0% found this document useful (0 votes)
0 views

Linux

The document is a test bank for the Linux+ and LPIC-1 Guide to Linux Certification, 6th Edition, containing multiple-choice questions and answers related to various topics in Linux. It covers fundamental concepts such as cloud computing, software types, server functionalities, and Linux distributions. Each question includes a rationale for the correct answer and is linked to specific learning objectives.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Linux

The document is a test bank for the Linux+ and LPIC-1 Guide to Linux Certification, 6th Edition, containing multiple-choice questions and answers related to various topics in Linux. It covers fundamental concepts such as cloud computing, software types, server functionalities, and Linux distributions. Each question includes a rationale for the correct answer and is linked to specific learning objectives.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 202

Test Bank Linux+ and LPIC-1 Guide to

Linux Certification - 6th - 2024 -


9798214000800

written by

TestBankNursingUS

www.stuvia.com

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.
Multiple Choice

1. The United States Air Force was able to install Linux on a popular gaming console and then connect over
1,700 of these systems together to work as one big supercomputer. Which of the following types of
technologies did they implement?
a. herding
b. cloud computing
c. group computing
d. clustering
ANSWER: d
RATIONALE: When multiple, or many, computers are joined together to work as one, it is called a
cluster.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

2. Which of the following terms describes a type of useful and legitimate software that is distributed by a
developer at no charge and with no source code?
a. shareware
b. freeware
c. malware
d. tryware
ANSWER: b
RATIONALE: Freeware is a type of software that is distributed for free by a software developer, but
the source code is not distributed along with it. Shareware is similar to freeware but
requires payment after a period of time, malware is malicious software, and tryware
does not exist.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

3. What term refers to a person that manages the Linux components that allow developers to push new versions
of their software to the cloud?

Page 1

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

a. orchestrator
b. build automator
c. integration specialist
d. DevOp
ANSWER: d
RATIONALE: The people who manage the workflow whereby software is added to a cloud
environment are called DevOps because they are system operators (ops) that
support web app development (dev).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.6 - Describe how Linux is used in the cloud.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.4 - Summarize common infrastructure as code technologies.
TOPICS: 1.6 Linux in the Cloud
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

4. Which of the following types of cloud delivery models would a containerized web app be considered?

a. SaaS
b. PaaS
c. IaaS
d. MaaS
ANSWER: b
RATIONALE: Web apps that are hosted within containers are delivered using a container runtime on
an underlying operating system platform and referred to as Platform as a Service, or
PaaS.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.6 - Describe how Linux is used in the cloud.
TOPICS: 1.6 Linux in the Cloud
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

5. Which of the following services does an MTA provide?

a. web
b. mail
c. DNS

Page 2

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

d. certificate
ANSWER: b
RATIONALE: Mail Transfer Agents (MTAs) provide email routing on Linux systems.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.3 - Mail Transfer Agent (MTA) basics.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

6. What term is used to refer to a specific variety of UNIX?

a. distribution
b. version
c. flavor
d. platform
ANSWER: c
RATIONALE: Each UNIX operating system is called a unique flavor of UNIX. For example,
FreeBSD and macOS are two different flavors of UNIX.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.3 - Describe the origins of the Linux operating system.
TOPICS: 1.3 The History of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

7. Which of the following types of servers can be used to cache requested Internet resources so that they can be
more quickly delivered to users requesting the same resource while at the same time reducing the burden on the
external network connection to the Internet for an organization?
a. file server
b. DNS server
c. proxy server
d. DHCP server
ANSWER: c
RATIONALE: A proxy server requests Internet resources on a user's behalf and can be configured to
cache results so that multiple users requesting the same content don't require
contacting the resource individually.

Page 3

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

8. Which of the following types of encryption uses a pair of keys known as public and private?

a. symmetric
b. asymmetric
c. SHA1 hashing
d. message digest
ANSWER: b
RATIONALE: Asymmetric encryption uses a public/private key pair. Symmetric encryption uses
a single key for encryption and decryption, while SHA1 hashing (also called a
message digest) does not use keys and is used to provide data validation only.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

9. When viewing the version number for a modern Linux kernel, what number indicates that it is a development
kernel?
a. major number
b. revision number
c. minor number
d. release candidate number
ANSWER: d
RATIONALE: A modern development kernel has a release candidate number appended to it. For
example, 5.19-rc8 is release candidate 8 of the 5.19 kernel.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 4

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

10. Which of the following is the greatest expense for companies using Linux?

a. additional software
b. operating system cost
c. hiring people to maintain the Linux system
d. software upgrades
ANSWER: c
RATIONALE: Outside of computer hardware costs, the hiring of staff to maintain the Linux system
is the greatest expense for companies using Linux. This is because Linux and most
Linux software are free and open source.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

11. In Linux, the core component of the GUI is known as:

a. GNOME
b. KDE
c. X Windows
d. Red Hat
ANSWER: c
RATIONALE: X Windows is the core component that provides GUI functionality on Linux systems.
Desktop environments, such as GNOME and KDE, run on top of X Windows to
provide a specific look and feel.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.4 Linux Distributions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

Page 5

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

12. An archive of files that usually contains source code or scripts that can be used to install software is referred
to as a:
a. router
b. package manager
c. DBMS
d. tarball
ANSWER: d
RATIONALE: Tarball is a compressed archive of files, very similar to WinZip or RAR files. It is
used for distributions or backup purposes.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where
to find them.
TOPICS: 1.4 Linux Distributions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

13. From what common Linux distribution is the Fedora Linux distribution derived?

a. Mandrake
b. SuSE
c. Debian
d. Red Hat
ANSWER: d
RATIONALE: Red Hat is one of the earliest and most common Linux distributions. Today, it is
available as Red Hat Enterprise Linux (RHEL) and Fedora.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where
to find them.
TOPICS: 1.4 Linux Distributions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

14. What service provides a method for the efficient transfer of files over the Internet?

a. FTP
b. HTML
c. SMTP

Page 6

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

d. Telnet
ANSWER: a
RATIONALE: The File Transfer Protocol (FTP) is the service that transfers files over the Internet. A
newer protocol that focuses on secure file transfer is called SFTP based on FTP.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

15. The iptables and nftables software on Linux is an example of what kind of software?

a. routing
b. anti-virus
c. firewall
d. proxy
ANSWER: c
RATIONALE: Both iptables and nftables are used to configure a set of rules necessary to make a
firewall.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

16. What piece of software tells the operating system how to use a specific hardware device?

a. graphical user interface


b. system service
c. device driver
d. user interface
ANSWER: c
RATIONALE: The device driver is responsible for communicating with the operating system on
how to establish communication with specific devices.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.1 - Explain the purpose of an operating system.

Page 7

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

TOPICS: 1.1 Operating Systems


KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

17. What type of software license does Linux adhere to?

a. permissive
b. freeware
c. closed source
d. copyleft
ANSWER: d
RATIONALE: Linux is licensed under the GNU General Public License (GPL), which is a type of
copyleft open source license.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

18. What are services running on a Linux server called?

a. daemons
b. service apps
c. containers
d. threads
ANSWER: a
RATIONALE: On Linux systems, services are commonly referred to as daemons. Containers
provide application and operating system virtualization, threads are execution units
for a process, and the term service app is not used.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

19. What Linux distribution is commonly used by cybersecurity professionals because it is packaged with
several security-related tools?

Page 8

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

a. Kali
b. Arch
c. Ubuntu
d. Gentoo
ANSWER: a
RATIONALE: Kali Linux is a security-focused Linux distribution often used by cybersecurity
professionals. While Ubuntu, Arch, and Gentoo Linux may also be used by
cybersecurity professionals, the security-related tools that are normally packaged with
Kali Linux will need to be installed manually after installation on these distributions.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where
to find them.
TOPICS: 1.4 Linux Distributions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

20. What culture led to the development of free and open source software, from which Linux is derived?

a. hacker
b. UNIX
c. free software
d. cracker
ANSWER: a
RATIONALE: The hacker culture led to the development of free and open source software, from
which Linux is derived.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.3 - Describe the origins of the Linux operating system.
TOPICS: 1.3 The History of Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

21. What common software component do all Linux distributions share at minimum?

a. compiler
b. kernel
c. package manager
d. X Windows
ANSWER: b

Page 9

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

RATIONALE: While Linux distributions may use different interfaces and software packages, they
all share the same Linux kernel.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where
to find them.
TOPICS: 1.4 Linux Distributions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

22. Amir is unfamiliar with Linux and would like to obtain physical help installing Linux on his laptop
computer. What resource would best suit Amir's needs?
a. online forum
b. LUG
c. Linux information website
d. social media website
ANSWER: b
RATIONALE: Linux User Groups (LUGs) are groups of Linux users who meet regularly to discuss
Linux-related issues and problems. Amir could bring his laptop computer to a LUG
to obtain help installing Linux from other LUG members.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

23. Which of the following job roles are most likely to use Linux on their workstation computer?

a. software developers
b. accountants
c. graphic artists
d. Windows server administrators
ANSWER: a
RATIONALE: The rich set of open source development tools and frameworks available for Linux
also makes Linux the preferred choice for software development workstations.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 10

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.5 - Explain the common uses of Linux in industry today.
TOPICS: 1.5 Common Uses of Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

24. Web app developers must regularly push new versions of their containerized web apps to the cloud. What is
this process called?
a. CI
b. build automation
c. orchestration
d. CD
ANSWER: d
RATIONALE: The process whereby developers push new web apps to the cloud is called
continuous deployment (CD).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.6 - Describe how Linux is used in the cloud.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.4 - Summarize common infrastructure as code technologies.
TOPICS: 1.6 Linux in the Cloud
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

Multiple Response

25. Which of the following are features of open source software (OSS)? (Choose all that apply.)

a. Software is developed through widespread collaboration.


b. Software bugs are fixed quickly.
c. Software features evolve based on users' needs.
d. The cost of the software is based on the number of software packages installed.
ANSWER: a, b, c
RATIONALE: Because open source software (OSS) is developed collaboratively, bugs are fixed
quickly and the software evolves based on users' needs. Linux and most software that
runs on Linux are open source and free of cost as a result.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Understand

Page 11

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

DATE CREATED: 5/1/2023 2:45 PM


DATE MODIFIED: 5/1/2023 2:45 PM

26. Which of the following types of hardware are supported by the Linux operating system? (Choose all that
apply.)
a. IoT devices
b. supercomputers
c. Internet servers
d. personal workstations
ANSWER: a, b, c, d
RATIONALE: Linux is available for nearly every hardware platform and type, including
workstations, servers, supercomputers, mobile, IoT, and custom hardware devices.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

27. What two Linux distributions utilize the Debian package manager by default?

a. Red Hat
b. openSUSE
c. Linux Mint
d. Ubuntu
ANSWER: c, d
RATIONALE: Linux Mint is a Debian-based distribution, focused on providing desktop and mobile
user capabilities. Ubuntu is a Debian-based distribution that is widely used in all
environments.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.4 - Identify the characteristics of various Linux distributions and where
to find them.
TOPICS: 1.4 Linux Distributions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

28. Which of the following software terms are equivalent? (Choose all that apply.)

a. MIT

Page 12

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 1: Introduction to Linux®.

b. FOSS
c. OSS
d. FLOSS
ANSWER: b, c, d
RATIONALE: Open source software (OSS) is also called free and open source software (FOSS) or
free/libre and open source software (FLOSS). MIT is a specific open source license.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.1.2 - Outline the key features of the Linux operating system.
TOPICS: 1.2 The Linux Operating System
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/1/2023 2:45 PM
DATE MODIFIED: 5/1/2023 2:45 PM

Page 13

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

1. Sandra needs to obtain the latest image of Fedora so that she can install it as a virtual machine on her
Windows workstation. Which of the following file formats is Sandra likely to find available for download from
Fedora's website that would allow her to use the file as the source for booting and installing Linux as a virtual
machine?
a. .zip
b. .tar.gz
c. .iso
d. .tgz
ANSWER: c
RATIONALE: This is a disk image that is commonly available to download from Linux
distribution sites and is meant to be burned to an optical disc, written to a USB
flash drive, or used as installation media for virtual machines.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

2. Dillon wants to install Fedora Linux on a workstation computer by booting from live installation media and
has already downloaded the live media ISO image for Fedora. What software can Dillon use on his Windows
PC to create a bootable USB flash drive from the live media ISO image? (Choose all that apply.)
a. Fedora Media Writer
b. disc burning software
c. Windows Explorer
d. balenaEtcher
ANSWER: a, d
RATIONALE: To write a live media ISO image to a USB flash drive, you can use the Fedora
Media Writer or balenaEtcher programs. Disc burning software is used to write a
live media ISO to a DVD.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM

Page 14

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

DATE MODIFIED: 5/2/2023 10:00 PM

3. Andre uses an Apple laptop and wishes to install Linux within a virtual machine on macOS. Which of the
following hypervisors can he install on macOS to create a Linux virtual machine? (Choose all that apply.)
a. Hyper-V
b. UTM
c. KVM
d. Parallels Desktop
ANSWER: b, d
RATIONALE: The Universal Turing Machine (UTM) and Parallels Desktop hypervisors are
available for macOS. Hyper-V is only available for Windows Systems and KVM is
only available on Linux systems.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

4. Which storage device name refers to the third partition on the second SAS SSD in a system?

a. sdc3
b. sdb2
c. sdb3
d. sdc2
ANSWER: c
RATIONALE: The first Serial Attached SCSI (SAS) SSD in the system is called sda, while the
second SAS SSD is called sdb. Partitions are numbered starting from 1 on each
storage device. Thus, the third partition on the second SAS SSD is sdb3.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

5. Which two partitions (and associated filesystems) must be created on a storage device at minimum during a
Linux installation? (Choose two.)
a. /

Page 15

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

b. swap
c. /boot
d. /home
ANSWER: a, c
RATIONALE: At minimum, a Linux system needs a /boot partition to store boot loader files and
the Linux kernel, as well as a / (root) partition to store the remainder of the
operating system files. A swap partition is not necessary since a Linux system can
use zswap or a swap file instead.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

6. What stores the partition configuration on storage devices that are larger than 2TB in size?

a. GUID
b. GPT
c. MBR
d. QEMU
ANSWER: b
RATIONALE: Storage devices that are larger than 2TB must use a GUID Partition Table (GPT)
to store partition configuration. GPTs allow for the creation of up to 128
partitions.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

7. Alexis is installing Linux on a new server system that will be used as a print server. Which directory should
Alexis choose to create as a separate filesystem during the installation to ensure that the print server cannot use
space on the / filesystem?
a. /var

Page 16

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

b. /usr
c. /home
d. /opt
ANSWER: a
RATIONALE: Because the /var directory contains print spools, it should be created as its own
filesystem during Linux installation to prevent printing services from using space
on the / filesystem.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

8. Sumbul has installed a new Fedora Linux system and configured a user account for herself. What command
can she run to set a password for the root user?
a. passwd
b. set-root
c. passwd --set-root
d. sudo passwd root
ANSWER: d
RATIONALE: The sudo passwd root command can be run following installation to set the root
user password.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

9. During a Fedora Linux installation, Harvey notices that the system has automatically configured a small
nvme0n1p1 partition with a vfat filesystem. Why did the system create this partition?
a. The computer has a UEFI BIOS.
b. The NVMe storage device uses an MBR.

Page 17

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

c. The NVMe storage device uses a GPT.


d. The computer has a standard BIOS.
ANSWER: d
RATIONALE: On systems that have a UEFI BIOS, the Linux installation program will create a
small UEFI System Partition formatted with the vfat filesystem to store operating
system boot files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

10. Which of the following can be used for virtual memory on a Linux system? (Choose all that apply.)

a. swap partition
b. swap disk
c. swap file
d. zswap
ANSWER: a, c, d
RATIONALE: Virtual memory (or swap) can be created from a partition, file, or a compressed
area of RAM using the zswap kernel feature.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.1 - Prepare for and install Fedora Linux using good practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 2.1 Installing Linux
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

11. What BASH shell prompt does the root user receive?

a. ?
b. %
c. #
d. $
ANSWER: c

Page 18

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

RATIONALE: The BASH shell provides regular users with a $ prompt and the root with a #
prompt.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.2 - Outline the structure of the Linux interface.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

12. What key combination can a local Linux user use to switch to the tty5 terminal?

a. Ctrl+5
b. F5
c. Ctrl+Alt+F5
d. \5
ANSWER: c
RATIONALE: You can use Ctrl+Alt+F# to switch to another terminal, where # is the number of the
terminal. Thus, Ctrl+Alt+F5 will switch to tty5 (local terminal 5).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.2 - Outline the structure of the Linux interface.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

13. Jayme is currently using a command-line terminal on a Linux server that does not have a GUI installed. He
would like to run commands within separate BASH shells in the terminal and observe the output of all
commands on the same screen. What program could Jayme use to obtain and view multiple BASH shells
simultaneously within his current terminal?
a. tmux
b. terminfo
c. screen
d. termx
ANSWER: a
RATIONALE: While you can use the screen or tmux commands to obtain and use multiple shells
within a single terminal, only the tmux command displays all shells (and the
associated command output) simultaneously on the terminal screen.
POINTS: 1

Page 19

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.2 - Outline the structure of the Linux interface.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

14. Which of the following are true of the echo command?

a. When used to display text, quotation marks are optional.


b. It can be used to display shell variables by including a $ sign in front of the variable name.
c. Including a semicolon at the end of the line will not affect the text being displayed.
d. All of the other options are true.
ANSWER: d
RATIONALE: All of the options are true. The echo command can be used to display text whether
the text is surrounded by quotation marks or not. It will display shell variables by
using the $ sign in front of the variable name. It will also execute the command
with a semicolon at the end and not affect the text. This is because you can run
multiple commands at the command line by separating them with semicolons, but
if there is only one command, it just stops after that command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

15. Dustin runs a command at the command line trying to find out what kernel version the system is running.
However, it doesn't give him the information he needs. He knows there is an option that can be used to display
the kernel version. How can he find out which option to use?
a. ver --help
b. help version
c. man uname
d. lsproc -?
ANSWER: c
RATIONALE: The man command will display the manual pages for a command. The uname
command will display system information. To display just the kernel version, he

Page 20

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

would be able to run the command and option combination of uname -v.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

16. When using command-line terminal, specific letters that start with a dash ("-") and appear after command
names are considered to be:
a. arguments
b. options
c. POSIX options
d. metacharacters
ANSWER: b
RATIONALE: Options are specific letters that start with a dash and are specific to the command.
The meaning of each letter depends on the task that needs to be performed and
whoever developed the command, determined which option would be used.
Options that start with two dashes are called POSIX options and are followed by a
word that indicates the task to be performed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

17. Which Linux command can be utilized to display your current login name?

a. who
b. whoami
c. id
d. w
ANSWER: b
RATIONALE: The whoami command displays the user's login name.
POINTS: 1

Page 21

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

18. In order to perform a series of commands as the root user, Parth would like to switch from his user account
to the root user account in his current terminal. What commands can Parth execute to achieve this? (Choose all
that apply.)
a. su
b. su -
c. su - root
d. su root
ANSWER: a, b, c, d
RATIONALE: The su command is used to switch to a new user account, and the - option can
optionally be used to load the target user's environment variables. If no target user
name is specified as an argument, the root user is assumed. Thus, all four options
will allow Parth to switch to the root user account.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

19. After a shell is no longer needed, what command can be given to exit the shell?

a. exit
b. stop
c. reset
d. quit
ANSWER: a
RATIONALE: The exit command allows you to exit out of your current shell.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 22

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

20. A calendar for the current month can be shown on the command line by issuing which command?

a. date
b. cal
c. w
d. id
ANSWER: b
RATIONALE: The cal command displays the calendar for the current month. The cal command
accepts different options that allow you to display the calendar according to the
options you choose.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

21. What metacharacter is used to perform command substitution?

a. @
b. ^
c. &
d. `
ANSWER: d
RATIONALE: The backquote (`) metacharacter is used to perform command substitution.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM

Page 23

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

DATE MODIFIED: 5/2/2023 10:00 PM

22. Louise has accidentally added an unnecessary metacharacter to a command that she executed and receives a
secondary prompt that requires additional input. What can Louise do to cancel her command and return to a
regular BASH shell prompt?
a. press Ctrl+c
b. execute the reset command
c. execute the exit command
d. execute the clear command
ANSWER: a
RATIONALE: Because Louise does not have access to a BASH shell prompt, she cannot execute
other commands. However, she can use the Ctrl+c key combination to cancel her
previous command and obtain a new BASH shell prompt.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

23. The apropos list command produces the same results as which command below?

a. man -j list
b. man -k list
c. man -l list
d. man -m list
ANSWER: b
RATIONALE: The command man -k is equivalent to apropos. Both commands will give the
exact same output on the terminal screen.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

Page 24

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

24. To learn more about the syntax of the logrotate file, Tristan executes the man logrotate command. However,
the manual page for the logrotate command is displayed instead. What command can Tristan use to view the
manual page for the logrotate file?
a. man -k logrotate
b. man 8 logrotate
c. man -f logrotate
d. man 5 logrotate
ANSWER: d
RATIONALE: File formats are listed in section 5 of the manual pages. However, the man
command searches starting from section 1 (user commands) by default. To search
the manual pages starting from section 5 for logrotate, Tristan can supply 5 as the
first argument to the man command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

25. After installing a new Linux system, Joel attempts to search the manual pages by keyword but no results are
displayed. What command should Joel run to remedy the issue?
a. makewhatis
b. mandb
c. info
d. man -k
ANSWER: b
RATIONALE: Immediately following a Linux installation, the manual pages may not be indexed
yet, and keyword searches will be unavailable. To index the manual pages, you
can use the mandb command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

Page 25

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

26. Which of the following commands can be used to display help for the exit shell function?

a. man exit
b. help exit
c. info exit
d. exit -h
ANSWER: b
RATIONALE: The help command is used to display usage information for shell functions.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.3 - Enter basic shell commands and find command documentation.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.103.1 - Work on the command line.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

27. Which of the following commands can be used to immediately power off a Linux system? (Choose all that
apply.)
a. shutdown -H now
b. poweroff
c. shutdown -h now
d. halt
ANSWER: b, c
RATIONALE: The poweroff and shutdown -h now commands will power off a system
immediately. The halt and shutdown -h now commands will halt the operating
system, but not call the BIOS ACPI function to power off the system.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.4 - Properly shut down the Linux operating system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

28. Ayushi needs to reboot a Linux system in 10 minutes. She wants to first warn any logged on users to save
their work and log off prior to the reboot. What command can Ayushi use?

