고수님들 도와주세요 (lpic 문제중 알쏭달쏭한 문제 올립니다.--
QUESTION NO: 1
The correct crontab entry in the minutes column to create a command in cron that runs every two
minutes would be _____.
Answer:
QUESTION NO: 2
You use the public NTP server time.nist.gov to make sure your system clock is accurate before using it
to adjust your hardware clock.
Complete the following command to accomplish this:
______ time.nist.gov
Answer:
QUESTION NO: 3
To slave your NTP daemon to an external source, you need to modify the ______ variable in your
/etc/ntp.conf file.
Answer:
QUESTION NO: 4
NTP is used to synchronize the system ____ with a central system resource.
Answer:
QUESTION NO: 5
Suppose that the command netstat-a hangs for a long time without producing output.
You might suspect:
A. A problem with NFS
B. A problem with DNS.
C. A problem with NIS.
D. A problem with routing.
E. That the netstat daemon has crashed.
Answer:
QUESTION NO: 6
You build and configured a bastion host to act as a router between two internal networks. Both eth0
and eth1 can see hosts on their respective networks, but the hosts on each network cannot see any
hosts on the other network. After verifying that the hosts have the correct gateway route, you decide
the bastion host does not have IP forwarding turned on.
To check this cat the file /proc/sys/net/ipv4/ _______ to ensure it has a 1.
Answer:
QUESTION NO: 7
When using /etc/ppp/peers/* files, which of the following is true:
A. The /etc/ppp/options should be empty.
B. Any user can run pppd from the command line.
C. The dial-on-demand option cannot be used.
D. You must use chap authentication.
Answer:
QUESTION NO: 8
You decide to use xinetd instead of inetd.
What must be done in order to properly configure xinetd?
A. You must create a new configuration file for xinetd.
B. You must add xinetd to /etc/services.
C. You must add xinetd support to your tcpwrappers configuration files.
D. Nothing, xinetd uses the same configuration files as inetd.
Answer:
QUESTION NO: 9
To avoid spammers using your mail server to relay their messages, you need to ________________.
A. Disable the relay control in /etc/aliases
B. Set up a ruleset for this in /etc/sendmail.cf
C. Set up relay control in your DNS’s MX record.
D. Recompile sendmail with the –NORELAY flag.
Answer:
QUESTION NO: 10
This is a line from the file /etc/export:
/product testking(rw)
What does it mean?
A. Only user testking may access the filesystem /product when it is NFS mounted.
B. This computer will mount the filesystem /product on testking via NFS.
C. The filesystem /product is exported for NFS mount to computer testking.
D. All NFS access to /product will use suid testking.
Answer:
QUESTION NO: 11
These lines are taken from /etc/smb.conf:
workgroup = group1
guest account = nobody
What else is needed for this to work?
A. nobody must be a valid group on the server.
B. nobody must be a user name listed in /etc/passwd.
C. group1 must be a valid group on the server.
D. workgroup must be a valid group on the server.
Answer:
QUESTION NO: 12
In what file do you change default shell variables for all users?
A. /etc/bashrc
B. /etc/profile
C. ~/.bash_profile
D. /etc/skel/.bashrc
E. /etc/skel/.bash_profile
Answer:
QUESTION NO: 13
This is the file /etc/named.boot from the computer named tellus with IP address 128.66.12.10.
directory /etc
secondary testking.com 128.66.12. testking.com.hosts
secondary 66.128.IN-ADDR.ARPA 128.66.12.5 128.66.rev
primary 0.0.127.IN-ADDR.ARPA named.local
cache named.ca
From this file, you know that:
A. tellus is the primary DNS server for domain testking.com.
B. There is a secondary DNS server for domain testking.com at the IP address 128.66.12.5.
C. tellus is a secondary DNS server for domain testking.com and it downloads the domain data from the
server at IP address 128.66.12.5.
D. The server at IP address 128.66.12.5 is allowed to download domain and reverse lookup data from
tellus.
