سوالات امتحان lpic-1

ارسال پست
نمایه کاربر
phoenix
مدیر کل سایت
مدیر کل سایت
پست در این موضوع: 1
پست: 197
تاریخ عضویت: شنبه 29 مهر 1396, 11:10 am
محل اقامت: مشهد
نسخه فدورا: 28
نوع دستکتاپ: LXQt
تماس:

سوالات امتحان lpic-1

پست توسط phoenix » جمعه 13 بهمن 1396, 9:17 am

چند نکته لازم هست ذکر کنم تمام تمارین ذکر شده در این پست در این انجمن وجود دارند فقط باید در انجمن جستجو بکنید شاید سوالاتی که در اینجا قرار گرفته باشند از سطحی که شما هستید بالاتر باشند ولی با جستجو در همین انجمن تمام سوالات و مشکلاتتان رفع میشود و نیازی به گوگل کردن یا سوال در گروه ها یا انجمن های دیگر نیست ;) Which of the following are required when configuring a computer to use a static IP address? (Select two.)

A. The IP address of the DHCP server
B. The hostname of the NBNS server
C. The computer’s IP address
D. The network mask
E. The IP address of the NTP server

The computer’s IP address (option C) and network mask (aka subnet mask or netmask; option D) are the most critical components in TCIP/IP network configuration. (Additional information that you may need to provide on many networks includes the IP addresses of one to three DNS servers, the hostname or IP address of a router, and the computer’s hostname.) You shouldn’t need the IP address of a Dynamic Host Configuration Protocol (DHCP) server (option A)—and if a DHCP server is present, chances are you should be using DHCP rather than static IP address assignment. A Net-BIOS Name Service (NBNS) server (option B) converts between names and IP addresses on NetBIOS networks. The hostname of such a computer isn’t likely to be a critical configuration element, although you may need to provide this information to Samba for some operations to function correctly when sharing files. A Network Time Protocol (NTP) server (option E) helps you maintain system time on all of your computers, but this isn’t required for basic network configuration.

Answer is ; C,D

Which of the following are journaling filesystems for Linux? (Select three.)

A. HPFS
B. ReiserFS
C. Ext2fs
D. Ext3fs
E. XFS

ReiserFS (option B) was written from scratch for Linux. The Third Extended Filesystem (ext3fs; option D) is a journaling filesystem based on the older non-journaling Second Extended Filesystem (ext2fs; option C). The Extents Filesystem (XFS; option E) is a journaling filesystem written by SGI for Irix and later ported to Linux. The Virtual File Allocation Table (vfat; option A) is a non-journaling filesystem designed by Microsoft for Windows. For more information, see Chapter 3, “Configuring Hardware.”

Answer is: B,D,E

How many SCSI ids for peripherals can SCSI-1 support

A. 5
B. 6
C. 7
D. 8

SCSI-1 support total 7 peripherals. There are several different types of SCSI devices. The original SCSI specification is commonly referred to as SCSI-1. The newer specification, SCSI-2, offers increased speed and performance, as well as new commands. Fast SCSI increases throughput to more than 10MB per second. Fast-Wide SCSI provides a wider data path and throughput of up to 40MB per second and up to 15 devices. There are Ultra-SCSI and Ultra-Wide-SCSI

Answer is: C

What does the pwd command accomplish

A. It prints the name of the working directory.
B. It changes the current working directory.
C. It prints wide displays on narrow paper.
D. It parses web page URLs for display.
E. It prints the terminal’s width in characters.

The pwd command prints (to standard output) the name of the current working directory. The remaining options are simply incorrect, although option B describes the cd command, and various tools can be used to reformat wide text for display or printing in fewer columns, as in option C.

Answer is : A

You type a command into bash and pass a long filename to it, but after you enter the command, you receive a File not found error message because of a typo in the filename. How might you proceed

A. Retype the command, and be sure you type the filename correctly, letter by letter.
B. Retype the command, but press the Tab key after typing a few letters of the long filename to ensure that the filename is entered correctly.
C. Press the Up arrow key, and use bash’s editing features to correct the typo.
D. Any of the above.
E. None of the above.

