Certbus > Lpi > LPI Certifications > 102-400 > 102-400 Online Practice Questions and Answers

102-400 Online Practice Questions and Answers

Questions 4

Which command is used to sync the hardware clock to the system clock? (Specify ONLY the command without any path or parameters.)

Browse 120 Q&As
Questions 5

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Browse 120 Q&As
Questions 6

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Browse 120 Q&As
Questions 7

What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)

Browse 120 Q&As
Questions 8

Which of the following commands lists all defined variables and functions within Bash?

A. env

B. set

C. env -a

D. echo $ENV

Browse 120 Q&As
Questions 9

Which of the following steps prevents a user from obtaining an interactive login session?

A. Run the command chsh -s /bin/false with the user name.

B. Set the UID for the user to 0.

C. Remove the user from the group staff.

D. Add the user to /etc/noaccess.

E. Create a .nologin file in the user's home directory.

Browse 120 Q&As
Questions 10

Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)?

A. export LANGUAGE="pt"

B. export MESSAGE="pt"

C. export UI_MESSAGES="pt"

D. export LC_MESSAGES="pt"

E. export ALL_MESSAGES="pt"

Browse 120 Q&As
Questions 11

Which of the following is observed and corrected by a NTP client?

A. The skew in time between the system clock and the hardware clock.

B. The skew in time between the system clock and the reference clock.

C. Changes in the time zone of the current computer's location.

D. Adjustments needed to support Daylight Saving Time.

Browse 120 Q&As
Questions 12

What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?

A. *.* /dev/tty12

B. /var/log/messages | /dev/tty12

C. | /dev/tty12

D. syslog tty12

E. mail.* /dev/tty12

Browse 120 Q&As
Questions 13

What is true regarding the file ~/.forward?

A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Browse 120 Q&As
Questions 14

Which of the following commands is used to rotate, compress, and mail system logs?

A. rotatelog

B. striplog

C. syslogd --rotate

D. logrotate

E. logger

Browse 120 Q&As
Questions 15

Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)

A. 2001:db8::15 www.example.com www

B. www.example.com www 203.0.13.15

C. 203.0.113.15 www.example.com www

D. www.example.com,www 203.0.13.15,2001:db8::15

E. 2003.0.113.15,2001:db8::15 www.example.com www

Browse 120 Q&As
Questions 16

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

A. resolv

B. dns

C. remote

D. files

E. hosts

Browse 120 Q&As
Questions 17

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

A. sshd

B. ssh-agent

C. ssh-keygen

D. ssh-add

Browse 120 Q&As
Questions 18

What is a purpose of an SSH host key?

A. It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B. It provides the server's identity information to connecting SSH clients.

C. It is the root key by which all user SSH keys must be signed.

D. It authenticates any user that logs into a remote machine from the key's host.

E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Browse 120 Q&As
Exam Code: 102-400
Exam Name: LPI Level 1 Exam 102, Junior Level Linux Certification, Part 2 of 2
Last Update: Mar 19, 2025
Questions: 120 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99