LPIC-2 Exam 201
Question No: 171 CORRECT TEXT – (Topic 8)
A dumb terminal on the serial line /dev/ttyE0 is losing characters when receiving large blocks of data from the server. Suspecting a flow control problem, you wish to
examine the complete list of settings for this line on the server. Please type the one command that completes this command line:
Explanation: The stty command works on the current terminal by default, but by using the input redirection (“lt;”) feature of the shell, we can have stty manipulate any tty device. The
-a option is used to display all configuration settings.
Question No: 172 – (Topic 8)
You attempt to log out but receive an error message that you cannot. When you issue the jobs command, you see a process that is running in the background. How can you fix thus so that you can logout?
Issue the kill command with the PID of each running command of the pipeline as an argument.
Issue the kill command with the job number as an argument.
Issue the kill command with the PID of the last command as an argument.
Issue the kill command without any arguments.
Explanation: The kill command is used to send a signal to kill one or more process IDs. You must own the process or be a privileged user, otherwise the kill command will be ignored.
A:You need to end the background process. You know its process ID; therefore you should issue the process ID with the kill command to kill the appropriate process.
B:You cannot use the job number with the kill command. You should use the process ID or process name.
D:The kill command won’t work if it doesn’t know what process you want it to kill.
Question No: 173 – (Topic 8)
You are covering for another system administrator and one of the users asks you to restore a file for him. You locate the correct tarfile by checking the backup log but you do not know how the directory structure was stored. What command can you use to determine this?
tar fx tarfile dirname
tar tvf tarfile filename
tar ctf tarfile
tar tvf tarfile
Explanation: You can list the contents of a ‘tarball’ with the tar tvf tarfile command. The t option is used to list the files and directories. The v option runs the command in verbose mode. The f option allows you to specify the name of the tarball (a tarball is a common name for an archive created with the tar utility) with the f lt;filenamegt; option.
A:The syntax of this command is wrong. The x must come before the f. This also does not list the contents of the file.
B:This command would list the path to ‘filename’. Although this would be required information to restore a file, the question states that you want to view the directory structure.
C:The c option is used to create a tarball which isn’t required in this question.
Question No: 174 CORRECT TEXT – (Topic 8)
The top utility can be used to change the priority of a running process? Another utility that can also be used to change priority is ?
Question No: 175 – (Topic 8)
While checking the logfiles on your log server, you notice that all client machines are showing up by IP address rather than by hostname, although DNS is configured and running. How would you ensure that host entries show by name rather than by IP?
Restart named and then syslogd on the log server.
Add the central logging server to all inbound logging hosts’ /etc/hosts.
Recompile syslogd to add remote logging support.
Restart syslogd on the inbound logging clients to force DNS resolution.
Add all inbound logging hosts to /etc/hosts on the log server, then restart syslogd.
Explanation: I don’t know why the DNS resolution isn’t working for the syslog daemon. It could be that there are lots of log entries and that the DNS requests are timing out.
Therefore, adding the inbound logging hosts to /etc/hosts on the log server will enable local hostname resolution, thus negating the need to use DNS.
A:The question states that DNS is configured and running and therefore does not need to be restarted.
B:This won’t work. The clients are able to contact the logging server. Adding the central logging server to all inbound logging hosts’ /etc/hosts files won’t affect how the logging server records the log entries.
C:Remote logging support is already enabled because the IP addresses are being logged.
D:DNS resolution needs to be forced on the server, not the clients.
Question No: 176 – (Topic 8)
You have recently decided to convert from using a monolithic kernel to using a modular kernel. You have made the appropriate changes in your kernel configuration. Next you wish to compile your new kernel and modules and copy the modules to their proper location.
What would you type to do this?
make modules modules_install
make bzImage modules modules_install
make mrproper modules modules_install
make dep clean modules modules_install
make dep clean bzImage modules modules_install
Explanation: This command consists of multiple make commands on the same line: The first part of the command, make dep, actually takes your configuration and builds the corresponding dependency tree. This process determines what gets compiled and what doesn#39;t.
The next step, make clean, erase all previous traces of a compilation so as to avoid any mistakes in which version of a feature gets tied into the kernel.
The next step, make bzImage does the full compilation of the kernel.
The next two steps, make modules and make modules_install will compile the modules and copy them to their appropriate location.
A:This command will compile the modules, but not the kernel.
B:You need the make dep command to build the dependency tree.
C:Make mrproper is similar to make clean except that it doesn’t delete any binaries. However, there is no kernel image specified in this command.
D:There is no kernel image specified in this command.
