Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESELPIC1 V4 Cap 7 Administracion de Sistemas Linux

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
LPIC1 V4 Cap 7 Administracion de Sistemas Linux

Descripción:
ADMINISTRACION DE SISTEMAS LINUX

Autor:
AVATAR
Sgos. Carrera Juan
(Otros tests del mismo autor)


Fecha de Creación:
16/05/2016

Categoría:
Test de conducir

Número preguntas: 20
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
1. Which of the following is a legal Linux username that will be accepted by useradd? A. larrythemoose B. 4sale C. PamJones D. Samuel_Bernard_Delaney_the_Fourth E. ted cho.
2. Why are groups important to the Linux user administration and security models? A. They can be used to provide a set of users with access to files without giving all users access to the files. B. They enable you to set a single login password for all users within a defined group. C. Users may assign file ownership to a group, thereby hiding their own creation of the file D. By deleting a group, you can quickly remove the accounts for all users in the group. E. They enable you to link together the account databases in a group of two or more com- puters, simplifying administration.
An administrator types chage -M 7 time. What is the effect of this command? A. The time account’s password must be changed at least once every seven days. B. All users must change their passwords at least once every seven days. C. All users are permitted to change their passwords at most seven times. D. The time account’s age is set to seven months.
4. What is wrong with the following /etc/passwd file entry? (Select two.) 4sally:x:1029:Sally Jones:/home/myhome:/bin/passwd A. The default shell is set to /bin/passwd, which is an invalid shell. B. The username is invalid; Linux usernames can’t begin with a number. C. The home directory doesn’t match the username. D. Either the UID or the GID field is missing. E. The encrypted password is missing.
5. You want sally, tom, and dale to be members of the group managers (GID 501). How would you edit the managers entry in /etc/group to accomplish this goal? A. managers:501:sally tom dale B. managers:501:sally:tom:dale C. managers:x:501:sally:tom:dale D. managers:x:501:dale,sally,tom E. managers:501:x:dale\sally\tom.
6. What types of files might you expect to find in /etc/skel? (Select three.) A. A copy of the /etc/shadow file B. An empty set of directories to encourage good file management practices C. A README or similar welcome file for new users D. A starting .bashrc file E. The RPM or Debian package management database.
7. What would a Linux system administrator type to remove the nemo account and its home directory? A. userdel nemo B. userdel -f nemo C. userdel -r nemo D. rm -r /home/nemo E. usermod -D nemo.
8. Which of the following system logging codes represents the highest priority? A. info B. warning C. crit D. debug E. emerg.
9. Which of the following configuration files does the logrotate program consult for its set- tings? A. /etc/logrotate.conf B. /usr/sbin/logrotate/logrotate.conf C. /usr/src/logrotate/logrotate.conf D. /etc/logrotate/.conf E. ~/.logrotate.
10. You want to create a log file entry noting that you’re manually shutting down the system to add a new network card. How might you create this log entry, just prior to using shutdown? A. dmesg -l “shutting down to add network card” B. syslog shutting down to add network card C. rsyslogd “shutting down to add network card” D. logger shutting down to add network card E. wall “shutting down to add network card” .
11. Your manager has asked that you configure logrotate to run on a regular, unattended basis. What utility/feature should you configure to make this possible? A. at B. logrotate.d C. cron D. inittab E. ntpd.
12. You’ve set your system (software) clock on a Linux-only computer to the correct time, and now you want to set the hardware clock to match. What command might you type to accomplish this goal? A. date --sethwclock B. ntpdate C. sysclock --tohc D. time --set –hw E. hwclock --utc --systohc.
13. As root, you type date 12110710. What will be the effect? A. The software clock will be set to 7:10 a.m. on December 11 of the current year. B. The software clock will be set to 12:11 p.m. on October 7 of the current year. C. The software clock will be set to 7:10 a.m. on November 12 of the current year. D. The software clock will be set to 12:11 p.m. on July 10 of the current year. E. The software clock will be set to July 10 in the year 1211.
14. What will be the effect of a computer having the following two lines in /etc/ntp.conf? server pool.ntp.org server tardis.example.org A. The local computer’s NTP server will poll a server in the public NTP server pool; the first server option overrides subsequent server options. B. The local computer’s NTP server will poll the tardis.example.org time server; the last server option overrides earlier server options. C. The local computer’s NTP server will poll both a server in the public NTP server pool and tardis.example.org and use whichever site provides the cleanest time data. D. The local computer’s NTP server will refuse to run because of a malformed server specification in /etc/ntp.conf. E. The local computer’s NTP server will poll a computer in the public NTP server pool but will fall back on tardis.example.org if and only if the public pool server is down. .
15. You’ve configured one computer (gateway.pangaea.edu) on your five-computer network as an NTP server that obtains its time signal from ntp.example.com. What computer(s) should your network’s other computers use as their time source(s)? A. You should consult a public NTP server list to locate the best server for you. B. Both gateway.pangaea.edu and ntp.example.com. C. Only ntp.example.com. D. Only gateway.pangaea.edu. E. None; NTP should be used on the Internet, not on small local networks.
16. Which of the following tasks are most likely to be handled by a cron job? (Select two.) A. Starting an important server when the computer boots B. Finding and deleting old temporary files C. Scripting supervised account creation D. Monitoring the status of servers and emailing a report to the superuser E. Sending files to a printer in an orderly manner.
17. Which of the following lines, if used in a user cron job, will run /usr/local/bin/cleanup twice a day? A. 15 7,19 * * * tbaker /usr/local/bin/cleanup B. 15 7,19 * * * /usr/local/bin/cleanup C. 15 */2 * * * tbaker /usr/local/bin/cleanup D. 15 */2 * * * /usr/local/bin/cleanup E. 2 * * * * /usr/local/bin/cleanup.
18. You’re installing Linux on a laptop computer. Which of the following programs might you want to add to ensure that log rotation is handled correctly? A. tempus B. anacron C. crontab D. ntpd E. syslog-ng.
19. What do the following commands accomplish? (The administrator presses Ctrl+D after typ- ing the second command.) # at teatime at> /usr/local/bin/system-maintenance A. Nothing; these commands aren’t valid. B. Nothing; teatime isn’t a valid option to at. C. Nothing; you may only type valid bash built-in commands at the at> prompt. D. Nothing; at requires you to pass it the name of a script, which teatime is not. E. The /usr/local/bin/system-maintenance program or script is run at 4:00 p.m.
20. How might you schedule a script to run once a day on a Linux computer? (Select two.) A. Place the script, or a link to it, in /etc/cron.daily. B. Use the at command to schedule the specified script to run on a daily basis at a time of your choosing. C. Create a user cron job that calls the specified script once a day at a time of your choos- ing, and install that cron job using crontab. D. Use run-parts to schedule the specified script to run on a daily basis. E. Type crontab -d scriptname, where scriptname is the name of your script .
Denunciar test Consentimiento Condiciones de uso