March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The ________ command is used to add a group to the system.

Full Access
Question # 5

Which file, if present, must contain all users that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.)

Full Access
Question # 6

Which of the following statements is true regarding systemd timer units?

A.

Timer units can only be defined within a service unit’s file.

B.

The command executed by the timer is specified in the timer unit’s [Cmd] section.

C.

A dedicated system service, systemd-cron, handles the execution of timer units.

D.

Timer units only exist in the system scope and are not available for users.

E.

Each systemd timer unit controls a specific systemd service unit.

Full Access
Question # 7

Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)?

A.

export LANGUAGE=“pt”

B.

export LC_MESSAGES=“pt”

C.

export UI_MESSAGES=“pt”

D.

export MESSAGE=“pt”

E.

export ALL_MESSAGES=“pt”

Full Access
Question # 8

Which of the following statements is true if the UID of a regular user is identical to the GID of a group?

A.

UID have precedence over GIDs, therefore the user is available while the group doesn’t.

B.

The user as well as the group are not available to avoid ambiguity due to the ID conflict.

C.

UIDs and GIDs are independent of each other, therefore the user as well as the group are still available.

D.

The user is the only member of the group, even if the group configuration contains other members.

E.

GIDs have precedence over UIDs, therefore the group is available while the user isn’t.

Full Access
Question # 9

Which of the following commands displays all environment and shell variables?

A.

getargs

B.

lsenv

C.

ls

D.

env

E.

lsshell

Full Access
Question # 10

Which of the following commands lists all queued print jobs?

A.

lpd

B.

lpr

C.

lp

D.

lsq

E.

lpq

Full Access
Question # 11

Which of the following information is stored in /etc/shadow for each user?

A.

The timestamp of the user’s last login

B.

The user’s private SSH keys

C.

The hashed password of the user

D.

The numerical user ID (UID)

E.

The path to the user’s home directory

Full Access
Question # 12

Which of the following commands can be used to convert text files in one character encoding to another character encoding?

A.

cat

B.

convert

C.

dd

D.

iconv

E.

utf2utf

Full Access
Question # 13

What is the purpose of the iconv command?

A.

It converts bitmap images from one format to another such as PNG to JPEG.

B.

It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).

C.

It displays additional meta information from icon files ending in .ico.

D.

It changes the mode of an inode in the ext4 file system.

E.

It converts files from one character encoding to another.

Full Access
Question # 14

Which command can be used to delete a group from a Linux system?

A.

groupdel

B.

groupmod

C.

groups

D.

groupedit

Full Access
Question # 15

Which of the following can the chage command NOT change?

A.

The number of days since January 1, 1970 after which the user's account will no longer be accessible.

B.

The number of days since January 1, 1970 after which the password can change.

C.

The number of days since January 1, 1970 since the password was last changed.

D.

The maximum number of days during which a password is valid.

E.

The number of days of inactivity after a password has expired before the account is locked.

Full Access
Question # 16

What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.)

A.

The user bob is removed from the system's user database.

B.

The user bob's home directory is removed.

C.

The locate database is updated to drop files owned by bob.

D.

All files owned by bob are remove from all mounted filesystems.

E.

In case bob was the last member of a group, that group is deleted.

Full Access
Question # 17

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

A.

*

B.

-

C.

s

D.

x

Full Access
Question # 18

What command will display the group names and GIDs to which a user belongs? (Provide only the command name with or without path information)

Full Access
Question # 19

Which of the following are commonly used Mail Transfer Agent (MTA) applications? (Choose THREE correct answers.)

A.

Postfix

B.

Procmail

C.

Sendmail

D.

Exim

E.

SMTPd

Full Access
Question # 20

What is the purpose of the command mailq?

A.

It fetches new emails from a remote server using POP3 or IMAP.

B.

It is a multi-user mailing list manager.

C.

It is a proprietary tool contained only in the qmail MTA.

D.

It queries the mail queue of the local MTA.

E.

It is a command-line based tool for reading and writing emails.

Full Access
Question # 21

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Full Access
Question # 22

Which of the following commands is used to rotate, compress, and mail system logs?

A.

rotatelog

B.

striplog

C.

syslogd --rotate

D.

logrotate

E.

logger

Full Access
Question # 23

Why is the correct configuration of a system's time zone important?

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Full Access
Question # 24

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Full Access
Question # 25

What is true about the ntpdate command?

A.

It is the primary management command for the NTP time server.

B.

It updates the local system's date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).

C.

It queries one or more NTP time servers and adjusts the system time accordingly.

D.

