Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

LPI 117-201 Exam - Cheat-Test.com

Free 117-201 Sample Questions:

QUESTION 1:
Which two utilities can you use to set up a job to run at a specified time?
A. at and crond
B. atrun and crontab
C. at and crontab
D. atd and crond
Answer: C
Explanation: The 'at' command is used to execute commands at a specified time and optional date. A cron job is a program or script scheduled at a specified time. The 'crontab' program is used to create user cron jobs.
Reference: http://www.oreillynet.com/linux/cmd/a/at.html
http://www.oreillynet.com/linux/cmd/c/crontab.html
Incorrect Answers.
A: The Cron daemon (crond) is the program that runs the cron job at the specified time. It is not used to set up a cron job.
B: Atrun is used to run jobs scheduled by the 'at' program. It is not used to set up a job to run at a specified time.
D: Atd is the 'at' deamon. Similar to the cron daemon, it is the program that runs the jobs scheduled with the 'at' command.

QUESTION 2:
After creating a backup of the users home directories called backup.cpio you are asked to restore a file called memo.ben. What command should you type?
Answer: cpio -iF backup.cpio memo.ben
Explanation: The 'cpio' command is used to create backups or restore files from a backup. The -i option is to extract something. The F option is to specify a file. Here we are extracting memo.ben from a file named backup.cpio.
Reference: http://www.oreillynet.com/linux/cmd/c/cpio.html

QUESTION 3:
You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type?
Answer: tar xf MyBackup.tar memo.ben
Explanation: Tarfiles are created using the 'tar' utility. Therefore, you should use the 'tar' utility to
extract the files. The x option is to extract and the f option is to specify a filename to extract from.
Reference: http://www.oreillynet.com/linux/cmd/t/tar.html

QUESTION 4:
When is the most important time to restore a file from your backup?
A. On a regular scheduled basis to verify that the data is available.
B. When the system crashes.
C. When a user inadvertently loses a file.
D. When your boss asks to see how restoring a file works.
Answer: A
Explanation: According to 'best practice', you should regularly restore files to verify that your backup procedures are working. It's no good backing up files regularly if you are unable to restore files when needed.
Incorrect Answers:
B: When the system crashes, you may need to restore your whole system. However, this shouldn't be the only time you restore files.
C: When a user loses a file, it will need to be restored. However, you should prepare for this eventuality by regularly testing your backup/restore process to ensure you are able to restore a file when needed.
D: When your boss asks to see how restoring a file works, you want it to work when you show him. This is why you should test your backup/restore processes.

QUESTION 5:
Which one of the following factors does not play a role in choosing the type of backup media to use?
A. How frequently a file changes.
B. How long you need to retain the backup.
C. How much data needs to be backed up.
D. How frequently the backed up data needs to be accessed.
Answer: A
Explanation: Your choice of backup media will depend on its capacity, its shelf life and the time it takes to access the data. The frequency of file changes is irrelevant.
Incorrect Answers:
B: Different backup media can be kept for varying periods of time. You should find out from the manufacturers how long a backup media can be kept without losing its data.
C: Obviously, your choice of backup media will depend on the amount of data to be backed up. For example, a CD-ROM can hold around 700MB of data while tapes can hold up to hundreds of gigabytes of data.
D: Your choice of backup media will also depend on the time it takes to retrieve data from the media. Reading data from a CD-ROM or DVD is much quicker than reading data from a tape.

QUESTION 6:
You attempt to log out but receive an error message that you cannot. When you issue the jobs command, you see a process that is running in the background. How can you fix thus so that you can logout?
A. Issue the kill command with the PID of each running command of the pipeline as an argument.
B. Issue the kill command with the job number as an argument.
C. Issue the kill command with the PID of the last command as an argument.
D. Issue the kill command without any arguments.
Answer: C
Explanation: The kill command is used to send a signal to kill one or more process IDs. You must own the process or be a privileged user, otherwise the kill command will be ignored.
Reference: http://www.oreillynet.com/linux/cmd/k/kill.html
Incorrect Answers:
A: You need to end the background process. You know its process ID, therefore you should issue the process ID with the kill command to kill the appropriate process.
B: You cannot use the job number with the kill command. You should use the process ID or process name.
D: The kill command won't work if it doesn't know what process you want it to kill.

QUESTION 7:
The top utility can be used to change the priority of a running process? Another utility that can also be used to change priority is_______?
Answer: renice

QUESTION 8:
You need to search the entire directory structure to locate a specific file. How could you do this and still be able to run other commands while the find command is still searching for you file?
A. find / -name filename &
B. find / -name filename
C. bg find / -name filename
D. &find / -name filename &
Answer: A
Explanation: The find command is used to locate files. / is the root directory, so searching from / will search the entire directory tree. The -name <filename> enables you to search for a file named<filename>. The ampersand character (&) is used to return control of the shell returning you to the command prompt, without have to wait for the command to execute.
Reference: http://www.oreillynet.com/linux/cmd/f/find.html
Incorrect Answers:
B: With no ampersand (&) following the command, you will not be able to run other commands until the find command has completed its search.
C: The bg command is used to run a suspended job in the background if job control is enabled. However, the program or command would have to started and then suspended for this to work.
D: The ampersand (&) must follow the command, not precede it.

QUESTION 9:
In order to display the last five commands you have entered using the history command, you would type _______.
Answer: history 5
Explanation: The history command is used to display the previously entered commands. If you typed history with no arguments, you would likely get a long scrolling list of commands. By typing a number after 'history', you will display only the last <number> of commands.
Reference:
http://www.redhat.com/docs/manuals/linux/RHL-7.3-Manual/getting-started-guide/s1-q-and-a-history-tips.html

QUESTION 10:
You telnet into several of your servers simultaneously. During the day, you sometimes get confused as to which telnet session is connected to which server.
Which of the following commands in your .profile would make it obvious to which server you are attached?
A. PS1='\h: \w>'
B. PS1='\s: \W>'
C. PS1='\!: \t>'
D. PS1='\a: \n>'
Answer: A
Explanation: The PS1 environment variable controls the prompt on the command line, and can be used by users to tell what system they are on, the directory they are currently in, the current date and more depending on how this variable is configured. The \h option is used to specify the hostname and the \w option will give the full path of the current working directory.
Reference: http://ctdp.tripod.com/os/linux/tips/tipsps1.html
Incorrect Answers:
B: The \s option is used to display the shell name. This won't give any indication of which machine you are connected to.
C: The \ option is used to display the history number of the current command. This won't give any indication of which machine you are connected to.
D: The \a option is used to display a new line. This won't give any indication of which machine you are connected to.

QUESTION 11:
You have to type your name and title frequently throughout the day and would like to decrease the number of key strokes you use to type this. Which one of your configuration files would you edit to bind this information to one of the function keys?
Answer: .inputrc
Explanation: The inputrc file is used to map keystrokes to text or commands. You can use this file to make a function key display your name and title. Other common uses include mapping a function key to lock your computer or run a command.
Note: Additional answer: ~/.inputrc (if asked after the full path)
Reference: http://beyond.linuxfromscratch.org/view/cvs/postlfs/inputrc.html

QUESTION 12:
When typing at the command line, the default editor is the ________ library.
Answer: readline
Explanation: The default command line editor is the Readline library. As with most text editor
programs, it allows certain keystrokes to aid in the writing/editing of a command. For example, there are keystroke combinations that allow you to jump to the beginning or end of the line, or to jump to the start or end of a previous word.
Reference: http://www.cs.utah.edu/dept/old/texinfo/bash/rlman.html

QUESTION 13:
What can you type at a command line to determine which shell you are using?
Answer: echo $SHELL
Explanation: The 'echo' command is used to echo a string to standard output. $shell is an environment variable that reflects the current shell in use. Therefore, the 'echo $shell' command will display the name and path of the shell you are using.
Reference: http://www.santafe.edu/projects/echo/how-to/node30.html

QUESTION 14:
You have recently decided to convert from using a monolithic kernel to using a modular kernel. You have made the appropriate changes in your kernel configuration. Next you wish to compile your new kernel and modules and copy the modules to their proper location. What would you type to do this?
A. make modules modules_install
B. make bzImage modules modules_install
C. make mrproper modules modules_install
D. make dep clean modules modules_install
E. make dep clean bzImage modules modules_install
Answer: E
Explanation: This command consists of multiple make commands on the same line:
The first part of the command, make dep, actually takes your configuration and builds the corresponding dependency tree. This process determines what gets compiled and what doesn't.
The next step, make clean, erase all previous traces of a compilation so as to avoid any mistakes in which version of a feature gets tied into the kernel.
The next step, make bzImage does the full compilation of the kernel.
The next two steps, make modules and make modules_install will compile the modules and copy them to their appropriate location.
Reference: http://www.openna.com/community/articles/security/v1.3-xml/chap7sec84.html
Incorrect Answers:
A: This command will compile the modules, but not the kernel.
B: You need the make dep command to build the dependency tree.
C: Make mrproper is similar to make clean except that it doesn't delete any binaries. However, there is no kernel image specified in this command.
D: There is no kernel image specified in this command.