Page 26

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 2: Linux® Installation and Usage.

a. echo
b. uname
c. wall
d. apb
ANSWER: c
RATIONALE: The wall (warn all) command can be used to send a message to all users on the
system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.2.4 - Properly shut down the Linux operating system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
TOPICS: 2.2 Basic Linux Usage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:00 PM
DATE MODIFIED: 5/2/2023 10:00 PM

Page 27

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

1. Kate wants to compare two text files to identify what might have been changed from one version to another.
Which of the following commands can she use to do this?
a. match document1.txt document2.txt
b. version --compare document1.txt document2.txt
c. compare document1.txt document2.txt
d. diff document1.txt document2.txt
ANSWER: d
RATIONALE: The diff command will compare the contents of two text files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.3 Displaying the Contents of Text Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

2. Mike has changed his current directory several times and has lost track of his location in the directory tree.
Which of the following commands can he use to tell him the full path to the current directory he is in?
a. cd -
b. pwd
c. cwd
d. ls -dir
ANSWER: b
RATIONALE: The pwd command prints the absolute pathname of the current directory to the
terminal screen.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and
absolute pathnames.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.1 The Linux Directory Structure
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

3. Which of the following commands will not interpret regular expressions, which translates into faster results
being returned? (Choose all that apply.)

Page 28

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

a. grep
b. grep -F
c. egrep
d. fgrep
ANSWER: b, d
RATIONALE: The grep -F command is the same as the fgrep command that is used to match
fixed strings rather than a pattern using regular expressions. The fgrep command
is the same as the grep -F command that is used to match fixed strings rather than
a pattern using regular expressions.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 3.5 Searching for Text Within Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

4. Jo has received a text file that contains multiple instances of his name spelled correctly as well as multiple
instances spelled as Joe. Which of the following commands would search a text file for any occurrences of
either spelling and display them out to the terminal? (Choose three.)
a. grep "Joe?" document1.txt
b. grep -E "Joe?" document1.txt
c. grep "Joe*" document1.txt
d. grep -E "Joe*" document1.txt
ANSWER: b, c, d
RATIONALE: The grep -E command interprets patterns as extended regular expressions. The
question mark is used to substitute any single letter, number, or character. The
asterisk will return instances where zero or more instances of "e". Answer a is not
valid because -E must be specified when using the "?" symbol.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 3.5 Searching for Text Within Files
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM

Page 29

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

DATE MODIFIED: 5/2/2023 10:01 PM

5. Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and
display them out to the terminal. Which of the following commands could Garrett use to perform this search?
a. grep -E "(John|Bob)" salesemployees.csv
b. grep (John|Bob) salesemployees.csv
c. grep -E (John|Bob) salesemployees.csv
d. egrep (John|Bob) salesemployees.csv
ANSWER: a
RATIONALE: The grep command has a -E option that specifies that it should use extended
regular expressions. When used inside parentheses, the pipe symbol can match
lines that contain either John or Bob, but the pipe symbol and parentheses must be
protected from shell interpretation using single or double quotes. The pipe symbol
is commonly used as an OR operator.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 3.5 Searching for Text Within Files
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

6. Chase is trying to extract records for employees 423 through 428 out of a comma separated values file that
starts with the employee number. Which of the following commands would accomplish this? (Choose all that
apply.)
a. grep 423,424,425,426,427,428 employees.csv
b. grep "^42[3-8]" employees.csv
c. grep "423-428" employees.csv
d. grep "[423-428]" employees.csv
ANSWER: b
RATIONALE: The first argument of the grep command accepts a regular expression, and the
second argument accepts the filename. The ^ regular expression matches a word
at the beginning of a line, while the square brackets match a single character.
Thus, ^42[3-8] would match lines that start with 42 followed by a single character
from 3 to 8. The ^ metacharacter must also be protected from shell interpretation
using either single quotes, double quotes, or a backslash character.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 30

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 3.5 Searching for Text Within Files
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

7. When using the vi text editor, which of the following keys, when in command mode, will change to insert
mode and place the cursor at the end of the current line?
a. i
b. a
c. I
d. A
ANSWER: d
RATIONALE: A capital A will change to insert mode and move to the end of the current line to
append new text.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.6 Editing Text Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

8. When using the vi text editor, which of the following keys, when in command mode, will move to the last
line in the document?
a. G
b. L
c. P
d. W
ANSWER: a
RATIONALE: A capital G will move the cursor to the last line in the document.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.

Page 31

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

TOPICS: 3.6 Editing Text Files


KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

9. What commands can be used to view a large text file interactively, page-by-page? (Choose all that apply.)

a. more
b. cat
c. page
d. less
ANSWER: a, d
RATIONALE: The more and less commands display a text file interactively. Both can be used to
view a text file page-by-page and line-by-line, while the less command also
allows cursor key scrolling.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.3 Displaying the Contents of Text Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

10. In order to move from the /home/joe/test/data directory to the /home/joe directory, what command should be
issued?
a. cd ..
b. cd ../..
c. /home/joe
d. cd ./..
ANSWER: b
RATIONALE: The cd ../.. command allows you to move two parent directories closer to the root
from the current directory. This command will move you to the /home/joe
directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and
absolute pathnames.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.1 The Linux Directory Structure

Page 32

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

KEYWORDS: Bloom's: Remember


DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

11. If enough unique letters of a directory name have been typed, what key can be pressed to activate the BASH
shell's completion feature?
a. Alt
b. Tab
c. Ctrl
d. Esc
ANSWER: b
RATIONALE: The Tab key provides the auto completion feature. If there are multiple files or
commands that match with the auto completion feature, the terminal provides
available options for the user to choose from when auto completing the remainder
of the command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and
absolute pathnames.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.1 The Linux Directory Structure
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

12. When issuing the ls -F command, what special character appended to the filename indicates that the file is a
shortcut to another file?
a. @
b. *
c. &
d. =
ANSWER: a
RATIONALE: The @ symbol appended to the filename in the output of ls -F indicates that the
file is a symbolically linked (shortcut) file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories

Page 33

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

KEYWORDS: Bloom's: Remember


DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

13. Select the command that can be used to provide a long listing for each file in a directory:

a. ls -t
b. ls -L
c. ls -F
d. ls -l
ANSWER: d
RATIONALE: The ls -l is used to provide a detailed (or long) listing for each file in a certain
directory. This listing includes type, mode, link count, ownership, modification
date and size information.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

14. What command can be used to display the last five lines of a text file?

a. end -5
b. head -5
c. cat -n 5
d. tail -5
ANSWER: d
RATIONALE: The tail command by default retrieves the last 10 lines on a file. However, by
specifying a number after the dash (-), the user has the capability to customize the
number of lines to retrieve. In this example, -5 is used to display the last five lines
on the file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.3 Displaying the Contents of Text Files
KEYWORDS: Bloom's: Apply

Page 34

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

DATE CREATED: 5/2/2023 10:01 PM


DATE MODIFIED: 5/2/2023 10:01 PM

15. Select the regular expression metacharacter that matches 0 or more occurrences of the previous character.

a. *
b. ?
c. +
d. ^
ANSWER: a
RATIONALE: While using regular expressions, the * permits you to match 0 or more
occurrences of the previous character.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.6 - Search text files for regular expressions using grep.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 3.5 Searching for Text Within Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

16. Which of the following key combinations, commonly used in the vi editor command mode, displays current
line statistics?
a. Alt+s
b. Alt+x
c. Ctrl+g
d. Ctrl+P
ANSWER: c
RATIONALE: Ctrl+g displays current line statistics, including the filename, current line number,
total lines in a file, and the percentage (%) of file location.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.6 Editing Text Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

Page 35

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

17. To display a text file in reverse order, what command should be used?

a. cat
b. tac
c. tee
d. sed
ANSWER: b
RATIONALE: The tac command (tac is cat spelled backwards) is used to display a file in reverse
order.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.3 Displaying the Contents of Text Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

18. What command is most effective at identifying different types of files?

a. ls -F
b. ls -l
c. ll
d. file
ANSWER: d
RATIONALE: The file command provides information about a file's type by examining the file
contents. As a result, it can differentiate between different types of text, data, and
binary files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

19. At the vi command mode prompt, what key combination will force a quit from the vi editor without saving
changes?
a. :q

Page 36

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

b. :q!
c. :exit
d. :!
ANSWER: b
RATIONALE: The :q! quits vi regardless of whether the last changes have been saved for the
current vi execution.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.7 - Use the vi editor to manipulate text files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.6 Editing Text Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

20. Wayne is using the command line and is in his home directory. Which of the following will display a list of
all files and their sizes from his home directory? (Choose two.)
a. ls -ax
b. ls -al ~
c. ls -ax ~
d. ls -al /home/wayne
ANSWER: b, d
RATIONALE: The -a option will list all files and the -l option will list extra information about
them, including file sizes. The tilde is a shortcut way of referencing a user's home
directory.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

21. Which of the following text editors is easy to use and favored by new Linux users as a result?

a. vi
b. emacs
c. vim

Page 37

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

d. nano
ANSWER: d
RATIONALE: The nano editor is often used by new Linux users because of its low learning
curve.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.8 - Identify common alternatives to the vi editor.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.8 - Basic file editing.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.6 Editing Text Files
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

22. Which of the following are valid file types in Linux? (Choose all that apply.)

a. named pipes
b. directories
c. linked files
d. special device files
ANSWER: a, b, c, d
RATIONALE: Text files, binary data files, executable program files, linked files, special device
files, named pipes, and sockets are all valid file types in Linux. Directories are
also files on Linux systems that function to organize other files.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.2 - Describe the various types of Linux files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

23. Which of the following information does the stat command display about a file? (Choose all that apply.)

a. The time a file was created


b. The file size
c. The last time a file was accessed
d. The last time the contents of a file were modified
ANSWER: a, b, c, d
RATIONALE: The stat command displays detailed information about a file, including the size,

Page 38

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

creation, modification, access timestamps.


POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

24. Which of the following will display a list of files and directories under the /bin directory? (Choose all that
apply.)
a. file /bin
b. ls -R /bin
c. tree /bin
d. tree -d /bin
ANSWER: b, c
RATIONALE: The -R option to the ls command, as well as the tree command (without
arguments) displays files and subdirectories recursively.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.3 - View filenames and file types.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

25. Abdul wishes to view the contents of a binary data file in his home directory to learn more about what
program was used to create it. Which of the following commands would allow Abdul to safely view the
contents of this file?
a. strings
b. file
c. grep
d. cat
ANSWER: a
RATIONALE: The strings command is safe to use on any file type and will print any text strings
that are present within the file contents.

Page 39

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.5 - Display the contents of text files and binary files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.4 Displaying the Contents of Binary Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

26. Which of the following commands change the current directory using an absolute pathname? (Choose all
that apply.)
a. cd /
b. cd ..
c. cd Desktop
d. cd /etc
ANSWER: a, d
RATIONALE: Absolute pathnames start from the root directory and must begin with /.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.1 - Navigate the Linux directory structure using relative and
absolute pathnames.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.1 The Linux Directory Structure
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

27. The current directory contains eight project files named project1.txt through project8.txt. Which of the
following commands will display the file type for all project files in the current directory except for project2.txt
and project7.txt?
a. file project1,3-6,8*
b. file project[&27]*
c. file project(1,3-6,8)*
d. file project[!27]*
ANSWER: d
RATIONALE: The square bracket wildcard metacharacters are used to match a single character,
and a ! character within these square brackets reverses the match condition. Thus
[!27] would match any character except 2 or 7.
POINTS: 1

Page 40

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 3: Exploring Linux® Filesystems.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.4 - Use shell wildcards to specify multiple filenames.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

28. Which of the following commands will display lines that start with Label in all .conf files in the /etc/selinux
directory?
a. grep "^Label" /etc/selinux/*.conf
b. grep "^Label" /etc/selinux/conf$
c. grep 'Label$' /etc/selinux/*.conf
d. grep 'Label$' /etc/selinux/conf$
ANSWER: a
RATIONALE: When searching for text, you must use regular expressions, and when searching
for filenames, you must use wildcard metacharacters. Thus, the first argument of
the grep command accepts a regular expression, and the second argument accepts
wildcard metacharacters. The ^ regular expression matches a word at the
beginning of a line, while the * wildcard matches zero or more characters in a
filename. The ^ metacharacter must also be protected from shell interpretation
using either single quotes, double quotes, or a backslash character.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.3.4 - Use shell wildcards to specify multiple filenames.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.7 - Search text files using regular expressions.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 3.2 Viewing Files and Directories
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

Page 41

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

1. Lynn runs the locate command and the results include many files from a directory that she doesn't want to
include in her search. Which of the following files could Lynn modify so that the locate command no longer
includes those results?
a. /etc/locate.d/updatedb.conf
b. /etc/locate.conf
c. /etc/updatedb.conf
d. /etc/locatedb.conf
ANSWER: c
RATIONALE: The locate command uses the configuration file located at /etc/updatedb.conf.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.3 Finding Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

2. Which of the following commands will return the absolute path on the filesystem to the grep binary
executable? (Choose all that apply.)
a. which grep
b. whereis grep
c. type grep
d. find grep
ANSWER: a, b
RATIONALE: The which grep command will return the alias and location of only the grep
executable. The whereis grep command will return the location of the grep
executable and its manual page. The type grep command will return either the
alias (if it exists) or location of the grep executable only. Because grep is
normally aliased on Linux systems, the type command will only display the alias
and not the location of the grep executable.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.3 Finding Files
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

Page 42

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

3. Mindy wants to create a new subdirectory at ~/2023projects/projectx/projectplans to start storing the initial
project plans for projectx. However, this is the first project she has worked on in 2023 and the 2023projects
directory does not exist yet. Which of the following commands will create the higher level directories if they do
not already exist?
a. mkdir -r ~/2023projects/project/projectplans
b. mkdir -p ~/2023projects project/projectplans
c. mkdir --all ~/2023projects/project/projectplans
d. mkdir -v ~/2023projects/project/projectplans
ANSWER: b
RATIONALE: The -p option will create parent directories when they do not already exist. To
learn available options to Linux commands, recall that you can consult the manual
pages. For this question, the man mkdir command will provide the information
necessary.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.2 Managing Files and Directories
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

4. Which of the following commands can be used to update the last modified timestamp on a file, or if the file
specified does not exist will create the file?
a. update file.txt
b. updatets file.txt
c. touch file.txt
d. stamp file.txt
ANSWER: c
RATIONALE: The touch command will update the last modified date on a file when used on a
file that exists. When used on a file that does not exist, it will create a blank file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM

Page 43

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

DATE MODIFIED: 5/2/2023 10:01 PM

5. Which of the following commands can be used to ensure that no user on the system, including the root user,
can modify the contents of the securedata.bin file?
a. chmod 000 securedata.bin
b. setfacl -b securedata.bin
c. chattr +i securedata.bin
d. chown nobody:nobody securedata.bin
ANSWER: c
RATIONALE: The immutable attribute can be set using the chattr +i command to prevent any
user from modifying or deleting a file. Modifying permissions will not satisfy the
requirements as the root user can supersede all permissions on a system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.10 - View and set filesystem attributes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

6. Which of the following commands will delete a directory and all of the files contained within it?

a. rm olddir
b. rmdir olddir
c. rm -rf olddir
d. rmdir -rf olddir
ANSWER: c
RATIONALE: The -r option for the rm command will recursively delete directories as well as
any subdirectories contained within them, as well as files contained in any of
those directories or subdirectories. The -f option is to force delete them without
asking for confirmation on each file or subdirectory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.2 Managing Files and Directories
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM

Page 44

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

DATE MODIFIED: 5/2/2023 10:01 PM

7. Jim wants to rename a directory for a project that he has been working on. Which of the following commands
can he use to perform that action?
a. mv projectx projecty
b. rn projectx projecty
c. ren projectx projecty
d. move projectx projecty
ANSWER: a
RATIONALE: The mv command can be used to move a directory from one location to another.
If the target location does not exist, the mv command renames the directory the
target name.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.4 - Use standard Linux commands to manage files and directories.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.2 Managing Files and Directories
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

8. Which of these commands will set the following permissions on file1.txt?


User = Read, Write, Execute
Group = Read, Execute
Others = Read
a. chmod o=rwx,g=rx,u=r file1.txt
b. chmod u=rwx,g=rx,u=r file1.txt
c. chmod 754 file1.txt
d. chmod 321 file2.txt
ANSWER: b, c
RATIONALE: The chmod command can be used to set permissions by specifying the exact
permissions (r, w, and/or x) for users (u), group (g), and others (o) followed by
the filename they are to be set for. The chmod command can be used to set
permissions by specifying them in octal format. Read has a value of 4, write has a
value of 2, and execute has a value of 1. They are in the order of user, group, and
then other. You just have to add up the values of each of the permissions for each
of the places. Read (4) + Write (2) + Execute (1) for the user gives us 7 as the first
character. Read (4) + Execute (1) gives us 5 for the group. Read (4) only is set for
all other users. The full result is 754. The syntax is important so after the chmod
comes the permissions to be set followed by the filename(s).
POINTS: 1

Page 45

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

QUESTION TYPE: Multiple Response


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

9. Which of the following umask settings will result in new files receiving the default permissions rw-------?

a. 177
b. 600
c. 188
d. 688
ANSWER: a
RATIONALE: New files receive rw-rw-rw- (666) from the system, minus those removed by the
umask. If the x (1) for user, rwx (7) for group, and rwx (7) for others in the
umask, the default permissions should be rw-------.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.7 - Identify the default permissions created on files and directories.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

10. Which of the following are valid permissions for a directory where the command chmod 1777 has been used
to set the permissions on it?
a. rwxrwxrwt
b. rwxrwxrwx
c. rwsrwsrwt
d. rwxrwxrwT
ANSWER: a
RATIONALE: The chmod 1777 command will set all permissions for user, group, and other
categories on the directory as well as the sticky bit permission. This results in a
lowercase t being shown instead of an x in the other permission category (an
uppercase T would indicate the absence of an underlying x permission for other).
The sticky bit will allow all users to add files to the directory, but only remove
files they have added.

Page 46

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.8 - Apply special file and directory permissions.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

11. What would be the result of running the command chown :root file1.txt?

a. This would set the owner of file1.txt to root.


b. This would set the group ownership of file1 to root.
c. This would set the owner and group ownership of file1 to root.
d. This would keep the current ownership of the file, and add root as a second owner of the file.
ANSWER: b
RATIONALE: The full syntax is chown user:group filename. The user and group are both
individually optional. You can specify one, the other, or both.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.5 - Modify file and directory ownership.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

12. Which of the following options will change the ownership of files and directories recursively within a
directory? (Choose all that apply.)
a. -a
b. -R
c. --recursive
d. --all
ANSWER: b, c
RATIONALE: The -R option will recursively change ownership on files and subdirectories
within a directory. The --recursive option is the POSIX version of the -R option.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False

Page 47

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.5 - Modify file and directory ownership.


ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

13. Which of the following indicate a symbolic link when displayed with the ls -l command?

a. -rw-r--r--
b. srwxrwxrwx
c. lrwxrwxrwx
d. srw-r--r--
ANSWER: c
RATIONALE: A symbolic link will have the first letter as a lowercase l with the read, write, and
execute bits set for user, group, and others.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.4 Linking Files
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

14. If a hard link is created to a file and then the original file is deleted, which of the following is true?

a. Both the original file and the hard link are removed.
b. An error message will be displayed preventing the deletion of the original file.
c. The original file will be removed while the hard link remains, though the content will not be
accessible.
d. The original file will be removed while the hard link remains usable to access the contents of the file.
ANSWER: d
RATIONALE: When the original file is deleted, since the hard link points to the same inode, the
contents of the inode are still accessible via the hard link.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.

Page 48

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

TOPICS: 4.4 Linking Files


KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

15. Which of the following commands will create a symbolic link named foo.txt to an original file named
bar.txt?
a. ln bar.txt foo.txt
b. ln foo.txt bar.txt
c. ln -s bar.txt foo.txt
d. ln -h foo.txt bar.txt
ANSWER: c
RATIONALE: The ln command requires the -s option to be used in order to create a symbolic
link. The ln command should be followed by the name of the original file and
then the name of the link to create.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.4 Linking Files
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

16. Jamie has created a hard link to another file within the same directory. Which of the following commands
can he use to verify that the hard link was created correctly? (Choose all that apply.)
a. ls -il
b. ls -i
c. ls -l
d. ls -al
ANSWER: a, b
RATIONALE: The -i option will display the inode of the file while the -l will show extra details
about the file. A hard link and the original file will have the same inode number.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.4 Linking Files

Page 49

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

KEYWORDS: Bloom's: Understand


DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

17. Jean installs a distribution of Linux on a workstation and attempts to run the locate command to find a
certain file. Instead of returning the results she expected, an error message is displayed that it cannot find the
plocate.db file in its default location. Which of the following commands should Jean run in an attempt to
resolve this problem?
a. apt upgrade plocate
b. updatedb
c. locate --update
d. mlocate --update
ANSWER: b
RATIONALE: The updatedb command is usually run daily by cron to update the default
database. However, until it is run for the first time, the locate command will be
unable to search an index of the files on the system. This means that it may be
necessary to run the updatedb command manually before the locate command can
be used for the first time.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.3 Finding Files
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

18. Julian notices a + symbol following the mode of a file when running the ls -l command. What command
should Julian run next to view the information provided by the + symbol?
a. getfacl
b. chlist
c. lsattr
d. ls -Fa
ANSWER: a
RATIONALE: The + symbol following the mode indicates that there are additional entries in the
ACL of the file. You can use the getfacl command to view those additional
entries.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.9 - Modify the default access control list (ACL).