Answer is: D
پیشنهاد میکنم این مطلب را برای سوال بالا بررسی کنید Which of the following ports are commonly used to retrieve email from an email server computer? (Select two.)

A. 110
B. 119
C. 139
D. 143
E. 443

A, D. Port 110 (option A) is assigned to the Post Office Protocol (POP), and port 143 (option D) is assigned to the Internet Message Access Protocol (IMAP), both of which may be used to retrieve email messages from an email server system. Port 119 (option B) is assigned to the Network News Transfer Protocol (NNTP), port 139 (option C) is assigned to the Server Message Block/Common Internet File System (SMB/CIFS) protocol, and port 443 (option E) is assigned to the Hypertext Transfer Protocol with SSL encryption (HTTPS), none of which is commonly used for email retrieval. For more information

Answer is : A, D

What is the function of the ~/.profile file

A. It’s the user configuration file for the ProFTP server.
B. It’s one of a user’s bash startup scripts.
C. It’s the user configuration file for the ProFile file manager.
D. Its presence tells tcsh to ignore file modes.
E. It holds the user’s encrypted password.

B. The ~./profile file is one of several bash startup scripts, as stated in option B. It has nothing to do with the ProFTP server (option A) or the tcsh shell (option D). The ProFile file manager mentioned in option C is fictitious. Users’ encrypted passwords (option E) are usually stored in /etc/shadow. For more information, see Chapter 9, “Writing Scripts, Configuring Email, and Using Databases.”

Answer is: B

You want your computer to remind you to get your car inspected in two years. What is the best way to do this, of the specified options

A. Create a program that repeatedly checks the time and, when two years have passed, displays a message to get your car inspected.
B. Type cal day month year, where day, month, and year specify the date of the future inspection, to have Linux run a program that you then specify on that date.
C. Create a cron job that runs hourly. This job should check the date and, when the correct date comes up, use mail to notify you of the need for a car inspection.
D. Use the NTP GUI calendar program to create an alarm for the specified date. The program will then display the message you enter at the specified date and time.
E. Type at date, where date is a date specification. You can then specify a command, such as mail with appropriate options, to notify you of the need to get your car inspected.

E. The at utility was created to run programs at one specified point in the future. Thus, option E will accomplish the stated goal. Options A and C might also work, but neither is the best way to accomplish this goal. Option A will tie up CPU time, and if the program crashes or the system is shut down during the intervening two years, the message will never be displayed. Option C would be more reliable, but it adds unnecessary complexity to your hourly cron job schedule. The cal program displays a text-mode calendar, enabling you to identify the days of a week for a given month; it doesn’t schedule future jobs, as option B suggests. A GUI calendar program, as specified in option D, might work, but NTP is the Network Time Protocol, a protocol and like-named program for synchronizing clocks across a network. Thus, NTP isn’t the tool for the job, and option D is incorrect. For more information.
Answer is: E

You type echo $PROC, and the computer replies Go away. What does this mean

A. No currently running processes are associated with your shell, so you may log out without terminating them.
B. The remote computer PROC isn’t accepting connections; you should contact its administratorto correct the problem.
C. Your computer is handling too many processes; you must kill some of them to regaincontrol of the computer.
D. Your central processing unit (CPU) is defective and must be replaced as soonas possible.
E. You, one of your configuration files, or a program you’ve run has set the $PROC environmentvariable to Go away.

E. The echo command echoes what follows to standard output, and $PROC is an environmentvariable. Thus, echo $PROC displays the value of the $PROC environmentvariable, meaning that it must have been set to the specified value by you, one of yourconfiguration files, or a program you’ve run. Although many environment variables areset to particular values to convey information, $PROC isn’t a standard environment variablethat might be associated with information described in options A, B, C, and D.

