Linux Professional Institute LPIC-2 (201-450) Simulator #4
Simulator Summary
0 of 70 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Results
0 of 70 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, your results in the simulator were not up to the desired standards. 😔
However, take advantage of your unlimited access and continue to practice.
Remember, persistence and dedication will lead to mastery. 😎 -
Congratulations! 🎉
You have successfully passed the simulator and are now one step closer to achieving your certification.
We hope you will consider joining us again in your future certification journey.Wishing you the best of luck with the upcoming exam. Keep up the great work! 💪
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 70
1. Question
Melanie, a system administrator, has observed a steady 5% increase in the monthly data storage requirements for her company’s primary application over the past year. She needs to ensure that the system will cater to the organization’s needs for the next two years. Which of the following actions should Melanie take based on this trend?
CorrectIncorrect -
Question 2 of 70
2. Question
Nathan, a system administrator at XYZ Corp, noticed that one of their critical applications was becoming slower every month. Upon investigation, he found that the system memory was being consumed at an increased rate each month. Which of the following steps should Nathan take to predict and prevent a potential resource exhaustion scenario within the next 6 months?
CorrectIncorrect -
Question 3 of 70
3. Question
As the newly appointed IT lead at ABC Tech, Maria is tasked with monitoring and ensuring optimal performance of the company’s server farm. She noticed that certain servers often have spiked CPU usage, leading to application slowdowns. Which command would be best for Maria to use to get a real-time dynamic view of the CPU performance of a particular server?
CorrectIncorrect -
Question 4 of 70
4. Question
John, a system administrator at DEF Corp, receives complaints about a web application becoming sluggish during peak hours. To troubleshoot the issue, John wants to check if the server hosting the application is facing high CPU usage during these times. Which of the following commands would allow John to see CPU usage statistics over specified intervals?
CorrectIncorrect -
Question 5 of 70
5. Question
After deploying a new software update to the company’s servers, Sarah, a systems administrator, wants to ensure that the update hasn’t caused any unexpected increase in memory usage. Which command should Sarah use to provide an overview of the total memory, used memory, free memory, and cached memory on a server?
CorrectIncorrect -
Question 6 of 70
6. Question
Ethan, a system administrator at XYZ Corp, receives reports about a web application performing slowly. To rule out memory bottlenecks, Ethan wants to check the memory usage of processes running on the server. Which of the following commands will display the memory usage of individual processes?
CorrectIncorrect -
Question 7 of 70
7. Question
David, a system administrator, notices a decline in the server’s performance, especially during peak hours. He suspects that the issue may be related to excessive disk I/O operations. Which command should David use to monitor disk I/O statistics in real-time?
CorrectIncorrect -
Question 8 of 70
8. Question
Sophia, a database administrator, is tasked with ensuring optimal performance for a database hosted on a Linux server. She wants to identify if there are any specific files that are causing a high number of I/O operations. Which command can Sophia use to view the I/O statistics of specific files?
CorrectIncorrect -
Question 9 of 70
9. Question
Alice, a network administrator, is troubleshooting a server that seems to be experiencing slow network connectivity. To gain insights into the server’s real-time network bandwidth usage and determine which interfaces are causing traffic congestion, which command should Alice use?
CorrectIncorrect -
Question 10 of 70
10. Question
Emily, a network engineer, suspects that the firewall might be a bottleneck in the data center. She wants to evaluate the number of packets per second (pps) the firewall is processing to identify if it is nearing its threshold. Which tool can Emily use to measure the firewall’s throughput in terms of pps?
CorrectIncorrect -
Question 11 of 70
11. Question
Juan, an IT specialist, has multiple Linux servers running with third-party kernel modules. He often updates the kernel and wants an automated method to rebuild and reinstall the third-party modules after each kernel update. Which tool would be most suitable for this purpose?
CorrectIncorrect -
Question 12 of 70
12. Question
Samantha, a system administrator, needs to check the version of the currently running Linux kernel on a remote server. Which command should she use to retrieve this information directly?
CorrectIncorrect -
Question 13 of 70
13. Question
After testing a specific kernel module named audio_enhancer, Rachel decides to unload it from her system. Which command is the most suitable to achieve this?
CorrectIncorrect -
Question 14 of 70
14. Question
Sophia, a system administrator, has recently loaded several modules for testing purposes. Before she unloads any modules, she needs to ensure no other modules depend on them. Which tool should she use to determine dependencies of a module named net_driver?
CorrectIncorrect -
Question 15 of 70
15. Question
Alex, a system administrator, is trying to determine the available parameters for the ethernet_driver module to adjust some networking configurations. Which command should he utilize to retrieve this information?
CorrectIncorrect -
Question 16 of 70
16. Question
Emily, a Linux administrator, wants to ensure that the serial_8250 module is loaded as custom_serial during boot. Which action should she take to achieve this?
CorrectIncorrect -
Question 17 of 70
17. Question
Jane, a systems administrator, is troubleshooting a Linux system. She wants to determine the current memory statistics of the system. Which file in the /proc filesystem should she check?
CorrectIncorrect -
Question 18 of 70
18. Question
Mike, a system engineer, is working on a Linux server and needs to find the vmlinuz file associated with the current kernel version. Where would he most likely find this file?
CorrectIncorrect -
Question 19 of 70
19. Question
Which command can be used to display detailed information about all PCI buses in the system and all devices connected to them?
CorrectIncorrect -
Question 20 of 70
20. Question
You are tasked with creating a udev rule to change the ownership of a particular USB flash drive to the user “john” every time it is plugged in. Which of the following rules achieves this?
CorrectIncorrect -
Question 21 of 70
21. Question
An administrator needs to gather detailed information about the hardware configuration of a system from the UEFI shell. Which command should they use within the UEFI shell to obtain detailed information about the system’s devices, including PCI and memory map details?
CorrectIncorrect -
Question 22 of 70
22. Question
An administrator has just compiled a new kernel for their Linux system. Before booting with this kernel, they want to ensure that essential drivers and binaries are available early in the boot process, especially those required for mounting the root filesystem. What is the purpose of the initrd or initramfs image in this context?
CorrectIncorrect -
Question 23 of 70
23. Question
An administrator is troubleshooting a non-booting system that relies on a traditional BIOS. They suspect that the issue might stem from corruption within the first sector of the bootable disk. What is this critical area referred to as?
CorrectIncorrect -
Question 24 of 70
24. Question
A system administrator needs to investigate why a particular service failed to start during the last system boot. They wish to view detailed log messages about this service from the systemctl utility. Which command should they use?
CorrectIncorrect -
Question 25 of 70
25. Question
An administrator has just set up a new service on a Linux server. They wish to ensure that this service starts automatically every time the system boots up. Using the systemctl command, which of the following should be executed to accomplish this?
CorrectIncorrect -
Question 26 of 70
26. Question
An organization is setting up a diskless workstation environment where workstations boot a Linux operating system over the network. Which variant of the SYSLINUX family is most suitable for implementing network booting using PXE?
CorrectIncorrect -
Question 27 of 70
27. Question
A systems administrator wants to set up a PXE boot environment. They have a mixture of older systems using BIOS and newer systems using UEFI. While configuring the DHCP server for PXE booting, they realized that they need to serve different boot files based on the firmware type of the client system. Which DHCP option should they use to specify the bootloader file for PXE clients?
CorrectIncorrect -
Question 28 of 70
28. Question
An organization is transitioning from BIOS to UEFI-based systems. They currently use PXE booting for automated installations. The systems administrator needs to ensure that the PXE infrastructure can handle UEFI-based systems. Which statement is true about the differences in PXE booting between BIOS and UEFI?
CorrectIncorrect -
Question 29 of 70
29. Question
As a systems administrator, you are transitioning from GRUB to another bootloader for your UEFI-based Linux systems. Which bootloader, developed by the systemd project, is specifically designed for UEFI systems and can be used as an alternative to GRUB?
CorrectIncorrect -
Question 30 of 70
30. Question
You are tasked with setting up a Linux-based live USB for field technicians. While researching lightweight bootloaders, you come across SYSLINUX. For which of the following scenarios is SYSLINUX specifically tailored?
CorrectIncorrect -
Question 31 of 70
31. Question
Alice, a system administrator, is configuring automount units for systemd. She needs to create a unit that automatically mounts an NFS share when it’s accessed. What type of unit file should Alice create?
CorrectIncorrect -
Question 32 of 70
32. Question
John, a systems engineer, needs to create an ISO image from a directory named project_files. Which command can John use to produce the ISO image named output.iso without including any file from a sub-directory named backup located inside project_files?
CorrectIncorrect -
Question 33 of 70
33. Question
Samantha, a systems administrator, has been given a CD-ROM which was created on a Macintosh computer. She knows the CD uses the HFS (Hierarchical File System) used by older Macs. Which of the following tools is BEST suited for reading the HFS file system on a Linux machine?
CorrectIncorrect -
Question 34 of 70
34. Question
Brian wants to create an HFS disk image from a directory named mac_data on his Linux machine. Which command would allow him to accomplish this, resulting in an image named mac_image.hfs?
CorrectIncorrect -
Question 35 of 70
35. Question
Martin, a system administrator, wants to create an ISO image from a directory containing files with long filenames and mixed-case letters. He wishes the CD-ROM to be readable on both Linux and Windows systems without filename limitations. Which filesystem extension should Martin use?
CorrectIncorrect -
Question 36 of 70
36. Question
You have been given a CD-ROM that is supposed to be bootable, but it’s not booting on your system. Which ISO 9660 extension is primarily responsible for making CD-ROMs bootable?
CorrectIncorrect -
Question 37 of 70
37. Question
Oliver, a systems administrator, has just set up a new Linux server. For added security, he wants to encrypt the data partition on the server. Which tool can be used to create an encrypted block device, that once unlocked, acts like a regular block device?
CorrectIncorrect -
Question 38 of 70
38. Question
Carla is a security analyst and wants to check the type and version of the encrypted device she received. Which command will allow her to obtain this information from a LUKS encrypted device?
CorrectIncorrect -
Question 39 of 70
39. Question
Lisa, a system administrator, is configuring automount on a Linux server to automatically mount NFS shares. She needs to specify the primary configuration file for automount. Which file serves this purpose?
CorrectIncorrect -
Question 40 of 70
40. Question
James is troubleshooting an issue with an automounted directory not behaving as expected. He wants to view the default options for the automount daemon. Which file should he inspect to see the default mount points and options?
CorrectIncorrect -
Question 41 of 70
41. Question
A Linux administrator needs to make a temporary change to the maximum number of file handles that can be opened system-wide (fs.file-max). They do not want this change to persist across reboots. Which of the following commands should they use?
CorrectIncorrect -
Question 42 of 70
42. Question
You are working on a system that has a mix of old IDE hard drives, modern SATA drives, and the latest NVMe drives. You need to quickly identify the device file for the first NVMe drive on the system. Which device file would represent the first NVMe drive?
CorrectIncorrect -
Question 43 of 70
43. Question
A colleague informs you that they’ve added a new SATA SSD to a running Linux server. Without rebooting the system, you wish to scan and recognize this new drive. Which device file prefix should you look out for when verifying if the system has recognized the new drive?
CorrectIncorrect -
Question 44 of 70
44. Question
After adding a new iSCSI disk to your Linux server, you want to retrieve the unique SCSI identifier for the disk for further configuration. Which command would help you accomplish this task?
CorrectIncorrect -
Question 45 of 70
45. Question
You are responsible for setting up an iSCSI connection to a new storage on a Linux server. The target’s IQN has been provided to you. Which tool would you use to initiate the iSCSI session with the target?
CorrectIncorrect -
Question 46 of 70
46. Question
A system administrator wants to uniquely identify storage devices in a SAN environment. Which of the following identifiers is globally unique for each device and is often used for zoning configurations?
CorrectIncorrect -
Question 47 of 70
47. Question
You are setting up a new storage array in a SAN environment. Each physical disk on the array will be subdivided into several logical units to be presented to various hosts. Which term is used to describe these logical units?
CorrectIncorrect -
Question 48 of 70
48. Question
After creating a physical volume on a new disk, John wants to integrate this disk into an existing volume group named “data_vg”. Which tool from the LVM suite should John use for this purpose?
CorrectIncorrect -
Question 49 of 70
49. Question
Lisa needs to get a detailed report on the status and configuration of all volume groups on her server. Which tool from the LVM suite should she use?
CorrectIncorrect -
Question 50 of 70
50. Question
You want to extend the size of a logical volume named “dataVol” in the volume group “vgData” by 5GB. Which command would you use?
CorrectIncorrect -
Question 51 of 70
51. Question
You are troubleshooting network issues on a Linux system and suspect that access restrictions might be causing the problem. Where is the common location for access restriction files that control network services?
CorrectIncorrect -
Question 52 of 70
52. Question
You are responsible for configuring and manipulating ethernet network interfaces on a Linux server. In which file would you typically define access restrictions for network services?
CorrectIncorrect -
Question 53 of 70
53. Question
You are tasked with troubleshooting routing issues on a Linux server. Which command would you use to display the routing table in a detailed and comprehensive format, including the type of service and source of the route?
CorrectIncorrect -
Question 54 of 70
54. Question
You are troubleshooting network issues on a Linux server and need to gather detailed information about its network configuration, including IP addresses, interface status, and routing tables. Which utility would you use for this purpose?
CorrectIncorrect -
Question 55 of 70
55. Question
You are tasked with troubleshooting network issues on a Linux server, and you need to gather information about the recognized and used hardware devices, including details about the network interfaces. Which command would you use for this purpose?
CorrectIncorrect -
Question 56 of 70
56. Question
You are troubleshooting network issues on a Linux server, and you need to inspect the initialization files related to network configuration in a SysV init system. Which file would you typically check for Ethernet interface configuration?
CorrectIncorrect -
Question 57 of 70
57. Question
As a system administrator, you are troubleshooting network issues on a Linux server, and you suspect that NetworkManager might be interfering with your manual network configurations. How can you temporarily disable NetworkManager to test your manual configurations?
CorrectIncorrect -
Question 58 of 70
58. Question
You are investigating network issues on a Linux server and want to display information about the routing table, addresses, link states, and other network-related details. Which command would you use for this purpose?
CorrectIncorrect -
Question 59 of 70
59. Question
You are troubleshooting network issues on a Linux server, and you want to display detailed information about network interfaces, including IP addresses, link states, and other relevant details. Which command would you use for this purpose?
CorrectIncorrect -
Question 60 of 70
60. Question
You are troubleshooting network connectivity issues on a Linux server, and you want to examine and modify the IP routing table. Which command allows you to view and manipulate the IP routing table on a Linux system?
CorrectIncorrect -
Question 61 of 70
61. Question
You need to create a compressed tarball of a directory named project_data and store it in a file named backup.tar.gz. Which tar command would you use for this purpose?
CorrectIncorrect -
Question 62 of 70
62. Question
You are configuring a backup solution and need to specify a tape drive for backups. Which device represents a SCSI tape drive in the /dev directory?
CorrectIncorrect -
Question 63 of 70
63. Question
You are tasked with checking the status of a tape drive before performing a backup. Which mt command would you use to display the status information of a SCSI tape drive?
CorrectIncorrect -
Question 64 of 70
64. Question
You are tasked with creating a backup of a directory and its contents using rsync. Which rsync command would you use to perform a local backup, preserving ownership and permissions?
CorrectIncorrect -
Question 65 of 70
65. Question
As a system administrator, you want to display a custom message to users when they log in to the system. Which file should you modify to automate this process?
CorrectIncorrect -
Question 66 of 70
66. Question
You want to ensure that users see a specific message when they log in, including important system-related information. What command should you use to edit the login message directly from the command line?
CorrectIncorrect -
Question 67 of 70
67. Question
As a system administrator, you need to inform active users about an upcoming system maintenance that will result in temporary service interruptions. What command can you use to send a broadcast message to all logged-in users?
CorrectIncorrect -
Question 68 of 70
68. Question
You want to display a system-wide message to users before they log in. Which file should you modify to achieve this?
CorrectIncorrect -
Question 69 of 70
69. Question
You want to customize the login prompt message for all users on your Linux system. Which command should you use to edit the content directly from the command line?
CorrectIncorrect -
Question 70 of 70
70. Question
You want to provide a message to users who access your system remotely through SSH. Which file should you modify to display a banner message specifically for remote logins?
CorrectIncorrect