It sends the local system time to one or many remote NTP time servers for redistribution.

E.

It can be used by any user to set the user clock independently of the system clock.

Full Access
Question # 26

To exclude all log messages of a given logging facility, you should use a logging priority of _____ .

Full Access
Question # 27

Which file inside the CUPS configuration directory contains the definition of the printers?

A.

cups-devices.conf

B.

snmp.conf

C.

printcap.conf

D.

printers.conf

E.

cupsd.conf

Full Access
Question # 28

Which command allows you to make a shell variable visible to subshells?

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Full Access
Question # 29

Which of the following commands puts the output of the command date into the shell variable mydate?

A.

mydate="$(date)"

B.

mydate="exec date"

C.

mydate="$((date))"

D.

mydate="date"

E.

mydate="${date}"

Full Access
Question # 30

What keyword is missing from this code sample of a shell script?

____ i in *.txt; do

echo $i

done

A.

for

B.

loop

C.

until

D.

while

Full Access
Question # 31

Which of the following configuration files should be modified to set default shell variables for all users?

A.

/etc/bashrc

B.

/etc/profile

C.

~/.bash_profile

D.

/etc/.bashrc

Full Access
Question # 32

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Full Access
Question # 33

Which of the following commands lists all defined variables and functions within Bash?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 34

Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records?

A.

LIMIT

B.

FROM

C.

WHERE

D.

IF

Full Access
Question # 35

After issuing:

function myfunction { echo $1 $2 ; }

in Bash, which output does:

myfunction A B C

Produce?

A.

A B

B.

A B C

C.

A C

D.

B C

E.

C B A

Full Access
Question # 36

What output will the command seq 10 produce?

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Full Access
Question # 37

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Full Access
Question # 38

Which of the following commands can be used to limit the amount of memory a user may use?

A.

umask

B.

usermod

C.

ulimit

D.

passwd

E.

chage

Full Access
Question # 39

Which file contains a set of services and hosts that will be allowed to connect to the server by going through a TCP Wrapper program such as tcpd? (Specify the full name of the file, including path.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAI/AAAAAAAAADM/-SXesH19Ido/s46-c-k-no/photo.jpg

Full Access
Question # 40

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Full Access
Question # 41

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

A.

sshd

B.

ssh-agent

C.

ssh-keygen

D.

ssh-add

Full Access
Question # 42

Which directory holds the files that configure the xinetd service when using several configuration files instead of an integrated configuration file? (Specify the full path to the directory.)

Full Access
Question # 43

Which configuration file would be edited to change default options for the OpenSSH server?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/server

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_server

Full Access
Question # 44

What is a purpose of an SSH host key?

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Full Access
Question # 45

On a Linux system with shadow passwords enabled, which file in the file system contains the password hashes of all local users? (Specify the full name of the file, including path.)

Full Access
Question # 46

Which of the following programs can be used to determine the routing path to a given destination?

A.

dig

B.

netstat

C.

ping

D.

route

E.

traceroute

Full Access
Question # 47

Which of the following is true about IPv6?

A.

With IPv6, the TCP port numbers of most services have changed.

B.

IPv6 no longer supports broadcast addresses.

C.

IPv4 addresses can be used without any change with IPv6.

D.

IPv6 no longer supports multicast addresses.

E.

For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.

Full Access
Question # 48

Which command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 49

What is true regarding TCP port 23?

A.

Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used.

B.

Port 23 is the well known port for the SSH service which provides secure logins.

C.

Port 23 is the well known port for the rlogin service which is SSL secured by default.

D.

Port 23 is the well known port for the system login services which are encrypted when the user runs the starttls command in his login shell.

Full Access
Question # 50

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

A.

resolv

B.

dns

C.

remote

D.

files

E.

hosts

Full Access
Question # 51

Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)

Full Access
Question # 52

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Full Access
Question # 53

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Full Access
Question # 54

What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

A.

Set a network interface active or inactive.

B.

Specify the kernel module to be used with a network interface.

C.

Allow regular users to change the network configuration of a network interface.

D.

Change the netmask used on a network interface.

E.

Specify which network services are available on a network interface.

Full Access
Question # 55

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 56

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Full Access
Question # 57

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Full Access
Question # 58

What is the purpose of a screen reader?

A.

It reads text displayed on the screen to blind or visually impaired people.

B.

It reads the parameters of the attached monitors and creates an appropriate X11 configuration.

C.

It displays lines and markers to help people use speed reading techniques.

D.

It manages and displays files that contain e-books.

Full Access
Question # 59

Which of the following commands shows the current color depth of the X Server?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access