Dump questions and answers of LPIC-1 101 Linux administrator for easy pass online| Page 14 -- Infibee
Home
You may like this!
66.
Which of the following commands are commonly used to create archive files? (Select two.)
  • A.
    restore
  • B.
    vi
  • C.
    tape
  • D.
    cpio
  • E.
    tar
  • Answer & Explanation
  • Report
Answer : [D, E]
Explanation :
The cpio and tar programs are common Linux archive-creation utilities, so options D and E are both correct. The restore command restores (but does not back up) data; its backup counterpart command is dump. Thus, option A is incorrect. The vi command launches a text editor; it’s not used to create archives, so option B is incorrect. There is no standard tape command in Linux, so option C is incorrect.
Report
Name Email  
67.
You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this?
  • A.
    tar uvf data79.tar
  • B.
    tar cvf data79.tar
  • C.
    tar xvf data79.tar
  • D.
    tar rvf data79.tar
  • E.
    tar tvf data79.tar
  • Answer & Explanation
  • Report
Answer : [E]
Explanation :
With the tar utility, the --list (t) command is used to read the archive and display its contents. The --verbose (v) option creates a verbose file listing, and --file (f) specifies the filename—data79.tar in this case. Option E uses all of these features. Options A, B, C, and D all substitute other commands for --list, which is required by the question.
Report
Name Email  
68.
You want to create a link from your home directory on your hard disk to a directory on a CD-ROM drive. Which of the following types of links might you use?
  • A.
    Only a symbolic link
  • B.
    Only a hard link
  • C.
    Either a symbolic or a hard link
  • D.
    Only a hard link, and then only if both directories use the same low-level filesystem
  • E.
    None of the above; such links aren’t possible under Linux
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Symbolic links can point across filesystems, so creating a symbolic link from one filesystem (in which your home directory resides) to another (on the CD-ROM) isn’t a problem, making option A correct. Hard links, as in options B, C, and D, are restricted to a single filesystem and so won’t work for the described purpose. Because symbolic links will work as described, option E is incorrect.
Report
Name Email  
69.
What command would you type (as root) to change the ownership of somefile.txt from ralph to tony?
  • A.
    chown ralph:tony somefile.txt
  • B.
    chmod somefile.txt tony
  • C.
    chown somefile.txt tony
  • D.
    chmod tony:ralph somefile.txt
  • E.
    chown tony somefile.txt
  • Answer & Explanation
  • Report
Answer : [E]
Explanation :
Option E is the correct command. Typing chown ralph:tony somefile.txt, as in option A, sets the owner of the file to ralph and the group to tony. The chmod command used in options B and D is used to change file permissions, not ownership. Option C reverses the order of the filename and the owner.
Report
Name Email  
70.
Typing ls -ld wonderjaye reveals a symbolic file mode of drwxr-xr-x. Which of the following are true? (Select two.)
  • A.
    wonderjaye is a symbolic link.
  • B.
    wonderjaye is an executable program.
  • C.
    wonderjaye is a directory.
  • D.
    wonderjaye has its SUID bit set.
  • E.
    wonderjaye may be read by all users of the system.
  • Answer & Explanation
  • Report
Answer : [C, E]
Explanation :
The d character that leads the mode indicates that the file is actually a directory (option C), and the r symbol in the r-x triplet at the end of the symbolic mode indicates that all users of the system have read access to the directory (option E). Symbolic links are denoted by leading l characters, which this mode lacks, so option A is incorrect. Although the x symbols usually denote executable program files, as specified in option B, in the case of directories this permission bit indicates that the directory’s contents may be searched; executing a directory is meaningless. SUID bits are indicated by an s character in place of the owner’s execute bit position in the symbolic mode. Since this position holds an x in this example, option D is incorrect.
Report
Name Email