2007年12月22日 星期六

LPIC Level 1 102 考古題 之二

Question 1/33
What command will remove a loaded kernel module?
Choose the best answer.
a.delmod
b.modrm
c.modkill
d.rmmod
e.depmod

answer:d


Question 2/33
Which file is used by modprobe to get the information, what kernel module is
needed by a particular other kernel module?
Choose the best answer.
a./etc/modules.dep
b./etc/modules.conf
c./lib/modules/$(uname -r)/modules.dep
d./lib/modules/$(uname -r)/modules.conf
e./lib/modules/$(uname -r)/modules.needed

answer:c

Question 3/33
You have just loaded a new version of the kernel source and installed it
into /usr/src/kernelnew. In /usr/src/kernelold are the
sources of your old kernel. Before configuring the new kernel you want to get as much
configuration information as possible from the old kernel to the new one.
What file will you copy from kernelold to kernelnew to archieve this?
Choose the best answer.
a.Makefile
b.kernel.dat
c.kernel.conf
d..config
e..kernelconf

answer:a

Question 4/33
Which file contains the main log of the system?
Choose the best answer.
a./var/mesg
b./var/log
c./var/log/mesg
d./var/log/messages
e./var/messages

answer:d

Question 5/33
What is the main configuration file for the init program?
Choose the best answer.
a./etc/init.conf
b./etc/system.conf
c./etc/inittab
d./etc/init/configure
e./etc/runlevel.conf

answer:c

Question 6/33
Which command will you use to send jobs to printers?
Choose the best answer.
a.lpd
b.lpr
c.lpc
d.lpq
e.print

answer:b

Question 7/33
What command will you use to submit a printjob to a remote printer on a
windows machine?
Choose the best answer.
a.wlpr
b.wprint
c.smbclient
d.samba
e.sambaprint

answer:c ?

Question 8/33
What is the command to built a new manpage index database?
Choose the best answer.
a.updatedb
b.updatemandb
c.mandb-update
d.mandb
e.mkindex

answer:e

Question 9/33
The file _____________ is displayed by getty befor the login message.
(Please enter full path and filename)
Type the answer.

answer:/etc/issue

Question 10/33
How can you assign the content of the enviroment variable PATH to the
enviroment variable MYPATH in the bash shell?
Choose the best answer.
a.MYPATH=PATH
b.MYPATH=$PATH
c.$MYPATH=PATH
d.$MYPATH=$PATH
e.let MYPATH=$PATH

answer:b

Question 11/33
You define an alias in your shell: alias cp="cp -i" but now you want to use
the original cp command. How can you remove the alias?
Choose the best answer.
a.alias cp=
b.alias cp=builtin cp
c.unalias cp
d.rmalias cp
e.delalias cp

answer:c

Question 12/33
Which statement about the following line is true?

[ -x /usr/sbin/daemon ] && /usr/sbin/daemon

Choose the best answer.
a./usr/sbin/daemon will be executed if it exists and is executable
b.The daemon will be executed with it's own path as parameter
c.This is a recursive call to daemon
d.This isn't a valid command

answer:a

Question 13/33
User foo has left our company and you want to remove his account and all his
files in his homedirectory. Which of the following commands will do this?
Choose the best answer.
a.rm -rf /home/foo
b.userdel -r foo
c.killuser foo
d.deluser -r foo
e.kill -HOME foo

answer:b

Question 14/33
What command shows you, what groups you belong to?
Choose the best answer.
a.whatgrp
b.whatgroup
c.group
d.groups
e.grps

answer:d

Question 15/33
You want to change from old /etc/passwd format to the modern and more save
shadow password system. What command can you use for that purpose?
Choose the best answer.
a.mkshadow
b.shadow
c.sh_create
d.sh-create
e.pwconv

answer:e

Question 16/33
Where can you configure the behavior of the syslog daemon?
Choose the best answer.
a./var/log/syslog.conf
b./var/log/syslogd.conf
c./etc/syslog.conf
d./etc/syslogd.conf
e./var/lib/syslogd/configure

answer:c

Question 17/33
What actions can be configured in the logrotate configuration file?
Choose every correct answer.
a.Mail old logs to a given address before deleting them
b.Compress rotated logfiles
c.Keep an amount of old messages in the newly generated logfile
d.Move rotated logs to a different location
e.Send a mail to root after every rotating

answer:b c e

Question 18/33
What file(s) can be used to permit or deny particular users to use the
cron-system?
Choose the best answer.
a./etc/hosts.allow and /etc/hosts.deny
b./etc/cron.allow and /etc/cron.deny
c./etc/cron/allow and /etc/cron/deny
d./etc/cronuser
e.Only root may use cron, so no settings are possible


answer:b



Question 19/33
What happens with the output of a command which is run by at by a
particular user?
Choose the best answer.
a.It will be written into the file /var/log/at
b.It will be written into the file /var/log/at_username
c.It will be written into the file at.out in the users home directory
d.It will be written to /dev/null
e.It will be mailed to the user

answer:e ?

