102-500 MCQs
102-500 TestPrep
102-500 Study Guide
102-500 Practice Test
102-500 Exam Questions
killexams.com
LPIC-1 Exam 102, version 5.0
https://killexams.com/pass4sure/exam-detail/102-500
What is the format of the private key stored in ~/.ssh/id_rsa?
ASCII
DER
PPK
PEM
Answer: D
Explanation: The private key stored in ~/.ssh/id_rsa is in PEM (Privacy-Enhanced Mail) format, which is a Base64 encoded format with headers.
In systemd, what is the purpose of a timer unit file?
To specify the system's boot parameters
To manage network connections
To log system events
To control the execution of services based on time
Answer: D
Explanation: A timer unit file in systemd is used to schedule the execution of service units based on time criteria, similar to cron but with more advanced features.
If you want to permanently change the hostname of your Linux system to "myserver", which file must you edit to ensure the change persists across reboots?
/etc/hosts
/etc/sysconfig/network
/etc/hostname
/etc/hostnamectl.conf
Answer: C
Explanation: The /etc/hostname file contains the static hostname and should be edited to make a permanent change.
Which of the following features distinguishes the GNOME desktop environment, particularly in its design philosophy and approach to user interaction?
Highly customizable interface
Integration with KDE applications
Minimalist design and usability focus
Extensive command-line tools
Answer: C
Explanation: GNOME is known for its minimalist design, focusing on usability and providing a clean interface that enhances the user experience through simplicity.
If you were to configure your NTP client to use the server at time.example.com, which line would you add to your NTP configuration file to ensure it is the primary time source?
driftfile time.example.com
peer time.example.com
restrict time.example.com
server time.example.com
Answer: D
Explanation: The line server time.example.com in the NTP configuration file specifies that the NTP daemon should synchronize time from the server at time.example.com.
What command would you use to revoke a GPG key, and what is the typical process followed after revocation?
gpg --delete-key keyid
gpg --revoke-key keyid
gpg --revoke keyid
gpg --revoke-certificate keyid
Answer: B
Explanation: The command gpg --revoke-key keyid is used to revoke a GPG key. After revocation, the revocation certificate should be distributed to key servers and shared with contacts to inform them that the key is no longer valid.
If a user wants to check the list of printers configured in a CUPS environment, which command should they use to display this information?
lpq
cups-config --list-printers
lprm -l
lpstat -p
Answer: D
Explanation: The command lpstat -p displays the status of all printers configured in the CUPS environment, including their availability and whether they are accepting print jobs.
To create a skeleton directory for new users that includes a specific configuration file, which of the following commands would be most appropriate?
cp /etc/skel/.bashrc /etc/skel/my_config_file
echo 'my_config' >> /etc/skel/my_config_file
useradd -k /etc/skel username
cp /path/to/my_config_file /etc/skel/
Answer: D
Explanation: Option B copies the specific configuration file into the skeleton directory, ensuring it is available for new users. The other options do not create a skeleton correctly.
How can you determine if the cron service is currently active and running on your system?
systemctl is-active cron
crontab -l
service cron status
ps aux | grep cron
Explanation: The command systemctl is-active cron checks if the cron service is currently active and running, providing a straightforward way to verify its status.
Which of the following methods can you use to create a pipeline that connects the output of one command to the input of another?
command1 > command2
command1 | command2
command1 < command2
command1 & command2
Answer: B
Explanation: The | operator creates a pipeline, passing the output of command1 directly as input to command2.
Considering security best practices, which of the following actions should be taken regarding the
/etc/passwd and /etc/shadow files to protect user account information?
Change permissions to restrict access, allowing only root to read /etc/shadow and limiting /etc/passwd appropriately.
Ensure both files are world-readable for troubleshooting access issues.
Store both files in a publicly accessible directory for transparency.
Regularly backup both files without changing their permissions.
Answer: A
Explanation: To protect user account information, the /etc/shadow file should be readable only by root, while /etc/passwd should be accessible for necessary user account functionality but with restricted permissions as appropriate.
If a system administrator needs to verify that the timezone is correctly set after using timedatectl, which command would provide the most comprehensive information, including NTP synchronization status?
timedatectl status
date +'%s'
cat /etc/timezone
timedatectl show
Answer: A
Explanation: The command timedatectl status provides detailed information about the current timezone settings, local time, UTC time, and NTP synchronization status, making it comprehensive for verification.
In order to check the status of the CUPS service and confirm it is running correctly, which command would you use on a Linux system?
systemctl status cups
service cups status
lpstat -t
cupsctl --status
Answer: A
Explanation: The command systemctl status cups checks the status of the CUPS service, confirming whether it is active and running correctly on the system.
What is the quickest way to check if the PATH variable includes /usr/local/sbin for the current session?
echo $PATH | grep /usr/local/sbin
printenv PATH | grep /usr/local/sbin
path | grep /usr/local/sbin
which /usr/local/sbin
Answer: A
Explanation: Option A correctly checks for the presence of the directory in the PATH variable. The other options do not effectively check the PATH.
When configuring SSH, what does the StrictHostKeyChecking option do when set to "no" in the SSH client configuration?
It automatically adds new host keys to the known_hosts file without prompting.
It requires a password for every connection.
It disables host key verification entirely.
It restricts connections to known hosts only.
Explanation: Setting StrictHostKeyChecking to "no" allows the SSH client to automatically add new host keys to the known_hosts file without prompting the user for confirmation.
Which command would be used to view the details of a specific systemd timer and its associated service?
systemctl show timer.timer
systemctl list-timers
systemctl status timer.timer
systemd-run timer.timer
Answer: C
Explanation: The systemctl status timer.timer command provides detailed information about a specific systemd timer, including its last and next activation times and the associated service it triggers.
Which of the following IP addresses is a valid private IP address according to RFC 1918, and would it be routable on the public Internet?
A. 10.0.0.1
B. All other options C. 192.168.1.1
D. 172.16.0.1
Answer: B
Explanation: All the listed IP addresses (10.0.0.1, 172.16.0.1, and 192.168.1.1) are valid private IP addresses as defined in RFC 1918. They are not routable on the public Internet.
KILLEXAMS.COM
Killexams.com is a leading online platform specializing in high-quality certification exam preparation. Offering a robust suite of tools, including MCQs, practice tests, and advanced test engines, Killexams.com empowers candidates to excel in their certification exams. Discover the key features that make Killexams.com the go-to choice for exam success.
Killexams.com provides exam questions that are experienced in test centers. These questions are updated regularly to ensure they are up-to-date and relevant to the latest exam syllabus. By studying these questions, candidates can familiarize themselves with the content and format of the real exam.
Killexams.com offers exam MCQs in PDF format. These questions contain a comprehensive
collection of questions and answers that cover the exam topics. By using these MCQs, candidate can enhance their knowledge and improve their chances of success in the certification exam.
Killexams.com provides practice test through their desktop test engine and online test engine. These practice tests simulate the real exam environment and help candidates assess their readiness for the actual exam. The practice test cover a wide range of questions and enable candidates to identify their strengths and weaknesses.
Killexams.com offers a success guarantee with the exam MCQs. Killexams claim that by using this materials, candidates will pass their exams on the first attempt or they will get refund for the purchase price. This guarantee provides assurance and confidence to individuals preparing for certification exam.
Killexams.com regularly updates its question bank of MCQs to ensure that they are current and reflect the latest changes in the exam syllabus. This helps candidates stay up-to-date with the exam content and increases their chances of success.