QUESTION 15:
To allow a user to mount a CD and read from it, which entry should be put into /etc/fstab?
A. /dev/cdrom /mnt/cdrom iso9660 noauto,user,ro 0 0
B. /dev/cdrom /mnt/cdrom iso9660 noauto,uid=user,gid=group,ro 0 0
C. /dev/cdrom /mnt/cdrom iso9660 noauto,User,ro 0 0
D. /dev/cdrom /mnt/cdrom iso9660 noauto,usermap,ro 0 0
E. /dev/cdrom /mnt/cdrom iso9660 noauto,owners,ro 0 0
Answer: A
Explanation: This entry in the fstab file allows any user to mount the CD-ROM (/dev/cdrom) in the
/mnt/cdrom directory. Iso9660 is the file system for the CD-ROM. Noauto means that the CD-ROM won't be automatically mounted when the system boots. The first '0' means that the CD-ROM shouldn't be backed up and the second '0' means that the CD-ROM file system shouldn't be checked for errors when the machine boots.
Reference: Roderick W. Smith. Sybex Linux + Study Guide: Page 400/1.
Incorrect Answers:
B: The syntax of this entry is incorrect.
C: The 'user' field should be lowercase.
D: Usermap is an invalid entry for the user field.
E: Owners is an invalid entry for the user field.

QUESTION 16:
What is the usable disk space of a RAID 5 array of five 18 GB drives with one drive dedicated as a spare?
A. 18GB
B. 34GB
C. 54GB
D. 72GB
E. 90GB
Answer: C
Explanation: The question states that you have 5 18GB drives, but one is dedicated as a spare. Therefore, you have the use of 4 drives which equals 72GB. When using RAID 5, parity data is written across the disks, using the equivalent of one disk's space (18GB). Therefore, the total useable space is 72 - 18 = 54GB.
Reference: http://www.pc.ibm.com/us/infobrf/raidfin.html
Incorrect Answers:
A: The total usable space is 54GB, not 18GB.
B: The total usable space is 54GB, not 34GB.
D: The equivalent of one drive is used for parity. Therefore, the total useable space is 72 - 18 = 54GB, not 72GB.
E: One drive is spare and the equivalent of one drive is used for parity. Therefore, the total useable space is 72 - 18 = 54GB, not 90GB.

QUESTION 17:
You have to mount the /data filesystem from an NFS server (srv 1) that does not support locking. Which of the following mount commands should you use?
A. mount -a -t nfs
B. mount -o locking=off srv1:/data /mnt/data
C. mount -o nolocking srv1:/data /mnt/data
D. mount -o nolock srv1:/data /mnt/data
E. mount -o nolock/data@srv1 /mnt/data
Answer: D
Explanation: If you are mounting a volume that does not support locking, you need to use the nolock option with the mount command. The nolock option tells the system to not use the NFS locking protocol.
Reference: http://docsrv.caldera.com:8457/cgi-bin/info2html?(am-utils.info.gz)opts%2520Option
Incorrect Answers:
A: This answer has the wrong command options.
B: 'Locking=off' is the wrong option. It should be 'nolock'.
C: 'Nolocking' is the wrong option. It should be 'nolock'.
E: /data@srv1 is the wrong syntax. It should be <servername>:/<foldername>.

