102-500 Dumps
102-500 Braindumps
102-500 Real Questions
102-500 Practice Test
102-500 Actual Questions
killexams.com
LPIC-1 Exam 102, version 5.0
https://killexams.com/pass4sure/exam-detail/102-500
the format of the private key stored in ~/.ssh/id_rsa? CII
R
M
er: D
nation: The private key stored in ~/.ssh/id_rsa is in PEM (Privacy-Enhanced Mail) format, w 64 encoded format with headers.
emd, what is the purpose of a timer unit file? pecify the system's boot parameters
anage network connections og system events
ontrol the execution of services based on time er: D
nation: A timer unit file in systemd is used to schedule the execution of service units based o
Question: 935 What is AS DE PPK PE Answ Expla hich is a Base Quest In syst To s To m To l To c Answ Expla n time criteria, similar to cron but with more advanced features. If you want to permanently change the hostname of your Linux system to "myserver", which file must you edit to ensure the change persists across reboots? /etc/hosts /etc/sysconfig/network /etc/hostname /etc/hostnamectl.conf Answer: C Explanation: The /etc/hostname file contains the static hostname and should be edited to make a permanent change. ghly customizable interface egration with KDE applications nimalist design and usability focus ensive command-line tools er: C nation: GNOME is known for its minimalist design, focusing on usability and providing a cl ce that enhances the user experience through simplicity. ere to configure your NTP client to use the server at time.example.com, which line would your NTP configuration file to ensure it is the primary time source? tfile time.example.com time.example.com rict time.example.com ver time.example.com er: D nation: The line server time.example.com in the NTP configuration file specifies that the NT daemon should synchronize time from the server at time.example.com. Hi Int Mi Ext Answ Expla ean interfa If you w you add to drif peer rest ser Answ Expla P What command would you use to revoke a GPG key, and what is the typical process followed after revocation? gpg --delete-key keyid gpg --revoke-key keyid gpg --revoke keyid gpg --revoke-certificate keyid Answer: B Explanation: The command gpg --revoke-key keyid is used to revoke a GPG key. After revocation, the revocation certificate should be distributed to key servers and shared with contacts to inform them that the key is no longer valid. s-config --list-printers -l at -p er: D nation: The command lpstat -p displays the status of all printers configured in the CUPS nment, including their availability and whether they are accepting print jobs. ate a skeleton directory for new users that includes a specific configuration file, which of the ing commands would be most appropriate? etc/skel/.bashrc /etc/skel/my_config_file 'my_config' >> /etc/skel/my_config_file radd -k /etc/skel username path/to/my_config_file /etc/skel/ er: D nation: Option B copies the specific configuration file into the skeleton directory, ensuring it ble for new users. The other options do not create a skeleton correctly. lpq cup lprm lpst Answ Expla enviro To cre follow cp / echo use cp / Answ Expla is availa How can you determine if the cron service is currently active and running on your system? systemctl is-active cron crontab -l service cron status ps aux | grep cron Answer: A Explanation: The command systemctl is-active cron checks if the cron service is currently active and running, providing a straightforward way to verify its status. Which of the following methods can you use to create a pipeline that connects the output of one command to the input of another? mmand1 | command2 mmand1 < command2 mmand1 & command2 er: B nation: The | operator creates a pipeline, passing the output of command1 directly as input to and2. dering security best practices, which of the following actions should be taken regarding the sswd and /etc/shadow files to protect user account information? ange permissions to restrict access, allowing only root to read /etc/shadow and limiting /etc/ priately. ure both files are world-readable for troubleshooting access issues. re both files in a publicly accessible directory for transparency. gularly backup both files without changing their permissions. er: A nation: To protect user account information, the /etc/shadow file should be readable only by etc/passwd should be accessible for necessary user account functionality but with restricted sions as appropriate.Question: 937
Question: 938
ion: 939
Quest
Question: 940
Question: 941
ion: 942
Quest
Question: 943
Question: 944
ion: 945