LPIC-2 Exam 201
Question No: 121 – (Topic 7)
Which of the following files will be looked for and used by GNU make, if one of them exists, unless a different file is specified on the command line when trying to compile software from source code? (Choose TWO correct answers.)
Question No: 122 – (Topic 7)
Which of the following are common backup systems used in Linux? (Choose TWO correct answers.)
Question No: 123 – (Topic 7)
When a makefile is included in a source code package, what are commonly defined targets in the file?
CFLAGS, CPPFLAGS, LIBS, LDFLAGS
clean, install, uninstall
PATHS, DESTDIR, LIBS, LDFLAGS
prefix, exec_prefix, bindir, mandir
Question No: 124 – (Topic 7)
A regular user, joe, has just run:
./configure amp;amp; make amp;amp; make install
to build and install a program. However, the installation fails. What could be done to install the program? (Choose TWO correct answers.)
Install the binaries manually with suinstall.
Run make install with root privileges.
Do not run ./configure in order to maintain the default configuration for correct installation.
Rerun ./configure with a -prefix option where the user has permissions to write.
Run make install_local to install into /usr/local/.
Topic 8, Exam Set Mix Questions A
Question No: 125 – (Topic 8)
When you back up only the files that have changed since the last backup, this is called a
Explanation: When you run a full backup, the files are marked as having been backed up (the archive attribute is cleared). When a file is created or changed, it is marked as ‘not backed up’ (the archive attribute is set). A differential backup backs up any files created or changed since the last full backup (the files marked as ‘not backed up’). It does not mark files as having been backed up (in other words, the archive attribute is not cleared).
Reference: http://www.raid-unix-mac-disk-datarecovery- service.com/diferential_backup.htm
A:A partial backup is not an actual backup type. It is just a description of backing up a few selected files.
C:A full backup backs up all files and marks them as having been backed up by clearing the archive attribute.
D:A copy backup backs up all files but does not mark them as having been backed up.
Question No: 126 – (Topic 8)
You are in charge of a domain. Your developers have asked that mirrors of certain sites be placed as actual directories off the default path. Specifically they have asked that the ftp.example-debian.org Debian tree should be mapped at /usr/local. Assume that ftp.example-debian.org does an NFS export of their site. What would be the correct entry in the /etc/auto.master file?
/usr/local/debian ro ftp.example-debian.org:/pub/debian
/usr/local/debian /etc/auto.debian with /etc/auto.debian containing debian- ro,soft,intr:ftp.example-debian.org:/pub/debian
/usr/local/debian :etc/auto.debian with /etc/auto.debian containing debian:rw,soft,intr:ftp.example-debian::/pub/debian
/etc/auto.debian with /etc/auto.debian containing debian-ro,soft,intr:ftp.example- debian.org:/pub/debian
/etc/auto.debian with /etc/auto.debian containing debian:rw,soft,intr:ftp.example- debian.org::/pub/debian
Explanation: Autofs uses the automount daemon to manage your mount points by only mounting them dynamically when they are accessed. Autofs consults the master map configuration file /etc/auto.master to determine which mount points are defined. It then starts an automount process with the appropriate parameters for each mount point. Each line in the master map defines a mount point and a separate map file that defines the filesystems to be mounted under this mount point.
In this question, the /etc/auto.master file would contain the line “/usr/local/debian
/etc/auto.debian”. /usr/local/debian is the mount point on the local machine.
/etc/auto.debian is the name of the map file that defines what should be mounted at the
The /etc/auto.debian file should contain “debian-ro,soft,intr:ftp.example- debian.org:/pub/debian”. This contains the mount point (debian), followed by some mount options (ro,soft,intr) followed by the directory to be mounted in the form of hostname:directory (ftp.example-debian.org:/pub/debian).
Reference: http://www.redhat.com/docs/manuals/linux/RHL-7.3-Manual/custom-guide/s1- nfs-mount.html
A:There is no map file defined in this line.
C:The syntax is wrong. usr/local/debian :etc/auto.debian should be /usr/local/debian
D:There is no mount point (usr/local/debian) defined in this answer.
E:There is no mount point (usr/local/debian) defined in this answer.
Question No: 127 CORRECT TEXT – (Topic 8)
You want to create a compressed backup of the users home directories so you can issue the command gzip /home/* backup.gz but it fails. The reason it failed is that gzip will only compress one at a time.
Explanation: The command: gzip lt;filenamegt; backup.gz will compress lt;filenamegt; and rename it to backup.gz. This only works with a single file. To compress multiple files into one file (archive), you should use the tar utility with the z option. Tar can archive multiple files into a single file (archive). The z option causes tar to use gzip to compress the files first.
Question No: 128 – (Topic 8)
You have been given the job of administering a new server. It houses a database used by the sales people. This information is changed frequently and is not duplicated anywhere else. What should you do to ensure that this information is not lost?
Create a backup strategy that includes backing up this information at least daily.
Prepare a proposal to purchase a backup server.
Recommend that the server be made part of a cluster.
Install an additional hard drive in the server.
Explanation: To ensure that data isn’t lost, it should be backed up. The question states that the information is changed frequently, so it should be backed up frequently.
B:A backup server usually runs backup software. This may not be necessary and is no use without a backup strategy.
C:Clustering the server would require additional servers and would be very expensive. Furthermore, depending on the type of cluster, you may only have one set of hard disks containing the information.
D:Installing an additional hard drive would only work if the data was regularly backed up to the additional hard drive. However, if the server failed, the data would still be unavailable.
Question No: 129 – (Topic 8)
You suspect malicious behavior by one of your console session users. Which of the following methods could be used so that you will be notified whenever the suspect user is logged in? The method should not tip off the suspect user or affect overall system integrity or performance to a noticeable degree.
Pipe the btmp file to a filter and launch a notification script if the user logs on.
Insert into the suspect user’s profile a script to notify you.
Configure syslogd to pipe all auth log messages to a script which checks for the suspect user and then notifies you via email.
Modify the user’s login script to inform you of his presence and then exec itself with the
Explanation: Syslogd (the system log daemon) can be configured via the syslog.conf file. This file specifies where log entries should be written. You can configure syslogd to send authentication log messages to a script which checks for the suspect user and then notifies you via email.
A:The btmp file is used to record failed logon attempts. This won’t work because the user is able to log on successfully.
B:Inserting a script into the users profile file won’t work because the user may notice the script if he/she looks at the profile file.
D:Modifying the users login script won’t work because the user may notice the modification if he/she looks at the script.
Question No: 130 – (Topic 8)
An ext2 filesystem is used by an application that frequently reads a large number of small files. Performance can be improved by mounting the filesystem with the option.
Explanation: Linux records information about when files were created and last modified as well as when it was last accessed. There is a cost associated with recording the last access time. The ext2 file system of Linux has an attribute that allows the super-user to mark individual files such that their last access time is not recorded. This may lead to significant performance improvements on often accessed frequently changing files.
A:The atime option will record the last access time for each file which may degrade system performance.
C:Noexec is a mount flag to not allow any executables to be run from the filesystem. This won’t work since the files are likely to be text files.
D:Nosuid is a mount flag to disallow any setuid binaries on the filesystem. This will not improve system performance.
E:The sync command is used to write the buffers to disk. This will not improve system performance.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|