QUESTION 18:
To list the filesystem available from the NFS server 'castor', the command" ____________ -e castor" can be used.
Answer: showmount
Explanation: The showmount is used to display information about NFS filesystems. The -e option is used to specify an exported filesystem.
Reference: http://www.oreillynet.com/linux/cmd/s/showmount.html

QUESTION 19:
You want to check what shares are offered by a Windows system. Which of the following commands could you use to perform this task?
A. mmblookup
B. showshares
C. smbclient
D. smbstatus
E. listshares
Answer: C
Explanation: The smbclient command with the -L can be used to display the shares on a Windows
system. The syntax is smbclient -L //<servername>.
Reference: http://www.winnetmag.com/Articles/Index.cfm?ArticleID=8897
Incorrect Answers:
A: Mmblookup is the incorrect command to display shares on a Windows system.
B: Showshares is the incorrect command to display shares on a Windows system.
D: Smbstatus is the incorrect command to display shares on a Windows system.
E: Listshares is the incorrect command to display shares on a Windows system.

QUESTION 20:
What file in the /proc file system will show you the parameters passed to your kernel at boot time?
A. /proc/apm
B. /proc/stat
C. /proc/kmsg
D. /proc/sys/kernel/sysrq
E. /proc/cmdline
Answer: E
Explanation: The /proc/cmdline file contains parameters passed to the kernel at system boot time.
Reference: http://www.dobit.com/emblin/embhowto.htm
Incorrect Answers:
A: The kernel parameters are in the /proc/cmdline file, not the /proc/apm file.
B: The kernel parameters are in the /proc/cmdline file, not the /proc/stat file.
C: The kernel parameters are in the /proc/cmdline file, not the /proc/kmesg file.
D: The kernel parameters are in the /proc/cmdline file, not the /proc/sys/kernel/sysrq file.

QUESTION 21:
When an ext2 partition is formatted, a fixed percentage of the blocks on the disk are reserved for use by the root user. After the filesystem has been created this percentage can be modified using which utility?
A. tune2fs
B. mke2fs
C. e2fsck
D. mount
E. hdparm
Answer: A
Explanation: The tune2fs utility can be used to modify the reserved blocks. For example, the tune2fs - u <username> command can be used to allow a user to use the reserved blocks.
Reference: http://www.oreillynet.com/linux/cmd/t/tune2fs.html
Incorrect Answers:
B: You need the tune2fs utility, not mke2fs.
C: E2fsck is used to check a disk for bad blocks. It is not used for reserved blocks.
D: The mount command is used to mount a filesystem. It is not used for reserved blocks.
E: Hdparm is used for tuning a hard disk for performance. It is not used for reserved blocks.

QUESTION 22:
You are asked to provide access through your FTP server to a network share available from an NT
server running on your local network- For this purpose, you will need ______ support in the kernel and to mount the NT share using the smbmount command line utility:
Answer: smbfs
Explanation: Windows NT uses SMB (Server Message Blocks) for network communications. In order to be able to use the smbmount command to mount a Windows NT share, your kernel must have smbfs (server message block file system) support.
Reference: http://uranus.it.swin.edu.au/~jn/linux/smbfs/

QUESTION 23:
On an ext2 filesystem, a running daemon has created a large logfile that is beginning to fill the disk. After deleting the file with an "rm-f" command as root, "df" shows that the space is still in use even though the file is not shown using "ls". To reclaim this space you must:
A. Restart the daemon.
B. Unmount and remount the filesystem.
C. Use sync.
D. Recreate the file.
E. Run fsck.
Answer: A
Explanation: If you have a daemon which writes a log file and keeps that file open for writing then
removing the file will not free up the disk space. The filesystem still sees the program as having a reference to it. Therefore the filesystem will not free up that disk space. The only way to free the space is to restart the daemon
Reference: http://mail.gnu.org/pipermail/bug-fileutils/2001-February/001495.html
Incorrect Answers:
B: Unmounting and remounting the filesystem is unnecessary and may not free the space.
C: Sync is used to write the buffers to disk. It will not free the space.
D: Recreating the file will not free the space because the daemon has a reference to the old file.
E: Fsck is a file system checking tool. It won't free the space because it won't recognize it as corrupted.

