Linux Essentials Certification Exam LPI 010-150 Test

80 Questions

Settings
Please wait...
Linux Essentials Certification Exam LPI 010-150 Test

Those beginning their Linux careers may find the Linux Essentials certification an excellent place to start before jumping into the more advanced LPIC certifications. Linux Essentials cover necessary skills, such as command-line editing and the Linux operating system. This quiz will give you a chance to revise for the exam. All the best!


Questions and Answers
  • 1. 
    • A. 

      Whoami

    • B. 

      Isgroup

    • C. 

      Who

    • D. 

      Id

  • 2. 
    Which of the following can be used to access the command line?
    • A. 

      BIOS

    • B. 

      Terminal

    • C. 

      XWindow

    • D. 

      Firefox

    • E. 

      Xargs

  • 3. 
    • A. 

      Touch newfile

    • B. 

      Create newfile

    • C. 

      Ls newfile

    • D. 

      Rmdir newdirectory

    • E. 

      Mkdir newdirectory

  • 4. 
    • A. 

      Cd /home

    • B. 

      Cd ~

    • C. 

      Cd ..

    • D. 

      Cd

    • E. 

      Cd /

  • 5. 
    Which option will cause the echo command NOT to output a trailing newline?
    • A. 

      -e

    • B. 

      -p

    • C. 

      -n

    • D. 

      -s

  • 6. 
    • A. 

      Mv ~/vacation/2011 ~/summer-vacation

    • B. 

      Move -R ~/summer-vacation ~/vacation/2011

    • C. 

      Mv /home/summer-vacation /home/vacation/2011

    • D. 

      Mv ~/summer-vacation ~/vacation/2011

    • E. 

      Mv -R ~/summer-vacation ~/vacation/2011

  • 7. 
    Which of the following commands can be used to create a file?
    • A. 

      Touch

    • B. 

      Build

    • C. 

      Nico

    • D. 

      Create

    • E. 

      Mkfile

  • 8. 
    Which function does a shell program serve?
    • A. 

      It provides a graphical environment

    • B. 

      It is responsible for establishing a connection to another computer

    • C. 

      It receives user commands and executes them

    • D. 

      It is responsible for logging a user into the system

  • 9. 
    How could one search for the file foo.txt under the directory /home?
    • A. 

      Search /home -file foo.txt

    • B. 

      Search /home foo.txt

    • C. 

      Find /home -file foo.txt

    • D. 

      Find /home -name foo.txt

    • E. 

      Find /home foo.txt

  • 10. 
    Which of the following is a Linux based operating system for use on mobile devices?
    • A. 

      IOS

    • B. 

      CentOS

    • C. 

      Android

    • D. 

      Debian

  • 11. 
    Which command will display running process information in realtime?
    • A. 

      Top

    • B. 

      Show current

    • C. 

      Ps current

    • D. 

      Process

  • 12. 
    Which of the following Linux distributions use the dpkg package management system? (Choose two correct answers)
    • A. 

      Suse

    • B. 

      Red Hat

    • C. 

      Debian

    • D. 

      Ubuntu

    • E. 

      Mandriva

  • 13. 
    • A. 

      \ (backslash)

    • B. 

      . (dot)

    • C. 

      - (minus)

    • D. 

      _ (underscore)

  • 14. 
    • A. 

      Actdat='date'

    • B. 

      Set actdat='date'

    • C. 

      Date | acdat

    • D. 

      Date > $actdat

    • E. 

      Actdat=date

  • 15. 
    • A. 

      Ln -sys /home/user/foo /user/bin/foo

    • B. 

      Ln -s /user/bin/foo /home/user/foo

    • C. 

      Ln /home/user/foo /user/bin/foo

    • D. 

      Ln /user/bin/foo /home/user/foo

    • E. 

      Ln --symlink /home/user/foo /user/bin/foo

  • 16. 
    Which of the following files holds the definition of the local user accounts?
    • A. 

      /etc/secret

    • B. 

      /etc/users

    • C. 

      /etc/passwd

    • D. 

      /etc/id

    • E. 

      /etc/home

  • 17. 
    What is the output of the following command?tail -n 20 test.txt
    • A. 

      The first 20 lines of test.txt

    • B. 

      The last 20 lines of test.txt omitting the black lines

    • C. 

      The last 20 lines of test.txt with line numbers

    • D. 

      The last 20 lines of test.txt including the black lines

  • 18. 
    • A. 

      Command>2>file &1>/dev/null

    • B. 

      Command /dev/null

    • C. 

      Command>2>discard-error>file

    • D. 

      Command> /dev/null 2&>1 output

    • E. 

      Command> file2>/dev/null

  • 19. 
    • A. 

      It is the sticky bit that causes all commands in this directory to be launched as a root.

    • B. 

      It means that even though the directory is global writable only the owner can delete their own files

    • C. 

      It makes the directory accessible for everybody

    • D. 

      It indicates that this directory contains only temporary files that may be deleted

    • E. 

      It is a temporary bit that prevents launching commands in this directory

    • F. 

      Option 6

  • 20. 
    After installing a new package, in which directory are you most likely find its configuration file?
    • A. 

      /lib

    • B. 

      /conf

    • C. 

      /etc

    • D. 

      /usr

    • E. 

      /opt

  • 21. 
    • A. 

      The personal settings of root are in this directory

    • B. 

      The files from the directory are copied to the home directory of the new user when starting the system

    • C. 

      The files from the directory are copied to the home directory of the new user when the account is created

    • D. 

      The directory contains a default set of configuration files used by the useradd command

    • E. 

      The directory contains the global settings for the Linux system

  • 22. 
    Which of the following file systems is most commonly used for Linux distributions?
    • A. 

      HFS+

    • B. 

      Ext4

    • C. 

      FAT32

    • D. 

      NTFS

  • 23. 
    When a new user is added, where does the user ID get stored?
    • A. 

      /etc/users

    • B. 

      /etc/realm

    • C. 

      /etc/pass

    • D. 

      /etc/shpasswd

    • E. 

      /etc/passwd

  • 24. 
    • A. 

      All passwords can be decrypted using the system administrator's master password

    • B. 

      Passwords may never start with a non-letter

    • C. 

      Users cannot change their password once it has been set

    • D. 

      Passwords are only stored in encrypted form

    • E. 

      Passwords may be at most six characters long

  • 25. 
    Which command lists all files in the current directory that starts with a capital letter?
    • A. 

      Ls [A-Z]*

    • B. 

      Ls A-Z

    • C. 

      Ls A-Z*

    • D. 

      Ls --upercasefiles

    • E. 

      Ls -uppercase-files

  • 26. 
    • A. 

      The Linux Advanced Mode Programming Interface which gives advanced capabilities to application developers

    • B. 

      The bus ID of an attached USB device that emits light

    • C. 

      Short for Lightweight Access Management Protocol which synchronizes permission in a network

    • D. 

      The combination of Linux, Apache, MySQL, and PHP and other programming languages

    • E. 

      Short for lamport-clock which is important in distributed network computing

  • 27. 
    • A. 

      The r bit is set

    • B. 

      The file must end with .sh

    • C. 

      The file line starts with #!/bin/bash

    • D. 

      /bin/bash has to be run in debug mode

    • E. 

      Scripts are never executable files

  • 28. 
    Which is a suitable command to find the next appearance of the word hidden in a man page being viewed from the command line?
    • A. 

      Find hidden

    • B. 

      /? hidden

    • C. 

      CTRL-F hidden

    • D. 

      /hidden

  • 29. 
    While deleting all files beginning with the letter a there was still the file Access.txt left. Assuming that it had the correct ownership, why was it not deleted?
    • A. 

      Files with extensions need a different treatment

    • B. 

      Rm had to be called with the option -R to delete all files

    • C. 

      The file Access.txt was probably opened by another application

    • D. 

      The file Access.txt was hidden

    • E. 

      Linux file names are case sensitive

  • 30. 
    • A. 

      Because, if data.txt is empty now, it must have been empty before

    • B. 

      Because sort cannot sort text files, only binary files

    • C. 

      Because sort detects that both files are the same

    • D. 

      Because the file gets truncated before the sort is executed

  • 31. 
    • A. 

      Grep -v fred data_file

    • B. 

      Grep '[f]red' data_file

    • C. 

      Egrep fred data_file

    • D. 

      Grep '[Ff]red' data_file

    • E. 

      Grep -i fred data_file

  • 32. 
    Which of the following statements may be used to access the second command line argument to a script?
    • A. 

      "ARG$2"

    • B. 

      $1

    • C. 

      "$2"

    • D. 

      "$1"

    • E. 

      '$2'

  • 33. 
    Which of the following commands is used to lookup the current IP address of a system?
    • A. 

      Less/proc/net/ipconfig

    • B. 

      Ifconfig

    • C. 

      Showip

    • D. 

      Ipconfig

    • E. 

      Sysinfo | grep ipaddress

  • 34. 
    Which of the following will change the group that is associated with a file?
    • A. 

      Chmod

    • B. 

      Chmod -w

    • C. 

      Chown

    • D. 

      Ls -g

  • 35. 
    The following file is found in which system file?root:x:0:0::/root:/bin/bash
    • A. 

      /etc/user.cong

    • B. 

      /etc/shadow

    • C. 

      /etc/passwd

    • D. 

      /usr/bin/shadow

    • E. 

      /etc/password

  • 36. 
    Which of the following commands will create an archive file, named backup.tar, containing all the files from the directory /home?
    • A. 

      Tar /home backup.tar

    • B. 

      Tar -cf /home backup.tar

    • C. 

      Tar -xf /home backup.tar

    • D. 

      Tar -xf backup.tar /home

    • E. 

      Tar -cf backup.tar /home

  • 37. 
    • A. 

      Anbncn

    • B. 

      Abc

    • C. 

      $token$token$token

    • D. 

      {a}{b}{c}

    • E. 

      A b c

  • 38. 
    • A. 

      ATI

    • B. 

      DVD

    • C. 

      HDMI

    • D. 

      VGA

    • E. 

      DVI

  • 39. 
    Which of the following commands can be used to view a file and do search operations within it while viewing the contents?
    • A. 

      Less

    • B. 

      Find

    • C. 

      Grep

    • D. 

      Report

    • E. 

      See

  • 40. 
    • A. 

      Cloud Computing provides new tools to manage IT resources

    • B. 

      From the business perspective, Cloud Computing means outsourcing or centralization of IT operations

    • C. 

      Cloud Computing is the opposite of the Green IT; i.e., the use of fossil non-regenerative energy for computing

    • D. 

      Cloud Computing implies sharing all information with everyone else in 'the cloud'

  • 41. 
    What keyword is missing from the following segment of the shell script?for i in*;----cat $idone
    • A. 

      Do

    • B. 

      Then

    • C. 

      Endo

    • D. 

      Fi

    • E. 

      Run

  • 42. 
    A Linux computer has no access to the Internet. Which command displays information about the network gateway for the system?
    • A. 

      Traceroute

    • B. 

      Ifconfig

    • C. 

      Gateway

    • D. 

      Route

    • E. 

      Ipconfig

  • 43. 
  • 44. 
    When typing a long command line at the shell, what single character can be  used to split a command across multiple lines?
  • 45. 
    What is the command that will show system boot time messages?
    • A. 

      Dmesg

    • B. 

      Echo

    • C. 

      Lspci

    • D. 

      Display system boot

    • E. 

      Messages

  • 46. 
    Which of the following statements concerning the General Public License (GPL) is true?
    • A. 

      The GPL is designed to ensure that the source code of a software remains freely available

    • B. 

      The GPL is identical to the BSD license

    • C. 

      GPL software may never be sold for money

    • D. 

      If you changed a program you received under the GPL, you must send your changes to the original author for approval

    • E. 

      GPL software may not be used to run nuclear reactors or air traffic control systems

  • 47. 
    • A. 

      Drw-r-xr--

    • B. 

      D--wxr-x--

    • C. 

      --wxr-x--x

    • D. 

      -rwxrw--x

    • E. 

      -rw-r-xr--

  • 48. 
    Which of the following commands can be used to extract content from  a tar file?
    • A. 

      Tar -xvf

    • B. 

      Tar -vf

    • C. 

      Tar -e

    • D. 

      Tar -c

    • E. 

      Tar -v

  • 49. 
    What are two character sequence is present at the beginning of an interpreted  script? Please specify two characters only
  • 50. 
    • A. 

      Konqueror

    • B. 

      Firefox

    • C. 

      Links

    • D. 

      Opera

    • E. 

      Chrome

  • 51. 
    Which command line can be used to search help files that mention the word "copy"?
    • A. 

      Man -k copy

    • B. 

      Whatis copy

    • C. 

      Man copy

    • D. 

      Copy help

    • E. 

      Copy -help

  • 52. 
    Which of the following commands will display a list of all files in the current directory, including  those that may be hidden?
    • A. 

      Ls -a

    • B. 

      Ls --hidden

    • C. 

      Ls -h

    • D. 

      Ls --a

  • 53. 
    Which command shows if /usr/bin is in the current shell search path?
    • A. 

      Cat PATH

    • B. 

      Echo $PATH

    • C. 

      Echo %PATH

    • D. 

      Cat $PATH

    • E. 

      Echo %PATH%

  • 54. 
    • A. 

      License costs

    • B. 

      Ideological preferences of the system administrator

    • C. 

      Linux can do everything, there is no need for further evaluation

    • D. 

      Availability of mandatory applications and tools

    • E. 

      Skills of the administrators and staff

  • 55. 
    • A. 

      Users who modify and distribute the software under the GPL license, must make the modifications they made, available to the recipients under the same license.

    • B. 

      The GPL license forbids the removal of the copyright and license notices from the source code files that are distributed.

    • C. 

      The GPL license contains a disclaimer of warranty requiring users not to hold the software authors liable to any damage.

    • D. 

      The GPL license requires that any legal disputes be settled with the modification of Free Software Foundation.

  • 56. 
    Which Linux distribution is used as a basis for the creation of Ubuntu Linux?
    • A. 

      Red Hat Linux

    • B. 

      Arch Linux

    • C. 

      SUSE Linux

    • D. 

      Gentoo Linux

    • E. 

      Debian Linux

  • 57. 
    • A. 

      Memory

    • B. 

      Top

    • C. 

      Ps

    • D. 

      Free

    • E. 

      Nice

  • 58. 
    • A. 

      Cp -ar /home /mnt/backp

    • B. 

      Mv /home /mnt/backp

    • C. 

      Sync -r /home /mnt/backp

    • D. 

      Tar -cf /mnt/backup/archive.tar /home

    • E. 

      Copy -r /home /mnt/backp

  • 59. 
    • A. 

      Postfix

    • B. 

      Thunderbird

    • C. 

      Apache

    • D. 

      GIMP

    • E. 

      MySQL

  • 60. 
    • A. 

      Open source software can not be copied for free

    • B. 

      Open source software is available for commercial use

    • C. 

      The freedom to redistribute copies must include binary or executable forms of the software but not the source code.

    • D. 

      Open source software is not for sale

  • 61. 
    • A. 

      Text=olaf\ is\home

    • B. 

      Text=$olaf is home

    • C. 

      $text='olaf is home'

    • D. 

      Text=='olaf is home'

    • E. 

      Text=="olaf is home"

  • 62. 
    Where is the BIOS located?
    • A. 

      RAM

    • B. 

      Hard drive

    • C. 

      Motherboard

    • D. 

      LCD Monitor

  • 63. 
    Which network interface always exists in a Linux system?
    • A. 

      Lo

    • B. 

      Sit0

    • C. 

      Wlan0

    • D. 

      Vlan0

    • E. 

      Eth0

  • 64. 
    Which of the following Ubuntu releases is considered most stable and fit to use for business purposes?
    • A. 

