Richard Blum

LPIC-1 Linux Professional Institute Certification Study Guide


Скачать книгу

want to use GPG encryption for your emails on top of the encryption provided by SSH?

      A. The SSH tunnel reaches only as far as the first email server; GPG encrypts data on all of the computers all the way to or from your email correspondents.

      B. SSH encryption is notoriously poor for email, although it's perfectly adequate for login sessions; thus, adding GPG encryption improves security.

      C. SSH doesn't encrypt the headers of the email messages; GPG encrypts the headers to keep snoopers from learning your correspondents' identities.

      D. Using GPG guarantees that your email messages won't contain unwanted viruses or worms that might infect your correspondents' computers.

      E. Configured in this way, SSH will encrypt the email headers and bodies but not any attachments to your email.

      12. Which of the following ports are commonly used to retrieve email from an email server computer? (Select two.)

      A. 110

      B. 119

      C. 139

      D. 143

      E. 443

      13. You're experiencing sporadic problems with a Secure Shell (SSH) login server – sometimes users can log in and sometimes they can't. What might you try immediately after a failure to help diagnose this problem?

      A. On the server computer, type http://localhost:631 into a web browser to access the SSH configuration page and check its error subpage for error messages.

      B. Type diagnose sshd to run a diagnostic on the SSH server daemon (sshd).

      C. Type tail /var/log/messages to look for error messages from the server.

      D. Examine the /dev/ssh device file to look for error messages from the server.

      E. On the server computer, type sshd to view SSH's diagnostic messages.

      14. What is the function of the ∼/.profile file?

      A. It's the user configuration file for the ProFTP server.

      B. It's one of a user's bash startup scripts.

      C. It's the user configuration file for the ProFile file manager.

      D. Its presence tells tcsh to ignore file modes.

      E. It holds the user's encrypted password.

      15. You want your computer to remind you to get your car inspected in two years. What is the best way to do this among the specified options?

      A. Create a program that repeatedly checks the time and, when two years have passed, displays a message to get your car inspected.

      B. Type cal day month year, where day, month, and year specify the date of the future inspection, to have Linux run a program that you then specify on that date.

      C. Create a cron job that runs hourly. This job should check the date and, when the correct date comes up, use mail to notify you of the need for a car inspection.

      D. Use the NTP GUI calendar program to create an alarm for the specified date. The program will then display the message you enter at the specified date and time.

      E. Type at date, where date is a date specification. You can then specify a command, such as mail with appropriate options, to notify you of the need to get your car inspected.

      16. How would you configure a computer to use the computer whose IP address is 172.24.21.1 as a gateway for all network traffic that's not otherwise configured?

      A. gateway default 172.24.21.1

      B. gateway 172.24.21.1

      C. route gateway 172.24.21.1

      D. route add default gw 172.24.21.1

      E. gw 172.24.21.1

      17. What software can you use to drive a Braille display device? (Select two.)

      A. Emacspeak

      B. BRLTTY

      C. A 2.6.26 or later kernel

      D. GOK

      E. A framebuffer driver

      18. Which is true of source RPM packages?

      A. They consist of three files: an original source tarball, a patch file of changes, and a PGP signature indicating the authenticity of the package.

      B. They require programming knowledge to rebuild.

      C. They can sometimes be used to work around dependency problems with a binary package.

      D. They are necessary to compile software for RPM-based distributions.

      E. They always contain software that's licensed under terms of the GPL.

      19. Which utility should you use by itself to rename the file pumpkin.txt to lantern.txt?

      A. dd

      B. rm

      C. cp

      D. mv

      E. ln

      20. You want to run a lengthy scientific simulation program, called simbigbang, which doesn't require any user interaction; the program operates solely on disk files. If you don't want to tie up the shell from which you run the program, what should you type to run simbigbang in the background?

      A. start simbigbang

      B. simbigbang &

      C. bg simbigbang

      D. background simbigbang

      E. nice simbigbang

      21. Which of the following commands will install an RPM package file called theprogram-1.2.3-4.i386.rpm on a computer? (Select two.)

      A. rpm – Uvh theprogram-1.2.3-4.i386.rpm

      B. rpm – i theprogram-1.2.3-4.i386.rpm

      C. rpm – U theprogram

      D. rpm – e theprogram-1.2.3-4.i386.rpm

      E. rpm – Vp theprogram-1.2.3-4.i386.rpm

      22. What tool can diagnose and fix many common Linux filesystem problems?

      A. mkfs

      B. fsck

      C. chkdsk

      D. scandisk

      E. fdisk

      23. You've just installed MySQL, and you intend to use it to store information about the animals in a zoo, from the anteaters to the zebras. What command are you likely to use first, once you start MySQL?

      A. CREATE DATABASE animals;

      B. USE animals;

      C. CREATE TABLE animals;

      D. INSERT INTO animals;

      E. UPDATE animals;

      24.