LPI 102 Certification Practice Test

1.1/1/1alphabetic

Suppose that after installing a serial multi-port card on a system, the mouse connected to a serial port on your motherboard stops functioning. Which of the following commands is MOST likely to be useful in diagnosing this problem?

1.1/2/1alphabetic

To determine what SCSI devices are attached to and recognized on either of the two SCSI channels by the currently running system, which command line would be BEST to run?

1.1/2/2alphabetic

Which of the following command lines would provide the most useful information in diagnosing a suspected hardware address conflict between an an EISA ethernet NIC card and a video controller?

1.1/3/1alphabetic

Whick of the following Linux utilities is MOST useful in determining what sort of motherboard audio support exists on the current system?

2.2/1/1alphabetic

Which Linux utility would provide BEST guidance to determining the relative performance characteristics of the several local hard-disks installed on a system?

2.2/2/1multiple alphabetic
    boot=/dev/hda
    map=/boot/map
    install=/boot/boot.b
    vga=791
    default=redhat
    keytable=/boot/us.klt
    lba32
    prompt
    timeout=200
    message=/boot/message
    menu-scheme=wb:bw:wb:bw
    image=/boot/vmlinuz-2.4.7-10
	    label=redhat-2.4.7
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.16
        label=redhat
	    alias=redhat-2.4.16
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.8-26mdk
	    label=mandrake81
	    root=/dev/hda10
	    initrd=/boot/initrd.img
	    append=" devfs=mount"
	    read-only
    image=/boot/vmlinuz-2.2.15-4mdk
	    label=mandrake71
	    root=/dev/hda7
	    read-only
    other=/dev/hda2
	    label=eComStation
	    table=/dev/hda
    other=/dev/fd0
	    label=floppy
	    unsafe

Please examine the '/etc/lilo.conf' file listed in the exhibit. Assume for purposes of this question that this configuration accurately matches the partitioning of the current system, and also that 'lilo' has been run while this configuration file is as listed. Which of the following statements do you know to be true?

2.2/3/1mutliple alphabetic

Suppose that you have just downloaded the application 'someapp' in the form of the file 'someapp-1.3.7.src.tar.bz2'. You have placed this file in your '~/tmp' directory. Which of the following command lines would be a reasonable first step for installation of the application

2.2/3/2alphabetic

Which of the following commands is frequently run first when compiling an unpacked Linux application from C source code?

2.2/4/1alphabetic

Which of the following command lines would be MOST useful in determining a list of the shared libraries loaded with the application '/usr/local/bin/someapp'?

2.2/5/1alphabetic

Assume you are maintaining a Debian-based Linux system. You wish to install the application 'someapp'. Which of the following command lines would be the most common way to install the application?

2.2/5/2alphabetic

Assume you are maintaining a Debian-based Linux system. You find a file on your system called '/usr/local/bin/curious', and are unsure why the file is present. Which of the following commands would provide you with information about the Debian package from which the file was installed?

2.2/6/1alphabetic

Assume you are maintaining a RPM-based Linux sysem. Which of the following command lines would be a likely choice for installing a precompiled distribution of the application 'someapp'

2.2/6/2multiple alphabetic

Assume you are maintaining a RPM-based Linux sysem. Which of the following applications can be used (if present on your system) for interactive management of installed packages?

2.2/6/3alphabetic

Which of the following command lines would you use to verify that a Red Hat Package for 'someapp' that you wish to install has not become corrupted, or been tampered with?

1.5/1/1multiple alphabetic

Which of the following utilities can be used to load driver support for an additional hardware device at runtime?

1.5/2/1multiple alphabetic
    boot=/dev/hda
    map=/boot/map
    install=/boot/boot.b
    vga=791
    default=redhat
    keytable=/boot/us.klt
    lba32
    prompt
    timeout=200
    message=/boot/message
    menu-scheme=wb:bw:wb:bw
    image=/boot/vmlinuz-2.4.7-10
	    label=redhat-2.4.7
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.16
        label=redhat
	    alias=redhat-2.4.16
	    root=/dev/hda9
	    read-only
    image=/boot/vmlinuz-2.4.8-26mdk
	    label=mandrake81
	    root=/dev/hda10
	    initrd=/boot/initrd.img
	    append=" devfs=mount"
	    read-only
    image=/boot/vmlinuz-2.2.15-4mdk
	    label=mandrake71
	    root=/dev/hda7
	    read-only
    other=/dev/hda2
	    label=eComStation
	    table=/dev/hda
    other=/dev/fd0
	    label=floppy
	    unsafe

The exhibit for this question is one screen of the kernel config utility at '/usr/src/linux-2.4.17/scripts/Menuconfig'. Based on this screen which of the following statements describe the kernel that would be created after saving the listed options?