      LTS

    • B. 

      Xubuntu

    • C. 

      Ubuntu Vanilla

    • D. 

      Kubuntu

    • E. 

      Xubuntu Server

  • 65. 
    Which command will display the last line of the file foo.txt?
    • A. 

      Head -n foo.txt

    • B. 

      Tail foo.txt

    • C. 

      Last -n 1 foo.txt

    • D. 

      Tail -n 1 foo.txt

  • 66. 
    Which command would you use to get comprehensive documentation about any command in Linux?
    • A. 

      Help command

    • B. 

      Echo command

    • C. 

      Locate command

    • D. 

      Man command

    • E. 

      Get command

  • 67. 
    What is the preferred source for the installation of new applications?
    • A. 

      The vendor's version management system

    • B. 

      A CD-ROM disk

    • C. 

      The distribution's package repository

    • D. 

      The vendor's website

    • E. 

      A retail store

  • 68. 
    Identify the proper device for the third partition, on the second hard disk, on the first IDE controller on a PC system. 
    • A. 

      /dev/hdb3

    • B. 

      /dev/hd1b3

    • C. 

      /dev/hdc1d2p3

    • D. 

      Dev/hdc1a3

    • E. 

      Dev/hdc1b3

  • 69. 
    Which command is used to make a shell variable known to subsequently executed programs?
    • A. 

      Export

    • B. 

      Announce

    • C. 

      Env

    • D. 

      Transfer

    • E. 

      Mv

  • 70. 
    What are the three sets of permission for a file?
    • A. 

      User, group, others

    • B. 

      Administrator, group, others

    • C. 

      User, standard user, others

    • D. 

      Administrator, standard user, others

  • 71. 
    Which of the following applications are used to play an MP3 file on a Linux system? Choose three answers  
    • A. 

      Xara Xtreme

    • B. 

      Banshee

    • C. 

      LibreOffice Player

    • D. 

      Amarok

    • E. 

      Audacious

  • 72. 
    Which permissions should be given to a file that needs to be opened and edited by the file's owner and opened read-only by the file's group?
    • A. 

      0751

    • B. 

      0466

    • C. 

      0540

    • D. 

      0640

    • E. 

      0444

  • 73. 
    Which commands provide help for a specific Linux command? (Choose two answers).
    • A. 

      Info

    • B. 

      Man

    • C. 

      Helpme

    • D. 

      Ask

    • E. 

      Whatdoes

  • 74. 
    Which of the following commands can be used to extract files from an archive?
    • A. 

      Tar -vf

    • B. 

      Tar -xvf

    • C. 

      Tar -evf

    • D. 

      Tar -e

    • E. 

      Tar -v

  • 75. 
    Which of the following directories is often used to store log files?
    • A. 

      /home

    • B. 

      /var

    • C. 

      /temp

    • D. 

      /dev

    • E. 

      /usr

  • 76. 
    • A. 

      Proc Num

    • B. 

      PIN

    • C. 

      Process Entry

    • D. 

      PID

  • 77. 
    Which statement about users and user groups is correct?
    • A. 

      A group can only have one main user

    • B. 

      There can be only one user group on a system

    • C. 

      Users do not have to belong to a user group

    • D. 

      Every user belongs at least to one user group

  • 78. 
    Which of the following hardware devices links a number of computers together to form an Ethernet LAN?
    • A. 

      Server

    • B. 

      Switch

    • C. 

      Connector

    • D. 

      Access point

    • E. 

      Terminal

  • 79. 
    How can the current directory and its subdirectories be searched for the file name MyFile.xml?
    • A. 

      Find -name MyFile.xml

    • B. 

      Grep MyFile.xml | find

    • C. 

      Grep -r MyFile.xml

    • D. 

      Less MyFile.xml

    • E. 

      Search MyFile.xml ./

  • 80. 
    Which of the following commands can be used to determine the time of the last login of a given user?
    • A. 

      Showlog

    • B. 

      Recent

    • C. 

      Last

    • D. 

      History

    • E. 

      Login