LPI 102-500 Exam Practice Questions (P. 3)
- Full Access (120 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which of the following changes may occur as a consequence of using the command ip? (Choose three.)
- ANetwork interfaces may become active or inactive.
- BNew name servers may be added to the resolver configuration.
- CThe system's host name may change.
- DIP addresses may change.
- EThe routing table may change.
Correct Answer:
ADE
ADE

Absolutely, you're spot on noting how the 'ip' command is versatile! It's a powerful tool primarily used for managing network interfaces and routing tables. With the 'ip' command, you're indeed able to activate or deactivate interfaces, modify IP addresses, and adjust the system’s routing tables. This provides a lot of flexibility in handling network configurations without needing multiple commands. Keep this flexibility in mind as it's a crucial aspect of network management.
send
light_mode
delete
Question #12
How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26?
- A6
- B14
- C30
- D62
- E126
Correct Answer:
D
D

The correct answer, 62 unique hosts for the subnet 192.168.2.128/26, is derived by using the formula 2^(32 - subnet mask) - 2, which in this case is 2^(32 - 26) - 2. This calculation accounts for subtracting the network address and the broadcast address from the total number of addresses (64), leaving 62 addresses available for use by hosts. This explanation aligns well with understanding IP address allocation and management in subnetting for IPv4 networks.
send
light_mode
delete
Question #13
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose three.)
- A10.0.0.0/8Most Voted
- B127.0.0.0/8
- C169.255.0.0/16
- D172.16.0.0/12Most Voted
- E192.168.0.0/16Most Voted
Correct Answer:
ADE
ADE

The 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 IP address blocks are dedicated for private network use. They were clearly defined by IANA as per the specifications in RFC 1918 to prevent public route conflicts. These blocks encompass Class A, B, and C private addresses, respectively, designed to allow organizations to create internal networks without using globally unique IP addresses. This setup is crucial for preserving the limited pool of public IP addresses and ensuring efficient network internal routing without internet-wide implications.
send
light_mode
delete
Question #14
Which of the following commands configure network interfaces based on the system's existing distribution-specific configuration files? (Choose two.)
- Aifconf
- BifdownMost Voted
- Cifpause
- Difstart
- EifupMost Voted
Correct Answer:
BE
BE

The ifup and ifdown commands are indeed crucial for managing network interfaces in systems that utilize /etc/network/interfaces, a common configuration file in many Unix-like operating systems. These commands don't just alter interface states; they act upon predefined configurations to engage or disengage network interfaces, reflecting their set administrative states in distribution-specific settings. Therefore, understanding these commands, backed by system-specific configuration files, is key in effectively managing network services in Linux environments.
send
light_mode
delete
Question #15
Which of the following statements is true if the UID of a regular user is identical to the GID of a group?
- AUID have precedence over GIDs, therefore the user is available while the group doesn't.
- BThe user as well as the group are not available to avoid ambiguity due to the ID conflict.
- CUIDs and GIDs are independent of each other, therefore the user as well as the group are still available.Most Voted
- DThe user is the only member of the group, even if the group configuration contains other members.
- EGIDs have precedence over UIDs, therefore the group is available while the user isn't.
Correct Answer:
C
C

In Linux, UIDs (User IDs) and GIDs (Group IDs) operate independently from one another. This means that even if a regular user's UID matches a group's GID, both entities remain distinct and functional. There isn't any conflict or precedence issue between UIDs and GIDs, allowing both the user and group settings to coexist without interfering with each other's operations. This understanding is crucial for managing user and group identities effectively in Linux environments.
send
light_mode
delete
All Pages