1.5/2/2alphabetic

Which of the following command lines can NOT be used to configure the compilation of a new Linux kernel and kernel modules?

1.7/1/1alphabetic

Which of the following key sequences will save changes made during a 'vi' editing session, and end the application?

1.7/2/1alphabetic

Which of the following utilities can be used to terminate a spooled print job without printing it?

1.7/3/1multiple alphabetic

Which of the following Linux comand lines will convert a plain text file 'file.txt' to postscript for later (prettified) printing or viewing? Assume for this question that any mentioned utilities are actually installed to the system in question.

1.7/4/1alphabetic

There have been a number of print-spooling systems developed for Linux, often offering a different range of capabilities such as format conversions and job-control tools. Which ONE of the following is NOT a widely used print-spooling system?

1.7/4/2alphabetic

There have been a number of document-type filtering systems developed for Linux, and working in cooperation with print-spooling daemons. Which ONE of the following is NOT a widely used filtering tool?

1.9/1/1alphabetic
    # head -2 /home/jdoe/.bashrc
    PS1='From .bashrc --* '
    export PS1
    # head -2 /home/jdoe/.bash_login
    PS1='From .bash_login --* '
    export PS1
    # head -2 .bash_profile
    PS1='From .bash_profile --* '
    export PS1
    # grep 'PS1=' /etc/bashrc
    [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\[email protected]\h \W]\\$ "

The exhibit for this question shows several shell configuration files. Assume for this exercise that the PS1 environment variable is not modified elsewhere in the (partially) displayed files, nor is it set anywhere else. If user 'jdoe' opens a secure shell connection to this system (named 'fury') from a remote location, what will his bash prompt display?

1.9/1/2alphabetic
    # head -2 /home/jdoe/.bashrc
    PS1='From .bashrc --* '
    export PS1
    # head -2 /home/jdoe/.bash_login
    PS1='From .bash_login --* '
    export PS1
    # head -2 .bash_profile
    PS1='From .bash_profile --* '
    export PS1
    # grep 'PS1=' /etc/bashrc
    [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\[email protected]\h \W]\\$ "

The exhibit for this question shows several shell configuration files on machine 'fury'. Assume for this exercise that the PS1 environment variable is not modified elsewhere in the (partially) displayed files, nor is it set anywhere else. If the root user issues a 'su jdoe' command, what will her bash prompt display?

1.9/2/1alphabetic

Which of the following bash command lines could be used to "run every executable file in the current directory"?

1.9/2/2alphabetic

What special line is normally placed at the top of a custom bash shell script?

2.10/1/1multiple alphabetic

Which of the following utilities are commonly available on a Linux system, and have the capability to detect chipset details and installed memory on local video cards (useful for configuring XFree86)?

2.10/1/2alphabetic

The file '/etc/X11XF86Config' contains configuration information about the local X server. Where within this file can you specify the video resolutions available when using the Ctrl-Alt-(Plus/Minus) toggles?

2.10/2/1alphabetic

Which of the following XFree86 tools is used to configure access to remote X11 clients?

2.10/3/1alphabetic

Unfortunately, not all X11 applications are well behaved. In particular, some applications are notorious for leaving behind phantom processes when an X session is exited. Which command line below might you use to make sure the application 'Xsomeapp' is terminated?

2.10/4/1alphabetic

Suppose that you would like to allow the current system to act as an X client for SOME remote X servers. Also assume that the current system is configured to recognize the alias TRUSTED for a corresponding IP address. Which of the following command lines would allow the machine TRUSTED to run an X11 application that lives on the current system?

2.10/4/2alphabetic

Which of the following environment variables is used to determine which workstation--local or remote--a launched X11 application will display on?

1.12/1/1alphabetic

RFC 1700 defines a set of standard port numbers for TCP/IP services. Some of these ports are fairly obscure, while a number are used on a daily basis by a Linux systems administrator for diagnosis of network issues. Which three services are mapped to the TCP/IP ports 80, 110 and 21 (in the listed order)?

1.12/1/2alphabetic

Which of the following files is used to define aliases for IP addresses, especially within a local TCP/IP network?

1.12/3/1alphabetic

Which of the following statements BEST describes a reason why you would want to run a DHCP server on an internal company LAN network?

1.12/3/2alphabetic

Which of the following TCP/IP network utilities is the BEST tool to use to establish if a given IP address is reachable under the current network configuration?

1.12/3/3alphabetic

Which of the following TCP/IP network utilities is BEST used to determine the hardware ethernet address of the card(s) installed in the current machine?

1.12/3/4alphabetic

Which of the following TCP/IP network utilities is the BEST tool to use in identifying bottlenecks between remote machines on the network? Specifically, assume a goal in this debugging is to determine the paths travelled in the forwarding of network packets, and identify intermediate routers that may be dropping packets.

1.12/3/5multiple alphabetic

Suppose that you find that your ISPs DNS service is slow or unreliable, and you would like to configure aliases for a few frequently targetted sites directly on the machines of users of the company internal network you maintain. Which of the following TCP/IP network utilities could you use to determine the IP address assigned to symbolic domain names (e.g. "www.somehostsite.com")?

1.12/4/1alphabetic

Which of the following commands is NOT a widely used Linux utility for initiating and configuring PPP connections?

1.13/1/1alphabetic

Which of the following utilities is often used in conjunction with inetd to log and filter incoming connection requests?

1.13/1/2alphabetic
    # description: the floozflam server handles
    #              flamflooz client connections
    service floozflam
    {
            disable         = yes
            flags           = NORETRY
            socket_type     = stream
            wait            = yes
            user            = root
            server          = /usr/sbin/in.floozflamd
            log_on_failure  += USERID
    }

The exhibit for this question shows the content of a hypothetical '/etc/xinetd.d/floozflam' configuration file. Assume that '/etc/xinetd.conf' includes the line "includedir /etc/xinetd.d", and that xinetd is used on the current system. Which of the following statements can you deduce from the provided information?

1.13/2/1alphabetic

Suppose that the 'sendmail' application is used on the current system as a mail transport agent. What file may user 'jdoe' modify in order to cause mail sent to him to be temporarily directed to an address outside the system's domain?

1.13/2/2alphabetic

Suppose that the 'sendmail' application is used on the current system as a mail transport agent. If the file '/etc/aliases' has been manually updated, what command needs to be run in order to cause the changes to take effect?

1.13/3/1alphabetic

Which of the following command lines can be used to determine the list of modules that have been compiled into the Apache web server?

1.13/4/1alphabetic

Which of the following files or directories is used to configure the local directories that are made available remotely by an Network File System server?

1.13/4/2alphabetic

Which of the following protocols/tools is MOST likely to be used in integrating a Linux system into a Windows network, and for accessing Windows files?

1.13/5/1alphabetic

Suppose that you have configured one Linux system on an internal LAN to run a DNS server. Which of the following files need to be updated on each DNS client on the LAN to get them to utilize the DNS service?

1.14/1/1alphabetic

In performing a security audit on a Linux system, one well-known security issue is applications that are configured to run as root (or from other high-permission accounts) that may be subject to call vulnerabilities such as buffer overruns. Which of the following command lines can be used for an initial sweep in analyzing this issue?

1.14/1/2alphabetic

Which of the following protocols or tools is BEST used to batch copy files between networked machines in a manner that protects their contents from an intruder using a packet sniffer?

1.14/2/1alphabetic

Which of the following Linux utilities is used to update the user passwords stored in '/etc/passwd' to utilize the more secure "shadow password" style.

1.14/2/2multiple alphabetic

Which of the following websites are well-known and important resources for monitoring known security problems in Linux distributions, and for obtaining patches and updates for vulnerable applications and components?

1.14/3/1alphabetic

One danger of a poorly written (or malicious) CGI application is that it can fork overly many child processes, eventually swamping the host system. Which of the following steps could BEST be used to control this specific danger?


Valid XHTML 1.0!