Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

102-500 Practice Questions

LPIC-1 Exam 102, Part 2 of 2, version 5.0

Last Update 3 days ago
Total Questions : 235

Dive into our fully updated and stable 102-500 practice test platform, featuring all the latest LPIC Level 1 exam questions added this week. Our preparation tool is more than just a LPI study aid; it's a strategic advantage.

Our free LPIC Level 1 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 102-500. Use this test to pinpoint which areas you need to focus your study on.

102-500 PDF

102-500 PDF (Printable)
$43.75
$124.99

102-500 Testing Engine

102-500 PDF (Printable)
$50.75
$144.99

102-500 PDF + Testing Engine

102-500 PDF (Printable)
$63.7
$181.99
Question # 31

How is a display manager started?

Options:

A.  

It is started by a user using the command startx.

B.  

It is started like any other system service by the init system.

C.  

It is started by inetd when a remote hosts connects to the X11 port.

D.  

It is started automatically when a X11 user logs in to the system console.

Discussion 0
Question # 32

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

Options:

A.  

When KDM starts

B.  

When a user's X session exits

C.  

When KDM crashes

D.  

When X is restarted

E.  

When X crashes

Discussion 0
Question # 33

Which commands can you use to change a user's account aging information? (Choose THREE correct answers.)

Options:

A.  

usermod

B.  

passwd

C.  

chattr

D.  

chage

E.  

chsh

Discussion 0
Question # 34

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

Options:

A.  

/etc/alias

B.  

~/.alias

C.  

/etc/mail/forwarders

D.  

~/.forward

E.  

~/.vacation

Discussion 0
Question # 35

Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose TWO correct answers.)

Options:

A.  

--from=

B.  

--since=

C.  

--until=

D.  

--upto=

E.  

--date=

Discussion 0
Question # 36

What command can be used to generate syslog entries of any facility and priority? (supply just the command name without a path)

Options:

Discussion 0
Question # 37

Which command will set the local machine's timezone to UTC?

Options:

A.  

cat UTC > /etc/timezone

B.  

ln -s /usr/share/zoneinfo/UTC /etc/localtime

C.  

date --timezone=UTC

D.  

mv /usr/timezone/UTC /etc

Discussion 0
Question # 38

In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?

Options:

A.  

Without additional configuration, no users may have user specific crontabs.

B.  

Without additional configuration, all users may have user specific crontabs.

C.  

The cron daemon will refuse to start and report missing files in the system's logfile.

D.  

When a user creates a user specific crontab the system administrator must approve it explicitly.

Discussion 0
Question # 39

What is true about the file /etc/localtime?

Options:

A.  

It is a plain text file containing a string such as Europe/Berlin

B.  

It is created and maintained by the NTP service based on the location of the system’s IP address.

C.  

It is a symlink to /sys/device/clock/ltime and always contains the current local time.

D.  

After changing this file, newtzconfig has to be run to make the changes effective.

E.  

It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.

Discussion 0
Question # 40

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

Options:

A.  

The encrypted passwords are still subject to brute force attacks.

B.  

This is just for historical reasons.

C.  

There is other information in the file that needs to be kept secret.

D.  

The passwords can be decrypted by anyone with root access.

Discussion 0
Get 102-500 dumps and pass your exam in 24 hours!

Free Exams Sample Questions