Answer is: E

How does man display information by default on most Linux systems

A. Using a custom X-based application
B. Using the Firefox web browser
C. Using the info browser
D. Using the vi editor
E. Using the less pager

E. By default, man uses the less pager to display information on most Linux ystems, so option E is correct. Although an X-based version of man does exist (xman), thebasic man doesn’t use a custom X-based application (option A), nor does it use Firefox(option B) or the vi editor (option D). The info command and man are competingdocumentation systems, so option C is incorrect.

Answer is: E

Which of the following commands will number the lines in aleph.txt? (Select three.)

A. fmt aleph.txt
B. nl aleph.txt
C. cat -b aleph.txt
D. cat -n aleph.txt
E. od -nl aleph.txt

The nl command numbers lines, so it does this task without any specialoptions, and option B is correct. (Its options can fine-tune the way it numbers lines,
though.) The cat command can also number lines via its -b and -n options; -b numbersnon-blank lines, whereas -n numbers all lines (including blank lines). Thus optionsC and D are both correct. Neither the fmt command nor the od command will numberthe lines of the input file, so options A and E are both incorrect.

Answer is: B,C,D

Which of the following commands will print lines from the file world.txt that containmatches to changes and changed

A. grep change[ds] world.txt
B. sed change[d-s] world.txt
C. od "change'd|s'" world.txt
D. cat world.txt changes changed
E. find world.txt "change(d|s)"

The grep utility is used to find matching text within a file and print thoselines. It accepts regular expressions, which means you can place in brackets the twocharacters that differ in the words for which you’re looking. Thus option A is correct.The syntax for sed, od, cat, and find wouldn’t perform the specified task, so options Bthrough E are all incorrect.

Answer is: A

What is the surest way to run a program (say, myprog) that’s located in the current workingdirectory

A. Type ./ followed by the program name: ./myprog.
B. Type the program name alone: myprog.
C. Type run followed by the program name: run myprog.
D. Type /. followed by the program name: /.myprog.
E. Type the program name followed by an ampersand (&): myprog &.

The dot (.) character refers to the current working directory, and the slash (/) is adirectory separator. Thus preceding a program name by ./ unambiguously identifiesthe intention to run the program that’s stored in the current directory. Option B willrun the first instance of the program that’s found on the current path. Because pathsoften omit the current directory for security reasons, this option is likely to fail. Therun command isn’t a standard Linux command, so option C is unlikely to do anything,much less what the question specifies. Option D would be correct except thatit reverses the order of the two characters. The effect is to attempt to run the .myprogfile in the root (/) directory. This file probably doesn’t exist, and even if it did, it’s notthe file the question specifies should be run. Option E runs the first instance of myprogfound on the path, and additionally it runs the program in the background. (Chapter 2covers background execution in more detail.)

Answer is: A

#Test
You want to store the standard output of the ifconfig command in a text file (file.txt) for future reference, and you want to wipe out any existing data in the file. You do notwant to store standard error in this file. How can you accomplish these goals

A. ifconfig < file.txt
B. ifconfig » file.txt
C. ifconfig > file.txt
D. ifconfig | file.txt
E. ifconfig 2> file.txt

The > redirection operator stores a command’s standard output in a file, overwritingthe contents of any existing file by the specified name, so option C is correct.Option A specifies the standard input redirection so that ifconfig will take the contentsof file.txt as input. Option B is almost correct: the » redirection operatorredirects standard output, as requested, but it appends data to the specified file ratherthan overwriting it. Option D specifies a pipe; the output of ifconfig is sent throughthe file.txt program, if it exists. (Chances are it doesn’t, so you’d get a command notfound error message.) Option E redirects standard error, rather than standard output,to file.txt and so is incorrect.

Answer is: C

#Test
What command will remove duplicate lines from a sorted file
A. filter
B. trim
C. uniq
D. wc

Answer is: C

What command returns the first few lines of a given file
Answer is: head

What does the following command accomplish

کد: انتخاب همه

$ wc report.txt | tee wc
A. It launches the wc editor on both the report.txt and wc.txt files; each file opens in its own window.
B. It displays a count of the windows in which the report.txt file is displayed and shows that information in a new window called wc.
C. It creates a count of newlines, words, and bytes in the report.txt file and then displays a count of these statistics about the report it just generated.
D. It cleans up any memory leaks associated with the tee program’s use of the report .txt file.
E. It displays a count of newlines, words, and bytes in the report.txt file and copies that output to the wc file.

E. The wc command displays a count of newlines, words, and bytes in the specified file (report.txt). Piping this data through tee causes a copy of the output to be stored in the new file (wc in this example—you shouldn’t run this command in the same directory as the wc executable file!). Thus, option E is correct. Contrary to option A, wc is not an editor, and the remaining syntax wouldn’t cause two files to open in separate windows even if wc were an editor. Contrary to option B, wc doesn’t count windows or open a new window. Option C describes the effect of wc report | wc—that is, it overlooks the tee command. Contrary to option D, wc has nothing to do with cleaning up memory leaks, and tee doesn’t directly use the report.txt file. For more information, see Chapter 1, “Exploring Linux Command-Line Tools.”

Answer is: E

Which is true of source RPM packages

A. They consist of three files: an original source tarball, a patch file of changes, and a PGP signature indicating the authenticity of the package.
B. They require programming knowledge to rebuild.
C. They can sometimes be used to work around dependency problems with a binary package.
D. They are necessary to compile software for RPM-based distributions.
E. They always contain software that’s licensed under terms of the GPL.

C. Some dependencies result from dynamically linking binaries to libraries at compile time, and so they can be overcome by recompiling the software from a source RPM, so option C is correct. Option A describes Debian source packages, not RPM packages. Recompiling a source RPM requires only issuing an appropriate command, although you must also have appropriate compilers and libraries installed. Thus, option B is overly pessimistic. Source tarballs can also be used to compile software for RPM systems, although this results in none of RPM’s advantages. Thus, option D is overly restrictive. The RPM format doesn’t impose any licensing requirements, contrary to option E. For more information, see Chapter 2.

Answer is: C

Which of the following commands will install an RPM package file called theprogram-1.2.3-4.i386.rpm on a computer? (Select two.)

A. rpm -Uvh theprogram-1.2.3-4.i386.rpm
B. rpm -i theprogram-1.2.3-4.i386.rpm
C. rpm -U theprogram
D. rpm -e theprogram-1.2.3-4.i386.rpm
E. rpm -Vp theprogram-1.2.3-4.i386.rpm

A, B. The -Uvh parameter (option A) issues an upgrade command (which installs the program whether or not an earlier version is installed) and creates a series of hash marks to display the command’s progress. The -i parameter (option B) installs the program if it’s not already installed but causes no progress display. Option C uses a package name, not a complete filename, and so it will fail to install the package file. The -e option (option D) removes a package. Option E’s -Vp option verifies the package file but doesn’t install it.

Answer is: A,B

Which of the following commands is equivalent to kill 1234

A. kill -1 1234 or kill -s SIGHUP 1234
B. kill -2 1234 or kill -s SIGINT 1234
C. kill -3 1234 or kill -s SIGQUIT 1234
D. kill -9 1234 or kill -s SIGKILL 1234
E. kill -15 1234 or kill -s SIGTERM 1234

Answer is: E
منبع کانال:lpiclearn
تصویر برای ادامه کار و بالا رفتن کیفیت آموزش ها نیاز به حمایت مالی شما داریم پس لطفا از ما حمایت کنید
از اونجایی که برای جمع آوری و ترجمه و تالیف یک پست آموزشی زمان و زحمت زیادی صرف شده است.
لطفاً در صورت استفاده از این مطلب در سایت یا مقاله و ..... حتما با ذکر منبع و لینک برگشتی باشد.

مسلما این حمایت شما دوستان موجب پایداری اینگونه اثرها خواهد بود سربلند و پیروز باشین

ارسال پست

بازگشت به “lpic-1”