New Questions 8
To prevent a specific user from scheduling tasks with at, what should the administrator do?
A. Add the specific user to /etc/at.allow file.
B. Add the specific user to [deny] section in the /etc/atd.conf file.
C. Add the specific user to /etc/at.deny file.
D. Add the specific user to nojobs group.
E. Run the following: atd --deny [user].
Answer: C
New Questions 9
Why is the correct configuration of a system's time zone important?
A. Because the conversion of Unix timestamps to local time relies on the time zone configuration.
B. Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.
C. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.
D. Because NTP chooses servers nearby based on the configured time zone.
Answer: A
New Questions 10
Which of the following commands lists all defined variables and functions within Bash?
A. env
B. set
C. env -a
D. echo $ENV
Answer: B
New Questions 11
Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)
A. 2001:db8::15 www.example.com www
B. www.example.com www 203.0.13.15
C. 203.0.113.15 www.example.com www
D. www.example.com,www 203.0.13.15,2001:db8::15
E. 2003.0.113.15,2001:db8::15 www.example.com www
Answer: A,C
New Questions 12
Which of the following commands is used to rotate, compress, and mail system logs?
A. rotatelog
B. striplog
C. syslogd --rotate
D. logrotate
E. logger
Answer: D
New Questions 13
What is the purpose of the nsswitch.conf file?
A. It is used to configure where the C library looks for system information such as host names and user passwords.
B. It is used to configure network protocol port numbers such as for HTTP or SMTP.
C. It is used to configure LDAP authentication services for the local system.
D. It is used to configure which network services will be turned on during the next system boot.
Answer: A
New Questions 14
What is a purpose of an SSH host key?
A. It must be sent by any SSH client in addition to a user key in order to identify the client's host.
B. It provides the server's identity information to connecting SSH clients.
C. It is the root key by which all user SSH keys must be signed.
D. It authenticates any user that logs into a remote machine from the key's host.
E. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts.
Answer: B
New Questions 15
CORRECT TEXTWhich command is used to set the hostname of the local system? (Specify ONLY the command without any path or parameters.)
Answer: hostname
New Questions 16
Which of the following programs can be used to determine the routing path to a given destination?
A. dig
B. netstat
C. ping
D. route
E. traceroute
Answer: E
New Questions 17
Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)
A. The user issuing the command must be in the group script.
B. The script file must be found in the $PATH.
C. The script file must have the executable permission bit set.
D. The script must begin with a shebang-line (#!) that points to the correct interpreter.
E. The file system on which the script resides must be mounted with the option scripts.
Answer: B,C,D
100% Renovate LPI 102-400 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/102-400-dumps.html (New Q&As)