LPIC-2 Exam 201
Question No: 161 – (Topic 8)
On a system with separate partitions for /, /usr, /var, /tmp, which filesystem[s] can safely be mounted read-only?
/usr, /, /tmp
Explanation: The /usr partition contains common executables and documents such as man pages (help files), all of which should not be changed by users. Therefore, this partition should be mounted as read only.
Reference: http://www.redhat.com/docs/manuals/linux/RHL-6.0-Manual/install- guide/manual/doc084.html
A:The /var (variable) partition is used for data that frequently changes such as log files and therefore cannot be read only.
B:The /var (variable) partition is used for data that frequently changes such as log files and therefore cannot be read only.
C:The /tmp (temporary) partition is used to store temporary files and therefore cannot be read only.
E:The /tmp (temporary) partition is used to store temporary files and therefore cannot be read only.
Question No: 162 – (Topic 8)
You need to search the entire directory structure to locate a specific file. How could you do this and still be able to run other commands while the find command is still searching for you file?
find / -name filename amp;
find / -name filename
bg find / -name filename
amp;find / -name filename amp;
Explanation: The find command is used to locate files. / is the root directory, so searching from / will search the entire directory tree. The -name lt;filenamegt; enables you to search for a file named lt;filenamegt;. The ampersand character (amp;) is used to return control of the shell returning you to the command prompt, without have to wait for the command to execute.
B:With no ampersand (amp;) following the command, you will not be able to run other commands until the find command has completed its search.
C:The bg command is used to run a suspended job in the background if job control is enabled. However, the program or command would have to started and then suspended for this to work.
D:The ampersand (amp;) must follow the command, not precede it.
Question No: 163 – (Topic 8)
After installing a package using dpkg, you find that the package manager tools no longer function. You isolate the problem to a broken library and you have a copy of the fixed library in a Debian .deb file. How can you extract files from a .deb file without using the Debian package manager?
->deb packages are compressed tar files with custom scripts.
Use GNU ‘tar’ to extract the file.
->deb packages are redhat (rpm) packages with different fields.
Use ‘rpm’ to extract the file.
->deb packages are simply gziped cpio files.
Use ‘gunzip’ to decompress the package and then use ‘cpio’ to extract the file. Use ‘ar’ to extract the data member and then use GNU ‘tar’ to extract the file.
deb packages use a proprietary format and the file cannot be extracted without specialized tools.
deb packages are ar archives with a special magic number.
Explanation: Debian archive (.deb) files can be parsed and manipulated by the utility ar. The precise contents of Debian archive files changed since Debian 0.93. The new contents are understood by versions of the primary package tool, dpkg, later than 0.93.76, and is described in the quot;debquot;(5) man page. The old format is described in quot;deb-oldquot;(5).
Using the command ar -t foo_VVV-RRR.deb, you’ll see that a Debian archive file contains these members:
->debian-binary: Contains one or more lines; currently it contains only one line giving
the version number (2.0) of the Debian package format.
->control.tar.gz: A compressed (gzip#39;d) tar file which contains the Debian control files for this package. (Confusingly, one of these files, and the only one which is required, is itself named control.)
->data.tar.gz: A compressed (gzip#39;d) tar file which contains the executables, libraries, documentation, etc., associated with this package. In other words, this component is the filesystem data part of a Debian package.
You can extract files from the .tar.gz files using the ‘tar’ utility.
A:You must first use the ‘ar’ utility to open the .deb file. Then you can use ‘tar’ to extract the required files.
B:.deb files are not rpm (redhat package manager) files, and therefore cannot be opened with the rpm utility.
C:.deb packages are not gziped cpio files, and therefore cannot be opened with gunzip and cpio.
D:.deb packages can be opened with the ‘ar’ utility; therefore, specialist tools are not required.
Question No: 164 – (Topic 8)
After typing in a new command and pressing enter, you receive an error message indicating incorrect syntax. This error message originated from?
The operating system.
Explanation: When you run a ‘command’ you are actually instructing the shell to run a program. If the shell can find the program, it will run it. The shell knows how to start the program, but it doesn’t know the syntax of the program/command. If you get an error saying ‘incorrect syntax’, the error will be coming from the program.
