117-201 - LPI Level 2 Exam 201
Go back to
LPI
Example Questions
Which of the following is a valid location in the automount configuration, when a Windows share needs to be made available to the system?
://server/sharename
Which of the following is a CD-ROM filesystem standard?
ISO9660
Which tool can be used to control the runtime behavior of udev?
udevadm
A regular user, joe, has just run: ./configure && make && make install to build and install a program. However, the installation fails. What could be done to install the program? (Choose TWO correct answers.)
Run make install with root privileges.
Rerun ./configure with a --prefix option where the user has permissions to write.
Which of these commands allows you to use shared libraries that are in /usr/local/lib?
ldconfig /usr/local/lib
What is the purpose of the command vgextend?
Add physical volumes to an existing volume group.
What command is used to force a file-system check, when rebooting?
shutdown -F -r now
Which of the following commands will securely copy the directory ./fyf/ to /var/tmp/ on the remote host deltaur using the remote user account kevin?
rsync -a -e ssh fyf/ [email protected]:/var/tmp/
A Linux machine freezes during boot. To boot directly to a shell prompt so that editing of files and manual starting of services is possible which command line must be passed to the kernel for the boot process?
init=/bin/bash
The IDE hard drive /dev/hda does not have DMA enabled. Which command must be run to enable DMA on it?
hdparm -d 1 /dev/hda
What script is included with the kernel source to patch a kernel?
patch-kernel
When is historical data of resource usage important? (Select THREE correct answers.)
Predicting when resources will need to be increased.
Diagnosing capacity problems.
Troubleshooting a software problem.
In order to find all library dependencies of /usr/bin/foo, which of the following statement is true?
Running ldd against /usr/bin/foo will show the required libraries.
What are the main network services used by the PXE protocol? (Choose TWO correct answers.)
DHCP
TFTP
What command is used to permanently set the options in the kernel when making a boot disk?
rdev
What does the -p3 option to the patch command do?
It will strip off path information from each file mentioned in the patch file up to and including the third / character.
Considering that a 2.4 series Linux kernel is being used, which kernel module must be loaded to enable CD burning with an IDE CD writer?
ide-scsi
A system is running out of swap space. To initialise 5GB of additional swap space, which combination of commands should be used?
dd if=/dev/zero of=/tmp/swapfile bs=1024 count=5120000; mkswap /tmp/swapfile; swapon /tmp/swapfile
Which pseudo-file contains information on the status of software RAID devices?
proc/mdstat
A GRUB boot loader installed in the MBR was accidentally overwritten. After booting with a rescue CD-ROM, how can the lost GRUB first stage loader be recovered?
Run grub-install after verifying that grub.conf is correct.
On a system with separate partitions for /, /usr, /var, /tmp, which filesystem[s] can safely be mounted readonly?
usr
What command should be used to find out what PCI devices can be seen, without querying the kernel?
lspci -b
To restore the kernel source to the previous, unpatched, version, which of the following commands could be used?
patch -R
Which command could be used to see the kernel messages created from the boot time until now?
dmesg
You find that a host (192.168.1.4) being used on one of your client's networks has been compromised with a backdoor program listening on port 31337. Your client requests a list of originating IP addresses connecting to that port. Using a Linux workstation as traffic analyzer, which of the following commands would gather the data requested by the client?
tcpdump host 192.168.1.4 and port 31337 -w out
A machine is running in single user mode and, as such, not all file-systems are accessible. What command must be run to make all of the other file-systems listed in /etc/fstab accessible?
mount -a
When building an RPM package, which rpmbuild option is used to unpack sources and apply patches before proceeding with the next steps?
-bp
A BIND server should be upgraded to use TSIG. Which configuration parameters should be added, if the server should use the algorithm hmac-md5 and the key skrKc4DoTzi/tAkllPi7JZA== ?
key server.example.com. { algorithm hmac-md5; secret "skrKc4DoTzi/tAkllPi7JZA=="; };
What information can be found in the log file specified by the status parameter in OpenVPN's server.conf? (Select TWO correct answers)
Routing information
A list of currently connected clients
The swap usage on a system needs to be checked. Which TWO commands can be used to display a swap usage summary?
cat /proc/swaps
swapon -s
If all of the following files and/or symlinks exist in a SysV-init runlevel directory, which of the following will be executed first when booting the system directly into the runlevel?
S98lpi
Which of the following commands will copy one disk partition /dev/sda3 to /dev/sdb3?
dd if=/dev/sda3 of=/dev/sdb3 bs=4096 conv=notrunc
Select the TWO correct alternatives regarding the kill -9 command:
Its use should be avoided and other alternatives should be tried before it.
Its use can occasionally cause the data loss.
[NEW] Which of the following must be included in the syslogd configuration file, so that ONLY kernel related messages with the priority crit are reported?
kern.crit
User Joseph has successfully extracted and compiled a program from source code. Installing the binaries produces errors. What is the most likely reason?
The binaries require root privileges to be installed
Which of the following commands can be used to list IPv4 addresses and MAC addresses for IP devices that the system has seen on the local network?
arp
Which tool can be used to control the runtime behaviour of udev?
udevadm
What component of a system does smartd monitor?
Hard drives
What is the minimum number of disks required in a fully redundant RAID5 array?
3
What command is used to mount a floppy disk image under /mnt/floppy?
mount -o loop root.img /mnt/floppy
A new PCMCIA network card is not functioning correctly. To troubleshoot this, the socket information should be checked. How can this be done? (Choose two.)
cardctl -s
cat /var/lib/pcmcia/stab
A DNS server has the IP address 192.168.0.1. Which TWO of the following need to be done on a client machine to use this DNS server?
Add nameserver 192.168.0.1 to /etc/resolv.conf
Ensure that the dns service is listed in the hosts entry in the /etc/nsswitch.conf file
Which ONE of the following wireless tools can be used to check the wireless network link quality?
iwconfig
Choose two backup programms run under linux
BackupPc
Amanda
In the following output from top, which processes contribute to the percentage of time that the CPU spends in the state of wa? Tasks: 193 total, 1 running, 190 sleeping, 2 stopped, 0 zombie Cpu(s): 0.5%us, 0.3%sy, 0.0%ni, 98.2%id, 1.0%wa, 0.0%hi, 0.0%si, 0.0%st
Processes waiting for IO operations to complete.
A BIND server should never answer queries from certain networks or hosts. Which configuration directive could be used for this purpose?
blackhole { ...; };
Which of these would be the simplest way to configure BIND to return a different version number to queries?
Set version "my version" in BIND's configuration file.
Where should the LILO code reside, on a system with only one installation of Linux and no other operating systems?
In the master boot record
What tool can you use to print shared library dependencies?
ldd
Which of the following sentences is true for the shown BIND9 configuration? options { directory "/var/named"; allow-query { any; }; allow-recursion {127.0.0.1; 10.0.0.0/24; }; forwarders {192.168.0.4; }; forward first; }; zone"." { type hint; file "named.ca"; };
If the server doesn't know the answer to a query, it sends a recursive query to 192.168.0.4.