New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is the purpose of the command mailq?

A.

It fetches new emails from a remote server using POP3 or IMAP.

B.

It is a multi-user mailing list manager.

C.

It is a proprietary tool contained only in the qmail MTA.

D.

It queries the mail queue of the local MTA.

E.

It is a command-line based tool for reading and writing emails.

Full Access
Question # 5

Which file, when using Sendmail or a similar MTA system, will allow a user to redirect all their mail to another address and is configurable by the user themselves?

A.

/etc/alias

B.

~/.alias

C.

/etc/mail/forwarders

D.

~/.forward

E.

~/.vacation

Full Access
Question # 6

Why is the correct configuration of a system's time zone important?

A.

Because the conversion of Unix timestamps to local time relies on the time zone configuration.

B.

Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.

C.

Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.

D.

Because NTP chooses servers nearby based on the configured time zone.

Full Access
Question # 7

Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)

Full Access
Question # 8

What is true regarding the file ~/.forward?

A.

As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.

B.

After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.

C.

Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.

D.

When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.

Full Access
Question # 9

What output will the following command produce?

seq 1 5 20

A.

1

6

1

1

1

6

B.

1

5

10

15

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Full Access
Question # 10

How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?

A.

unset -v FOOBAR;./myscript

B.

set -a FOOBAR="";./myscript

C.

env -u FOOBAR./myscript

D.

env -i FOOBAR./myscript

Full Access
Question # 11

Which of the following commands lists all defined variables and functions within Bash?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 12

What output will the following command sequence produce?

echo '1 2 3 4 5 6' | while read a b c; do

echo result: $c $b $a;

done

A.

result: 3 4 5 6 2 1

B.

result: 1 2 3 4 5 6

C.

result: 6 5 4

D.

result: 6 5 4 3 2 1

E.

result: 3 2 1

Full Access
Question # 13

Which of the following is the best way to list all defined shell variables?

A.

env

B.

set

C.

env -a

D.

echo $ENV

Full Access
Question # 14

What is the purpose of the file /etc/profile?

A.

It contains the welcome message that is displayed after login.

B.

It contains security profiles defining which users are allowed to log in.

C.

It contains environment variables that are set when a user logs in.

D.

It contains default application profiles for users that run an application for the first time.

Full Access
Question # 15

Which command makes the shell variable named VARIABLE visible to subshells?

A.

export $VARIABLE

B.

export VARIABLE

C.

set $VARIABLE

D.

set VARIABLE

E.

env VARIABLE

Full Access
Question # 16

Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)

A.

The user issuing the command must be in the group script.

B.

The script file must be found in the $PATH.

C.

The script file must have the executable permission bit set.

D.

The script must begin with a shebang-line (#!) that points to the correct interpreter.

E.

The file system on which the script resides must be mounted with the option scripts.

Full Access
Question # 17

Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?

A.

CASE

B.

FROM

C.

WHERE

D.

IF

Full Access
Question # 18

What output will the command seq 10 produce?

A.

A continuous stream of numbers increasing in increments of 10 until stopped.

B.

The numbers 1 through 10 with one number per line.

C.

The numbers 0 through 9 with one number per line.

D.

The number 10 to standard output.

Full Access
Question # 19

What is the difference between the commands test -e path and test -f path?

A.

They are equivalent options with the same behaviour.

B.

The -f option tests for a regular file. The -e option tests for an empty file.

C.

Both options check the existence of the path. The -f option also confirms that it is a regular file.

D.

The -f option tests for a regular file. The -e option tests for an executable file.

Full Access
Question # 20

What word is missing from the following SQL statement?

__________ count(*) from tablename;

(Please specify the missing word using lower-case letters only.)

Full Access
Question # 21

Which of the following files assigns a user to its primary group?

A.

/etc/pgroup

B.

/etc/shadow

C.

/etc/group

D.

/etc/passwd

E.

/etc/gshadow

Full Access
Question # 22

What is pool.ntp.org?

A.

A deprecated feature for maintaining system time in the Linux kernel

B.

A website which provides binary and source packages for the OpenNTPD project

C.

A virtual cluster of various timeservers

D.

A community website used to discuss the localization of Linux

Full Access
Question # 23

You need to pause the CUPS printer HPLaserjet4, and you want to cancel all print jobs with a message, "hello". Which command will do this?

A.

cupsreject -c -r hello HPLaserjet4

B.

cupsreject -p -m hello HPLaserjet4

C.

cupsdisable -c -r hello HPLaserjet4

D.

cupsdisable -p -m hello HPLaserjet4

Full Access
Question # 24

Each entry in a crontab must end with what character?

A.

Tab

B.

Space

C.

Backslash

D.

Newline

Full Access
Question # 25

Which commands can you use to change a user's account aging information? (Choose THREE correct answers.)

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Full Access
Question # 26

Which commands can be used to change a user's account aging information? (Choose THREE correct answers.)

A.

usermod

B.

passwd

C.

chattr

D.

chage

E.

chsh

Full Access
Question # 27

Of the ways listed, which is the best way to temporarily suspend a single user's ability to interactively login?

A.

Add the user name to /etc/nologin.

B.

Change the user's password.

C.

Change the user name in /etc/passwd.

D.

Use change to expire the user account.

E.

Place the command logout in the user's profile.

Full Access
Question # 28

On a system using shadowed passwords, the most correct permissions for /etc/passwd are ___ and the most correct permissions for /etc/shadow are _________.

A.

-rw-r-----, -r--------

B.

-rw-r--r--, -r--r--r--

C.

-rw-r--r--, -r--------

D.

-rw-r--rw-, -r-----r--

E.

-rw-------, -r--------

Full Access
Question # 29

To prevent a specific user from scheduling tasks with at, what should the administrator do?

A.

Add the specific user to /etc/at.allow file.

B.

Add the specific user to [deny] section in the /etc/atd.conf file.

C.

Add the specific user to /etc/at.deny file.

D.

Add the specific user to nojobs group.

E.

Run the following: atd --deny [user].

Full Access
Question # 30

Of the ways listed, which is the best method to temporarily suspend a user's ability to interactively login?

A.

Use passwd -d username to give the user an empty password.

B.

Use chage to expire the user account.

C.

Change the user's password.

D.

Add the command exit to the user's .login file.

Full Access
Question # 31

Which file contains the date of the last change of a user's password?

A.

/etc/gshadow

B.

/etc/passwd

C.

/etc/pwdlog

D.

/etc/shadow

E.

/var/log/shadow

Full Access
Question # 32

What is the main difference between the batch and at commands?

A.

The batch command will run multiple times.The at command will only run once.

B.

The batch command will run when system load is low. The at command runs at a specific time.

C.

The at command reads commands from standard input. The batch command requires a command line argument.

D.

The at command e-mails results to the user. The batch command logs results to syslog.

Full Access
Question # 33

Which command should be added to /etc/bash_profile to change the language of messages from an internationalised program to Portuguese (pt)? (Select TWO correct answers)

A.

export LANGUAGE="pt"

B.

export MESSAGE="pt"

C.

export LANG="pt"

D.

export LC_MESSAGES="pt"

E.

export ALL_MESSAGES="pt"

Full Access
Question # 34

Which of the following protocols is related to the term open relay?

A.

SMTP

B.

POP3

C.

NTP

D.

IMAP

E.

LDAP

Full Access
Question # 35

Why is /etc/shadow not world readable if the passwords are stored in an encrypted fashion?

A.

The encrypted passwords are still subject to brute force attacks.

B.

This is just for historical reasons.

C.

There is other information in the file that needs to be kept secret.

D.

The passwords can be decrypted by anyone with root access.

Full Access
Question # 36

What command enables a network interface according to distribution-specific configuration, such as /etc/network/interfaces or /etc/sysconflg/network-scripts/ifcfg-etho?(Specify ONLY the command without any path or parameters.)

Full Access
Question # 37

Which of the following connection types, as seen in unroll connection show, may exist in Network Manager? (Choose THREE correct answers.)

A.

tcp

B.

Ethernet

C.

wifi

D.

ipv6

E.

bridge

Full Access
Question # 38

Which of the following commands can identify the PID od a process which opened a TCP port?

A.

ptrace

B.

strace

C.

debug

D.

lsof

E.

nessus

Full Access
Question # 39

Which file lists which users can execute commands using sudo? (Specify the full name of the file, including path.)

Full Access
Question # 40

Which of the following commands displays all environment and shell variables?

A.

getargs

B.

lsenv

C.

ls

D.

env

E.

lsshell

Full Access
Question # 41

What output does the command seq 1 5 20 produce?

A.

1

5

10

15

B.

1

6

11

16

C.

1

2

3

4

D.

2

3

4

5

E.

5

10

15

20

Full Access
Question # 42

Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?

A.

tcpd

B.

inetd

C.

fingerd

D.

mountd

E.

xinetd

Full Access
Question # 43

Which of Ihe following commands will delete Ihe defaull gateway from the system's IP touting table? (Choose TWO correct answers.)

A.

Ifconfig unaet default

B.

Route del default

C.

Ip route del default

D.

Netstat –r default

E.

Sysct1 ipv1default_gw=0

Full Access
Question # 44

Which of the following commands preloads and manages keys that are used for automatic authentication while logging in to other machines using SSH?

A.

sshd

B.

ssh-agent

C.

ssh-keygen

D.

ssh-add

Full Access
Question # 45

Your senior administrator asked you to change the default background of his machine, which uses XDM. Which file would you edit to achieve this?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 46

Which file is processed by newaliases? (Specify the full name of the file, including path.)

Full Access
Question # 47

Which of the following nmcli subcommands exist? (Choose two.)

A.

nmcli ethernet

B.

nmcli device

C.

nmcli wifi

D.

nmcli address

E.

nmcli connection

Full Access
Question # 48

On a system running the KDE Display Manager, when is the /etc/kde4/kdm/Xreset script automatically executed?

A.

When KDM starts

B.

When a user's X session exits

C.

When KDM crashes

D.

When X is restarted

E.

When X crashes

Full Access
Question # 49

X is running okay but you're concerned that you may not have the right color depth set. What single command will show you the running color depth while in X?

A.

xcd

B.

xcdepth

C.

xwininfo

D.

xcolordepth

E.

cat /etc/X11

Full Access
Question # 50

The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?

A.

It is placed in curly brackets as in Section SectionName { ... }.

B.

It is placed between a line containing Section "SectionName" and a line containing EndSection.

C.

It is placed between the tags

and

D.

It is placed after the row [SectionName].

E.

It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.

Full Access
Question # 51

Which of the following lines is an example of a correct setting for the DISPLAY environment variable?

A.

hostname:displayname

B.

hostname:displaynumber

C.

hostname/displayname

D.

hostname/displaynumber

E.

hostname

Full Access
Question # 52

What is the default name of the configuration file for the Xorg X11 server? (Specify the file name only without any path.)

Full Access
Question # 53

Which file used by XDM specifies the default wallpaper?

A.

/etc/X11/xdm/Xsetup

B.

/etc/X11/xdm.conf

C.

/etc/X11/xdm/Defaults

D.

/etc/X11/defaults.conf

Full Access
Question # 54

Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 55

What is the name of the simple graphical login manager that comes with a vanilla X11 installation? (Specify ONLY the command without any path or parameters.)

Full Access
Question # 56

Why is the xhost program considered dangerous to use?

A.

It makes it difficult to uniquely identify a computer on the network.

B.

It allows easy access to your X server by other users.

C.

It logs sensitive information to syslog.

D.

It makes your computer share network resources without any authentication.

E.

It is a graphical DNS tool with known exploits.

Full Access
Question # 57

How is a display manager started?

A.

It is started by a user using the command startx.

B.

It is started like any other system service by the init system.

C.

It is started by inetd when a remote hosts connects to the X11 port.

D.

It is started automatically when a X11 user logs in to the system console.

Full Access
Question # 58

What is the purpose of the Sticky Keys feature in X?

A.

To assist users who have difficulty holding down multiple keys at once

B.

To prevent repeated input of a single character if the key is held down

C.

To ignore brief keystrokes according to a specified time limit

D.

To repeat the input of a single character

Full Access
Question # 59

Which of the following details is NOT provided in any output from the netstat utility?

A.

broadcast services

B.

interface statistics

C.

masquerading connections

D.

network connections

E.

routing tables

Full Access
Question # 60

On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

A.

The local routing information may be corrupted and must be re-validated using a routing protocol.

B.

One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.

C.

There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.

D.

DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

Full Access
Question # 61

Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

A.

dnsq

B.

dig

C.

hostname

D.

dnslookup

E.

zoneinfo

Full Access
Question # 62

With IPv6, how many bits have been used for the interface identifier of an unicast address? (Specify the number using digits only.)

Full Access
Question # 63

Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?

Full Access
Question # 64

Which of the following commands will help identify a broken router between the local and the remote machine?

A.

ps

B.

netstat

C.

nslookup

D.

ifconfig

E.

traceroute

Full Access
Question # 65

Which parameter must be passed to ifconfig to activate a previously inactive network interface? (Specify the parameter only without any command, path or additional options)

Full Access
Question # 66

Which of the following commands can be used to display the local routing table? (Choose TWO correct answers.)

A.

ifconfig

B.

dig

C.

netstat

D.

route

E.

trackroute

Full Access
Question # 67

Which of the following is a valid IPv6 address?

A.

2001:db8:3241::1

B.

2001::db8:4581::1

C.

2001:db8:0g41::1

D.

2001%db8%9990%%1

E.

2001.db8.819f..1

Full Access
Question # 68

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Full Access
Question # 69

What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)

A.

route del default

B.

ifconfig unset default

C.

netstat -r default

D.

ip route del default

E.

sysctl ipv4.default_gw=0

Full Access
Question # 70

Which port is the default server port for the HTTPS protocol? (Specify the port number using digits.)

Full Access