Answer:
QUESTION NO: 14
The file /etc/ssh_host_key should be:
A. world-readable
B. readable to group sys
C. readable to root only
D. readable by all SSH users
Answer:
QUESTION NO: 15
You’ve just rebooted your server. Users complain that the server is refusing secure connections.
Which of the following is most likely causing this problem?
A. The clients are not resolving the server name properly.
B. sshd is not configured to start in the default runlevel.
C. sshd is using tcpwrappers for security.
D. The public keys have been corrupted on the server.
E. The users need to restart their ssh-agent.
Answer:
QUESTION NO: 16
To increase system security, it is often desirable to run daemons for system services with non-root
user ids.
Which one of the following services can be run as a non-root user?
A. inetd
B. named
C. rlogind
D. crond
E. telnetd
Answer:
QUESTION NO: 17
You’ve decided to convert from standard shadow passwords to MD5 passwords. You make the
appropriate changes to the /etc/pam.d/ files.
What do you do next?
A. Nothing, the passwords will be changed as users login and out.
B. Nothing, users will be automatically prompted to change their passwords at the next login.
C. You need to manually change all the passwords using the passwd program.
D. Delete and recreate all the users.
E. Change the /etc/pam.d files back because shadow passwords and MD5 passwords are
incompatible.
Answer:
QUESTION NO: 18
If you need to view per-user disk space usage on a filesystem, the ______ command can provide that
information if the kernel is built to support it.
Answer:
QUESTION NO: 19
What well-known service binds port 25 and is it required on all hosts?
A. SNMP and it should be turned off if not needed.
B. SMTP and it is a required service.
C. SMTP and it is only required on MX hosts.
D. SLPD and it is required if you run LDAP services.
E. SSHD and it is required for secure logins.
Answer:
QUESTION NO: 20
How many cron fields are there for specifying the time to execute a cron job?
A. 1
B. 3
C. 4
D. 5
E. 6
Answer:
QUESTION NO: 21
You have just recompiled a new kernel and rebooted your system with the new kernel. Unfortunately
you are getting “Can’t locate module” error messages.
Which of the following is most likely to be the source of the problem?
A. You copied the modules to the wrong directory.
B. You did not configure modular support into the kernel.
C. You did not run depmod after installing the modules.
D. You dud not install the modules.
Answer:
QUESTION NO: 22
Which of the following commands can be used to view kernel messages?
A. less dmesg
B. less /var/log/kern.log
C. cat /proc/kernel |less
D. cat /proc/dmesg
Answer:
QUESTION NO: 23
Which crontab entry could be used to set the system time at regular intervals?
A. 10 * * * date $d$t$24
B. 10 * * * settime $d$t$24
C. 10 * * * date<ntpl.digex.net
D. 10 * * * /usr/sbin/runcron date <ntpl.digex.net
E. 10 * * * /usr/sbin/ntpdate ntp1.digex.net> /dev/null2>&1
Answer:
QUESTION NO: 24
Assume that on your system, there are man pages for both the command crontab and the
configuration file for crontab.
What command would you use to access the man page for the crontab configuration file?
Answer:
QUESTION NO: 25
The main collection of Linux usenet newsgroups are found in which usenet hierarchy?
A. sys.linux
B. comp.linux
C. comp.os-linux
D. comp.sys.linux
E. comp.opsys.linux
Answer:
QUESTION NO: 26
You want to find the man pages for utilities and tools related to PPP, but you don’t know the name of
the specific commands.
How can you get a list of man pages that contain information about PPP?
A. whatis ppp
B. man ppp
C. apropos ppp
D. mandb ppp
Answer:
QUESTION NO: 27
You added /usr/local/bin to your PATH environment variable. Next you executed the command
make, which calls gcc. This failed because gcc couldn’t find the executable in /usr/local/bin that
it needed.
To fix this, you should execute:
______PATH allowable
Answer:


댓글 달기