Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your LPI 102-500 LPIC-1 Exam 102, Part 2 of 2, version 5.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 235 questions

What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.)

A.

The user bob is removed from the system's user database.

B.

The user bob's home directory is removed.

C.

The locate database is updated to drop files owned by bob.

D.

All files owned by bob are remove from all mounted filesystems.

E.

In case bob was the last member of a group, that group is deleted.

Which command will set the local machine's timezone to UTC?

A.

cat UTC > /etc/timezone

B.

ln -s /usr/share/zoneinfo/UTC /etc/localtime

C.

date --timezone=UTC

D.

mv /usr/timezone/UTC /etc

Which crontab entry could be used to set the system time at regular intervals?

A.

1 0 * * * date $d $t $24

B.

1 0 * * * ntpdate ntp1.digex.net

C.

1 0 * * * date ntp1.digex.net

D.

1 0 * * * runcron date ntp1.digex.net

E.

1 0 * * * settime $d $t $24

Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow?

A.

*

B.

-

C.

s

D.

x

Which of the following connection types, as seen in unroll connection show, may exist in Network Manager? (Choose THREE correct answers.)

A.

tcp

B.

Ethernet

C.

wifi

D.

ipv6

E.

bridge

Which configuration file would be edited to change default options for the OpenSSH server?

A.

/etc/ssh/sshd_config

B.

/etc/ssh/ssh

C.

/etc/ssh/server

D.

/etc/ssh/ssh_config

E.

/etc/ssh/ssh_server

Which of the following information is stored in /etc/shadow for each user?

A.

The timestamp of the user’s last login

B.

The user’s private SSH keys

C.

The hashed password of the user

D.

The numerical user ID (UID)

E.

The path to the user’s home directory

Which of the following commands display the number of bytes transmitted and received via the etho network interface? (Choose TWO correct answer.)

A.

Route –v via etho

B.

Ip stats show dev etho

C.

Netstat –s –I etho

D.

Ifconfig etho

E.

Ip –s link show etho

Which mechanism does ggfe use to interact with the SSH agent?

A.

Connecting to pod 2222 which is used by the system-wide SSH agent.

B.

Using the fixed socket .BBh-ngant/ipe.

C.

Creating an alias replacing anh with calls to ssh-agent.

D.

Starting ssh-agent as a child process for each sir. invocation.

E.

Evaluating environment variables such as SSH_AUTH_SOCK.

Which of the following commands shows all active systemd timers?

A.

systemctl-timer show

B.

timectl list

C.

systemctl –t

D.

systemctl list-timers

E.

timeq

If an alias 1s exists, which of the following commands updates the alias to point to the command 1s -1 instead of the alias's current target?

A.

Sot is=’Is -1’

B.

Alias 1s=’s’1a -1’

C.

Alias –force 1s=’1s -1’

D.

Alias –update is is-‘1s-1’

E.

Realias 1s=’1s -1’

What is Irue regarding public and private SSH keys? (Choose TWO correct answers.)

A.

For each user account, there is exactly one key pair that can be used to log into that account.

B.

The private key must never be revealed to anyone.

C.

Several different public keys may be generated (or the same private key.

D.

To maintain the private key's confidentiality, the SSH key pair must be created by its owner.

E.

To allow remote logins, the user's private key must be copied to the remote server.

Where is the system journal stored?

A.

/var/ jlog/ and /var/jlogd/

B.

/proc/log and /proc/klog

C.

/run/Iog/journal/or/var/log/journal/

D.

/var/log/syslog.bin or /var/log/syslog-jrn

E.

/etc/system/journal / or /usr/1ib/sysLend/journal/

Which of the following commands can identify the PID od a process which opened a TCP port?

A.

ptrace

B.

strace

C.

debug

D.

lsof

E.

nessus

What is a purpose of an SSH host key?

A.

It must be sent by any SSH client in addition to a user key in order to identify the client's host.

B.

It provides the server's identity information to connecting SSH clients.

C.

It is the root key by which all user SSH keys must be signed.

D.

It authenticates any user that logs into a remote machine from the key's host.

E.

It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.

Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.)

What is the purpose of the nsswitch.conf file?

A.

It is used to configure where the C library looks for system information such as host names and user passwords.

B.

It is used to configure network protocol port numbers such as for HTTP or SMTP.

C.

It is used to configure LDAP authentication services for the local system.

D.

It is used to configure which network services will be turned on during the next system boot.

Which of the following statements is valid in the file /etc/nsswitch.conf?

A.

multi on

B.

192.168.168.4 dns-server

C.

hosts: files dns

D.

include /etc/nsswitch.d/

Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)

A.

resolve

B.

dns

C.

remote

D.

files

E.

hosts

What is the lowest numbered unprivileged TCP port? (Specify the number in digits only.)

Page: 2 / 4
Total 235 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved