Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

LPIC-1 Exam 102, Part 2 of 2, version 5.0

Last Update 20 hours ago Total Questions : 235

The LPIC-1 Exam 102, Part 2 of 2, version 5.0 content is now fully updated, with all current exam questions added 20 hours ago. Deciding to include 102-500 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 102-500 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 102-500 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any LPIC-1 Exam 102, Part 2 of 2, version 5.0 practice test comfortably within the allotted time.

Question # 41

What is true regarding the command sendmail?

A.

With any MTA, the sendmail command must be run periodically by the cron daemon.

B.

All MTAs, including Postfix and Exim, provide a sendmail command.

C.

The sendmail command prints the MTAs queue history of which mails have been sent successfully.

D.

It is only available when the sendmail MTA is installed.

Question # 42

Each entry in a crontab must end with what character?

A.

Tab

B.

Space

C.

Backslash

D.

Newline

Question # 43

Which of the following fields are available in both the global /etc/crontab file as well as in user-specific crontab files? (Select TWO correct answers)

A.

Year

B.

Minute

C.

Username

D.

Command

Question # 44

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Question # 45

The ________ command is used to add a group to the system.

Question # 46

What is the conventional purpose of Linux UIDs that are lower than 100?

A.

They are reserved for super user accounts.

B.

They are reserved for the system admin accounts.

C.

They are reserved for system accounts.

D.

They are unused, aside from 0, because they are targets of exploits.

E.

They are used to match with GIDs in grouping users.

Question # 47

Which file is processed by newaliases? (Specify the full name of the file, including path.)

Question # 48

Which of the following commands connects to the remote host example.com which has OpenSSH listening on TCP port 2222? (Choose TWO correct answers.)

A.

ssh --port 2222 example.com

B.

ssh -p 2222 example.com

C.

ssh -o Port=2222 example.com

D.

ssh -o GatewayPort=2222 example.com

E.

ssh example.com:2222

Question # 49

Which of the following find commands will print out a list of files owned by root and with the SUID bit set in /usr?

A.

find /usr -uid 0 -perm +4000

B.

find -user root +mode +s /usr

C.

find -type suid -username root -d /usr

D.

find /usr -ls \*s\* -u root

E.

find /usr -suid -perm +4000

Question # 50

Which of the following commands puts the output of the command date into the shell variable mydate?

A.

mydate= " $(date) "

B.

mydate= " exec date "

C.

mydate= " $((date)) "

D.

mydate= " date "

E.

mydate= " ${date} "

Go to page: