Linux Professional Institute LPIC-1 (101-500) Simulator #3
Simulator Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, your results in the simulator were not up to the desired standards. 😔
However, take advantage of your unlimited access and continue to practice.
Remember, persistence and dedication will lead to mastery. 😎 -
Congratulations! 🎉
You have successfully passed the simulator and are now one step closer to achieving your certification.
We hope you will consider joining us again in your future certification journey.Wishing you the best of luck with the upcoming exam. Keep up the great work! 💪
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
A system administrator is troubleshooting a server that doesn’t recognize a newly installed hard drive during the boot process. Which step should the administrator check first to ensure the drive is properly configured?
CorrectIncorrect -
Question 2 of 50
2. Question
Which of the following best describes the primary role of the BIOS in a computer’s boot process?
CorrectIncorrect -
Question 3 of 50
3. Question
You are configuring a new server and notice that it uses UEFI instead of traditional BIOS. Which of the following benefits would you expect from a system using UEFI?
CorrectIncorrect -
Question 4 of 50
4. Question
A colleague wants to enable Secure Boot on a server with UEFI. He asks for your opinion on the purpose of Secure Boot. How would you explain it?
CorrectIncorrect -
Question 5 of 50
5. Question
You have been given a task to set up a dual-boot system with Linux and Windows. When researching bootloaders, you find that GRUB2 is commonly used for Linux. Why might GRUB2 be a suitable choice for this task?
CorrectIncorrect -
Question 6 of 50
6. Question
You’re troubleshooting a Linux system that isn’t booting correctly. You suspect that the bootloader might be misconfigured. Which file should you check on a system using GRUB2 to verify its configurations?
CorrectIncorrect -
Question 7 of 50
7. Question
A server administrator needs to pass certain parameters to the kernel during boot time to handle system-specific nuances. Which of the following is the common place where these parameters can be added to ensure they are read by the kernel at boot time?
CorrectIncorrect -
Question 8 of 50
8. Question
After recent updates on a Linux machine, the administrator noticed that a custom kernel parameter previously set is no longer being applied at boot. Which of the following could be a likely reason for this issue?
CorrectIncorrect -
Question 9 of 50
9. Question
After performing a Linux system upgrade, a system administrator notices that the system fails to boot and hangs after loading the kernel. Suspecting an issue with initramfs, the administrator wants to regenerate it. Which of the following commands can be used to regenerate the initramfs for the currently active kernel version?
CorrectIncorrect -
Question 10 of 50
10. Question
A system administrator is preparing to set up a new disk encryption system on a Linux server. Which of the following best describes the role of initramfs in relation to disk encryption during the boot process?
CorrectIncorrect -
Question 11 of 50
11. Question
A system administrator notices that a Linux server is consistently booting into a multi-user, non-graphical mode. To diagnose the cause, the administrator wants to check the default runlevel of the system. Which of the following files should the administrator examine to determine the system’s default runlevel?
CorrectIncorrect -
Question 12 of 50
12. Question
While troubleshooting a Linux system’s boot process, a system administrator needs to change the system’s current runlevel. Which command should the administrator use to change the system’s runlevel to 3 without rebooting the system?
CorrectIncorrect -
Question 13 of 50
13. Question
A system administrator has been asked to disable the Apache web server from starting at boot on a Linux system that uses SysVinit. Which of the following commands can be used to achieve this without manually editing any configuration files?
CorrectIncorrect -
Question 14 of 50
14. Question
On a system using SysVinit, a system administrator notices that a custom script isn’t executing during the boot process. To ensure that the script runs during the boot sequence, in which directory should the administrator place the init script?
CorrectIncorrect -
Question 15 of 50
15. Question
A server administrator needs to mask the Nginx service using systemd to ensure it can’t be started accidentally. Which command should the administrator run to accomplish this?
CorrectIncorrect -
Question 16 of 50
16. Question
An IT technician wants to get a list of all failed services on a system managed by systemd. Which command should they use to achieve this?
CorrectIncorrect -
Question 17 of 50
17. Question
A Linux system administrator wants to set the default boot target of a server to multi-user mode without a graphical interface using systemd. Which command should they use?
CorrectIncorrect -
Question 18 of 50
18. Question
The system administrator wants to check the default boot target of a Linux system managed by systemd. Which command will provide this information?
CorrectIncorrect -
Question 19 of 50
19. Question
A system administrator needs to change the running system to a non-graphical multi-user mode using systemd without changing the default boot target. Which command should they use?
CorrectIncorrect -
Question 20 of 50
20. Question
On an older Linux system using SysVinit, the system administrator needs to bring the system into single-user mode. Which command should they use?
CorrectIncorrect -
Question 21 of 50
21. Question
You are configuring the GRUB boot loader on a system that has multiple Linux distributions installed. You want to ensure that if the default boot entry fails, you can easily select an alternative boot location. What should you do in GRUB to achieve this?
CorrectIncorrect -
Question 22 of 50
22. Question
While setting up a dual-boot system, you want to ensure that in case the main OS fails to boot, there’s a backup option to boot into a recovery mode. Which of the following options in the GRUB configuration will allow for this?
CorrectIncorrect -
Question 23 of 50
23. Question
Your company still uses GRUB Legacy for booting several legacy servers. One day, after a routine update, one of the servers failed to boot. You suspect that the issue might be related to the GRUB configuration. Which file should you check and possibly edit to resolve the booting issue on a system using GRUB Legacy?
CorrectIncorrect -
Question 24 of 50
24. Question
You are in the process of manually installing GRUB Legacy on a system. After editing the /boot/grub/menu.lst file to specify the boot options, what command should you run to install GRUB Legacy to the MBR (Master Boot Record) of the primary hard drive?
CorrectIncorrect -
Question 25 of 50
25. Question
You’ve recently made changes to the /etc/default/grub file on a Linux server. To ensure the changes are reflected the next time the system boots, which command should you execute?
CorrectIncorrect -
Question 26 of 50
26. Question
In a GRUB 2 setup on a Linux server, you want to temporarily add a kernel boot parameter for debugging purposes during the next boot. Where would you typically add this parameter?
CorrectIncorrect -
Question 27 of 50
27. Question
On a Linux system with GRUB 2 installed, you have been instructed to interrupt the normal boot sequence and access the GRUB command line for troubleshooting. What action should you perform during the boot process?
CorrectIncorrect -
Question 28 of 50
28. Question
After editing the GRUB configuration file on a system, you wish to interact with the boot loader to ensure that the changes are properly applied and the system boots correctly. Which of the following steps is the best initial action to verify this?
CorrectIncorrect -
Question 29 of 50
29. Question
You are working on a system that utilizes the legacy GRUB boot loader. You have been tasked with editing its configuration to change the default boot entry. Which file would you most likely edit?
CorrectIncorrect -
Question 30 of 50
30. Question
After a recent Linux installation, you’re asked to modify the boot menu of the GRUB 2 boot loader to change the boot timeout. Which file would you edit to directly modify this configuration?
CorrectIncorrect -
Question 31 of 50
31. Question
A Linux administrator has replaced the main hard drive on a server. Before booting into the new Linux installation on the new drive, the administrator needs to install the GRUB boot loader. Which command should the administrator use to install GRUB to the MBR of the new hard drive /dev/sda?
CorrectIncorrect -
Question 32 of 50
32. Question
After making changes to the GRUB configuration files, an administrator decides to install GRUB to a USB drive /dev/sdb for recovery purposes. Which command should be used to accomplish this without any errors?
CorrectIncorrect -
Question 33 of 50
33. Question
You want to view the contents of a file named “important.txt” in your home directory. Which of the following commands will you use?
CorrectIncorrect -
Question 34 of 50
34. Question
You’re analyzing a large log file named /var/log/biglog.txt on a Unix system. The file is too extensive to read all at once, and you want to view its contents with a command that allows you to navigate through the file using keyboard arrows and to search interactively. Which command should you employ for this purpose?
CorrectIncorrect -
Question 35 of 50
35. Question
You’ve recently downloaded an ISO image from a website. To ensure the file’s integrity, the website provides an MD5 checksum. You want to verify if the ISO image you downloaded matches the checksum provided. Which command would you use to generate the MD5 checksum of the file named linux-distro.iso?
CorrectIncorrect -
Question 36 of 50
36. Question
You are reviewing a script and come across a file named configurations.log. You want to number each line of the file to make it easier to reference specific lines during your review. Which command would you use to achieve this?
CorrectIncorrect -
Question 37 of 50
37. Question
A colleague sent you a binary file named data.bin. You wish to inspect the contents of the file in hexadecimal format. Which command should you use to achieve this?
CorrectIncorrect -
Question 38 of 50
38. Question
You are given two files: names.txt containing a list of names and ages.txt containing a list of ages. You want to merge them side by side such that each name in names.txt is followed by the corresponding age in ages.txt on the same line. Which command will you use?
CorrectIncorrect -
Question 39 of 50
39. Question
You have a file named products.txt that contains a list of products with their prices, formatted as “ProductName – Price”. There was a mistake in entering the prices, and every product has an extra zero at the end. For example, “Laptop – 5000” should be “Laptop – 500”. Which sed command would you use to correct this mistake in the file?
CorrectIncorrect -
Question 40 of 50
40. Question
You’ve just downloaded a file named linux-distro.iso and its corresponding SHA256 checksum from a website. You want to verify the integrity of the download. Which command will help you to verify the SHA256 checksum of the downloaded file?
CorrectIncorrect -
Question 41 of 50
41. Question
You’ve been given a task to ensure the utmost security while verifying the integrity of crucial files in your organization. While SHA256 is frequently used, you’re considering an even more secure hashing algorithm. Which command will help you to produce a SHA512 checksum for a file named critical-file.tar.gz?
CorrectIncorrect -
Question 42 of 50
42. Question
You’re working with a file named employee.txt which contains names of employees. The names are in random order, and you want to sort them in reverse alphabetical order. Which command will achieve this?
CorrectIncorrect -
Question 43 of 50
43. Question
Jeremy, a system administrator, needs to adjust a filesystem so that it is checked for errors after every 30 mounts. Which command should he use to achieve this for the filesystem /dev/sda1?
CorrectIncorrect -
Question 44 of 50
44. Question
Janet noticed that her XFS filesystem on /dev/sdc1 may have developed some inconsistencies. She intends to run a repair but does not want to affect the data on the partition. How should she proceed using the xfs_repair tool?
CorrectIncorrect -
Question 45 of 50
45. Question
John, a Linux system administrator, is trying to optimize and reduce fragmentation on his XFS filesystem on /dev/sdb1. He decides to use the xfs_fsr tool. However, he wants to limit the defragmentation process to run for a maximum of 1 hour. Which of the following commands will help him achieve this?
CorrectIncorrect -
Question 46 of 50
46. Question
As a new Linux system administrator, Karen is tasked with examining the XFS filesystem on /dev/sda2 to get details about the superblock. She has heard about the xfs_db utility. Which of the following commands should Karen use to open an XFS filesystem and navigate to the superblock section?
CorrectIncorrect -
Question 47 of 50
47. Question
Emily, a Linux administrator, wants to temporarily mount the ext4 filesystem located on /dev/sda3 to the /mnt/data directory. Which command should she use to manually mount the filesystem?
CorrectIncorrect -
Question 48 of 50
48. Question
Kevin is tasked with ensuring that the filesystem on /dev/sdb1 is automatically mounted to the /data directory upon system boot. Which file should Kevin edit to achieve this?
CorrectIncorrect -
Question 49 of 50
49. Question
Alice is responsible for configuring a Linux workstation so that users can mount USB drives, but only root can unmount them. Which of the following entries in the /etc/fstab file would achieve this goal for a filesystem with UUID 1234-5678 that should be mounted under /mnt/usbdrive?
CorrectIncorrect -
Question 50 of 50
50. Question
Linda, a Linux novice, was told by her colleague to use UUID instead of device names for mounting her partitions because UUIDs remain consistent. She wishes to determine the UUID of her /dev/sdc2 partition. Which command should she use?
CorrectIncorrect