A:The shell knows how to start the program, but it doesn’t know the syntax of the program/command. A shell error message would be for example, ‘lt;commandgt;: Command not found.’.
B:The operating system runs the shell. It doesn’t know about specific commands.
D:The kernel is effectively the operating system. It doesn’t know about specific commands.
Question No: 165 – (Topic 8)
What is the usable disk space of a RAID 5 array of five 18 GB drives with one drive dedicated as a spare?
Explanation: The question states that you have 5 18GB drives, but one is dedicated as a spare. Therefore, you have the use of 4 drives which equals 72GB. When using RAID 5, parity data is written across the disks, using the equivalent of one disk’s space (18GB).
Therefore, the total useable space is 72 – 18 = 54GB.
A:The total usable space is 54GB, not 18GB.
B:The total usable space is 54GB, not 34GB.
D: The equivalent of one drive is used for parity. Therefore, the total useable space is 72 – 18 = 54GB, not 72GB.
E: One drive is spare and the equivalent of one drive is used for parity. Therefore, the total useable space is 72 – 18 = 54GB, not 90GB.
Question No: 166 – (Topic 8)
You have installed a new application but when you type in the command to start it you get the error message:
Command not found
What do you need to do to fix this problem?
Add the directory containing the application to your path.
Specify the directory’s name whenever you run the application.
Verify that the execute permission has been applied to the command.
Give everyone read, write and execute permissions to the application’s directory.
Explanation: One important environment variable is PATH, a list of directories separated by colons (#39;:#39;). These directories are searched through to find commands. If you try to
invoke command #39;foo#39;, all the directories in PATH (in that order) are searched for an executable file #39;foo#39; (one with x-bit on). If a file is found, it is executed.
B:It is not necessary to specify the directory’s name, if the directory is in the path.
C:If you didn’t have execute permission, you would get a permission denied error.
D:It is not necessary to give everyone these permissions. Users shouldn’t have write access to an application directory.
Question No: 167 CORRECT TEXT – (Topic 8)
What key combination can you press to suspend a running job and place it in the background?
Explanation: You can suspend a currently running job by using the Ctrl z keystroke. This will stop the job, but it won’t end it. The job will be available to be resumed. Note: you can only stop jobs that were started in your current shell.
Question No: 168 – (Topic 8)
You maintain daily backups of a large file, as well as calculating an MD5 checksum with md5sum. When verifying the contents of one such backup, you notice that the new checksum is different from the previous one by only one byte. What does this tell you about the contents of the file?
A single character in the original file has been modified.
1/32nd of the original file has been modified.
1/128th of the original file has been modified.
It tells you that the original file has been modified.
The contents of the file are in reverse order from the original.
Explanation: The MD5 (Message Digest number 5) value for a file is a 128-bit value similar to a checksum. This value is calculated according to the contents of a file. If a file has changed, the MD5/checksum value will be different.
A:A different checksum means that the file has changed. However, it offers no indication of how much of the file has changed.
B:A different checksum means that the file has changed. However, it offers no indication of how much of the file has changed.
C:A different checksum means that the file has changed. However, it offers no indication of how much of the file has changed.
E:A different checksum means that the file has changed. However, it offers no indication of how much of the file has changed.
Question No: 169 – (Topic 8)
Which of the following environment variables determines your working directory at the completion of a successful login?
Explanation: The HOME environment variable determines your working directory when
you log on. This is typically /home/lt;usernamegt; for a normal user account or the root directory (/) for the root user. The HOME environment variable also determines the directory you will be taken to if you enter the ‘cd’ command with no arguments.
B: The BASH_ENV variable is used for non-interactive shells. It does not determine your working directory when you log on.
C:The PWD variable contains the current working directory. It does not determine your working directory when you log on. The ‘pwd’ command is used to display the full path to your current directory.
D:The BLENDERDIR variable is used with a piece of software named ‘Blender’. It does not determine your working directory when you log on.
Question No: 170 CORRECT TEXT – (Topic 8)
Many factors are taken into account when planning a backup strategy. The one most important one is how often does the file .
Explanation: The frequency of a file changing will determine the frequency of your backup. If the file changes often, you will need to back up the file often, otherwise the backed up version of the file will be an old version.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|