Page 50

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.


Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

19. Which of the following commands can be used to recursively search through the directory tree in search of a
file that meets a set of given criteria instead of using an indexed database?
a. locate
b. mlocate
c. find
d. where
ANSWER: c
RATIONALE: The find command can be used to recursively search the directory tree instead of
using an indexed database of files. This means that it is a slower alternative when
looking for files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.3 Finding Files
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

20. Which of the following commands will display all files and directories within the /var/log directory or its
subdirectories that are owned by the root user?
a. find /var/log -user root
b. find -uid root -print /var/log
c. find -user root -print /var/log
d. find -start /var/log -user root
ANSWER: a
RATIONALE: After the find command, you should specify the base directory or subdirectory
where you want to limit the search to (including any subdirectories contained
within), and then the user option can narrow the list of files returned to only those
owned by a particular username.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 51

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.1 - Find files and directories on the filesystem.


ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 4.3 Finding Files
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

21. The Filesystem Hierarchy Standard specifies what directory as the root user's home directory?

a. /bin
b. /home/root
c. /boot
d. /root
ANSWER: d
RATIONALE: The root user's home directory is /root.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.3 - Explain the function of the Filesystem Hierarchy Standard.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.7 - Find system files and place files in the correct location.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 4.1 The Filesystem Hierarchy Standard
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

22. What argument can be used with the chmod command to add read permission and remove write permission
for the group owner of a file?
a. u+r+w
b. g-r+w
c. g+r-w
d. o+r-w
ANSWER: c
RATIONALE: Group owners are indicated by the g symbol. The plus (+) symbol adds
permission. The minus (-) symbol removes permission.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions

Page 52

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

KEYWORDS: Bloom's: Apply


DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

23. In order to set all of the special permissions on a certain file or directory, which command should be used on
a file named filename?
a. chmod 777 filename
b. chmod 7777 filename
c. chmod 6666 filename
d. chmod 0000 filename
ANSWER: b
RATIONALE: In the chmod 7777 command, the first number represents the SUID(4), SGID(2),
and sticky bit(1) permissions. Combined, these are indicated by a first number of
7 (4+2+1=7).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.8 - Apply special file and directory permissions.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

24. Nicholas wants to identify the other files that are hard linked to a particular file. He issues the ls -li
command and notes that the file has a link count of 4 and inode number of 3456. Which of the following
commands could he use to locate the other hard linked files on the system?
a. ls -h 4
b. ls -h 3456
c. find / -inum 4
d. find / -inum 3456
ANSWER: d
RATIONALE: Hard links share the same inode number. As a result, you can use the -inum
search option to the find command to locate them on the system. To locate all
files starting from the / directory that have inode number 3456, you can use the
find / -inum 3456 command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.2 - Describe and create linked files.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.6 - Create and change hard and symbolic links.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.

Page 53

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

TOPICS: 4.4 Linking Files


KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

25. Jan needs to set permissions on a file so that the owner has read, write, and execute permissions. The group
should have read permissions only, and everyone else should have no access. Which of the following
parameters, when used with the chmod command, would set the permissions described?
a. 047
b. 740
c. 026
d. 620
ANSWER: b
RATIONALE: The permissions are set from left to right for owner (user), group, and everyone
else (other). Read = 4, Write = 2, and Execute = 1. A 7 in the user placeholder is
equal to 4 + 2 + 1, or Read + Write + Execute. A 4 in the group placeholder
means only the read bit is turned on. A 0 in the other placeholder means that none
of the permissions are set.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

26. Jose needs to ensure that members of the newly created acctg group have read and write permissions on the
project.csv file. However, he cannot modify the existing group owner on the file, and other users cannot be
allowed access to the file via the other category in the mode. Which of the following commands can Jose use to
achieve his goal?
a. chmod 2660 project.csv
b. setfacl -m g:acctg:rw project.csv
c. chmod 1660 project.csv
d. setfacl -a acctg -p rw project.csv
ANSWER: b
RATIONALE: The setfacl -m command can be used to add additional user and group categories
to the mode of a file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 54

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.9 - Modify the default access control list (ACL).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

27. Nashina is logged in as the root user account on a production Linux server but is unable to modify a
particular configuration file. What command can be used to verify whether the configuration file is read-only?
a. ls -li
b. getfacl
c. lsattr
d. chmod --list
ANSWER: c
RATIONALE: The lsattr command can be used to list file attributes, including the immutable
attribute that sets a file read-only for all users (including root).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.10 - View and set filesystem attributes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

28. Jillian performs a long listing on a directory and notices that a file called securedata.xml has an owner of
bparsons, group owner of ctlgroup, and mode of rw-r-----. What permissions does the root user have to this file?
a. rwx
b. rw
c. r
d. no permissions
ANSWER: a
RATIONALE: The owner (bparsons) has rw- to the file, the group owner (ctlgroup) has r--
permissions to the file, and other users have --- (no permissions) to the file.
However, the root user can supersede all permissions and hence has all
permissions (rwx) to the file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 55

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 4: Linux® Filesystem Management.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.4.6 - Define and change Linux file and directory permissions.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.5 - Manage file permissions and ownership.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 4.5 File and Directory Permissions
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

Page 56

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

1. Which of the following commands can be used to display the filesystem and partition UUIDs on a Linux
system?
a. e2label
b. blkid
c. fatlabel
d. showpart
ANSWER: b
RATIONALE: The blkid command can be used to display the filesystem and partition UUIDs on
a Linux system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

2. Jackson wants to automatically mount a secondary internal hard drive when his Linux workstation boots up.
In which of the following files should he configure an entry for the partition on the drive that he wants to
mount?
a. /etc/ftab
b. /etc/crontab
c. /etc/mtab
d. /etc/fstab
ANSWER: d
RATIONALE: Partitions that should be mounted at boot time are normally configured in the
/etc/fstab file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux
directory tree.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM

Page 57

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

DATE MODIFIED: 5/2/2023 10:01 PM

3. Which of the following can be used to show the block devices on a Linux system? (Choose two.)

a. ls /sys/block
b. cat /proc/block
c. lsblk
d. ls /etc/block
ANSWER: a, c
RATIONALE: The /sys/block directory contains the block devices on a Linux system.nd repair
quota files. The lsblk command will not only show the block devices on a Linux
system, but will also show information such as their major and minor numbers,
size, and whether it is readonly.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

4. Aria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk
command indicates that the new partition information must be manually reloaded. Which of the following
should she do next? (Choose two. Either answer is independently correct.)
a. Run the parted command.
b. Run the partprobe command.
c. Run the cfdisk program.
d. Reboot the system.
ANSWER: b, d
RATIONALE: The partprobe command will reload the partition information from the MBR or
GPT into memory. Rebooting the system is the most reliable way of making sure
the partition information is reloaded into memory.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the

Page 58

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

appropriate tools.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

5. Which of the following would be the device file for the third partition on the second SATA drive on a Linux
system?
a. /dev/hdb3
b. /dev/hdc2
c. /dev/sdb3
d. /dev/sdc2
ANSWER: c
RATIONALE: SATA devices start with sd. The second SATA drive is sdb, which should be
followed by the partition number of 3 for /dev/sdb3.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev
directory.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

6. Sharon has inserted a USB flash drive into her Linux workstation while using the GNOME desktop
environment. After opening a Terminal app, what directory can she change to in order to access the contents of
the filesystem on the USB flash drive if the drive is labeled as BACKUPS?
a. /media/BACKUPS
b. /mnt/BACKUPS
c. /home/sharon/BACKUPS
d. /run/media/sharon/BACKUPS
ANSWER: d
RATIONALE: The automounter daemon within a desktop environment automatically mounts
removeable media under the /run/media/username/label directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux
directory tree.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.

Page 59

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the


appropriate tools.
TOPICS: 5.5 Working with Removeable Media within a Desktop Environment
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

7. Which of the following is required as a separate partition in order to use LVM?

a. /var
b. /boot
c. /tmp
d. /home
ANSWER: b
RATIONALE: The /boot directory is a required separate partition in order to use LVM on the
Linux operating system as the kernel in the /boot directory must first be loaded in
order for the system to process logical volumes.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.6 - Use the LVM to create and manage logical volumes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.1 - Design hard disk layout.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

8. If the mkfs command is executed to create a filesystem and only the block device name is specified, which of
the following filesystems will be created?
a. exFAT
b. ext2
c. ext3
d. ext4
ANSWER: b
RATIONALE: If the −t option is not specified to indicate the type of file system, the default ext2
filesystem is used.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.

Page 60

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the


appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

9. Which of the following commands can be used to create an exFAT filesystem on a USB thumb drive that is
recognized as /dev/sdb? (Choose all that apply.)
a. mkfs.exfat /dev/sdb1
b. mkfs exfat /dev/sdb1
c. mkexfatfs /dev/sdb1
d. mke2fs.exfat /dev/sdb1
ANSWER: a, c
RATIONALE: The mkfs.exfat and mkexfatfs commands can create an exFAT filesystem. The
mkfs command would need the −t option to specify exfat.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

10. Clint has run the command parted /dev/sdb and wants to display a list of the existing partitions that exist on
that drive. Which of the following commands can he use to display the existing partitions?
a. disp
b. list
c. print
d. display
ANSWER: c
RATIONALE: The print command while in the parted utility will display a list of existing
partitions on a hard drive.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.

Page 61

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.


Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

11. Which of the following commands can be used to create and activate a swap partition on a Linux system?
(Each answer represents part of the whole.)
a. mkswap /dev/sda6
b. mke2swap /dev/sda6
c. mkswap −on /dev/sda6
d. swapon /dev/sda6
ANSWER: a, d
RATIONALE: The mkswap command is the first part of the two commands necessary to create
the swap partition. After it is created, you must run the swapon command. The
swapon command is the second part of the two commands necessary and will
activate the partition created by the mkswap command.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

12. Which of the following commands will prompt to convert an MBR partition to GPT, thus destroying all
existing MBR partitions on a disk?
a. gdisk
b. cfdisk
c. gfdisk
d. iconv
ANSWER: a
RATIONALE: The gdisk command, when used on an MBR partition, will prompt to convert to
GPT. If you choose to allow it to do this, it will destroy all existing MBR
partitions on a disk.
POINTS: 1

Page 62

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.4 - Create and manage filesystems on hard disk drives, SSDs, and
removable media storage devices.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

13. Callie wants to make sure that a filesystem is checked every 20 days. Which of the following options, when
used with the tune2fs command, would set a full filesystem check to run every 14 days?
a. −i 14
b. −i 14d
c. −d 14
d. −i 336
ANSWER: b
RATIONALE: To set the interval to 14 days, you need to use the −i option and specify 14d as the
interval.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.8 - Check filesystems for errors.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.7 Monitoring Filesystems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

14. Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the
following commands will compact or otherwise improve the layout of the contiguous blocks of file data for an
XFS filesystem?
a. defrag
b. xfs_fsr
c. fsck
d. xfs_db
ANSWER: b
RATIONALE: The xfs_fsr command will compact or otherwise improve the layout of the
extents, or contiguous blocks of data, for an XFS filesystem.

Page 63

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.8 - Check filesystems for errors.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.7 Monitoring Filesystems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

15. Which of the following commands produce many pages of results when run from the "/" directory?

a. fdisk --list
b. ls -al
c. df
d. du
ANSWER: d
RATIONALE: The du, or directory usage, command lists file space usage and includes all of the
recursive directories contained within whatever directory the command is run
from.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.7 - Monitor free space on mounted filesystems.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.7 Monitoring Filesystems
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

16. Which of the following commands can be used to show the block devices, including their major and minor
numbers, on a system which are located in the /sys/block directory?
a. lsblk
b. cat /sys/block
c. ls -al /sys/block
d. lsblock
ANSWER: a
RATIONALE: The lsblk command can be used to display block devices on a system, including
their major and minor numbers.
POINTS: 1

Page 64

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev
directory.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

17. Which of the following can be used to specify a filesystem to mount in /etc/fstab? (Choose all that apply.)

a. A device path such as /dev/sdb2


b. A filesystem UUID
c. A filesystem label
d. A filesystem nickname configured in /etc/mtab
ANSWER: a, b, c
RATIONALE: A device path such as /dev/sdb2 can be used to mount a filesystem. A filesystem
UUID can be used to mount a filesystem. A filesystem label can be used to mount
a filesystem.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux
directory tree.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

18. Elijah is done working with an external USB hard drive and wants to properly disconnect it. Which of the
following commands should he use before unplugging the USB cable?
a. unmount
b. disable
c. umount
d. mount --eject
ANSWER: c
RATIONALE: The umount command can be used to unmount a filesystem.
POINTS: 1

Page 65

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux
directory tree.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.3 Working with USB Flash Drives
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

19. Which two commands can be used to add the /dev/nvme3n1p1 partition to the existing storage1 volume
group? (Choose two.)
a. pvcreate /dev/nvme3n1p1
b. vgcreate /dev/nvme3n1p1
c. vgextend storage1 /dev/nvme3n1p1
d. lvextend storage1 /dev/nvme3n1p1
ANSWER: a, c
RATIONALE: The pvcreate command adds the partition to the LVM (assigning it as a physical
volume), while the vgextend command can be used to allocate the storage in the
physical volume to an existing volume group. Following this, logical volumes can
be created or extended from the addition volume group capacity.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.6 - Use the LVM to create and manage logical volumes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

20. Which command can be used to create a logical volume called data1 from 80TB of available space within
the storage1 volume group?
a. lvcreate −L 80TB −n storage1 data1
b. lvextend +80TB storage1 data1
c. lvcreate −L 80TB −n data1 storage1
d. lvextend +80TB data1 storage1
ANSWER: c
RATIONALE: The lvcreate command can be used to create a new logical volume. The −L option

Page 66

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

to this command specifies the size, the −n option specifies the logical volume
name, and the final argument is the volume group to obtain storage from.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.6 - Use the LVM to create and manage logical volumes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.6 Working with Hard Disk Drives and SSDs
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

21. Which of the following commands can be used to scan a filesystem for disk usage, as well as create, check,
and repair quota files?
a. quota
b. edquota
c. chkquota
d. quotacheck
ANSWER: d
RATIONALE: The quotacheck command can be used to scan a filesystem for disk usage, as well
as create, check, and repair quota files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.9 - Use disk quotas to limit user space usage.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 5.8 Disk Quotas
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

22. Which of the following directories is created by default when an ext2, ext3, or ext4 filesystem is created on a
device?
a. crash
b. tmp
c. lost+found
d. proc
ANSWER: c
RATIONALE: The lost+found directory is created by default when an ext2, ext3, or ext4
Page 67

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

filesystem is created on a device. It is used by the fsck utility to store files that
cannot be repaired.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.8 - Check filesystems for errors.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.7 Monitoring Filesystems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

23. After using the DVD drive on his Linux computer, John pushes the eject button on the front of the drive but
it doesn't eject the DVD. Which of the following commands should he run? (Choose all that apply.)
a. unmount /dev/sr0
b. umount /dev/sr0
c. eject /dev/sr0
d. detach /dev/sr0
ANSWER: b, c
RATIONALE: The umount command along with device can be used to unmount the DVD and
allow the user to eject the disc. The eject command along with device can be used
to unmount the DVD and then sends the command to the drive to eject the disc.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.3 - Mount and unmount filesystems to and from the Linux
directory tree.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.4 Working with CDs, DVDs, and ISO Images
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

24. The quotas for certain users can be edited by using which command?

a. edquota
b. chquota
c. usrquota
d. repquota
ANSWER: a

Page 68

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

RATIONALE: The edquota command allows system administrators to edit the quotas for certain
users.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.9 - Use disk quotas to limit user space usage.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.8 Disk Quotas
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

25. Which of the following commands can be used to create an ISO image from the contents of the /backups
directory?
a. mkfs −t iso9660 −n image.iso /backups/*
b. mkfs −t udf −n image.iso /backups/*
c. mkisofs −RJ −o image.iso /backups/*
d. isoimage --create image.iso /backups/*
ANSWER: c
RATIONALE: The mkisofs command can be used to create an ISO image.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.5 - Create and use ISO images.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.1 - Create partitions and filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.4 Working with CDs, DVDs, and ISO Images
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

26. Which of the following commands can be used to list detailed information for a hardware device on the
system?
a. lsblk /dev/sdb1
b. udevadm info /dev/sdb1
c. blkid /dev/sdb1
d. cat /dev/sdb1
ANSWER: b
RATIONALE: The udevadm info command can be used to list detailed information for a device
on the system.
Page 69

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev
directory.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 5.1 The /dev Directory
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

27. Which of the following filesystems would most likely be used for the root filesystem on a modern Linux
system? (Choose all that apply.)
a. xfs
b. exfat
c. ext4
d. ext2
ANSWER: a, c
RATIONALE: Both xfs and ext4 are fast, feature-rich filesystems that are often used on modern
Linux systems. The exfat filesystem is designed for removable storage devices,
and the legacy ext2 filesystems do not provide journaling capability.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.2 - Identify common filesystem types and their features.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.1 - Design hard disk layout.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 5.2 Filesystems
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

28. Which of the following are block device files? (Choose all that apply.)

a. /dev/nvme0
b. /dev/zero
c. /dev/tty1
d. /dev/zram0
ANSWER: a, d
RATIONALE: Block device files normally contain a filesystem and are written to block-by-
block. Both NVMe and zram are block devices, as are virtual hard disk, SATA,
SCSI, SAS, PATA, CD and DVD devices.

Page 70

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 5: Linux® Filesystem Administration.

POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.5.1 - Identify the structure and types of device files in the /dev
directory.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 5.1 The /dev Directory
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:01 PM
DATE MODIFIED: 5/2/2023 10:01 PM

Page 71

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

1. Which command should you run after installing a new kernel module to update the module dependency
database?
a. insmod
b. modprobe
c. lsmod
d. depmod
ANSWER: d
RATIONALE: The depmod command can be used to update the module dependency database.
The depmod command generates a list of dependency description of kernel
modules and its associated map files. The mapping is used to search and find the
correct module when a unit of hardware requests it.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver
support.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

2. Leonard wants to find detailed information about the Bluetooth kernel module. Which of the following
commands can he use to display this information?
a. modstatus bluetooth
b. lsmod bluetooth
c. modinfo bluetooth
d. modstat bluetooth
ANSWER: c
RATIONALE: The modinfo command can be used to display detailed information about a kernel
module. In this case, by specifying bluetooth as the parameter, it will display
information about the Bluetooth module.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver
support.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM

Page 72

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

DATE MODIFIED: 5/2/2023 10:02 PM

3. Which of the following commands can be used to create and manage a software RAID configuration after
installation?
a. mdadm
b. raidadm
c. dmadm
d. madam
ANSWER: a
RATIONALE: The mdadm command can be used to create and manage a software RAID
configuration after installation.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.4 - Explain the different levels of RAID and types of RAID
configurations.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

4. In order to create and manage KVM or QEMU virtual machines, a Linux system must have which of the
following software libraries installed?
a. libvm
b. virsh
c. vmlib
d. libvirt
ANSWER: d
RATIONALE: The libvert virtualization libraries must be installed in order to create and manage
KVM or QEMU virtual machines.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.2 - Outline different Linux server virtualization options.
TOPICS: 6.2 Understanding Server Virtualization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

5. Which of the following can be used to create and manage KVM/QEMU virtual machines on a Linux system?

Page 73

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

(Choose all that apply.)


a. Virtual Machine Manager
b. virsh
c. SPICE
d. Boxes
ANSWER: a, b, d
RATIONALE: You can use the virsh command or the Virtual Machine Manager or Boxes tools
within a desktop environment to create and manage KVM/QEMU virtual machines.
SPICE is a protocol that desktop virtualization tools (e.g., Boxes) can use to interact
graphically with virtual machines.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.2 - Outline different Linux server virtualization options.
TOPICS: 6.2 Understanding Server Virtualization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

6. Which of the following commands will list messages that were displayed during the boot sequence by the
kernel? (Choose all that apply.)
a. journalctl -k
b. logger --boot
c. cat /var/log/boot
d. dmesg
ANSWER: a, d
RATIONALE: The dmesg and journalctl -k commands will list messages that were displayed by
the kernel during the previous system boot.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.7 - Troubleshoot the Linux server installation process.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

7. Which of the following commands can be used to display general hardware information for the entire system?

a. lshw
b. lscpu

Page 74

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

c. hwdisp
d. hware
ANSWER: a
RATIONALE: Without options or arguments, the lshw command displays general hardware
information for all hardware categories on the system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver
support.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

8. Which of the following commands will display detailed CPU information, including CPU features such as
virtualization extensions? (Choose all that apply.)
a. lshw -class cpu
b. cat /proc/cpuinfo
c. lscpu
d. hwinfo --cpu
ANSWER: a, b, c, d
RATIONALE: The lshw, lscpu, and hwinfo commands can be used to display detailed CPU
information. This information is obtained from the kernel exported data in the
/proc/cpuinfo file.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver
support.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

9. A government office wants to secure a few of its Linux systems so that they can only use certain USB
devices. After plugging in a USB device, which of the following commands could be used to detect certain
identifying information that can be used to only allow that type of USB device?

Page 75

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

a. usbdetect
b. modusb
c. lspci
d. lsusb
ANSWER: d
RATIONALE: The lsusb command will display individual USB device information that can be
used to limit the USB devices allowed on a Linux system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver
support.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.1 - Determine and configure hardware settings.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

10. What type of hypervisor is KVM?

a. Type 1
b. Type 2
c. Type 3
d. Type 4
ANSWER: a
RATIONALE: Since KVM is part of the Linux kernel and runs guest operating systems directly on
server hardware, it is considered a Type 1 hypervisor and suitable for hosting large
numbers of virtual machines within a datacenter environment.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.2 - Outline different Linux server virtualization options.
TOPICS: 6.2 Understanding Server Virtualization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

11. When running Linux within a Microsoft Hyper-V virtual machine, which of the following modules would
you expect to see as part of the output of the lsmod command that provide the necessary drivers for virtualized
hardware?
a. hv_

Page 76

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

b. virtio
c. vmw
d. hyperv_
ANSWER: a
RATIONALE: Drivers for Hyper-V are provided as modules that start with hv_.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.8 - Identify and resolve issues related to hardware device driver
support.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

12. What type of storage configuration provides faster access to the underlying storage devices than what they
support by default?
a. RAID level 0
b. RAID level 1
c. RAID level 5
d. JBOD
ANSWER: c
RATIONALE: RAID level 5 provides striping with parity to spread data across multiple storage
devices for faster data access. Because it writes parity information to each storage
device, all data will still be accessible in the event a single storage device fails.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.4 - Explain the different levels of RAID and types of RAID
configurations.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

13. Each SCSI device attached to a system must be assigned an ID number. What is this ID number called?

a. device ID
b. target ID
c. SCSI number

Page 77

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

d. SCSI controller
ANSWER: b
RATIONALE: The target ID or SCSI ID is a unique ID number associated with each SCSI
controller and hard disk.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

14. If a Linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has
occurred?
a. page fault
b. IRQ fault
c. segmentation fault
d. RAM failure
ANSWER: c
RATIONALE: The segmentation fault indicates an error when a program accesses an unassigned
area in the RAM.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.7 - Troubleshoot the Linux server installation process.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

15. Which of the following commands can you use on a Linux server to configure a connection to an iSCSI
target following installation?
a. iscsiadm
b. fcstat
c. mpathconf
d. multipath

Page 78

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

ANSWER: a
RATIONALE: The iscsiadm command can be used to detect and configure a connection to an
iSCSI target to provide access to an iSCSI SAN.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

16. Your system currently contains a single SAS storage device that hosts the root filesystem. After installing
the correct module for your Fibre Channel HBA, what device file can you use to access your Fibre Channel
SAN storage?
a. /dev/fc0
b. /dev/fc/0
c. /dev/sda
d. /dev/sdb
ANSWER: b
RATIONALE: Both iSCSI and Fibre Channel SAN devices implement the SCSI protocol and are
identified as SCSI storage devices in Linux. Because the system already has a
single SAS storage device (/dev/sda), the Fibre Channel SAN will be identified as
/dev/sdb.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

17. Lou has configured multiple SAN connections on his Linux system and would like to implement DM-
MPIO. What command can Lou run to automatically detect the SAN connections and create a default MPIO
configuration?
a. fcstat
b. mpathconf

Page 79

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

c. iscsiadm
d. multipath
ANSWER: b
RATIONALE: The mpathconf command can be used to easily detect and create a DM-MPIO
configuration.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.3 - Describe the configuration of SCSI devices and SANs.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

18. Select the command that can be used to change the root filesystem to a different directory, such as when you
are in a rescue environment.
a. change_root
b. chroot
c. set_root
d. croot
ANSWER: b
RATIONALE: The chroot command allows you to change the root of the live OS to the /mnt
directory, which is actually the root filesystem on the local disk.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.9 - Access an installed system using system rescue.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 6.5 System Rescue
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

19. What command is used to create a ZFS volume from one or more storage devices?

a. mkfs
b. mkfs.zfs
c. zfs
d. zpool
ANSWER: d

Page 80

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

RATIONALE: The zpool command is used to create a ZFS volume and associated ZFS filesystem
from one or more storage devices on the system. The zfs command is used to manage
ZFS settings on an existing ZFS volume or dataset.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

20. What is the term for a subdirectory on a ZFS volume that is treated as a separate ZFS filesystem?

a. ZFS store
b. ZFS vault
c. ZFS dataset
d. ZFS data lake
ANSWER: c
RATIONALE: Zettabyte File Systems (ZFS) datasets are ZFS filesystems that are created within
existing ZFS volumes. You associate a ZFS dataset to a subdirectory on a ZFS
volume. The ZFS volume itself can also be referred to as a ZFS dataset that includes
other ZFS datasets.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

21. What command can be used to check a BTRFS filesystem for errors? (Choose all that apply.)

a. btrfsck
b. fsck.btrfs
c. btrfs fsck
d. btrfs check
ANSWER: a, d
RATIONALE: The btrfsck and btrfs check commands can be used to check and repair BTRFS
filesystems.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False

Page 81

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems.


ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems.
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

22. Valentina suspects that there is corruption on the root filesystem of one of her Linux servers, but is unable to
unmount the filesystem to perform a filesystem check and repair using fsck. What should Valentina do in order
to perform a filesystem check on the root filesystem?
a. Run the fsck command with the --force option.
b. Run the fsck command after booting the system from live installation media.
c. Run fsck from single user mode.
d. Stop all processes that are writing to the root filesystem and then run the fsck command.
ANSWER: b
RATIONALE: By booting the system from live media to perform system rescue, Valentina can
safely use the fsck command to check the root filesystem on her Linux server as
the filesystem is not actively mounted by the Linux system running from the live
installation media.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.9 - Access an installed system using system rescue.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.2 - Maintain the integrity of filesystems.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 6.5 System Rescue
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

23. Which directory contains installation log files following a Fedora Linux installation?

a. /sys/install
b. /var/log/installer
c. /etc/installer
d. /var/log/anaconda
ANSWER: d
RATIONALE: Fedora systems write detailed installation logs to the /var/log/anaconda directory.
Anaconda is the name of the Fedora installation program.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 82

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.7 - Troubleshoot the Linux server installation process.


ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

24. Which of the following are you least likely to be prompted to configure during the installation process for a
Linux server distribution?
a. host name
b. IP configuration
c. desktop environment
d. root user password
ANSWER: c
RATIONALE: Linux server distributions do not contain a desktop environment by default.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.6 - Install a Linux server distribution.
TOPICS: 6.4 Installing a Linux Server Distribution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

25. During the creation of a BTRFS filesystem, you can provide different levels of fault tolerance for the inode
table and data blocks on a filesystem. What BTRFS term is used to describe the inode table?
a. system
b. metadata
c. inum
d. data
ANSWER: b
RATIONALE: BTRFS refers to the inode table as metadata. Thus, the -m (metadata) option of
the mkfs.btrfs command can be used to specify the fault tolerance level for the
inode table.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage

Page 83

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

KEYWORDS: Bloom's: Remember


DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

26. Which of the following RAID configurations would be best to provide fault tolerance for the storage devices
that hold the root filesystem within a server system?
a. Fibre Channel or iSCSI SAN
b. firmware, hardware, software, or ZFS RAID level 5
c. firmware, hardware, software, or ZFS RAID level 6
d. firmware, hardware, software, or BTRFS RAID level 1
ANSWER: d
RATIONALE: Since the root filesystem should not contain most data, it is reasonable to assume
that most server systems will contain the minimum of two local storage devices to
provide RAID level 1 fault tolerance for the root filesystem. All other data is
typically stored on other storage devices or SANs with higher RAID levels for
speed and fault tolerance.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.4 - Explain the different levels of RAID and types of RAID
configurations.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Evaluate
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

27. Which of the following refers to the minimum height of a rackmount server?

a. 1U
b. R0
c. CAT1
d. L1
ANSWER: a
RATIONALE: 1U is 1.75 inches and corresponds to the minimum height of a rackmount server
system. Other heights are represented in multiples of 1U.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.1 - Identify the types of hardware present in most server systems.
TOPICS: 6.1 Understanding Server Hardware
KEYWORDS: Bloom's: Remember

Page 84

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 6: Linux® Server Deployment.

DATE CREATED: 5/2/2023 10:02 PM


DATE MODIFIED: 5/2/2023 10:02 PM

28. Which of the following statements about ZFS is false?

a. There is no command to check a ZFS filesystem for errors.


b. ZFS filesystems are automatically mounted at boot time to /volumename.
c. ZFS can be used to provide triple parity fault tolerance for data.
d. ZFS is bundled with most Linux distributions.
ANSWER: d
RATIONALE: ZFS filesystems are automatically detected and mounted on the system by the zfs
module and do not get corrupted. Additionally, raidz3 can be specified when creating
a ZFS volume to provide triple parity. However, ZFS does not use a GPL-compatible
license and is not bundled with most Linux distributions. Instead, it is often installed
afterwards from a software repository.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.6.5 - Configure the ZFS and BTRFS filesystems.
TOPICS: 6.3 Configuring Server Storage
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

Page 85

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

1. When writing shell scripts and using a case statement to determine whether a set of code should be executed,
what is the proper syntax to end the case construct?
a. endcase
b. esac
c. /case
d. done
ANSWER: b
RATIONALE: To end a case statement, you must use the esac keyword, which is case spelled in
reverse.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in
shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

2. Using the syntax below, what command will create directories named one, two, and three?

echo one two three | ___________ mkdir


a. uniq
b. tr
c. where
d. xargs
ANSWER: d
RATIONALE: The xargs command turns standard input into arguments that are passed to a
command specified as an argument. In this case, one two three are turned into
three arguments that were passed to the mkdir command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:02 PM

Page 86

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

DATE MODIFIED: 5/2/2023 10:02 PM

3. Which of the following will take output from a command and append it to the end of a file?

a. <
b. <<
c. >
d. >>
ANSWER: d
RATIONALE: Two greater than signs will append the output of a command to whatever file is
specified after the greater than signs. If the file does not exist, it will create the
file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

4. Which of the following commands will display the exit status of the last command used in the BASH shell?

a. echo $status
b. echo $exit
c. echo $?
d. echo $!
ANSWER: c
RATIONALE: The $? shell variable can display the exit status of the previous command used in
the BASH shell.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.2 - Identify and manipulate common shell environment variables.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.2 Shell Variables
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

Page 87

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

5. Which of the following characters can be entered at the beginning of a line in a shell script to ensure that line
is recognized as a comment line only?
a. $
b. >
c. %
d. #
ANSWER: d
RATIONALE: Entering a pound sign-#-at the beginning of a line will ensure that line is
recognized as a comment and will prevent the system from trying to execute it.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

6. Which of the following is the common escape sequence to display a horizontal tab using the echo command?

a. \tab
b. ?tab
c. \t
d. %tab
ANSWER: c
RATIONALE: The \t escape sequence will display a horizontal tab using the echo command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.1 - Work on the command line.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

7. Which of the following can be used for comparing values within an if statement? (Choose two.)

a. -lt

Page 88

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

b. -neq
c. =
d. -grt
ANSWER: a, c
RATIONALE: The -lt statement can be used to determine whether one value is less than
another. The = symbol can be used to determine whether two strings are equal.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in
shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

8. Which command can be used to download an updated copy of the main branch from the original Git
repository?
a. git pull origin main
b. git pull original main
c. git pull main original
d. git pull main origin
ANSWER: a
RATIONALE: The git pull origin main command can be used to download an updated copy of
the main branch from the original Git repository.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.8 - Use Git to perform version control for shell scripts and other
files.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.3 - Given a scenario, perform basic version control using Git.
TOPICS: 7.4 Version Control Using Git
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

9. Which of the following files can you add filenames to so that the git add * command will not stage them?

a. .gitignore
b. .gitnopush

Page 89

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

c. .ignore
d. .nopush
ANSWER: a
RATIONALE: You can add filenames to the .gitignore file so that they do not get staged.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.8 - Use Git to perform version control for shell scripts and other
files.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.3 - Given a scenario, perform basic version control using Git.
TOPICS: 7.4 Version Control Using Git
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

10. Which of the following commands should you use to specify that you want to use Git for version tracking on
them?
a. git version
b. git track
c. git add
d. git new
ANSWER: c
RATIONALE: The git add command will start using git for version tracking on the files specified
by adding them to the staging area.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.8 - Use Git to perform version control for shell scripts and other
files.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.3 - Given a scenario, perform basic version control using Git.
TOPICS: 7.4 Version Control Using Git
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

11. Marisa executes a shell script using the following syntax: ./script1.sh dog cat rabbit. What line can be used
within the script to print the value "cat"?
a. echo $1
b. echo $2
c. echo $arg1
d. echo $arg2

Page 90

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

ANSWER: b
RATIONALE: Arguments provided to a shell script are called positional parameters and placed
into variables starting from 1. Thus, echo $2 will print the contents of the second
argument.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in
shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

12. Which of the following commands will count the number of lines in a file named data.csv?

a. lc data.csv
b. wc -l data.csv
c. lines data.csv
d. count -l data.csv
ANSWER: b
RATIONALE: The wc command can be used to count characters, words, or lines. When no
options are specified, it will return all three. If the -l option is specified, it will
return only the number of lines.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

13. Which of the following commands will display the output of a file while also displaying a line number at the
left side of each line for the /etc/passwd file?
a. numbers /etc/passwd
b. wc -l /etc/passwd
c. nl /etc/passwd

Page 91

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

d. ln /etc/passwd
ANSWER: c
RATIONALE: The nl (number lines) command will display the contents of a file along with a
line number to the left side of each line within the file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

14. Which of the following commands will display the contents of the /etc/passwd file in alphanumerical order?

a. cat --sort /etc/passwd


b. cat -s /etc/passwd
c. sed /etc/passwd
d. sort /etc/passwd
ANSWER: d
RATIONALE: The sort command will display the contents of a file in alphanumerical order.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

15. Which of the following commands will send the output of the cat command to the grep command to be
filtered?
a. cat /etc/passwd | grep jsmith
b. cat /etc/passwd > grep jsmith
c. cat /etc/passwd >> grep jsmith
d. cat /etc/passwd @ grep jsmith
ANSWER: a

Page 92

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

RATIONALE: The | (pipe) symbol will send the standard output of one command to become the
standard input of another command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

16. Which of the following will look at the /etc/passwd file for any lines containing the word root and display
them out to the screen while simultaneously writing the results to a file?
a. cat /etc/passwd | grep root | merge ~/root.txt
b. cat /etc/passwd | grep root >> ~/root.txt
c. grep root /etc/passwd | tee ~/root.txt
d. grep root /etc/passwd | split ~/root.txt
ANSWER: c
RATIONALE: The output of the grep command is sent to the tee command, which displays the
output to the screen while simultaneously writing it to a file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Create
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

17. Which of the following represents stderr at the command line when used for redirection?

a. 0
b. 1
c. 2
d. 3
ANSWER: c
RATIONALE: The number 2 represents stderr at the command line when used for redirection.

Page 93

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.1 - Redirect the input and output of a command.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.4 - Use streams, pipes and redirects.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.1 Command Input and Output
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

18. Which command can be used to create a new command that will monitor the contents of auth.log as they get
added to the file?
a. create showauth='tail -f /var/log/auth.log'
b. alias showauth='tail -f /var/log/auth.log'
c. new showauth as ‘cat -f /var/log/auth.log'
d. ln showauth='tail -f /var/log/auth.log'
ANSWER: b
RATIONALE: The alias command will create a new command for the command line as shown to
show the last lines of the auth.log file and leave the stream open so that any new
entries also are displayed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.3 - Create and export new shell variables.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.2 Shell Variables
KEYWORDS: Bloom's: Create
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

19. An alias has previously been created named showauth. Which of the following commands can be used to
remove that alias?
a. alias -d showauth
b. ualias shoauth
c. noalias showauth
d. unalias showauth
ANSWER: d
RATIONALE: The unalias command can be used along with the name of the alias to remove an
alias from a system.

Page 94

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.3 - Create and export new shell variables.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.2 Shell Variables
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

20. Which of the following commands can be used to create a BASH variable named CREATOR with the value
of Torvalds?
a. export CREATOR=Torvalds
b. set $CREATOR = Torvalds
c. export CREATOR = Torvalds
d. var CREATOR as Torvalds
ANSWER: a
RATIONALE: The name of the variable should be followed by an equal sign. The export
command ensures that the variable is made available to subshells.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.3 - Create and export new shell variables.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.2 Shell Variables
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

21. Which of the following is a valid method of running a script named myscript.sh that gives the current user
execute permission? (Choose all that apply.)
a. source myscript.sh
b. bash myscript.sh
c. run myscript.sh
d. ./myscript.sh
ANSWER: a, b, d
RATIONALE: The source command will execute a script in the current shell, whereas the bash
command will start a new BASH shell to execute the script. A ./ in front of a
script filename that has execute permission will also run the file as a script.

Page 95

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.6 - Create and execute basic shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

22. Which of the following constructs can be used in a shell script to determine whether two values are equal
and if so run another set of commands?
a. when
b. where
c. if
d. comp
ANSWER: c
RATIONALE: The if construct can be used in a shell script to determine whether two values are
equal and if so run another set of commands.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in
shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

23. Which of the following results would be created by the command sequence?
echo ‘apple banana carrot dog elephant' | while read a b c; do echo result: $c $b $a; done
a. elephant dog carrot
b. apple banana carrot dog elephant
c. carrot dog elephant banana apple
d. carrot dog elephant apple banana
ANSWER: c
RATIONALE: The read command will read apple into a, banana into b, and then the rest will be
read into c. When echo result $c $b $a is executed, c is displayed first, then b,

Page 96

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

then a.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in
shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Analyze
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

24. Which of the following would be the results of running the command seq 7?

a. 6 through 0 being displayed one number per line.


b. 7 through 1 being displayed one number per line.
c. 1 through 7 being displayed one number per line.
d. 0 through 6 being displayed one number per line.
ANSWER: c
RATIONALE: When only one parameter is given to the seq command, the command will start
counting from 1 until it reaches the number specified after the seq command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.7 - Effectively use constructs, special variables, and functions in
shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

25. Levi wants to run 5 commands sequentially but does not want to create a shell script. He knows that each
command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch
15 minutes from now. He knows that he can type all of the commands on the same line and separate them with
a certain character to run them sequentially. What can he type after each command to have them run one after
the next without requiring further input from him, as well as ensure that if one of the commands encounters an
error, the remaining commands are not run?
a. a pipe (|)
b. a colon (:)

Page 97

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

c. a semicolon (;)
d. two ampersands (&&)
ANSWER: d
RATIONALE: Levi can separate the commands with two ampersands between commands to
have them run sequentially and ensure that the next command is only run if the
previous command didn't encounter any errors.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.5 - Describe the purpose and nature of shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

26. Which of the following BASH environment files is executed first when a user opens a new terminal?

a. /etc/profile
b. ~/.bashrc
c. ~/.bash_profile
d. ~/.profile
ANSWER: a
RATIONALE: The first environment file processed by a new BASH shell is /etc/profile.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.4 - Edit environment files to create variables upon shell startup.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 7.2 Shell Variables
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

27. Scott has recently set the Z shell as his current shell and wishes to enable some additional Z shell options.
What command should Scott run to do this?
a. zmodload
b. autoload
c. vi ~/.zshrc
d. setoption

Page 98

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 7: Working with the Shell.

ANSWER: c
RATIONALE: To enable Z shell options, you can use the setopt command. To ensure that these
options are loaded each time Scott opens a Z shell, he must add the appropriate
setopt line to his ~/.zshrc file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.9 - Compare and contrast BASH and Z shell features and
configuration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 7.5 The Z Shell
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

28. How many times will the following loop execute as part of a script:
#!/bin/bash
COUNTER=0
while [ $COUNTER -lt 7 ]
do
echo "hello world"
done
a. 0
b. 1
c. 7
d. until Ctrl+c is used to terminate it
ANSWER: d
RATIONALE: The script is missing a line to increment the counter after echoing hello world,
which means the counter will remain at 0 in an infinite loop until it is terminated.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.7.5 - Describe the purpose and nature of shell scripts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.3.1 - Given a scenario, create simple shell scripts to automate
common tasks.
TOPICS: 7.3 Shell Scripts
KEYWORDS: Bloom's: Analyze
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

Page 99

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
1. Which of the following will invalid entries in the GRUB2 configuration cause?

a. kernel warning automatically skipping invalid entries


b. kernel panic and halt the system
c. kernel error with confirmation to skip invalid entries
d. no error, automatically skipping invalid entries until a valid entry is found
ANSWER: b
RATIONALE: Invalid entries in the GRUB2 configuration file will cause a kernel panic and halt
the system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.2 - Outline the configuration of the GRUB boot loader.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 8.2 Boot Loaders
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

2. What UEFI option allows for a boot loader to be verified using a digital signature?

a. Netboot
b. Secure boot
c. PXE
d. initialization validation
ANSWER: b
RATIONALE: Secure boot can be enabled in a UEFI BIOS to provide digital signature validation
of the boot loader stored in the UEFI System Partition.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.1 - Summarize the major steps necessary to boot a Linux system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 8.1 The Boot Process
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

3. Which of the following files is used to set the default runlevel on Linux systems that use SysV init?

a. /etc/inittab

Page 100

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
b. /etc/init.d/init
c. /etc/rc.d/init.conf
d. /etc/rc.d/init.d/init.conf
ANSWER: a
RATIONALE: On Linux systems that use SysV init, the default runlevel is set in the /etc/inittab
file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering
certain runlevels and targets.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

4. Which of the following system variables can you modify to override the default system timezone within your
current shell?
a. TZ
b. TIME
c. LOCALE
d. LC_TZ
ANSWER: a
RATIONALE: You can override the default system time zone within your current shell by
modifying the contents of the TZ variable.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.3 - Localization and internationalization.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

5. Which of the following commands can be used to display the current locale of a system? (Choose two.)

a. locale

Page 101

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
b. localectl
c. localed
d. syslocale
ANSWER: a, b
RATIONALE: The locale command can be used to display the locale of a system. The localectl
command can be used without any options to display the locale of a system.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.3 - Localization and internationalization.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

6. The Linux kernel stores time in the number of seconds since which date?

a. the number of days since January 1, 1900


b. the number of minutes since January 1, 1900
c. the number of seconds since January 1, 1970
d. the number of milliseconds since January 1, 1980
ANSWER: c
RATIONALE: Linux keeps track of the number of seconds since January 1, 1970, as the epoch
date. January 1, 1970, is considered the birth date of UNIX.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

7. Which of the following commands will show the current runlevel along with the previous runlevel?

a. init
b. telinit
c. runlevel

Page 102

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
d. echo $RUNLEVEL
ANSWER: c
RATIONALE: The runlevel command will show the current and previous runlevels.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization
processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

8. Which of the following commands will display a list of Systemd units sorted by the time they took to load?

a. systemd-analyze blame
b. systemd --listload
c. systemctl --listload
d. systemctl-analyze --blame
ANSWER: a
RATIONALE: The system-analyze blame command will display a list of Systemd units sorted by
the time they took to load.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization
processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.4.5 - Given a scenario, use systemd to diagnose and resolve common
problems with a Linux system.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

9. Which of the following is a tiling window manager that can be used with Wayland?

a. i3
b. LXDE
c. Mutter
d. Sway

Page 103

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
ANSWER: d
RATIONALE: The Sway tiling window manager is available as a Wayland compositor.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.6 - Explain the purpose of the major Linux GUI components.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 8.4 The X Windows System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

10. Which of the following commands can configure the time zone on a Linux system?

a. timedatectl set-time
b. timedatectl set-timezone
c. tzselect
d. date --timezone
ANSWER: b
RATIONALE: The timedatectl set-timezone command followed by the desired time zone will
configure the system with that time zone.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

11. Which of the following does Systemd use to denote runlevels?

a. service units
b. target units
c. mount units
d. timer units
ANSWER: b
RATIONALE: Systemd uses target units (or targets) to represent system states and runlevels on
the system. For example, graphical.target and runlevel5.target are equivalent to
runlevel 5 in SysV init.

Page 104

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization
processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

12. Which of the following commands will shut down a Linux system? (Choose all that apply.)

a. init 6
b. telinit 0
c. systemctl isolate poweroff.target
d. systemctl isolate runlevel6.target
ANSWER: b, c
RATIONALE: You can enter runlevel 0 or poweroff.target to shut down a Linux system. This
can be performed with either the init 0 or telinit 0 command, or via the systemctl
isolate poweroff.target command on a system that uses Systemd.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.4 - Start, stop, and restart daemons.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

13. Which of the following commands will set the default runlevel of a Linux system that uses Systemd?

a. systemctl --set-default runlevel5.target


b. systemctl set-default runlevel5.target
c. systemctl --default runlevel5.target
d. systemctl set-init runlevel5.target
ANSWER: b
RATIONALE: The set-default option can be used for the systemctl command to set the default
runlevel.

Page 105

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering
certain runlevels and targets.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

14. Which command can be used to configure a daemon to start upon entering a specific runlevel on a Linux
system that uses SysV init?
a. systemctl
b. service
c. chkconfig
d. update-rc.d
ANSWER: c
RATIONALE: The chkconfig command can be used to configure a daemon to start in a particular
runlevel on a SysV init system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering
certain runlevels and targets.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

15. After modifying the /etc/default/grub file, what must you do for your changes to be reflected by GRUB on
the next boot?
a. run the grub2-install command
b. run the grub2-mkconfig command
c. copy the file to the /boot/grub directory
d. run the dracut command
ANSWER: b
RATIONALE: After modifying the options in /etc/default/grub, you must rebuild the GRUB
Page 106

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
configuration file. This can be done by executing the grub2-mkconfig command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.2 - Outline the configuration of the GRUB boot loader.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.2 - Install a boot manager.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 8.2 Boot Loaders
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

16. Where can you find the boot entries displayed by GRUB at boot time on a Fedora Linux system that uses the
BootLoaderSpec module?
a. /boot/grub/grub.cfg
b. /boot/efi/EFI/fedora/grub.cfg
c. /boot/loader/entries/*
d. /boot/grub/entries.conf
ANSWER: c
RATIONALE: If the BootLoaderSpec (blscfg) module is used, information for each kernel line
loaded by GRUB is stored within a UUID-kernel.conf file under the
/boot/loader/entries directory, where UUID is the UUID of the root filesystem,
and kernel is the version of the Linux kernel.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.2 - Outline the configuration of the GRUB boot loader.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.2 - Install a boot manager.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 8.2 Boot Loaders
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

17. Which of the following is considered a lightweight desktop environment suitable for low memory systems?

a. GNOME
b. XFCE
c. Cinnamon
d. MATE
ANSWER: b
RATIONALE: XFCE is a popular lightweight desktop environment used by many different
Linux distributions today, including Kali Linux.

Page 107

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.106.2 - Graphical desktops.
TOPICS: 8.4 The X Windows System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

18. If incompatible X Windows settings are configured, where will the errors that are generated be written to?

a. ~/.xsession-errors
b. ~/.xerror
c. ~/.xwin-error
d. /var/log/xwindows.error
ANSWER: a
RATIONALE: If incompatible X Windows settings are configured, the errors that are generated
are written to ~/.xsession-errors.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.106.1 - Install and configure X11.
TOPICS: 8.4 The X Windows System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

19. Which command can be used to start the SSH daemon on a Linux server that uses SysV init?

a. service sshd start


b. systemctl start sshd.service
c. /etc/rc.d/sshd start
d. start sshd
ANSWER: a
RATIONALE: The service command can be used to start, stop, restart, reload, and view daemons
on a system that uses SysV init.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.4 - Start, stop, and restart daemons.

Page 108

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

20. Which command can be used to restart the DHCP daemon on a Linux server that uses Systemd?

a. service restart dhcpd


b. /etc/rc.d/init.d/restart --service dhcpd
c. /etc/rc.d/dhcpd restart
d. systemctl restart dhcpd.service
ANSWER: d
RATIONALE: The systemctl command can be used to start, stop, restart, reload, and view
daemons on a system that uses Systemd.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.4 - Start, stop, and restart daemons.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

21. Mufasa has created a Systemd mount unit called /etc/systemd/system/backups.mount that mounts a
filesystem UUID to the /backups directory upon entering graphical.target. After rebooting the system and
entering graphical.target, he notices that the filesystem is not mounted. What should Mufasa do to remedy the
issue?
a. enable the mount unit using the systemctl command
b. copy the mount unit to the /lib/systemd/system directory
c. ensure that the mount unit gives execute permission to the other category
d. ensure that the mount unit is owned by the systemd group
ANSWER: a
RATIONALE: After creating the backups.mount unit file, it must be enabled using the systemctl
enable backups.mount command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False

Page 109

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization
processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.104.3 - Control mounting and unmounting of filesystems.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Analyze
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

22. Which of the following accessibility features simulates simultaneous key presses when two keys are pressed
in sequence?
a. Bounce keys
b. Repeat Keys
c. Sticky keys
d. Slow keys
ANSWER: c
RATIONALE: Turning on Sticky keys will simulate simultaneous key presses when two keys are
pressed in sequence.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.106.3 - Accessibility.
TOPICS: 8.4 The X Windows System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

23. Which of the following does Click Assist do?

a. Simulates a right click by holding down the left mouse button.


b. Simulates a right click by holding down the Ctrl key on the keyboard.
c. Simulates a left click by holding down the left shift key or a right click by holding down the right
shift key.
d. Reads the text for buttons on the screen so the user knows what they may be clicking on.
ANSWER: a
RATIONALE: Click Assist simulates a right click by holding down the left mouse button.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.7 - Configure X Windows settings and accessibility options.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.106.3 - Accessibility.

Page 110

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
TOPICS: 8.4 The X Windows System
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

24. Which of the following commands can be used to configure the Postfix daemon to start in the default
runlevel on a Linux system that uses Systemd?
a. chkconfig postfix on
b. systemctl enable postfix.service
c. service postfix start
d. systemctl start postfix.service
ANSWER: b
RATIONALE: The systemctl enable command can be used to enable a daemon to start in the
default runlevel.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.5 - Configure the system to start and stop daemons upon entering
certain runlevels and targets.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.3 - Change runlevels / boot targets and shutdown or reboot system.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

25. Which of the following commands will prompt you to answer a series of questions to help determine which
time zone file you should use?
a. zones
b. timezones
c. zoneselect
d. tzselect
ANSWER: d
RATIONALE: The tzselect command will prompt you to answer a series of questions to help
determine which time zone file you should use.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.3 - Localization and internationalization.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.

Page 111

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

26. Which of the following files is a binary file that contains the rules for calculating the time based on your
time zone relative to epoch time?
a. /usr/local/bin/timecalc
b. /etc/localtime
c. /sbin/tickadj
d. /sbin/timeadj
ANSWER: b
RATIONALE: The /etc/localtime file is a binary file that contains the rules for calculating the
time based on your time zone relative to epoch time.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

27. Which runlevel and target are used to load just enough daemons to perform system maintenance as the root
user? (Choose two.)
a. runlevel 2
b. runlevel 1
c. rescue.target
d. maintenance.target
ANSWER: b, c
RATIONALE: Both runlevel 1 and rescue.target represent Single User Mode, which allows the
root user to perform system maintenance without other users logged onto the
system.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.3 - Detail the UNIX SysV and Systemd system initialization
processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.101.2 - Boot the system.

Page 112

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 8: System Initialization, X Windows, and Localization.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 8.3 Linux Initialization
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

28. Which of the following can be used to write the current system time to the hardware clock in the system
BIOS?
a. systohc
b. date --hw2sys
c. date +%s
d. hwclock -w
ANSWER: d
RATIONALE: The hwclock -w command can be used to write the currently configured time on
the Linux system to the hardware clock in the BIOS.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.8.8 - Configure time, time zone, and locale information on a Linux
system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 8.5 Localization
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:02 PM
DATE MODIFIED: 5/2/2023 10:02 PM

Page 113

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
1. You have run the top command successfully, but realize that the q key on the keyboard has suddenly stopped
working. What is another way that you can exit out of the top program?
a. Ctrl+c
b. Ctrl+q
c. Ctrl+w
d. Ctrl+x
ANSWER: a
RATIONALE: The Ctrl+c key combination sends the SIGINT kill signal and will exit out of the
top program.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

2. Which of the following commands will send a process's resources to /dev/null to kill the process for process
ID 1357?
a. sigkill 1357
b. killall 1357
c. kill -15 1357
d. kill -9 1357
ANSWER: d
RATIONALE: The kill command can be used with a -9 to send the SIGKILL signal, which will
send the process's resources to /dev/null.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 114

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
3. Which of the following commands will show the cron jobs that have been created for the currently logged in
user?
a. cronjobs --list
b. cron --list
c. cron -l
d. crontab -l
ANSWER: d
RATIONALE: The crontab -l command can be used by a user to show that user's cron jobs.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

4. Which of the following states describe a process that is waiting for a parent process to release its PID?

a. wait
b. suspended
c. zombie
d. dead
ANSWER: c
RATIONALE: A process that is waiting for a parent process to release its PID is said to be a
zombie process.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.1 - Categorize the different types of processes on a Linux system.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

5. If a process is currently in an uninterruptible sleep state, which letter will show in the output of the ps
command?
Page 115

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.

a. S
b. U
c. N
d. D
ANSWER: d
RATIONALE: A process is in uninterruptible sleep if it is waiting for disk access and will be
indicated with the letter D.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

6. Which of the following commands can be used to see files that are currently being used by a specific process
ID (PID)?
a. psfiles
b. lsof
c. pstatus
d. pids
ANSWER: b
RATIONALE: The lsof (list open files) command can be used to show files that are currently
being used by a specific process ID (PID).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

7. Which of the following commands can be used to schedule very frequent recurring tasks, such as running
once every minute?

Page 116

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
a. at
b. watch
c. do
d. while
ANSWER: b
RATIONALE: The watch command can be used to schedule very frequent recurring tasks, such
as running once every minute.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

8. Which of the following can be used preceding a command to prevent a process from terminating when the
parent process terminates?
a. bg
b. runat
c. &
d. nohup
ANSWER: d
RATIONALE: The nohup, or no hangup, command can be used preceding a command to prevent
it from terminating when the parent process terminates.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.4 - Describe how binary programs and shell scripts are executed.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

9. Which of the following commands can be used to display the background processes started by the current
user?

Page 117

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
a. bg
b. jobs
c. fg --bg
d. ps --bg
ANSWER: b
RATIONALE: The jobs command will show background processes.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.5 - Create and manipulate background processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.5 Running Processes in the Background
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

10. You have started a process in the background that you want to now bring to the foreground. The process has
PID 3456 and background job ID 5. Which of the following commands can be used to move this process to the
foreground?
a. fg %3456
b. fg %5
c. bg --fg %3456
d. bg --fg %5
ANSWER: b
RATIONALE: The fg command can be used to take a job running in the background (that is
specified by %jobID) and move it to the foreground where it will display the
output to the terminal screen.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.5 - Create and manipulate background processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.5 Running Processes in the Background
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

11. Which of the following commands can be used to terminate a process by the process name? (Choose all that
apply.)

Page 118

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.

a. kill
b. pkill
c. stop
d. killall
ANSWER: b, d
RATIONALE: The pskill and killall command can be used to terminate a process by using the
process name. The kill command can only be used to terminate a process by PID.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

12. Which of the following commands will show a list of process names along with their process ID (PID)?
(Choose two.)
a. ps
b. proc
c. htop
d. jobs
ANSWER: a, c
RATIONALE: The ps command will show a list of process names along with their process ID.
The htop command will show a list of process names along with their process ID
in addition to a number of other pieces of information about the processes, and
general system performance statistics.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 119

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
13. Which of the following nice values will result in the lowest priority for a process?

a. -20
b. 19
c. 10
d. 0
ANSWER: b
RATIONALE: The highest value for niceness is 19, which would result in the greatest chance of
a lower priority. The lowest value for niceness is -20, which would result in the
greatest chance of a higher priority.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.6 - Use standard Linux utilities to modify the priority of a process.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.6 - Modify process execution priorities.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.6 Process Priorities
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

14. Which of the following cron table lines would execute the /bin/myscript.sh shell script every Friday at 11:30
PM?
a. 11 30 5 * * /bin/myscript.sh
b. 30 23 * * 5 /bin/myscript.sh
c. 11 30 * 5 * /bin/myscript.sh
d. 30 23 * 5 * /bin/myscript.sh
ANSWER: b
RATIONALE: Cron tables lines have six fields: minute, hour (24-hour format), day of month,
month of year, day of week (1 = Monday, 5 = Friday, 7 = Sunday), and command
or script.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM

Page 120

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
DATE MODIFIED: 5/2/2023 10:03 PM

15. In which directory would a system administrator store scripts that should be run monthly by the cron
daemon?
a. /var/cron/monthly
b. /etc/crontab/monthly
c. /var/crontab/monthly
d. /etc/cron.monthly
ANSWER: d
RATIONALE: Any scripts placed in the /etc/cron.monthly directory will be executed once every
month.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

16. A system administrator wants to allow most users to be able to run cron jobs, but wants to specifically
prevent a couple of users from doing so. Which of the following files could the administrator edit to disallow
these users from creating cron jobs?
a. /etc/cron.deny
b. /etc/cron.d/cron.deny
c. /etc/cron.allow
d. /etc/cron.d/cron.allow
ANSWER: a
RATIONALE: The users that should not be able to run cron jobs should be configured in the
/etc/cron.deny file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands

Page 121

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

17. A system administrator wants to schedule a task to run at midnight but knows that they will not be in the
office at that time. Which of the following commands can they use to schedule this task to run that night while
they are at home?
a. exec -t 00:00
b. run -t 00:00
c. at midnight
d. crontab -e 00:00
ANSWER: c
RATIONALE: The at command can be used to schedule a task to run at a specified time. It
allows for multiple friendly time formats to be specified, such as now, midnight,
teatime, and noon.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

18. Which of the following command can be used to remove at job 5 from the list of pending jobs? (Choose all
that apply.)
a. at -remove %5
b. atrm 5
c. at -d %5
d. at -d 5
ANSWER: b, d
RATIONALE: The atrm command will remove a job from the list of pending jobs. The -d option
to the at command is equivalent to the atrm command. The % symbol is used to
identify background jobs only.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at
daemon.

Page 122

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

19. Which of the following commands will display a list of the pending jobs to be run? (Choose all that apply.)

a. at -l
b. atq
c. atls
d. at -j
ANSWER: a, b
RATIONALE: The atq command is equivalent to the at -l command and will display a list of
pending jobs to be run.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.7 - Schedule commands to execute in the future using the at
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

20. What character under the TTY column in the output of the ps command likely indicates that the process is a
daemon process?
a. D
b. d
c. ?
d. N
ANSWER: c
RATIONALE: Daemons are not associated with a terminal. As a result, the TTY column will list
? for daemon processes.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.

Page 123

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

21. Cicero wishes to schedule a shell script called /bin/report.sh at 9:00 PM on the first day of each month on his
Linux server. The report.sh script displays a summary of storage usage statistics to stdout. What cron table entry
can he create?
a. 0 21 * * * /bin/report.sh >/etc/currentreport.txt
b. 0 9 * * * /bin/report.sh >/etc/currentreport.txt
c. 0 9 * * * /bin/report.sh
d. 0 21 * * * /bin/report.sh
ANSWER: a
RATIONALE: Cron tables lines have six fields: minute, hour (24-hour format), day of month,
month of year, day of week (1 = Monday, 5 = Friday, 7 = Sunday), and command
or script. Thus, 9:00 PM (21:00) would any day, month, or week would be
represented by 0 21 * * *. To ensure that the stdout is captured, you must redirect
the output of the script to a file, otherwise it will be mailed to the user (if a mail
daemon is installed and configured).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.8 - Schedule commands to execute repetitively using the cron
daemon.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.2 - Automate system administration tasks by scheduling jobs.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.7 Scheduling Commands
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

22. What option can be used with the ps command to display an entire list of processes across all terminals,
including daemons?
a. -a
b. -f
c. -e
d. -l
ANSWER: c
RATIONALE: The -e option displays all processes running on terminals as well as processes that

Page 124

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
do not run on a terminal (daemons).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

23. Which kill signal terminates a process by taking the process information in memory and saving it to a file
called core on the hard disk in the current working directory?
a. SIGINT
b. SIGKILL
c. SIGQUIT
d. SIGTERM
ANSWER: c
RATIONALE: The SIGQUIT signal terminates a process by taking the process information in
memory and saving it to a file called core on the hard disk in the current working
directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

24. What command is used to display the lineage of a process by tracing its PPIDs until the init daemon?

a. ps -f
b. pstree
c. ps -R
d. ps aux
ANSWER: b
RATIONALE: The pstree command displays the lineage of a process by tracing its PPIDs until

Page 125

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
the init daemon.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

25. What kill command can be used to restart the Systemd or Sys V init daemon?

a. kill -1 1
b. kill -SIGHUP 0
c. pkill --restart 0
d. kill -1 0
ANSWER: a
RATIONALE: The Systemd or SysV init daemon always has a PID of 1, and the kill signal that
can restart a process is 1 (SIGHUP). Thus, running the kill -1 command on the
PID of 1 would restart the Systemd or Sys V init daemon.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.3 - Explain the difference between common kill signals.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.3 Killing Processes
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

26. Which of the following statements is false regarding commands and shell scripts that are executed within a
shell?
a. They are executed within a separate subshell by default.
b. The shell waits until the command has completed before providing another prompt to the user.
c. Background processes provide another shell prompt to the user immediately after execution.
d. They are executed within the current shell unless they are run in the background.
ANSWER: d
RATIONALE: By default, commands and shell scripts are executed in a subshell using the fork()

Page 126

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
function. During execution, the parent shell waits for the command or shell script
to complete before providing another user prompt, unless the command or shell
script was run in the background using the & symbol. You must use the source,
dot (.), or exec commands to run a command or shell script in the current shell.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.4 - Describe how binary programs and shell scripts are executed.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.105.2 - Customize or write simple scripts.
Eckert.XK0-005.24.1.4 - Given a scenario, configure and use the appropriate processes
and services.
TOPICS: 9.4 Process Execution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

27. Which of the following commands can be used to change the priority of a running process?

a. nice
b. nohup
c. renice
d. psgrep
ANSWER: c
RATIONALE: The nice command can only be used to start a process with a different priority. To
alter the priority of an already running process, you must use the renice command.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.6 - Use standard Linux utilities to modify the priority of a process.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.6 - Modify process execution priorities.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 9.6 Process Priorities
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

28. Which of the following commands can be used to identify rogue processes? (Choose all that apply.)

a. top
b. ps aux
c. ps -ef
d. htop
ANSWER: a, d

Page 127

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 9: Managing Linux® Processes.
RATIONALE: The top and htop commands sort processes by CPU and RAM usage at the top of
their output, which makes them suitable for identifying rogue processes that use
high amounts of CPU.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.9.2 - View processes using standard Linux utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 9.2 Viewing Processes
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 128

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
1. Kisha manages a Linux file server that contains user accounts for all of the users in her organization. She
would like to ensure that when new user accounts are created, an introduction.txt file is automatically copied to
their home directory. In which of the following directories can Kisha place the introduction.txt such that it will
be copied to new user home directories?
a. /etc/rc.d
b. /etc/skel
c. /etc/login.defs.d/template
d. /etc/default/useradd
ANSWER: b
RATIONALE: When a new user is created, they receive files in their home directory copied from
the /etc/skel directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

2. Which of the following commands can be used to delete a user account?

a. deluser
b. rmuser
c. userdel
d. expireuser
ANSWER: c
RATIONALE: The userdel command can be used to delete a user from the Linux operating
system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

3. Which of the following commands can be used to set the number of days until user account jsmith with an

Page 129

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
expired password is disabled?
a. usermod -f 15 jsmith
b. usermod -d 15 jsmith
c. usermod -x 15 jsmith
d. usermod -e 15 jsmith
ANSWER: a
RATIONALE: The -f option for the usermod command allows you to specify the number of days
until a user account with an expired password is disabled.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

4. Which of the following will show account aging information for a user such as the date of the last password
change, when the password expires, and the number of days of warning before the password expires?
a. usermod --expiry jsmith
b. chage -u jsmith
c. chage -l jsmith
d. lsuser jsmith
ANSWER: c
RATIONALE: The -l option for the chage command will list account aging information.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

5. Which of the following is a special group that provides its members with the ability to run commands as the
root user via the sudo command on Fedora Linux systems?
a. sudoers

Page 130

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
b. adm
c. wheel
d. sys
ANSWER: c
RATIONALE: The wheel group is a special group whose purpose is to provide its members with
the ability to run the sudo command to execute other commands as the root user
via an entry in the /etc/sudoers file. It is used for this purpose on most Linux
distributions, including Fedora. However, on Ubuntu systems the sudo group is
used in place of the wheel group.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

6. Which of the following will allow the root user to display the contents of the /etc/shadow file? (Choose all
that apply.)
a. cat /etc/shadow
b. getent shadow
c. shadowls
d. sudocat /etc/shadow
ANSWER: a, b
RATIONALE: The cat command will display the contents of a file, such as the /etc/shadow
file. The getent command will show the contents of system databases such as
passwd, shadow, group, and gshadow.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

7. Laverne has recently been assigned to manage a Linux server in her organization that uses the System Log
Daemon. She wishes to learn more about where events are logged. In which locations should Laverne look?

Page 131

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
(Choose all that apply.)
a. /etc/rsyslog.conf
b. /etc/syslog.conf
c. /etc/rsyslog.d/*
d. /etc/rsyslog.rules
ANSWER: a, b, c
RATIONALE: Rules for logging on modern systems that use the System Log Daemon can be
configured in the /etc/rsyslog.conf file or in files under the /etc/rsyslog.d
directory. On legacy systems, the System Log Daemon used rules in the
/etc/syslog.conf file.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.2 - System logging.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

8. Yasir has been tasked with setting up a new Linux print server in his organization. He has installed CUPS and
would like to access the CUPS web administration tool to complete the configuration. What URL should Yasir
use within a web browser to access this tool?
a. http://servername
b. http://servername/cups
c. http://servername:631
d. http://servername/ipp
ANSWER: c
RATIONALE: The CUPS web administration tool listens to port 631 using HTTP. Thus, you
must use the URL http://servername:631 to access it.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 132

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
9. Which of the following files stores information about failed logins on a Linux system?

a. /var/log/btmp
b. /var/log/wtmp
c. /var/log/nolo
d. /var/log/failed
ANSWER: a
RATIONALE: The /var/log/btmp log file shows the last failed logins on a Linux operating
system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

10. Which of the following log files contains information and error messages generated by the Linux kernel?

a. /var/log/wtmp
b. /var/log/dmesg
c. /var/log/kern.log
d. /var/log/secure
ANSWER: c
RATIONALE: The kern.log log file contains information and error messages generated by the
kernel.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.2 - System logging.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

11. Which command can be used to display messages from the MySQL daemon between 10:00 am and 10:15
am today? (Choose all that apply.)

Page 133

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.

a. journalctl --range "10:00-10:15" mysqld.service


b. journalctl _COMM=mysqld --since "10:00" --until "10:15"
c. journalctl --unit mysqld.service --range "10:00-10:15"
d. journalctl --unit mysqld.service --since "10:00" --until "10:15"
ANSWER: b, d
RATIONALE: The journalctl command can query events based on command (_COMM) and
service unit (--unit), as well as narrow down time ranges using the --since and --
until options. Command must be specified as they are displayed using the Tab key
(name only) while service units must be specified using their Systemd syntax
(name.service).
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.2 - System logging.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

12. Which of the following log files under the /var/log directory contain security-related events? (Choose all that
apply.)
a. btmp
b. secure
c. auth.log
d. yum.log
ANSWER: a, b, c
RATIONALE: Failed logins (btmp), network access requests (secure), and user/daemon
authentication (auth.log) can be considered security-related events as they pertain
to system access. The yum.log contains events related to RPM package
installation only.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.2 - System logging.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Evaluate

Page 134

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

13. Which of the following commands can be used to remove a group from a Linux system?

a. rmgroup
b. rmg
c. groupdel
d. groups
ANSWER: c
RATIONALE: The groupdel command can be used to remove a group from a Linux system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

14. Which of the following is the first field of the /etc/passwd file?

a. UID
b. username
c. GECOS
d. GID
ANSWER: b
RATIONALE: The username is the first field in the /etc/passwd file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

15. Teresa is troubleshooting a printing issue on a Linux workstation and wishes to view the file contents of the
print queue to ensure that they match what is shown using the lpstat command. In which directory should
Teresa look?

Page 135

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.

a. /var/cups/jobs
b. /tmp/printers/cups/jobs
c. /etc/cups/jobs
d. /var/spool/cups
ANSWER: c
RATIONALE: CUPS stores print jobs in the /var/spool/cups directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

16. Which of the following options can be used with the usermod command to change the description of the user
account that is stored in the GECOS field?
a. -g
b. -d
c. -c
d. -s
ANSWER: c
RATIONALE: The -c option specifies a new description for the GECOS, or description, for the
user account.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

17. Which of the following two commands can be used to add custom log file entries to the journald database?
(Choose two.)
a. logentry
b. mklog

Page 136

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
c. systemd-cat
d. logger
e. systemd-make
ANSWER: c, d
RATIONALE: The systemd-cat command can be used to add custom log file entries to the
journald database. The logger command can be used to add custom log file
entries to the journald database or a System Log Daemon log file.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.2 - System logging.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

18. The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path
to this socket?
a. /tmp/log
b. /var/log.sock
c. /etc/rsyslog.socket
d. /dev/log
ANSWER: d
RATIONALE: The System Log Daemon, rsyslogd, creates a socket at /dev/log that other system
processes can write to.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.2 - System logging.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

19. You want to limit the size of the journald database, overwriting events as needed. What file must you
modify to specify a maximum database size?
a. /etc/systemd/journald.conf

Page 137

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
b. /etc/journald/journald.conf
c. /etc/rsyslogd/journald.conf
d. /etc/rsyslog/journald.conf
ANSWER: a
RATIONALE: The journald.conf file is located in the /etc/systemd directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.2 - System logging.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

20. Which of the following entries could be added to the rsyslog.conf configuration file to ensure that network
login events of warning priority and more serious are logged immediately to the /var/log/logins file?
a. auth.warn -/var/log/logins
b. authpriv.warn -/var/log/logins
c. authpriv.=warning /var/log/logins
d. auth.=warn /var/log/logins
ANSWER: b
RATIONALE: The format of lines in rsyslog.conf file are: facility.priority logfile. Network
logins use a facility of authpriv, and the priority of warn or warning (without the =
sign) ensure that warnings and more serious are matched. The - before the log file
ensures that events are logged immediately rather than waiting for the next I/O
cycle.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.2 - Outline the purpose of log files and how they are
administered.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.2 - System logging.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 10.2 Log File Administration
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

21. Which of the following commands can be used to set the default printer to printer1 for all users on a Linux
system?
Page 138

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.

a. lp -d printer1
b. lpoptions -d printer1
c. lpd -d printer1
d. lpq --set-default printer1
ANSWER: b
RATIONALE: The -d option for the lptions command sets the default printer on a Linux system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

22. Julius would like to ensure that his default printer is different than the system default printer. Which line can
he add to his ~/.bash_profile to set his default printer to printer5? (Choose two.)
a. export PRINT=printer5
b. export PRINTER=printer5
c. export LPDEFAULT=printer5
d. export LPDEST=printer5
ANSWER: b, d
RATIONALE: The PRINTER or LPDEST environment variables can be changed to set the
default printer on a Linux system.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.105.1 - Customize and use the shell environment.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

23. Which of the following commands will display the print jobs in the print queue for printer1 only?

a. lpstat -o printer1
b. lpq -d printer1
c. lpq -p printer1

Page 139

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
d. lp -j printer1
ANSWER: a
RATIONALE: The -o option can be used with the lpstat command to show the jobs in the print
queue for printer1 only.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

24. Which of the following commands can be used to prevent a printer named Printer1 from sending print jobs
in the print queue to the printer?
a. cupsreject -p Printer1
b. cupsdisable -c Printer1
c. cupsreject Printer1
d. cupsdisable Printer1
ANSWER: d
RATIONALE: The cupsdisable command can be used to temporarily pause printing of jobs in a
print queue.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

25. Emily accidentally created a new user account named bparsons on the wrong server. Which of the following
commands could she use to delete the account she created as well as the associated home directory? (Choose all
that apply.)
a. userdel bparsons ; rm -rf /home/bparsons
b. userdel bparsons
c. userdel -h bparsons
d. userdel -r bparsons

Page 140

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
ANSWER: a, d
RATIONALE: The userdel -r command can be used to remove a home directory as well as the
associated home directory. Alternatively, the user and home directory can be
removed separately using the userdel and rm -rf commands.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.3 - Create and manage user and group accounts.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.107.1 - Manage user and group accounts and related system files.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 10.3 Administering Users and Groups
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

26. Which of the following commands can you use to send a print job to printer1? (Choose all that apply.)

a. lp -d printer1 mydocument.txt
b. lpr -d printer1 mydocument.txt
c. lpr -P printer1 mydocument.txt
d. lp -p printer1 mydocument.txt
ANSWER: a, c
RATIONALE: The lp command, as part of the CUPS printing system, can use the -d option to set
the destination printer as printer1 followed by the filename that you want to
print. The lpr command, as part of the legacy printing system, has a -P option to
specify the printer.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

27. Uli administers a Linux print server on the network. The printer named printer5 on the print server has
experienced a hardware failure and Uli wants to let users immediately know that the printer is unavailable
should they attempt to submit a print job. What command should Uli run?
a. cupsreject -r "Unavailable. Please submit your job to another printer" printer5
b. cupsdisable -r "Unavailable. Please submit your job to another printer" printer5
c. cupsreject -m "Unavailable. Please submit your job to another printer" printer5
d. cupsdisable -m "Unavailable. Please submit your job to another printer" printer5

Page 141

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 10: Common Administrative Tasks.
ANSWER: a
RATIONALE: The cupsreject command can be used to prevent print jobs from being accepted
into the print queue, and the -r option can optionally be used to provide a message
to users that attempt to submit print jobs to the printer.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

28. Which protocol does CUPS use to share printers to client computers on the network by default?

a. SMB
b. IPP
c. LPD
d. LPR
ANSWER: b
RATIONALE: CUPS uses the HTTP-based Internet Printing Protocol (IPP) by default to share
print resources on networks such as the Internet.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.10.1 - Set up, manage, and print to printers on a Linux system.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.4 - Manage printers and printing.
TOPICS: 10.1 Printer Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 142

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

1. After compiling source code, which command still needs to be run in order to copy the newly compiled
binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the
correct location on the filesystem?
a. make install
b. make
c. make image
d. make clean
ANSWER: a
RATIONALE: The make install command will copy the newly compiled binaries as well as the
supporting files to the appropriate location on the filesystem.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.7 - Compile and install software packages from source code.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

2. When using the compress command to archive a file, which of the following options will display the
compression ratio of the new compressed file?
a. -c
b. -v
c. -s
d. -a
ANSWER: b
RATIONALE: The -v option displays a message of the percentage of reduction for each file
compressed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.2 - Compress and decompress files using common compression
utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.1 Compression
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 143

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

3. Which of the following can be used at the command line to download a source code tarball using the HTTP
protocol? (Choose two.)
a. GET
b. wget
c. curl
d. wwwretr
ANSWER: b, c
RATIONALE: The wget and curl commands can be used at the command line to download files
via HTTP.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.7 - Compile and install software packages from source code.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

4. Which of the following commands will install a package using the Red Hat Package Manager, showing all
information, while printing pound signs to show the progress of installation?
a. rpm -iah packagename.rpm
b. rpm -iap packagename.rpm
c. rpm -ivh packagename.rpm
d. rpm -ivp packagename.rpm
ANSWER: c
RATIONALE: The -i option to the rpm command will install, the -v option will display messages
in a verbose manner, and the -h option will display hash marks to indicate the
progress of the installation.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 144

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

5. Which of the following file extensions are used by the Debian Package Manager?

a. .dpm
b. .deb
c. .dpkg
d. .d
ANSWER: b
RATIONALE: Debian Package Manager software packages use the .deb file extension.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

6. You have downloaded an AppImage file from the Internet. What command can be used to verify the SHA-
256 checksum that is listed on the website from which you downloaded the file?
a. checksum --sha256
b. md5sum --sha256
c. sha256sum
d. shasum --level 256
ANSWER: c
RATIONALE: The sha256sum command can be used to verify a SHA-256 checksum on a Linux
system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.10 - Install and manage Snap, Flatpak, and AppImage
applications.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.2 - Process text streams using filters.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

7. Which of the following options for the tar command will create an archive that is also gzipped while

Page 145

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

displaying all of the work in progress to the terminal screen?


a. tar -zcvf archive.tar.gz
b. tar -cfza archive.tar.gz
c. tar -czvf archive.tar.gz *
d. tar -nzaf archive.tar.gz
ANSWER: c
RATIONALE: The -c option to tar is used to create, the z option is used to gzip, the -v option is
used for verbose output, and the -f option specifies the filename to create (the -f
option must precede the filename argument). The final argument of the tar
command must specify the files or directory to be added to the archive (*
indicates all files in the current directory will be added to the archive.tar.gz file).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.3 - Perform system backups using the tar, cpio, dump, and dd
commands.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.2 System Backup
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

8. Meredith is a software developer that is planning to install Visual Studio Code on her Linux workstation. She
regularly adds and removes packages to and from her workstation and wants to ensure that Visual Studio Code
always remains stable. In what software format should she obtain Visual Studio Code?
a. Source code
b. Package (DPM or RPM)
c. Sandbox (Flatpak, Snap, or AppImage)
d. Software as a Service (SaaS)
ANSWER: c
RATIONALE: Sandboxed applications contain all required dependency applications and will
remain stable regardless of whether other software is added to or removed from
the system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.6 - Describe common types of Linux software.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Understand

Page 146

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

DATE CREATED: 5/2/2023 10:03 PM


DATE MODIFIED: 5/2/2023 10:03 PM

9. Which of the following commands can be used to back up files in case of system failure, supports long
filenames, and can also back up special files?
a. dd
b. dump
c. cpio
d. tar
ANSWER: c
RATIONALE: The cpio command can be used to back up files in the case of system failure,
supports long filenames, and unlike other backup utilities, can also back up
special files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.3 - Perform system backups using the tar, cpio, dump, and dd
commands.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.2 System Backup
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

10. Which of the following files contains the list of shared libraries?

a. /etc/ld.so.conf
b. /etc/ld.so.cache
c. /lib/shared.conf
d. /lib/ld.so.conf
ANSWER: b
RATIONALE: The /etc/ld/so.cache file contains the list of shared libraries.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.9 - Identify and support shared libraries used by software.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.3 - Manage shared libraries.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM

Page 147

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

DATE MODIFIED: 5/2/2023 10:03 PM

11. Which of the following commands will list missing libraries as not found if a necessary library is not
installed?
a. ldd
b. ldconfig
c. ldso
d. ldchk
ANSWER: a
RATIONALE: The ldd command will list missing libraries as not found if a necessary library is
not installed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.9 - Identify and support shared libraries used by software.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.3 - Manage shared libraries.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

12. Ruprect needs to add a third-party repository to the Debian Package Manager in order to install the correct
driver for a Fibre Channel HBA. The HBA manufacturer has supplied him with a file that contains the
necessary repository location. To which directory can Ruprect copy this file to ensure that it will be used the
next time he runs an apt update command?
a. /etc/dpm/repolist
b. /etc/apt
c. /etc/dpm
d. /etc/apt/sources.list.d
ANSWER: d
RATIONALE: Debian Package Manager repositories are configured from entries in the
/etc/apt/sources.list file and files under the /etc/apt/sources.list.d directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 11.3 Software Installation

Page 148

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

KEYWORDS: Bloom's: Understand


DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

13. Which of the following commands can be used to modify installation configuration options for DPM
packages after they have been installed?
a. dpkg-configure
b. dpkg-reconfigure
c. dpkg-update
d. apt-cache
ANSWER: b
RATIONALE: The dpkg-reconfigure command can be used to modify configuration options for
DPM packages once they have been installed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

14. Which of the following commands can you use to search available packages on a DPM software repository?
(Choose two.)
a. apt-cache
b. apt-query
c. apt query
d. apt search
ANSWER: a, d
RATIONALE: The apt-cache command can be used to search available packages from a DPM
software repository. Alternatively, you can use apt command with the search
option to perform the same task.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management.

Page 149

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.


TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

15. Which of the following commands can be used to install the latest versions of all packages currently
installed on the system from the sources configured in sources.list?
a. apt upgrade
b. apt upgrade all
c. apt update
d. apt-upgrade
ANSWER: a
RATIONALE: The apt upgrade command will upgrade all currently installed packages that were
installed on the system from the sources configured in sources.list.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

16. Which of the following commands can be used to install sandboxed applications? (Choose all that apply.)

a. appimage
b. apt
c. snap
d. flatpak
ANSWER: c, d
RATIONALE: Snap and Flatpak are package managers for their own sandboxed application
formats and use the snap and flatpak commands to install applications,
respectively. AppImage is a sandboxed package format only and not a package
manager or command, while apt installs non-sandboxed DPM packages.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.10 - Install and manage Snap, Flatpak, and AppImage

Page 150

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

applications.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

17. Which of the following commands will install an RPM package while ignoring any other packages that it
may be dependent upon for proper operation?
a. rpm -ivh --nodeps package.rpm
b. rpm -ivhn package.rpm
c. rpm -i --ignoredeps package.rpm
d. rpm -in package.rpm
ANSWER: a
RATIONALE: The -i option to rpm will install an RPM package, the -v option will print verbose
output while doing so, and the -h option will display hash marks as the installation
progresses. The --nodeps option will ignore any dependencies and install the
package anyways if any dependencies are found that are not installed.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

18. Which of the following RPM options will update a software package to the newest version, or install the
package if it does not already exist on a system?
a. -i
b. -U
c. -u
d. -F
ANSWER: b
RATIONALE: The -U (capitalized) option is the same as --upgrade, which will update a software
package to the newest version if an older version exists on a system, or will install
the package if it does not currently exist.
POINTS: 1

Page 151

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

QUESTION TYPE: Multiple Choice


HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

19. Which of the following tools can search Internet software repositories for RPM packages that map to your
system's architecture, and automatically install or upgrade those packages on your system? (Choose all that
apply.)
a. apt
b. apt-get
c. dnf
d. yum
ANSWER: c, d
RATIONALE: The yum (Yellowdog Updater Modified) and dnf (Dandified YUM) tools can be
used to search Internet software repositories for RPM packages that map to your
system's architecture, and automatically install or upgrade those packages on your
system.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

20. Which of the following Red Hat Package Manager commands will install the newest versions of all
packages that are currently installed on a system?
a. apt-get update
b. dnf upgrade
c. apt-get upgrade all
d. dnf update-all
ANSWER: b

Page 152

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

RATIONALE: The dnf upgrade option will upgrade all RPM packages installed on a system to
the newest versions.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

21. The SUSE and openSUSE Linux distributions use an alternative to yum but that provides the same
functionality. What is the name of the command they use?
a. apt
b. rpm
c. zypper
d. dnf
ANSWER: c
RATIONALE: The SUSE and openSUSE distributions of Linux make use of a zypper utility as
an alternative to yum, but that still provides the same functionality for
downloading and installing RPM packages.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.5 - Use RPM and YUM package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

22. What command can be used to display the contents of a file that was compressed with the compress utility?

a. acat
b. zcat
c. cat
d. ccat

Page 153

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

ANSWER: b
RATIONALE: The zcat command can be used to display the contents of a file that was
compressed with the compress utility. You can also use the zgrep command to
search the contents of a compressed file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.2 - Compress and decompress files using common compression
utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.1 Compression
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

23. What command looks for a Makefile and uses the information within it to compile the source code into
binary programs using the appropriate compiler program for the local hardware architecture?
a. configure
b. install
c. make install
d. make
ANSWER: d
RATIONALE: The make command looks for the Makefile file and uses the information in it to
compile the source code into binary programs using the appropriate compiler
program for the local hardware architecture.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.7 - Compile and install software packages from source code.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

24. What option can be added to the dpkg command to remove a specified package from the system, including
any configuration files used by the package?
a. -d
b. -P
c. -D

Page 154

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

d. -r
ANSWER: b
RATIONALE: The dpkg -P command removes everything, including configuration files used by
the package.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.8 - Install and manage software packages using the Red Hat
Package Manager (RPM) and Debian Package Manager (DPM).
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.4 - Use Debian package management.
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

25. If no level of compression is specified, the gzip command assumes what compression level?

a. 4
b. 5
c. 6
d. 7
ANSWER: c
RATIONALE: If no level of compression is specified, the gzip command assumes the -6 option.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.1 - Outline the features of common compression utilities.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.1 Compression
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

26. Which of the following is a common CD and DVD disc burning software package available for Linux
systems?
a. mkisofs
b. Brasero
c. Nautilus
d. Mopheus
ANSWER: b

Page 155

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

RATIONALE: Brasero is a common disc burning software package that is installed by default on
many Linux distributions.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.5 - Use burning software to back up files to CD and DVD.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.2 System Backup
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

27. After downloading a sample.appimage file from AppImageHub.com, how can you run it?

a. Run the fuse sample.appimage command.


b. Run the fuse --run sample.appimage command.
c. Double-click on the sample.appimage file within a desktop environment to start the installation
program.
d. Modify the file permissions to grant execute permission and execute it like any other program binary.
ANSWER: d
RATIONALE: AppImage files are self-contained filesystems that can be executed like any other
program binary once they are granted execute permission.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.10 - Install and manage Snap, Flatpak, and AppImage
applications.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.6 - Given a scenario, build and install software.
TOPICS: 11.3 Software Installation
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

28. Which of the following will extract the contents of the archive.tar.gz file?

a. tar -ztvf archive.tar.gz


b. tar -zxa archive.tar.gz
c. tar -zrvf archive.tar.gz
d. tar -zxf archive.tar.gz
ANSWER: d
RATIONALE: The -x option to tar is used to extract, the z option is used to gunzip, and the -f
option specifies the filename to extract (the -f option must precede the filename
Page 156

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 11: Compression, System Backup, and Software Installation.

argument).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.11.4 - View and extract archives using the tar, cpio, restore, and dd
commands.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.3 - Perform basic file management.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 11.2 System Backup
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:03 PM
DATE MODIFIED: 5/2/2023 10:03 PM

Page 157

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
1. When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint
for the target computer. In which file is this fingerprint stored?
a. ~/.ssh/options
b. ~/.ssh/rsa.pub
c. ~/.ssh/known_hosts
d. ~/.ssh/rsa
ANSWER: c
RATIONALE: The encryption fingerprint for each remote host is stored within a paragraph for
each host in the ~/.ssh/known_hosts file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote
administration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption.
Eckert.XK0-005.24.2.4 - Given a scenario, configure and execute remote connectivity for
system management.
TOPICS: 12.8 Remote Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

2. What file lists ports and their associated protocols?

a. /etc/services
b. /etc/ports.conf
c. /etc/hosts
d. /etc/nsswitch.conf
ANSWER: a
RATIONALE: The /etc/services file lists known ports and protocol combinations alongside their
service description.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.7 - Identify common network services.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.7 Network Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

3. Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to
Page 158

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
determine the round trip time it takes a packet to travel?
a. ping -4 server1
b. ping server1
c. ping -c 4 server1
d. ping -n 4 server1
ANSWER: c
RATIONALE: The -c 4 option for the ping command will send a count of 4 ICMP echo requests.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting.
Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource
issues.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

4. Which of the following commands will display detailed information for a wired network interface?

a. lsnet
b. hwdisp --network
c. lshw --net
d. ethtool
ANSWER: d
RATIONALE: The ethtool command can be used to display detailed information for a wired
network interface.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

5. You run the command hostname server1 and then issue the reboot command. You notice that the host name
has reverted back to what it was before the reboot. Which of the following commands should you have used to
change the host name instead?

Page 159

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
a. ifconfig server1
b. host server1
c. hostnamectl set-hostname server1
d. set hostname="server1"
ANSWER: c
RATIONALE: The hostnamectl command will change a Linux system's host name so that it
persists across reboots. It does this by also adding the host name to the
/etc/hostname file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved
to IP addresses.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.4.5 - Given a scenario, use systemd to diagnose and resolve common
problems with a Linux system.
TOPICS: 12.5 Name Resolution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

6. Which of the following are available network renderer services on Linux systems?

a. Systemd-networkd
b. Netplan
c. NetworkManager
d. Cloud-init
ANSWER: b, c
RATIONALE: Systemd-networkd is a network renderer service that is part of Systemd and
commonly used on Linux server distributions, whereas NetworkManager is a
network renderer service that is bundled with most desktop environments and
used on Linux workstations.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 160

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
7. Which of the following can only be used to remotely administer a Linux machine graphically?

a. SSH
b. Telnet
c. FTP
d. VNC
ANSWER: d
RATIONALE: VNC is Virtual Network Computing and is a cross-platform method of
graphically connecting to a remote system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote
administration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.8 Remote Administration
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

8. Which of the following commands can be used to trace an IPv6 route? (Choose two.)

a. trace6
b. traceroute6
c. tracert6
d. tracepath6
ANSWER: b, d
RATIONALE: The traceroute6 command can be used to trace an IPv6 route. The tracepath6
command can be used similar to traceroute6 to trace an IPv6 route.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.6 - Configure IP routing.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting.
Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource
issues.
TOPICS: 12.6 Routing
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

9. Which of the following ports would be used to resolve a domain name to an IP address?

Page 161

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
a. 443
b. 23
c. 53
d. 69
ANSWER: c
RATIONALE: Port 53 is used by DNS, or the Domain Name System.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.7 - Identify common network services.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.7 Network Services
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

10. Which of the following is a media access method?

a. TCP/IP
b. UDP/IP
c. ICMP
d. Ethernet
ANSWER: d
RATIONALE: Ethernet is a protocol that is used to directly access network media.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.1 - Describe the purpose and types of networks, protocols, and
media access methods.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols.
TOPICS: 12.1 Networks
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

11. Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal
notation listed as 255.255.255.224. How would this be represented by the ip addr command using CIDR
notation?
a. /23
b. /24

Page 162

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
c. /27
d. /28
ANSWER: c
RATIONALE: 255.255.255.224 in dotted decimal notation is the same as /27 (27 bits within the
subnet mask) in CIDR notation.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols.
TOPICS: 12.2 The IP Protocol
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

12. Which of the following IPv4 addresses can only be used behind a proxy server or NAT router?

a. 3.0.2.7
b. 10.4.9.2
c. 192.139.188.42
d. 100.1.1.1
ANSWER: b
RATIONALE: Certain IP address ranges are reserved for use behind proxy/NAT devices. These
include the entire 10.0.0.0 Class A network (10.0.0.0/8), the 172.16 through
172.31 Class B networks (172.16-31.0.0/16), and the 192.168 Class C networks
(192.168.0-255.0/24).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols.
TOPICS: 12.2 The IP Protocol
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

13. The system administrator has shut Ethernet interface eth0 down while making some changes to the system.
Which of the following commands can they use to bring the network connection back up? (Choose all that
apply.)
a. ifconfig eth0 up
b. activate eth0
c. int eth0 up

Page 163

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
d. ip link set eth0 up
ANSWER: a, d
RATIONALE: The ifconfig eth0 up command can be used to bring ethernet interface eth0 back
up on a system with the net-tools package installed. On a system with the
iproute/iproute2 package installed, the ip link set eth0 up command can instead be
used.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

14. On a system running NetworkManager, which of the following commands can be used to view or modify
connection information?
a. netman
b. nm
c. netctonf
d. nmcli
ANSWER: d
RATIONALE: The nmcli command can be used to view or modify connection information on
systems running NetworkManager.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.3 - Configure a network interface to use IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

15. Which of the following files does the hostnamectl command modify to set the hostname on a machine?

a. /etc/hostname
b. /etc/host.conf

Page 164

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
c. /etc/hosts.conf
d. /etc/hostname.conf
ANSWER: a
RATIONALE: The /etc/hostname file stores the hostname of the system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved
to IP addresses.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.5 Name Resolution
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

16. You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS
server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before
falling back to the /etc/hosts file. Which of the following files should you modify to make this possible?
a. /etc/hosts
b. /etc/nsswitch.conf
c. /etc/resolv.conf
d. /etc/named.conf
ANSWER: b
RATIONALE: The /etc/nsswitch.conf file will specify which order a Linux machine will use in
order to resolve names to IP addresses.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved
to IP addresses.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.5 Name Resolution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

17. Which of the following commands can be used to display TCP connections on a Linux system? (Choose all
that apply.)
a. sockstat

Page 165

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
b. ss -t
c. netstat -t
d. sstat
ANSWER: b, c
RATIONALE: The ss or netstat command alongside the -t option will display TCP connections
(sockets) on the system.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.7 - Identify common network services.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.7 Network Services
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

18. Which of the following commands copy the /etc/hosts file on server5 to the root directory on the local
system using SSH? (Choose all that apply.)
a. scp root@server5:/etc/hosts /
b. scp root@server5:/etc/hosts >/hosts
c. ssh root@server5:/etc/hosts | ssh &> /
d. ssh root@server5 cat /etc/hosts > /hosts
ANSWER: a, d
RATIONALE: You can use the ssh or scp commands to copy files from remote systems. The
syntax for ssh is: ssh user@server:remotefile > localfile. The syntax for scp is: scp
user@server:remotefile localdirectory.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote
administration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption.
Eckert.XK0-005.24.1.2 - Given a scenario, manage files and directories.
TOPICS: 12.8 Remote Administration
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

19. Which of the following is a valid APIPA address?

a. 127.0.0.1

Page 166

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
b. 169.254.38.101
c. 10.11.12.13
d. 192.168.1.17
ANSWER: b
RATIONALE: The 169.254.0.0 through 169.254.255.255 range of IP addresses has been
designated for use by the Automatic Private IP Address (APIPA) method of
assigning IP addresses when a DHCP server is unavailable and an address has not
been statically assigned.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.109.1 - Fundamentals of internet protocols.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

20. Houston is an IT support specialist who needs to modify the IP address configuration on a Fedora
Workstation on the network remotely via an SSH connection. What configuration file should he modify once he
has connected to the remote system?
a. /etc/NetworkManager/system-connections/eth0.nmconnection
b. /etc/netplan/00-installer-config.yaml
c. /etc/networks/eth0.conf
d. /etc/sysconfig/network-services/eth0
ANSWER: a
RATIONALE: Fedora Workstation uses the NetworkManager network renderer service, which
stores IP configuration in files under the /etc/NetworkManager/system-
connections directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

21. Which of the following is a valid DNS server definition in the /etc/resolv.conf file?

Page 167

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
a. dns 1.1.1.1
b. order hosts, bind
c. 10.1.15.60 server10
d. nameserver 8.8.8.8
ANSWER: d
RATIONALE: Lines in /etc/resolv.conf have the format: nameserver IP.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved
to IP addresses.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.5 Name Resolution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

22. Doug notices that the DNS server IP address listed in /etc/resolv.conf is 127.0.0.53. What does this indicate?

a. DNS name resolution is disabled on the system.


b. Name resolution requests will be forwarded to Systemd-resolved.
c. The local system is running a DNS server service.
d. The system will only use DNS servers listed in /etc/hosts.
ANSWER: b
RATIONALE: On modern Linux systems that use Systemd, /etc/resolv.conf may be configured
to redirect requests to Systemd-resolved, which listens on the IP address
127.0.0.53.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.5 - Describe the purpose of host names and how they are resolved
to IP addresses.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.4 - Configure client side DNS.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.5 Name Resolution
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

23. What command can be run within a desktop environment to configure a DSL connection on a system that
uses NetworkManager?

Page 168

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
a. modem-manager-gui
b. nm-connection-editor
c. dslconf
d. pppoeconf
ANSWER: b
RATIONALE: The nm-connection-editor command starts the graphical Network Connections
utility, which can configure a wide range of network connections and
technologies, including DSL.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.4 - Configure a PPP interface.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.4 Configuring a PPP Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

24. Seema needs to modify the static IP address configuration on an Ubuntu Server system on the network.
What configuration file should she modify?
a. /etc/networks/eth0.conf
b. /etc/netplan/00-installer-config.yaml
c. /etc/NetworkManager/system-connections/eth0.nmconnection
d. /etc/sysconfig/network-services/eth0
ANSWER: b
RATIONALE: Ubuntu Server uses the NetPlan subsystem to provide IP configuration to
Systemd-networkd. The default file used to provide NetPlan configuration on
Ubuntu is /etc/netplan/00-installer-config.yaml.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.2 - Explain the basic configuration of IP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.2 - Persistent network configuration.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.3 Configuring a Network Interface
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

25. What command can be used to connect to server5 using SSH as the user eschmidt? (Choose all that apply.)

Page 169

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.

a. ssh -l eschmidt server5


b. ssh //server5/eschmidt
c. ssh eschmidt@server5
d. ssh -u eschmidt@server5
ANSWER: a, c
RATIONALE: The ssh command accepts the syntax username@server or the syntax -l user
server.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote
administration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.8 Remote Administration
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

26. You would like to configure the connection options allowed for the SSH daemon. What file should you edit?

a. /etc/ssh/ssh.conf
b. /etc/ssh/sshd.conf
c. ~/.ssh/sshd
d. ~/.ssh/options
ANSWER: b
RATIONALE: The SSH daemon configuration file is /etc/ssh/sshd.conf.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote
administration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 12.8 Remote Administration
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

27. Which of the following commands will add a route to the route table on a Linux router to the
192.139.188.0/24 network via the router 15.2.199.6?
a. route add -net 192.139.188.0 netmask 255.255.255.0 gw 15.2.199.6

Page 170

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 12: Network Configuration.
b. route add -target 192.139.188.0/24 -source 15.2.199.6
c. ip route add 192.139.188.0/24 gw 15.2.199.6
d. ip route add 192.139.188.0/24 via 15.2.199.6
ANSWER: a, d
RATIONALE: The route and ip commands can be used to add routes to the route table. The
syntax for the route command is: route add -net networkIP netmask subnetmask
gw routerIP. The syntax for the ip command is: ip route add networkCIDR via
routerIP.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.6 - Configure IP routing.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.109.3 - Basic network troubleshooting.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.6 Routing
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

28. Ricky has configured a VNC server on his Linux workstation that listens on the second X Windows display.
What port must he allow on his network firewall in order to access his VNC server from a remote system?
a. 23
b. 6100
c. 5902
d. 22
ANSWER: c
RATIONALE: VNC listens on port 5900 + display#. For display 2, VNC would listen on port
5902.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.12.8 - Use command-line and graphical utilities to perform remote
administration.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.106.2 - Graphical desktops.
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 12.8 Remote Administration
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 171

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
1. Which of the following files contain the path and filename where zone definitions should be configured on a
DNS server?
a. /etc/nsswitch.conf
b. /etc/named.conf
c. /etc/named.conf
d. /etc/hosts
ANSWER: c
RATIONALE: The /etc/named.conf file is where you would define the zones that a DNS server
should use.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS,
and NTP.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

2. Which of the following commands can be used to run a persistent container called webapp1 based on the
wopr image created by arfa on DockerHub, as well as map port 46000 on the underlying platform to port 8080
in the container?
a. docker run -d -p 46000:8080 --name webapp1 arfa/wopr
b. docker run -d -p 8080:46000 --name webapp1 arfa/wopr
c. docker run -d -p 46000:8080 --name webapp1 wopr/arfa
d. docker run -d -p 8080:46000 --name webapp1 wopr/arfa
ANSWER: c
RATIONALE: The docker run -d command will run a container persistently. The -p option is
used to map a port in the format platform:container, the --name option specifies
the container name, and the final argument specifies the container image in the
format organization/image.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.7 - Create and run containers using Docker.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest.
Eckert.XK0-005.24.3.2 - Given a scenario, perform basic container operations.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 172

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
3. Ryu would like to connect to the webapp5 container that is running on his Linux server to modify the
configuration of the application run within. What command can he use to obtain an interactive shell in this
container?
a. docker ps /bin/sh webapp5
b. docker run -s /bin/sh webapp5
c. docker exec -it webapp5 sh
d. docker shell webapp5
ANSWER: c
RATIONALE: The docker exec command can be used to connect to a shell within a running
container.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.7 - Create and run containers using Docker.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest.
Eckert.XK0-005.24.3.2 - Given a scenario, perform basic container operations.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

4. Gordon administers a Kubernetes cluster that runs a microservice-based web app comprised of several
containers. Currently, these microservices are configured to communicate directly with one another. What could
Gordon implement to provide additional logging and security for information that is passed between these
microservices?
a. service mesh
b. ambassador container
c. sidecar container
d. ingress controller
ANSWER: a
RATIONALE: Microservices running in different containers can be configured to communicate
among each other via a special proxy service called a service mesh that provides
additional security and monitoring capabilities.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.6 - Describe how virtual machines and containers are created and
used within cloud environments.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.5 - Summarize container, cloud, and orchestration concepts.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM

Page 173

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
DATE MODIFIED: 5/2/2023 10:04 PM

5. Which of the following is a valid SQL statement for adding a new row of data to a SQL database table?

a. INSERT INTO users (firstname, lastname) values (‘George', ‘Washington');


b. INSERT (‘George', ‘Washington') INTO users (firstname, lastname);
c. ALTER TABLE users SET firstname = ‘George', lastname = ‘Washington';
d. UPDATE users SET firstname = ‘George', lastname = ‘Washington';
ANSWER: a
RATIONALE: The correct syntax to add a new row of data is to use the INSERT INTO statement.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.5 - Configure database services using PostgreSQL.
TOPICS: 13.5 Database Services
KEYWORDS: Bloom's: Analyze
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

6. Victoria has created a Kubernetes deployment and service for a new microservice-based web app. What can
she configure to ensure that this web app can be accessed from outside of the Kubernetes cluster? (Choose all
that apply.)
a. an ingress controller
b. a pod controller
c. a load balancer service
d. an ambassador container
ANSWER: a, c
RATIONALE: A service can be exposed outside of a Kubernetes cluster by configuring either an
ingress controller or a load balancer service.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.8 - Configure Kubernetes to run containers.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.5 - Summarize container, cloud, and orchestration concepts.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

7. Which of the following storage types can be accessed using HTTP or HTTPS and is often used by web apps
that need to store many documents, pictures, and videos?
a. block

Page 174

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
b. object
c. database
d. persistent
ANSWER: b
RATIONALE: Object storage is accessed using HTTP or HTTPS. Because of its relatively low
cost and persistence needs, it is well suited for storing large numbers of user files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.6 - Describe how virtual machines and containers are created and
used within cloud environments.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest.
Eckert.XK0-005.24.1.1 - Summarize Linux fundamentals.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

8. Which of the following can be run within the psql utility to list the tables within the current database?

a. \l
b. \d
c. \c
d. \b
ANSWER: d
RATIONALE: The \d command within the psql utility displays the tables within the current
database.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.5 - Configure database services using PostgreSQL.
TOPICS: 13.5 Database Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

9. Which of the following commands can be used to display any email messages awaiting delivery alongside the
reason that they were not delivered?
a. mailqueue
b. mailq
c. mail --queue
d. mail -q
ANSWER: b

Page 175

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
RATIONALE: The mailq command can be used to display any email messages awaiting delivery
alongside the reason that they were not delivered.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.4 - Configure email services using Postfix.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.3 - Mail Transfer Agent (MTA) basics.
TOPICS: 13.4 Email Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

10. Hadeel's organization creates new virtual machines on a public cloud provider several times a month from
virtual machine templates supplied by the cloud provider. Each of these systems must use one of three standard
software and system configuration that the organization has defined. What software can Hadeel use to simplify
the configuration of new virtual machines that he creates in the future?
a. orchestration
b. OVF
c. CM
d. IaT
ANSWER: c
RATIONALE: Configuration Management (CM) software can be used to automatically apply
standard configurations to multiple systems. These configurations can be
specified in declarative format and stored in YAML files to provide a series of
templates that can be reused. This practice is called Infrastructure as Code (IaC).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.6 - Describe how virtual machines and containers are created and
used within cloud environments.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.102.6 - Linux as a virtualization guest.
Eckert.XK0-005.24.3.4 - Summarize common infrastructure as code technologies.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Analyze
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

11. What ftp command uploads the filename from the current directory on the local computer to the current
directory on the remote computer and allows the use of wildcard metacharacters to specify the filename?
a. upload filename
b. mput filename
c. put filename

Page 176

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
d. get filename
ANSWER: b
RATIONALE: The mput filename is a common FTP command that uploads the given filename
from the current directory on the local computer to the current directory on the
remote computer and allows the use of wildcard metacharacters to specify
multiple files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and
FTP.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 13.3 File Sharing Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

12. Darius would like to prevent the user jwhitley from logging into the FTP service running on his Linux
server. Which file must Darius configure to provide for this restriction?
a. /etc/vsftpd.conf
b. /etc/ftpusers
c. /etc/ftplist
d. /etc/hosts.deny
ANSWER: b
RATIONALE: Denied FTP users are listed in the /etc/ftpusers and /etc/user_list files.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and
FTP.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 13.3 File Sharing Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

13. After modifying the /etc/aliases file, what command must be run in order to rebuild the email aliases
database?
a. alias

Page 177

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
b. newaliases
c. sendmail
d. mail
ANSWER: b
RATIONALE: The newaliases command is used in order to rebuild the aliases database that is
located within /etc/aliases.db based on the entries in the /etc/aliases file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.4 - Configure email services using Postfix.
ACCREDITING STANDARDS:
Eckert.LPIC-1.24.108.3 - Mail Transfer Agent (MTA) basics.
TOPICS: 13.4 Email Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

14. What PostgreSQL command-line utility backs up PostgreSQL database settings?

a. pg_dumpall
b. pg_dump
c. pg_restore
d. pg_backup
ANSWER: b
RATIONALE: The pg_dump command backs up PostgreSQL database settings.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.5 - Configure database services using PostgreSQL.
TOPICS: 13.5 Database Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

15. What DNS resource record type is used to provide an alias for another resource record?

a. NS
b. MX
c. SOA
d. CNAME
ANSWER: d
RATIONALE: The CNAME record specifies another name for an existing A or AAAA resource
record for a zone.

Page 178

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS,
and NTP.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Understand
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

16. What line in the /etc/chrony.conf file would allow systems on the 10.3.0.0/16 network to obtain time
information from the NTP server?
a. allow 10.3.0.0 255.0.0.0 -iburst
b. restrict 10.3.0.0 255.0.0.0 -iburst
c. allow 10.3/16
d. restrict 10.3/16
ANSWER: c
RATIONALE: The allow line in /etc/chrony.conf specifies the hosts and networks allowed to
query time information from the NTP server. For networks, it accepts shortened
CIDR notation, such as 10.3/16 for the 10.3.0.0/16 network.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP,
DNS, and NTP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

17. Yassir has been tasked with adding a new SMB share definition to Linux server. What file should he modify
to add the share definition?
a. /etc/samba/smb.conf
b. /etc/exports
c. /etc/samba/shares
d. /etc/smb/shares
ANSWER: a
RATIONALE: SMB share definitions are defined in /etc/samba/smb.conf for use with the Samba
daemons.
POINTS: 1

Page 179

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and
FTP.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 13.3 File Sharing Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

18. What zone configuration file contains a PTR record used to identify the loopback adapter?

a. /var/named/named.ca
b. /etc/named.conf
c. /var/named/named.local
d. /etc/named.loop
ANSWER: c
RATIONALE: The file used to identify the loopback adapter is at /var/named/named.local or
/var/named/named.localhost or /var/named/named.loopback.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS,
and NTP.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

19. Which command can be used to test the performance of an Apache web server?

a. apachectl
b. ab
c. curl
d. testparm
ANSWER: b
RATIONALE: The ab (Apache benchmark) command can be used to send multiple requests to an
Apache web server to measure performance.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.2 - Configure web services using the Apache web server.

Page 180

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 13.2 Web Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

20. Where is the default document root directory for the Apache Web server?

a. /usr/local/html
b. /var/www/html
c. /usr/share/local/html
d. /var/html
ANSWER: b
RATIONALE: The /var/www/html directory typically contains the default website that is used on the
server and is called the document root directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.2 - Configure web services using the Apache web server.
TOPICS: 13.2 Web Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

21. After making several changes to the Apache configuration file on his web server and restarting the Apache
daemon, Tung notices that the Apache web server fails to start. What command can Tung use to determine
whether a syntax error in the Apache configuration file is to blame?
a. testparm
b. apachectl configtest
c. ab
d. curl
ANSWER: b
RATIONALE: The apachectl configtest command prints any syntax errors it finds in the Apache
configuration files on the system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.2 - Configure web services using the Apache web server.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.5 - Given a scenario, use the appropriate networking tools or
configuration files.
TOPICS: 13.2 Web Services

Page 181

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

22. Jinu has installed the DHCP daemon on one of her Linux servers and wishes to configure it to provide IPv4
and IPv6 addressing for systems on the network. What two files must she modify? (Choose two.)
a. /etc/dhcp/dhcpd.conf
b. /etc/dhcp/ip4.conf
c. /etc/dhcp/ip6.conf
d. /etc/dhcp/dhcpd6.conf
ANSWER: a, d
RATIONALE: The /etc/dhcp/dhcpd.conf file stores IPv4 configuration, while the
/etc/dhcp/dhcpd6.conf file stores IPv6 configuration.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS,
and NTP.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

23. The systems on your network obtain IPv4 configuration from a Linux DHCP server. When monitoring
network traffic from your router, which of the following DHCP packets would you expect to see large numbers
of if the Linux DHCP server is offline?
a. DHCPDISCOVER
b. DHCPOFFER
c. DHCPREQUEST
d. DHCPACK
ANSWER: a
RATIONALE: The first packet in a DHCP negotiation for IPv4 is DHCPDISCOVER. If a DHCP
server is offline, systems will continue to send these packets on the network, but no
subsequent DHCP packets (DHCPOFFER, DHCPREQUEST, or DHCPACK) will be
transmitted.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP, DNS,
and NTP.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Remember

Page 182

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

24. What command can you run on a Linux system that uses the NTP daemon (ntpd) to view the available time
sources?
a. chronyc -u
b. ntpdate -u
c. ntpq -p
d. chronyc sources -v
ANSWER: c
RATIONALE: On a system that uses ntpd, the ntpq -p command will print the current time
sources. On a system that uses chronyd, the chronyc sources -v command will
print the current time sources.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.1 - Configure infrastructure network services, including DHCP,
DNS, and NTP.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.108.1 - Maintain system time.
Eckert.XK0-005.24.1.7 - Given a scenario, manage software configurations.
TOPICS: 13.1 Infrastructure Services
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

25. What syntax can be used from the File Explorer app on a Windows workstation to access the SMB share
called data on the server called garamas?
a. //garamas/data
b. \\garamas\data
c. garamas:/data
d. smb://garamas/data
ANSWER: b
RATIONALE: Windows clients can use the format \\servername\sharename format to access
SMB shares on a Linux server running Samba.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and
FTP.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 13.3 File Sharing Services

Page 183

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

26. Which of the following lines in the /etc/exports file will share the /data directory to all hosts using NFS
while preventing privileged write access?
a. [data] path=/data options=rw,all,noroot
b. /data *(rw) --noroot
c. /data hosts=all options=rw,root_squash
d. /data *(rw,root_squash)
ANSWER: d
RATIONALE: Lines in the /etc/exports file use the format: directory hosts(options).
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and
FTP.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 13.3 File Sharing Services
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

27. Billy would like to mount the remote /data directory on server5 to the /mnt directory on his local system
using NFS. Which command can he use?
a. mount -t nfs server5:/data /mnt
b. mount -t nfs //server5/data /mnt
c. mount -t nfs \\server5\data /mnt
d. mount -t nfs data@server5 /mnt
ANSWER: a
RATIONALE: NFS shares are mounted using the mount command, but use the syntax
server:directory instead of a device file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.3 - Configure file-sharing services, including Samba, NFS, and
FTP.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.1.3 - Given a scenario, configure and manage storage using the
appropriate tools.
TOPICS: 13.3 File Sharing Services

Page 184

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 13: Configuring Network Services and Cloud Technologies.
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

28. Which of the following commands can be used to configure a Kubernetes cluster?

a. k3s
b. podman
c. k8s
d. kubectl
ANSWER: d
RATIONALE: The kubectl command is used to configure Kubernetes clusters.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.13.8 - Configure Kubernetes to run containers.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.3.5 - Summarize container, cloud, and orchestration concepts.
TOPICS: 13.6 Working with Cloud Technologies
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 185

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
1. Violet wants to configure an encrypted partition to mount when her workstation boots up. Which of the
following should she do?
a. Configure /etc/crypttab to open the volume and then /etc/fstab to mount it.
b. Configure /etc/fstab to mount the partition.
c. Configure /etc/crypttab to mount the partition.
d. Configure /etc/crypttab to open the volume and then /etc/mtab to mount it.
ANSWER: a
RATIONALE: The /etc/crypttab file should be configured to open the encrypted partition and
then the /etc/fstab should be configured to mount it.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.3 - Securing data with encryption.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

2. Which of the following commands can be used to force udev to reload new rules from the /etc/udev/rules
directory?
a. udevadm reload
b. udevadm apply
c. udevadm --reload
d. udevadm control -R
ANSWER: d
RATIONALE: The udevadm control -R command will force udev to reload new rules from the
/etc/udev/rules directory.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application,
filesystem, and network problems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 14.3 Resolving Common System Problems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

3. Which of the following is not a valid AppArmor command?

Page 186

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.

a. aa-enforce
b. aa-trust
c. aa-unconfined
d. aa-complain
ANSWER: b
RATIONALE: There is not an aa-trust command for AppArmor. The aa-enforce command sets
an AppArmor profile to enforce mode, the aa-complain command sets an
AppArmor profile to complain mode, and the aa-unconfined command displays
services and components that do not have an associated AppArmor profile.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

4. Which of the following commands will change the SELinux security context of a file?

a. sechange
b. secontext
c. chcon
d. scont
ANSWER: c
RATIONALE: The chcon command can change the SELinux security context of a file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

5. Which of the following daemons should be installed in order to join a Linux server to Microsoft's Active
Directory? (Choose all that apply.)
a. realmd

Page 187

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
b. kerberosd
c. sssd
d. add
ANSWER: a, c
RATIONALE: The System Security Services Daemon (sssd) on the Linux system provides for
LDAP and Kerberos connectivity, while the Realm Daemon (realmd) is used to
discover and join an Active Directory domain.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

6. Which of the following are examples of devices that provide for multifactor authentication when used in
combination with a username and password? (Choose all that apply.)
a. lock screen
b. fingerprint reader
c. YubiKey token device
d. user certificate
ANSWER: b, c, d
RATIONALE: Multifactor authentication uses two or more separate authentication mechanisms
to validate a user's identity. Fingerprint readers, token devices, and user
certificates are common mechanisms that users can use to provide validation in
addition to a username and password, but a lock screen merely prompts for your
username and password.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.1 - Describe the different facets of Linux security.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 188

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
7. Which of the following can you use to configure firewall rules for IPv6 on a Linux system? (Choose all that
apply.)
a. ip6tables
b. ufw
c. firewall-cmd
d. nftables
ANSWER: a, b, c
RATIONALE: The ip6tables, ufw, firewall-cmd, and nft commands can configure firewall rules
for IPv6.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.3 - Given a scenario, implement and configure firewalls.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

8. Which of the following commands can be used to allow a firewalld exception for SSH traffic during system
initialization?
a. firewall-cmd --add-port=22/udp
b. firewall-cmd --add-port=53/tcp --permanent
c. firewall-cmd --add-port=23/tcp
d. firewall-cmd --add-port=22/tcp --permanent
ANSWER: d
RATIONALE: SSH uses TCP port 22. To ensure that the rule is loaded at system initialization,
the --permanent option must be supplied to firewall-cmd.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.3 - Given a scenario, implement and configure firewalls.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

9. Which of the following commands can be used to view the attack surface of a Linux server by examining the
services that the server is responding to?

Page 189

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
a. nmap
b. tshark
c. ss -u
d. tripwire
ANSWER: a
RATIONALE: The nmap command scans one or more systems and displays the open ports and
associated services running on the system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

10. Which of the following utilities will allow you to view information about virtual memory usage on a Linux
system? (Choose all that apply.)
a. free
b. sar -W 1 5
c. top
d. vmstat
ANSWER: a, b, c, d
RATIONALE: The free, vmstat, and top commands display virtual memory statistics, as will the
-W option to the sar command.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 14.4 Performance Monitoring
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

11. When looking at the password-auth file on a Fedora system, you notice part of the syntax that says
dcredit=3. What is the significance of this part of the configuration?

Page 190

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
a. The minimum password length has to be at least 3 characters long.
b. There must be at least 3 characters that are different from their previous password.
c. Users must use at least 3 characters as numbers in their passwords.
d. Users cannot re-use their last 3 passwords.
ANSWER: c
RATIONALE: The dcredit=3 signifies that the password must have at least 3 numbers in it.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

12. Which of the following commands can you use to list users who have been locked out by pam_faillock.so?

a. faillock
b. pam_faillock
c. pam_tally2
d. locklist
ANSWER: a
RATIONALE: The faillock command will list users who have been locked out by
pam_faillock.so.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.2 - Given a scenario, implement identity management.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

13. Which of the following commands will display a friendly summary of recent SELinux violations and the
commands that can be used to allow them?
a. semanage --list
b. restorecon --violations
c. chcon --violations

Page 191

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
d. audit2why < /var/log/audit/audit.log
ANSWER: d
RATIONALE: The audit2why command can be used to interpret the entries in the SELinux
audit.log and display summary information and remediation commands.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.5 - Given a scenario, apply the appropriate access controls.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

14. If the /dev/sdb device on a Linux server experiences poor IOPS performance, which of the following could
you try to improve performance?
a. modify the default scheduler listed in /sys/block/sdb/queue/scheduler
b. run the echo "- - -" > /sys/class/scsi_host/host0/scan command
c. create a udev rule that limits unnecessary writes to /dev/sdb
d. recreate the block device file with a higher major number using the mknod command
ANSWER: a
RATIONALE: The Linux kernel offers different storage schedulers for I/O. If performance issues
persist for a storage device, you can try using different schedulers to see if it
solves the issue. To use a different scheduler, you must first view the available
schedulers in the /sys/block/sdb/queue/scheduler file, and then echo the
appropriate one to the file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application,
filesystem, and network problems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 14.3 Resolving Common System Problems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

15. When experiencing a network issue, you want to determine where the source of the problem is. Which of the
three following commands can be used to determine whether there is an issue with a router in the normal route
that the packets are attempting to take? (Choose all that apply.)
a. mtr

Page 192

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
b. traceroute
c. tracert
d. tracepath
ANSWER: a, b, d
RATIONALE: The mtr command combines the functionality of the traceroute and ping
commands and is also known as My Traceroute. The traceroute command on
Linux is fully written out and prints the route packets take to a network host. The
tracepath command traces a path to a network host, discovering the MTU along
this path.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application,
filesystem, and network problems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource
issues.
TOPICS: 14.3 Resolving Common System Problems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

16. Which of the following are important to keep in mind when troubleshooting issues on a Linux server?
(Choose all that apply.)
a. Prioritize problems.
b. Limit the time you spend on each individual problem.
c. Try to locate the root cause of issues.
d. Solve the easiest problems first.
ANSWER: a, c
RATIONALE: Prioritizing problems will help you solve the most important issues in a timely
way, while looking for the root cause of an issue will save you time solving
multiple problems that are the result of a common misconfiguration or failure.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.3 - Describe and outline good troubleshooting practices.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 14.2 Troubleshooting Methodology
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 193

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
17. Which of the following commands allows a standard user to execute a single command as root without
obtaining a root shell? (Choose all that apply.)
a. su -c
b. sudo
c. su -
d. sudoedit
ANSWER: a, b
RATIONALE: The sudo and su -c commands allow a standard user to execute a single command
as root without obtaining a root shell. The sudo command requires the user be
granted the rights to execute the command in /etc/sudoers, while the su -c
"command" prompts the user for root user credentials.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.4.4 - Given a scenario, analyze and troubleshoot user access and file
permissions.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

18. Which of the following ports should you disable so that their corresponding services no longer respond to
network requests on a Linux system due to a lack of encryption? (Choose all that apply.)
a. 21
b. 22
c. 23
d. 80
ANSWER: a, c, d
RATIONALE: FTP, running on ports 20 and 21, should be disabled and discarded in favor of
SFTP or some other secure method of transferring files. Telnet runs on port 23
and does not use encryption. It is a best practice to disable telnet on most systems.
HTTP runs on port 80 and should be disabled in favor of HTTPS on port 443
where possible.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.
TOPICS: 14.1 Security

Page 194

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

19. Kevin has tried to run the fsck command on a damaged /data filesystem, but the filesystem was unable to be
repaired. What should his next course of action be?
a. Restore a recent backup of the /data filesystem.
b. Recreate the /data filesystem using mkfs.
c. Run the fsck command on the /data filesystem from system rescue.
d. Run the badblocks command on the /data filesystem.
ANSWER: b
RATIONALE: If a filesystem cannot be repaired, you should recreate the filesystem with mkfs
and then restore a recent backup of the data. It is important that you recreate the
filesystem as you should not restore a data backup onto a damaged filesystem.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application,
filesystem, and network problems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 14.3 Resolving Common System Problems
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

20. Walter's Linux workstation is experiencing slow network performance. He suspects that one of the software
applications running on the workstation is consuming a large amount of network bandwidth. What tool can
Walter use to confirm this?
a. iperf
b. ss
c. nmap
d. iftop
ANSWER: d
RATIONALE: Because the iftop command lists statistics for each network session to other
systems, it can be used to identify a connection to a particular destination
(website, host, IP). This information can then be used to determine which
software application is communicating to that destination.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.6 - Identify and fix common performance problems.
ACCREDITING STANDARDS:

Page 195

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource
issues.
TOPICS: 14.3 Resolving Common System Problems
KEYWORDS: Bloom's: Evaluate
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

21. Which of the following permissions should a standard user have on the /etc/shadow file?

a. read
b. read and write
c. read, write, and execute
d. no permissions
ANSWER: d
RATIONALE: If the user had read permissions on the /etc/shadow file, they could read the
encrypted version of all user passwords and then attempt to crack them through
brute force, a dictionary attack, or some other method.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.1 - Describe the different facets of Linux security.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security.
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

22. Which of the following files does a TCP wrapper check before starting a network daemon?

a. /etc/tcp.allow and /etc/tcp.deny


b. /etc/hosts.allow and /etc/hosts.deny
c. /etc/wrapper.allow and /etc/wrapper.deny
d. /etc/daemon.allow and /etc/daemon.deny
ANSWER: b
RATIONALE: The TCP wrapper should check the /etc/hosts.allow and /etc/hosts.deny files
before starting a network daemon.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.2 - Setup host security.
Eckert.XK0-005.24.4.2 - Given a scenario, analyze and troubleshoot network resource
issues.

Page 196

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

23. Teresa notices that %usr is consistently higher than %sys in the output of the sar -u command on her system.
What should she do to improve the performance of her system?
a. Add additional RAM to the system.
b. Use the top command to look for memory leaks.
c. Upgrade the CPU to a faster model.
d. Nothing.
ANSWER: d
RATIONALE: On a healthy system, %usr should always be higher than %sys. Thus, there is no
performance issue on Teresa's system.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.6 - Identify and fix common performance problems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 14.4 Performance Monitoring
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

24. If someone tries to log into a system using a daemon account, but the daemon account does not have a valid
shell assigned to it, they would normally see a standard warning. If you want to customize the error, which of
the following files can you put a message in that will display upon an attempted login?
a. /etc/deny.login
b. /etc/banner.conf
c. /etc/nologin.txt
d. /etc/warning.txt
ANSWER: c
RATIONALE: You can configure a message to be displayed upon denying login via a daemon
account without a shell in the /etc/nologin.txt file.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.2 - Increase the security of a Linux computer.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.110.1 - Perform security administration tasks.
Eckert.XK0-005.24.2.1 - Summarize the purpose and use of security best practices in a
Linux environment.

Page 197

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
TOPICS: 14.1 Security
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

25. Which of the following commands would display processor queue statistics from the eleventh day of the
month?
a. sar -q -f /var/log/sa/sa11
b. sar -u -f /var/log/sa/11
c. sar -q -f /var/log/sa/11
d. sar -u -f /var/log/sa/sar11
ANSWER: c
RATIONALE: The sar -q command displays processor queue statistics. The -f option specifies a
historical performance file. A Systemd timer unit or cron job is normally
configured to take performance statistics each day that are saved in the file
/var/log/sa/sa# where # is the day of the month.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 14.4 Performance Monitoring
KEYWORDS: Bloom's: Apply
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

26. Which of the following performance utilities display system load averages? (Choose all that apply.)

a. tload
b. uptime
c. top
d. w
ANSWER: a, b, c, d
RATIONALE: The tload, uptime, top, and w commands all display system load averages.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance.
ACCREDITING STANDARDS: Eckert.LPIC-1.24.103.5 - Create, monitor, and kill processes.
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 14.4 Performance Monitoring

Page 198

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

27. When should you take baseline performance measurements on a production Linux server?

a. immediately following installation


b. during periods of regular usage (e.g., business hours)
c. at times when the system is less than 50% utilized
d. during peak usage times
ANSWER: c
RATIONALE: Baseline performance measurements represent normal system activity and should
be taken when the system is experiencing regular usage.
POINTS: 1
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.5 - Monitor system performance.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.3 - Given a scenario, analyze and troubleshoot central processing
unit (CPU) and memory issues.
TOPICS: 14.4 Performance Monitoring
KEYWORDS: Bloom's: Remember
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

28. Xavier receives an error message stating that he cannot copy files to a filesystem that has plenty of free
space. What are the probable causes of this issue?
a. Xavier has exceeded the hard limit of a user or group quota.
b. The filesystem is corrupted.
c. The inode table on the filesystem has been exhausted.
d. Xavier does not have sufficient permissions to the directory he is trying to copy files.
ANSWER: a, c, d
RATIONALE: Quota limits, insufficient permissions to the target directory, and target filesystem
inode exhaustion are common reasons why a file could not be copied (and
created) in a folder on a new filesystem. If the target filesystem was corrupted, the
file copy would proceed but the copied file may have corrupted contents
following the copy operation.
POINTS: 1
QUESTION TYPE: Multiple Response
HAS VARIABLES: False
LEARNING OBJECTIVES: Eckert.Linux+6e.24.14.4 - Effectively troubleshoot common hardware, application,
filesystem, and network problems.
ACCREDITING STANDARDS:
Eckert.XK0-005.24.4.1 - Given a scenario, analyze and troubleshoot storage issues.

Page 199

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Stuvia.com - The Marketplace to Buy and Sell your Study Material

Test Bank for Linux+ And LPIC-1 Guide To Linux Certification 6th Edition
Chapter 14: Security, Troubleshooting, and Performance.
TOPICS: 14.3 Resolving Common System Problems
KEYWORDS: Bloom's: Evaluate
DATE CREATED: 5/2/2023 10:04 PM
DATE MODIFIED: 5/2/2023 10:04 PM

Page 200

Downloaded by: dedicatedspamfolder | [email protected] Want to earn $1.236


Distribution of this document is illegal extra per year?
Powered by TCPDF (www.tcpdf.org)

You might also like