QUESTION 24:
While checking the logfiles on your log server, you notice that all client machines are showing up by IP address rather than by hostname, although DNS is configured and running. How would you ensure that host entries show by name rather than by IP?
A. Restart named and then syslogd on the log server.
B. Add the central logging server to all inbound logging hosts' /etc/hosts.
C. Recompile syslogd to add remote logging support.
D. Restart syslogd on the inbound logging clients to force DNS resolution.
E. Add all inbound logging hosts to /etc/hosts on the log server, then restart syslogd.
Answer: E
Explanation: I don't know why the DNS resolution isn't working for the syslog daemon. It could be that there are lots of log entries and that the DNS requests are timing out. Therefore, adding the inbound logging hosts to /etc/hosts on the log server will enable local hostname resolution, thus negating the need to use DNS.
Incorrect Answers:
A: The question states that DNS is configured and running and therefore does not need to be restarted.
B: This won't work. The clients are able to contact the logging server. Adding the central logging server to all inbound logging hosts' /etc/hosts files won't affect how the logging server records the log entries.
C: Remote logging support is already enabled because the IP addresses are being logged.
D: DNS resolution needs to be forced on the server, not the clients.

QUESTION 25:
You are trying to boot a system and change the root password, which you do not know. What do you type at he LILO prompt?
A. linux /etc/passwd
B. linux norootpass
C. linux disable passwords
D. linux init=/bin/bash
E. linux passwd=0
Answer: D
Explanation: If you forget the root password, you can boot init into the shell and change the password using the following commands:
boot: Linux init=/bin/sh
bash# mount -o remount / -rw
bash# passwd root
Reference: Michael J. Tobler. New Riders, Inside Linux: Page 466.
Incorrect Answers:
A: linux /etc/passwd is not a valid boot prompt command.
B: linux norootpass is not a valid boot prompt command.
C: linux disable passwords is not a valid boot prompt command.
E: linux passwd=0 is not a valid boot prompt command.

QUESTION 26:
You need to use grep to search for specific log entries. Given the following three log entries, which grep command will match only one line? Assume that every pattern matches at least one line.
Jun 16 01:46:18 hostname pumpd[10]: PUMP: got an offer
Jun 17 21:52:28 hostname kernel: SCSI subsystem driver Revision: 1.00
Jul 20 11:09:01 hostname /USR/SBIN/CRON[1800]: (mail) CMD runq
A. grep "hostname\ [^\]*\[A-Z]*:"
B. grep "Ju[I-Z]\[0-9].*:.1"
C. grep "hostname,*[pumpd]*[10]"
D. grep "[0-9]:[1-8]*\ host.*\(.*\)"
E. grep "US*[^]]*]*:"
Answer: D.

QUESTION 27:
How can you determine who has scheduled at jobs?
A. at -l
B. at -q
C. at -d
D. atwho
Answer: A
Explanation: The at -l command is the same as the atq command. It will list the user's pending jobs, unless the user is a privileged user; in which case, everybody's jobs are listed
Reference: http://www.oreillynet.com/linux/cmd/a/at.html
Incorrect Answers:
B: The -q option is used to place the job in a specified queue. It does not display who has scheduled jobs.
C: The -d option is used to delete a specified job. It does not display who has scheduled jobs.
D: This is an invalid command.

QUESTION 28:
You want to create a compressed backup of the users home directories. What utility should you use?
Answer: tar
Explanation: The tar utility is used to archive multiple files into one 'tarball'. The -z option invokes another utility called gzip and instructs it to compress the files before tar archives them.
Reference: http://www.oreillynet.com/linux/cmd/t/tar.html

QUESTION 29:
You are covering for another system administrator and one of the users asks you to restore a file for him. You locate the correct tarfile by checking the backup log but you do not know how the directory structure was stored. What command can you use to determine this?
A. tar fx tarfile dirname
B. tar tvf tarfile filename
C. tar ctf tarfile
D. tar tvf tarfile
Answer: D
Explanation: You can list the contents of a 'tarball' with the tar tvf tarfile command. The t option is used to list the files and directories. The v option runs the command in verbose mode. The f option allows you to specify the name of the tarball (a tarball is a common name for an archive created with the tar utility) with the f <filename> option.
Reference: http://www.oreillynet.com/linux/cmd/t/tar.html
Incorrect Answers:
A: The syntax of this command is wrong. The x must come before the f. This also does not list the contents of the file.
B: This command would list the path to 'filename'. Although this would be required information to restore a file, the question states that you want to view the directory structure.
C: The c option is used to create a tarball which isn't required in this question.

QUESTION 30:
The easiest, most basic form of backing up a file is to _____ it to another location.
Answer: copy
Explanation: The easiest way to backup a file is to copy it to another location. Having a backup copy of a file is always recommended.


© 2014 Cheat-Test.com, All Rights Reserved