Question 20/33
How many backup levels are provided by dump?
Choose the best answer.
a.2
b.3
c.5
d.10
e.20

answer:d 0-9

Question 21/33
What is a NTP server?
Choose the best answer.
a.Network Transfer Protocol - a fileserver
b.Network Time Protocol - a server which offers exact time settings
c.NT-Protocol - a Win-NT server
d.Net Talk Protocol - a chat server

answer:b

Question 22/33
Which service works usually on port 139 ?
Choose the best answer.
a.nntp
b.netbios-ssn
c.pop3
d.snmp
e.imap

answer:b

Question 23/33
Which segmentation is correct for Class C addresses ?
Choose the best answer.
a.1 byte network address, 3 byte host address
b.2 byte network address, 2 byte host address
c.3 byte network address, 1 byte host address

answer:c

Question 24/33
The CIDR mask /28 is in dotted quad notation 255.255.255._____
Type the answer.

answer:240

Question 25/33
You get the IP-address 191.123.234.168/29 from your ISP. What is your
broadcast address in dotted quad?
Type the answer.

answer:191.123.234.175

Question 26/33
The file /etc/_____________ contains the information, in which order
IP-address resolutions should be proceeded.
Type the answer.

answer:resolv.conf

Question 27/33
Which of the following protocols can be used to authenticate a ppp client to
a ppp server?
Choose every correct answer.
a.chat
b.CHAP
c.PPP-AUTH
d.PAP
e.pppd

answer:b d

Question 28/33
What is the configuration file for inetd?
Choose the best answer.
a.~/.inetd.conf
b.~/.inetdrc
c./etc/inetdrc
d./etc/inetd.conf
e./etc/inetd.options

answer:d

Question 29/33
The user bob of your local system wants to read all his local mail at home.
He now asks you to forward his mail to his regular email address. What do
you do?
Choose the best answer.
a.change /etc/mail/forward
b.change /etc/sendmail.fw
c.change /etc/sendmail.forward
d.change /home/bob/.forward or show bob how to change it
e.change /home/bob/.sendmail.cf or show bob how to change it

answer:d

Question 30/33
How can you mount a NFS share?
Choose the best answer.
a.use nfsmount hostname target
b.use mount hostname:/absolute/path target
c.use nfsmount hostname sharename target
d.use mount hostname sharename target
e.NFS shares can not be mounted

answer:b

Question 31/33
What command is used to create key pairs for the ssh daemon?
Choose the best answer.
a.sshkeygen
b.ssh-keygen
c.mksshkeys
d.makekey
e.mkkeys

answer:b

Question 32/33
What syslog facility does the linux firewall use?
Choose the best answer.
a.auth
b.authpriv
c.security
d.kern
e.firewall

answer:d

Question 33/33
What is a true statement about the file /etc/nologin?
Choose the best answer.
a.It contains a list of users who may not login
b.It contains a list of users who may login
c.If it exists no user can login
d.If it exists no user except the root user can login

answer:d

沒有留言:

搜尋此網誌

本站大事記

這個部落格(網站)內容以分享LINUX和延伸出的技術文章為主!
特別是為了工作和進修需要,搜集了不少網站連結。
希望對來這裡觀文的朋友們,有提供一些有用的資訊或文章。
但這裡的文章中,也包含個人的心情扎記和隨興言談……
若是當中沒有對上你的口味,請多包涵!

原「琳娜絲與希斯寇的邂逅」,改名為「愛上琳娜絲」!

原「琳娜絲與希斯寇的邂逅」,改名為「愛上琳娜絲」!
--原序文--
就是當LINUX遇上CISCO啦!他們的結合還能作什麼事…不就是讓這個世界的網路,串…串起來啊…不然你們那能上這網站看部落格!