LPI 010-160 Exam Practice Questions (P. 3)
- Full Access (80 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which permissions are set on a regular file once the permissions have been modified with the command chmod 654 file.txt?
- Adrw-r-xr--
- Bd-wxr-x--
- C-wxr-x--x
- D-rwxrw---x
- E-rw-r-xr--Most Voted
Correct Answer:
E
E

The correct permissions set by 'chmod 654 file.txt' result in '-rw-r-xr--'. This means the owner has read and write permissions (6), the group has read and execute permissions (5), and others have read permission (4). It’s essential to remember that the initial '-' in the permissions string represents a regular file, and this directly aligns with the given command outcome. This set of permissions satisfies typical needs where the owner can modify the file, the group can view and execute, and others can only view it. Always ensure the numeric mode accurately reflects desired permission levels.
send
light_mode
delete
Question #12
What is true about the owner of a file?
- AEach file is owned by exactly one user and one group.Most Voted
- BThe owner of a file always has full permissions when accessing the file.
- CThe user owning a file must be a member of the file's group.
- DWhen a user is deleted, all files owned by the user disappear.
- EThe owner of a file cannot be changed once it is assigned to an owner.
Correct Answer:
A
A

Each file in Unix-like systems is uniquely owned by one user and one group. This clear ownership structure aids in permission management and resource tracking within the system. It’s essential to understand that although a file may only have one primary group explicitly assigned, additional permissions can be configured using Access Control Lists (ACLs), which allow for more detailed permissions for various users and groups. However, the basic understanding that each file has one user and one group owner remains fundamentally correct and integral to file permission concepts.
send
light_mode
delete
Question #13
Which of the following permissions are set on the /tmp/ directory?
- ArwxrwxrwtMost Voted
- B------rwX
- CrwSrw-rw-
- DrwxrwS---
- Er-xr-X--t
Correct Answer:
A
A

The correct permissions for the /tmp/ directory, rwxrwxrwt, incorporate a sticky bit (denoted by the 't' at the end), which is essential for shared directories like /tmp/. This sticky bit restricts file deletion so that only the file's owner, the directory's owner, or the root user can remove files from the directory. This attribute is crucial for maintaining the security and proper function of temporary storage areas in multi-user environments, preventing users from deleting or altering each other's temporary files.
send
light_mode
delete
Question #14
Which command adds the new user tux and creates the user's home directory with default configuration files?
- Adefaultuser tux
- Buseradd -m tuxMost Voted
- Cusercreate tux
- Duseradd -o default tux
- Epasswd -a tux
Correct Answer:
B
B

Indeed, the command 'useradd -m tux' is the correct choice for adding a new user named tux while simultaneously creating the user's home directory. The '-m' option is crucial as it instructs the system to create a home directory for the user, which will be populated with default configuration files. This command thus effectively sets up a new user with their own space on the system, making it ready for immediate use.
send
light_mode
delete
Question #15
What information is stored in /etc/passwd? (Choose three.)
- AThe user's storage space limit
- BThe numerical user IDMost Voted
- CThe usernameMost Voted
- DThe encrypted password
- EThe user's default shellMost Voted
Correct Answer:
BCE
BCE

The /etc/passwd file on Linux systems contains key user information, including the username, numerical user ID, and the user's default shell. It's essential to remember that while this file used to store encrypted passwords, for increased security, these are now stored in the /etc/shadow file, accessible only to the root user or commands with suid bit. This separation enhances system security by limiting exposure of sensitive data.
send
light_mode
delete
All Pages