E) 203.0.113.81
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following commands will delete the default gateway from the system's IP routing table?
A) ifconfig unset default
B) route del default
C) ip route del default
D) netstat -r default
E) sysctl ipv4.default_gw=0
A) ifconfig unset default
B) route del default
C) ip route del default
D) netstat -r default
E) sysctl ipv4.default_gw=0
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
67
How can a specific user be prevented from scheduling tasks with at ?
A) By adding the specific user to the /etc/at.allow file. By adding the specific user to the /etc/at.allow file.
B) By adding the specific user to the [deny] section in the /etc/atd.conf file. [deny] section in the /etc/atd.conf
C) By adding the specific user to the nojobs group. nojobs group.
D) By adding the specific user to the /etc/at.deny file. /etc/at.deny
E) By executing the atd --deny [user] command. By executing the atd --deny [user] command.
A) By adding the specific user to the /etc/at.allow file. By adding the specific user to the /etc/at.allow file.
B) By adding the specific user to the [deny] section in the /etc/atd.conf file. [deny] section in the /etc/atd.conf
C) By adding the specific user to the nojobs group. nojobs group.
D) By adding the specific user to the /etc/at.deny file. /etc/at.deny
E) By executing the atd --deny [user] command. By executing the atd --deny [user] command.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
68
What is true about NetworkManager on a Linux system that uses its distribution's mechanisms to configure network interfaces?
A) NetworkManager reconfigures all network interfaces to use DHCP unless they are specifically managed by NetworkManager.
B) NetworkManager must be explicitly enabled for each interface it should manage.
C) NetworkManager by default does not change interfaces which are already configured.
D) NetworkManager disables all interfaces which were not configured by NetworkManager.
E) NetworkManager can be configured to use the distribution's network interface configuration.
A) NetworkManager reconfigures all network interfaces to use DHCP unless they are specifically managed by NetworkManager.
B) NetworkManager must be explicitly enabled for each interface it should manage.
C) NetworkManager by default does not change interfaces which are already configured.
D) NetworkManager disables all interfaces which were not configured by NetworkManager.
E) NetworkManager can be configured to use the distribution's network interface configuration.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
69
Given the following routing table:
How would an outgoing packet to the destination 192.168.2.150 be handled?
A) It would be passed to the default router 192.168.178.1 on wlan0.
B) It would be directly transmitted on the device eth0.
C) It would be passed to the default router 255.255.255.0 on eth0.
D) It would be passed to the router 192.168.1.1 on eth0.
E) It would be directly transmitted on the device wlan0.

A) It would be passed to the default router 192.168.178.1 on wlan0.
B) It would be directly transmitted on the device eth0.
C) It would be passed to the default router 255.255.255.0 on eth0.
D) It would be passed to the router 192.168.1.1 on eth0.
E) It would be directly transmitted on the device wlan0.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
70
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow ?
A) *
B) -
C) s
D) #
E) x
A) *
B) -
C) s
D) #
E) x
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
71
What does the term Braille Display refer to?
A) A standardized high contract graphical theme for desktop applications?
B) A Linux desktop environment similar to KDE and GNOME.
C) A legacy display technology superseded by LCD.
D) A physical representation of characters using small dots.
E) A standard file format for data exchange, similar to XML.
A) A standardized high contract graphical theme for desktop applications?
B) A Linux desktop environment similar to KDE and GNOME.
C) A legacy display technology superseded by LCD.
D) A physical representation of characters using small dots.
E) A standard file format for data exchange, similar to XML.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
72
Given the following user's crontab entry: 15 14 * * 1-5 /usr/local/bin/example.sh When will the script /usr/local/bin/example.sh be executed?
A) At 14:15 local time, January till May.
B) At 15:14 local time, 1st to 5th day of month.
C) At 14:15 local time, February till June.
D) At 14:15 local time, 1st to 5th day of month.
E) At 14:15 local time, Monday to Friday
A) At 14:15 local time, January till May.
B) At 15:14 local time, 1st to 5th day of month.
C) At 14:15 local time, February till June.
D) At 14:15 local time, 1st to 5th day of month.
E) At 14:15 local time, Monday to Friday
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
73
If neither cron.allow nor cron.deny exist in /etc/ , which of the following is true?
A) Without additional configuration, all users may create user specific crontabs.
B) Without additional configuration, only root may create user specific crontabs.
C) The cron daemon will refuse to start and report missing files in the system's logfile. The cron daemon will refuse to start and report missing files in the system's logfile.
D) When a user creates a user specific crontab the system administrator must approve it explicitly.
E) The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not. The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not.
A) Without additional configuration, all users may create user specific crontabs.
B) Without additional configuration, only root may create user specific crontabs.
C) The cron daemon will refuse to start and report missing files in the system's logfile. The cron daemon will refuse to start and report missing files in the system's logfile.
D) When a user creates a user specific crontab the system administrator must approve it explicitly.
E) The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not. The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following states can NetworkManager show regarding the system's network connectivity?
A) up
B) portal
C) full
D) login-required
E) firewalled
A) up
B) portal
C) full
D) login-required
E) firewalled
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following tasks are handled by a display manager like XDM or KMD?
A) Configure additional devices like new monitors or projectors when they are attached.
B) Start and prepare the desktop environment for the user.
C) Create an X11 configuration file for the current graphic devices and monitors.
D) Lock the screen when the user was inactive for a configurable amount of time.
E) Handle the login of a user.
A) Configure additional devices like new monitors or projectors when they are attached.
B) Start and prepare the desktop environment for the user.
C) Create an X11 configuration file for the current graphic devices and monitors.
D) Lock the screen when the user was inactive for a configurable amount of time.
E) Handle the login of a user.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following protocols is designed to access the video card output of a virtual machine?
A) KDE
B) X11
C) Xfce
D) SPICE
E) XDMCP
A) KDE
B) X11
C) Xfce
D) SPICE
E) XDMCP
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following fields can be found in the /etc/group file?
A) The home directory of the group.
B) The list of users that belong to the group.
C) The name of the group.
D) The default group ACL.
E) The description of the group.
A) The home directory of the group.
B) The list of users that belong to the group.
C) The name of the group.
D) The default group ACL.
E) The description of the group.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following commands sets the system's time zone to the Canadian Eastern Time?
A) localegen -t -f /usr/share/zoneinfo/Canada/Eastern > /etc/locate.tz
B) tzconf /etc/localtime
C) sysctl -w clock.tz='Canada/Eastern'
D) modprobe tz_ca_est
E) ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime
A) localegen -t -f /usr/share/zoneinfo/Canada/Eastern > /etc/locate.tz
B) tzconf /etc/localtime
C) sysctl -w clock.tz='Canada/Eastern'
D) modprobe tz_ca_est
E) ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
79
What is the purpose of the iconv command?
A) It converts bitmap images from one format to another such as PNG to JPEG.
B) It verifies that the root directory tree compiles to all conventions from the Filesystem Hierarchy Standard (FHS).
C) It converts files from one character set to an other.
D) It changes the mode of an inode in the ext4 filesystem.
E) It displays additional meta information from icon files ending in .ico.
A) It converts bitmap images from one format to another such as PNG to JPEG.
B) It verifies that the root directory tree compiles to all conventions from the Filesystem Hierarchy Standard (FHS).
C) It converts files from one character set to an other.
D) It changes the mode of an inode in the ext4 filesystem.
E) It displays additional meta information from icon files ending in .ico.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following getent invocations lists all existing users?
A) getent homes
B) getent uids
C) getent passwd
D) getent users
E) getent logins
A) getent homes
B) getent uids
C) getent passwd
D) getent users
E) getent logins
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck