LPI 102 Certification Practice Test
    Suppose that after installing a serial multi-port card on a
    system, the mouse connected to a serial port on your
    motherboard stops functioning.  Which of the following
    commands is MOST likely to be useful in diagnosing this
    problem?
- A. setserial /dev/com1 -v auto_irq 
- B. cat /dev/mouse > serial-info.dump 
- C. setserial -a /dev/cua0 
- D. ioaddr /dev/ttyS1 
    To determine what SCSI devices are attached to and recognized
    on either of the two SCSI channels by the currently running
    system, which command line would be BEST to run?
    Which of the following command lines would provide the most
    useful information in diagnosing a suspected hardware address
    conflict between an an EISA ethernet NIC card and a video controller?
- A. cat /proc/irq 
- B. cat /proc/meminfo 
- C. cat /proc/iomem 
- D. cat /proc/modules 
    Whick of the following Linux utilities is MOST useful in
    determining what sort of motherboard audio support exists on
    the current system?
- A. less -f /dev/audio 
- B. pnpdetect 
- C. modprobe 
- D. sndconfig 
    Which Linux utility would provide BEST guidance to
    determining the relative performance characteristics of the
    several local hard-disks installed on a system?
- A. nfsstone 
- B. hdparm 
- C. fdisk 
- D. modprobe 
| 2.2/2/1 | multiple alphabetic |  | 
|     boot=/dev/hda
    map=/boot/map
    install=/boot/boot.b
    vga=791
    default=redhat
    keytable=/boot/us.klt
    lba32
    prompt
    timeout=200
    message=/boot/message
    menu-scheme=wb:bw:wb:bw
    image=/boot/vmlinuz-2.4.7-10
	    label=redhat-2.4.7
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.16
        label=redhat
	    alias=redhat-2.4.16
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.8-26mdk
	    label=mandrake81
	    root=/dev/hda10
	    initrd=/boot/initrd.img
	    append=" devfs=mount"
	    read-only
    image=/boot/vmlinuz-2.2.15-4mdk
	    label=mandrake71
	    root=/dev/hda7
	    read-only
    other=/dev/hda2
	    label=eComStation
	    table=/dev/hda
    other=/dev/fd0
	    label=floppy
	    unsafe
 | 
    Please examine the '/etc/lilo.conf' file listed in the
    exhibit.  Assume for purposes of this question that this
    configuration accurately matches the partitioning of the
    current system, and also that 'lilo' has been run while this
    configuration file is as listed.  Which of the following
    statements do you know to be true?
- A. lilo is installed to the master boot record of the first
       IDE hard-disk.
- B. lilo is installed on the partition '/dev/hda9' where there is
       a kernel image called '/boot/vmlinuz-2.4.7-10' on that
       partition.
- C. Exactly three partitions on '/dev/hda' contain separate
       Linux installation.
- D. The default boot kernel image is in a file named
       'vmlinuz-2.4.16'.
- E. The kernel image /boot/vmlinuz-2.4.8-26mdk is stored on
       the partition '/dev/hda10'.
- F. The current system contains exactly one IDE hard-disk. 
| 2.2/3/1 | mutliple alphabetic |  | 
    Suppose that you have just downloaded the application
    'someapp' in the form of the file
    'someapp-1.3.7.src.tar.bz2'.  You have placed this file in
    your '~/tmp' directory.  Which of the following command
    lines would be a reasonable first step for installation of
    the application
- A. rpm Uvh someapp-1.3.7.src.tar.bz2 
- B. tar xvfj someapp-* 
- C. bunzip2 someapp-1.3.7.src.tar.bz2 | tar tvf - 
- D. cat someapp-1.3.7* | tar xvfz - 
- E. dbkg -L someapp-1.3.7.src.tar.bz2 | less 
- F. make --all someapp-1.3.7.src.tar.bz2 
    Which of the following commands is frequently run first when
    compiling an unpacked Linux application from C source code?
- A. rpm Uvh * 
- B. make install 
- C. setup -c 
- D. configure 
    Which of the following command lines would be MOST useful in
    determining a list of the shared libraries loaded with the
    application '/usr/local/bin/someapp'?
- A. cat /etc/ld.so.conf | grep someapp 
- B. ldd -v /usr/local/bin/someapp 
- C. ldconfig -l /usr/local/bin/someapp 
- D. readlink /usr/local/bin/someapp 
    Assume you are maintaining a Debian-based Linux system.
    You wish to install the application 'someapp'.  Which of the
    following command lines would be the most common way to
    install the application?
    Assume you are maintaining a Debian-based Linux system.  You
    find a file on your system called '/usr/local/bin/curious',
    and are unsure why the file is present.  Which of the
    following commands would provide you with information about
    the Debian package from which the file was installed?
- A. dpkg -s /usr/local/bin/curious 
- B. dpkg -L /usr/local/bin/curious 
- C. dpkg -S /usr/local/bin/curious 
- D. dpkg -l /usr/local/bin/curious 
    Assume you are maintaining a RPM-based Linux sysem. Which of
    the following command lines would be a likely choice for
    installing a precompiled distribution of the application
    'someapp'
- A. rpm -i someapp-1.3.7.src.rpm 
- B. rpm -Uvh someapp-1.3.7.i586.rpm 
- C. tar xvfz someapp-1.3.7.i386.tgz | rpm -qpl 
- D. rpm -Kv someapp-1.3.7.i386.rpm 
| 2.2/6/2 | multiple alphabetic |  | 
    Assume you are maintaining a RPM-based Linux sysem. Which of
    the following applications can be used (if present on your
    system) for interactive management of installed packages?
- A. dselect 
- B. kpackage 
- C. gpackage 
- D. xrpm 
- E. rpmfind 
- F. gnorpm 
    Which of the following command lines would you use to verify
    that a Red Hat Package for 'someapp' that you wish to
    install has not become corrupted, or been tampered with?
- A. rpm -Kv someapp-1.3.7.i586.rpm | tee someapp-1.3.7.md5 
- B. md5sum someapp-1.3.7.i586.rpm | diff - someapp-1.3.7.md5 
- C. gpg --verify someapp-1.3.7.i586.rpm 
- D. checkrpm someapp-1.3.7.i586.rpm 
| 1.5/1/1 | multiple alphabetic |  | 
    Which of the following utilities can be used to load driver
    support for an additional hardware device at runtime?
- A. modprobe 
- B. lsmod 
- C. insmod 
- D. chmod 
- E. modules 
- F. modinfo 
| 1.5/2/1 | multiple alphabetic |  | 
|     boot=/dev/hda
    map=/boot/map
    install=/boot/boot.b
    vga=791
    default=redhat
    keytable=/boot/us.klt
    lba32
    prompt
    timeout=200
    message=/boot/message
    menu-scheme=wb:bw:wb:bw
    image=/boot/vmlinuz-2.4.7-10
	    label=redhat-2.4.7
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.16
        label=redhat
	    alias=redhat-2.4.16
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.8-26mdk
	    label=mandrake81
	    root=/dev/hda10
	    initrd=/boot/initrd.img
	    append=" devfs=mount"
	    read-only
    image=/boot/vmlinuz-2.2.15-4mdk
	    label=mandrake71
	    root=/dev/hda7
	    read-only
    other=/dev/hda2
	    label=eComStation
	    table=/dev/hda
    other=/dev/fd0
	    label=floppy
	    unsafe
 | 
    The exhibit for this question is one screen of the kernel
    config utility at '/usr/src/linux-2.4.17/scripts/Menuconfig'.
    Based on this screen which of the following statements
    describe the kernel that would be created after saving the
    listed options?
- A. Multi-IO card drivers are contained in loadable modules
       rather than in the base kernel.
- B. The compiled system supports parallel ports at a hardware
       level, but we cannot determine whether parallel printer
       support is installed.
- C. IEEE 1284 (enhanced parallel) mode drivers are contained
       in loadable modules rather than in the base kernel.
- D. PCMCIA management drivers are contained in loadable
       modules rather than in the base kernel.
- E. Kernel support for SuperIO chipsets is included in this
       base kernel.
- F. IEEE 1284 (enhanced parallel) mode drivers are compiled
       directly into this base kernel.
    Which of the following command lines can NOT be used to
    configure the compilation of a new Linux kernel and kernel
    modules?
- A. make xconfig 
- B. make menuconfig 
- C. make kernconfig 
- D. make config 
    Which of the following key sequences will save changes made
    during a 'vi' editing session, and end the application?
- A. <esc>:qw 
- B. <esc>:sx 
- C. <esc>:wq 
- D. <esc>:xs 
    Which of the following utilities can be used to terminate a
    spooled print job without printing it?
- A. lpr 
- B. lpc 
- C. lpd 
- D. lpq 
| 1.7/3/1 | multiple alphabetic |  | 
    Which of the following Linux comand lines will convert a
    plain text file 'file.txt' to postscript for later
    (prettified) printing or viewing?  Assume for this question
    that any mentioned utilities are actually installed to the
    system in question.
- A. enscript -p - file.txt > file.ps 
- B. a2ps -o file.ps file.txt 
- C. text2ps < file.txt > file.ps 
- D. cat file.txt | lpr -P file.ps 
- E. ps2ascii file.ps file.txt 
- F. gs --source=file.txt --output=file.ps 
    There have been a number of print-spooling systems developed
    for Linux, often offering a different range of capabilities
    such as format conversions and job-control tools.  Which ONE
    of the following is NOT a widely used print-spooling system?
- A. CUPS 
- B. GPR 
- C. PDQ 
- D. LPD 
    There have been a number of document-type filtering systems
    developed for Linux, and working in cooperation with
    print-spooling daemons.  Which ONE of the following is NOT a
    widely used filtering tool?
- A. Apsfilter 
- B. Magicfilter 
- C. printfilter 
- D. doctype-filter 
|     # head -2 /home/jdoe/.bashrc
    PS1='From .bashrc --* '
    export PS1
    # head -2 /home/jdoe/.bash_login
    PS1='From .bash_login --* '
    export PS1
    # head -2 .bash_profile
    PS1='From .bash_profile --* '
    export PS1
    # grep 'PS1=' /etc/bashrc
    [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\u@\h \W]\\$ "
 | 
    The exhibit for this question shows several shell
    configuration files.  Assume for this exercise that the PS1
    environment variable is not modified elsewhere in the
    (partially) displayed files, nor is it set anywhere else.  If
    user 'jdoe' opens a secure shell connection to this system
    (named 'fury') from a remote location, what will his bash
    prompt display?
|     # head -2 /home/jdoe/.bashrc
    PS1='From .bashrc --* '
    export PS1
    # head -2 /home/jdoe/.bash_login
    PS1='From .bash_login --* '
    export PS1
    # head -2 .bash_profile
    PS1='From .bash_profile --* '
    export PS1
    # grep 'PS1=' /etc/bashrc
    [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\u@\h \W]\\$ "
 | 
    The exhibit for this question shows several shell
    configuration files on machine 'fury'.  Assume for this
    exercise that the PS1 environment variable is not modified
    elsewhere in the (partially) displayed files, nor is it set
    anywhere else.  If the root user issues a 'su jdoe' command,
    what will her bash prompt display?
    Which of the following bash command lines could be used to
    "run every executable file in the current directory"?
- A. for i in * ; do { case [ -x $i ] ; { ./$i; } esac } done
- B. while i in * ; do { if [ -x $i ] ; then { ./$i; } fi } done
- C. foreach i in * ; do { if [ -x $i ] ; then { ./$i; } done }
- D. for i in * ; do { if [ -x $i ] ; then { ./$i; } fi } done
    What special line is normally placed at the top of a custom
    bash shell script?
- A. #/usr/local/bin/bash 
- B. #!/bin/bash 
- C. #!/usr/env bash 
- D. #!/bash 
| 2.10/1/1 | multiple alphabetic |  | 
    Which of the following utilities are commonly available on a
    Linux system, and have the capability to detect chipset
    details and installed memory on local video cards (useful
    for configuring XFree86)?
- A. XF86Config 
- B. SuperProbe 
- C. scanpci 
- D. XConfigurator 
- E. X11Setup 
- F. scanvideo 
    The file '/etc/X11XF86Config' contains configuration
    information about the local X server.  Where within this file
    can you specify the video resolutions available when using
    the Ctrl-Alt-(Plus/Minus) toggles?
- A. Section "Device" / Subsection "Resolutions" 
- B. Section "Screen" / Subsection "Display" 
- C. Section "Monitor" /Subsection "Mode" 
- D. Section "Video" / Subsection "ModeLine" 
    Which of the following XFree86 tools is used to configure
    access to remote X11 clients?
- A. xf86config 
- B. xeyes 
- C. xaccess 
- D. xdm 
    Unfortunately, not all X11 applications are well behaved.  In
    particular, some applications are notorious for leaving
    behind phantom processes when an X session is exited.  Which
    command line below might you use to make sure the application
    'Xsomeapp' is terminated?
    Suppose that you would like to allow the current system to
    act as an X client for SOME remote X servers.  Also assume
    that the current system is configured to recognize the alias
    TRUSTED for a corresponding IP address.  Which of the
    following command lines would allow the machine TRUSTED to
    run an X11 application that lives on the current system?
    Which of the following environment variables is used to
    determine which workstation--local or remote--a launched X11
    application will display on?
- A. XTERM 
- A. CLIENT 
- A. SERVER 
- D. DISPLAY 
    RFC 1700 defines a set of standard port numbers for TCP/IP
    services.  Some of these ports are fairly obscure, while a
    number are used on a daily basis by a Linux systems
    administrator for diagnosis of network issues.  Which
    three services are mapped to the TCP/IP ports 80, 110 and 21
    (in the listed order)?
- A. http, telnet, ssh 
- B. http, pop3, ftp 
- C. kerberos, smtp, ftp 
- D. whois, telnet, pop3 
    Which of the following files is used to define aliases for IP
    addresses, especially within a local TCP/IP network?
- A. /etc/hosts 
- B. /etc/services 
- C. /etc/aliases 
- D. /etc/networks 
    Which of the following statements BEST describes a reason why
    you would want to run a DHCP server on an internal company
    LAN network?
- A. To serve as a gateway between the external internet and an
       internal network, and to provide IP address translation of
       packets.
- B. To filter network packets that may contain unauthorized or
       malicious contents, such as "hacker" portscans or overly
       large email attachments.
- C. To allow in-company machines to access a central
       "web-services" application that is utilized in common by
       various employees.
- D. To avoid confict between assigned IP addresses on various
       in-company machines, especially where machines such as
       laptops may between different ethernet hubs.
    Which of the following TCP/IP network utilities is the BEST
    tool to use to establish if a given IP address is reachable
    under the current network configuration?
- A. ping 
- B. finger 
- C. route 
- D. host 
    Which of the following TCP/IP network utilities is BEST used
    to determine the hardware ethernet address of the card(s)
    installed in the current machine?
- A. netstat 
- B. ifconfig 
- C. ethers 
- D. arpwatch 
    Which of the following TCP/IP network utilities is the BEST
    tool to use in identifying bottlenecks between remote
    machines on the network?  Specifically, assume a goal in
    this debugging is to determine the paths travelled in the
    forwarding of network packets, and identify intermediate
    routers that may be dropping packets.
- A. route 
- B. netstat 
- C. ping 
- D. traceroute 
| 1.12/3/5 | multiple alphabetic |  | 
    Suppose that you find that your ISPs DNS service is slow or
    unreliable, and you would like to configure aliases for a
    few frequently targetted sites directly on the machines of
    users of the company internal network you maintain. Which of
    the following TCP/IP network utilities could you use to
    determine the IP address assigned to symbolic domain names
    (e.g. "www.somehostsite.com")?
- A. hostname 
- B. whois 
- C. host 
- D. nslookup 
- E. netstat 
- F. ping 
    Which of the following commands is NOT a widely used Linux
    utility for initiating and configuring PPP connections?
- A. KPPP 
- B. WvDial 
- C. netconf 
- D. netppp 
    Which of the following utilities is often used in conjunction
    with inetd to log and filter incoming connection requests?
- A. tcpd 
- B. logwatch 
- C. ipfilt 
- D. xinetd 
|     # description: the floozflam server handles
    #              flamflooz client connections
    service floozflam
    {
            disable         = yes
            flags           = NORETRY
            socket_type     = stream
            wait            = yes
            user            = root
            server          = /usr/sbin/in.floozflamd
            log_on_failure  += USERID
    }
 | 
    The exhibit for this question shows the content of a
    hypothetical '/etc/xinetd.d/floozflam' configuration file.
    Assume that '/etc/xinetd.conf' includes the line
    "includedir /etc/xinetd.d", and that xinetd is used on the
    current system.  Which of the following statements can you
    deduce from the provided information?
- A. The floozflam service is carried over the UDP protocol. 
- B. Multiple floozflam servers will be forked if multiple
       incoming requests are received.
- C. The floozflam service in not activated on the current
       system.
- D. If a floozflam connection fails, the IP address of the
       requesting client is logged.
    Suppose that the 'sendmail' application is used on the
    current system as a mail transport agent.  What file may user
    'jdoe' modify in order to cause mail sent to him to be
    temporarily directed to an address outside the system's
    domain?
    Suppose that the 'sendmail' application is used on the
    current system as a mail transport agent.  If the file
    '/etc/aliases' has been manually updated, what command needs
    to be run in order to cause the changes to take effect?
- A. sendmail -bh 
- B. sendmail -ba 
- C. sendmail -bi 
- D. sendmail -bp 
    Which of the following command lines can be used to determine
    the list of modules that have been compiled into the Apache
    web server?
    Which of the following files or directories is used to
    configure the local directories that are made available
    remotely by an Network File System server?
- A. /etc/fstab 
- B. /mnt/nfs 
- C. /etc/smb.conf 
- D. /etc/exports 
    Which of the following protocols/tools is MOST likely to be
    used in integrating a Linux system into a Windows network,
    and for accessing Windows files?
- A. NFS 
- B. SAMBA 
- C. FTP 
- D. SCP 
    Suppose that you have configured one Linux system on an
    internal LAN to run a DNS server.  Which of the following
    files need to be updated on each DNS client on the LAN to get
    them to utilize the DNS service?
- A. /etc/hosts 
- B. /etc/exports 
- C. /etc/resolv.conf 
- D. /etc/dns.conf 
    In performing a security audit on a Linux system, one
    well-known security issue is applications that are configured
    to run as root (or from other high-permission accounts) that
    may be subject to call vulnerabilities such as buffer
    overruns.  Which of the following command lines can be used
    for an initial sweep in analyzing this issue?
    Which of the following protocols or tools is BEST used to
    batch copy files between networked machines in a manner that
    protects their contents from an intruder using a packet
    sniffer?
- A. ssh/scp 
- B. httpd/SSL 
- C. gpg/snmp 
- D. nfs/md5sum 
    Which of the following Linux utilities is used to update the
    user passwords stored in '/etc/passwd' to utilize the more
    secure "shadow password" style.
- A. passwd -s 
- B. mkshadow 
- C. shadowpw 
- D. pwconv 
| 1.14/2/2 | multiple alphabetic |  | 
    Which of the following websites are well-known and important
    resources for monitoring known security problems in Linux
    distributions, and for obtaining patches and updates for
    vulnerable applications and components?
- A. http://www.securityfocus.com/ 
- B. http://www.bugtraq.com/ 
- C. http://www.securityupdate.net/ 
- D. http://www.cert.org/ 
- E. http://www.linux-bugwatch.gov/ 
- F. http://www.linuxsecurity.com 
    One danger of a poorly written (or malicious) CGI application
    is that it can fork overly many child processes, eventually
    swamping the host system.  Which of the following steps could
    BEST be used to control this specific danger?
- A. Include the line 'ulimit -u 512'  in the file
       /etc/profile.
- B. For each CGI user, run the command 'edquota username', and
       set blocks to 2048 (or other appropriate value).
- C. If a user is discovered to have an errant CGI application,
       run the command line 'ps hU username -o pid | xargs kill -9'
       to terminate their stray processes.
- D. Edit the file /etc/limits to include a line similar to
       'CGI 512 2048 0 0 -' (or other appropriate values).