Question No: 177 – (Topic 8)
As a system administrator, you are instructed to backup all the users home directories. Which of the following commands would accomplish this?
tar rf usersbkup home/*
tar cf usersbkup home/*
tar cbf usersbkup home/*
tar rvf usersbkup home/*
Explanation: The c option used with the tar command is used to create an archive. The f
lt;filenamegt; option allows you to specify a filename.
A:The r option is used to append the files to an existing archive.
C:The b option is used to specify a block size. As no block size is specified, this answer is incorrect.
D:The r option is used to append the files to an existing archive.
Question No: 178 – (Topic 8)
What is wrong with the following command?
tar cvfb //dev/tape 20
You cannot use the c option with the b option.
The correct command should be tar -cvfb /dev/tape20.
The arguments are not in the same order as the corresponding modifiers.
The files to be backed up have not been specified.
Explanation: The command should read tar cvfb /dev/tape 20 / . The letters c, v, f and b are the ‘modifiers’. The arguments are the options for the modifiers and should be in the same order as the modifiers. The c modifier is to create an archive. The v modifier is for verbose mode. The f modifier specifies the name of the tar file and so needs an ‘argument’ (in this case a tape drive called /dev/tape). The b modifier is used to set a block size and so needs an ‘argument’ (in this case 20). Note that the arguments following the modifiers are in the same order as the modifier. The “f” precedes the “b” modifier so the arguments have the device before the blocking factor. The arguments must be in the same order as the modifiers, which can sometimes cause a little confusion.
After the modifiers and arguments have been entered, you need to enter the files to be backed up (in this case the root directory ‘/’).
A:You can use the c option with the b option.
B:You don’t need a hyphen (-) when specifying tar options. Furthermore, the files to be backed up haven’t been specified.
D:The files to be backed up have been entered (the root partition ‘/’), but they are entered in the wrong place.
Question No: 179 – (Topic 8)
A single machine acts as a mail server, web server, and gateway to the Internet for the rest of your internal network. Why shouldn’t you also use this machine as your central log host?
It may reduce web server performance.
The remote logging may have a negative impact on network performance.
If the web server crashed, log messages from other hosts would be lost.
Under high load, syslogd on the web server may start rejecting messages, and clients would try to log the error, creating a recursive loop between the clients and the log host.
If the security of your server is compromised, an attacker would have access to log information from all your hosts.
Explanation: You are running three services that connect directly to the Internet (mail server, web server and gateway). This in itself poses a security risk. The logs will contain a lot of information that an attacker would be able to access if the attacker gained access to your system.
A:The logging may have a minimal effect on the web server. This is not as much a problem as the security risk in answer E.
B:It is unlikely that the remote logging will have any negative impact on the network performance.
C:If the web server crashed you may not be able to access the logs. However, this is not as much a problem as the security risk in answer E.
D:This just wouldn’t happen.
Question No: 180 – (Topic 8)
You have been asked by your management to come up with a backup solution that covers not only data loss, but also situations where the entire system, or building, is destroyed.
Your solution should also protect against data theft. Which of the following plans provides the most secure redundant backup and storage solution?
->Once a week, all of your systems receive a full system backup to tape.
Those tapes are stored in a secured location in your facility.
->Once a week, all of your systems receive an incremental system backup to tape.
Those tapes are stored in a secured location in remote facility.
->Every night, all of your systems receive an incremental system backup to tape.
Those tapes are stored in a secured location in a remote facility.
->Every night, all of your systems receive an incremental system backup to tape, and once a month, all systems receive a full backup to tape.
Those tapes are stored in a secured remote facility.
Twice a month, all of your systems receive a full backup to CD. The tapes are stored in a secured remote facility.
The CD’s are stored locally.
A. Once a week, all of your systems receive a full backup to tape.
Explanation: Your backup strategy should allow for backups to occur as often as possible. Daily backups are recommended but this isn’t always possible because the amount of time a full backup would take. For this reason, daily incremental backups are recommended. An incremental backup will only backup the files that have been created or changed since the last backup, thus saving time and backup media space.
You should however perform full backups on a regular basis (monthly is recommended). This will allow the easy restoration of a failed system.
The backup tapes should be stored in a secured remote facility, in case the building is destroyed.
A:If you back up the files once a week, you could lose up to one week’s data. For this reason, daily backups are recommended.
B:If you back up the files once a week, you could lose up to one week’s data. For this reason, daily backups are recommended.
C:You should perform full backups on a regular basis (monthly is recommended). This will allow the easy restoration of a failed system.
E:If you back up the files once a week, you could lose up to one week’s data. For this reason, daily backups are recommended.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|