최신 102-500 Deutsch 무료덤프 - Lpi LPIC-1 Exam 102, Part 2 of 2, version 5.0 (102-500 Deutsch Version)
Welche der folgenden Aussagen ist in der Datei /etc/nsswitch.conf gültig?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Lückentext
Um alle Protokollmeldungen einer bestimmten Protokollierungsfunktion auszuschließen, sollten Sie eine Protokollierungspriorität von _____ verwenden.
Um alle Protokollmeldungen einer bestimmten Protokollierungsfunktion auszuschließen, sollten Sie eine Protokollierungspriorität von _____ verwenden.
정답:
none
Explanation:
To exclude all log messages of a given logging facility, you should use a logging priority of none. This means that no messages from that facility will be logged, regardless of their severity level. For example, if you want to exclude all messages from the local0 facility, you can use local0.none in your syslog configuration file. This will prevent any messages from local0 from being written to any log file or destination that matches that selector12. The logging priority of none is part of the LPI's multi-level Linux professional certification program, and it is covered in the topic 106.1 System logging of the exam 102 objectives3. Reference: 1: logging - exclude syslog facility from all others - Server Fault 2: rsyslog.conf(5) - Linux manual page - man7.org 3: Exam 102 Objectives
Explanation:
To exclude all log messages of a given logging facility, you should use a logging priority of none. This means that no messages from that facility will be logged, regardless of their severity level. For example, if you want to exclude all messages from the local0 facility, you can use local0.none in your syslog configuration file. This will prevent any messages from local0 from being written to any log file or destination that matches that selector12. The logging priority of none is part of the LPI's multi-level Linux professional certification program, and it is covered in the topic 106.1 System logging of the exam 102 objectives3. Reference: 1: logging - exclude syslog facility from all others - Server Fault 2: rsyslog.conf(5) - Linux manual page - man7.org 3: Exam 102 Objectives
Welche der folgenden Optionen kann der Befehl chage NICHT ändern?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Welcher Befehl macht die Shell-Variable namens VARIABLE für Subshells sichtbar?
정답: E
설명: (DumpTOP 회원만 볼 수 있음)
Was ist der herkömmliche Zweck von Linux-UIDs, die unter 100 liegen?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Auf einem Linux-System mit aktivierten Shadow-Passwörtern enthält welche Datei im Dateisystem die Passwort-Hashes aller lokalen Benutzer? (Geben Sie den vollständigen Namen der Datei einschließlich des Pfads an.)
정답:
etcshadow
Explanation:
On a Linux system with shadow passwords enabled, the file that contains the password hashes of all local users is /etc/shadow. This file is a replacement for the password field in /etc/passwd, which is a world-readable file that contains basic information about users. The /etc/shadow file is not readable by regular users, and it stores the encrypted passwords (or hashes) of each user, along with other information such as password expiration dates, minimum and maximum password ages, and password warning periods. The /etc/shadow file has nine colon-delimited fields for each user:
Username: The name used when the user logs into the system.
Password: The encrypted password of the user, or a special character that indicates the password status. For example, an asterisk (*) means the account is locked, and an exclamation mark (!) means the password is expired.
Last Password Change: The date of the last password change, expressed as the number of days since January 1, 1970.
Minimum Password Age: The minimum number of days required between password changes. A zero means the password can be changed anytime.
Maximum Password Age: The maximum number of days the password is valid. After this number of days, the password must be changed. A zero means the password never expires.
Password Warning Period: The number of days before the password expires that the user will be warned. A zero means no warning is given.
Password Inactivity Period: The number of days after the password expires that the account will be disabled. A negative value means the account is never disabled.
Account Expiration Date: The date when the account will be disabled, expressed as the number of days since January 1, 1970. A zero means the account never expires.
Reserved Field: A field for future use.
The /etc/shadow file can be modified by using the commands passwd and chage, which are used to change the password and the password aging information of a user, respectively. The /etc/shadow file should not be edited directly, but always through the tools provided by the distribution. For more details, see the shadow manual page.
Reference:
LPIC-1 Exam 102 Objectives, Topic 110: Security, Subtopic 110.2: Use sudo to manage access to the root account, Weight: 2, Key Knowledge Areas: Configure sudo and sudoers. Use sudo to execute commands as another user.
LPIC-1 Exam 102 Learning Materials, Topic 110: Security, Subtopic 110.2: Use sudo to manage access to the root account, Section 110.2.1: sudo and sudoers, Page 3-5.
Explanation:
On a Linux system with shadow passwords enabled, the file that contains the password hashes of all local users is /etc/shadow. This file is a replacement for the password field in /etc/passwd, which is a world-readable file that contains basic information about users. The /etc/shadow file is not readable by regular users, and it stores the encrypted passwords (or hashes) of each user, along with other information such as password expiration dates, minimum and maximum password ages, and password warning periods. The /etc/shadow file has nine colon-delimited fields for each user:
Username: The name used when the user logs into the system.
Password: The encrypted password of the user, or a special character that indicates the password status. For example, an asterisk (*) means the account is locked, and an exclamation mark (!) means the password is expired.
Last Password Change: The date of the last password change, expressed as the number of days since January 1, 1970.
Minimum Password Age: The minimum number of days required between password changes. A zero means the password can be changed anytime.
Maximum Password Age: The maximum number of days the password is valid. After this number of days, the password must be changed. A zero means the password never expires.
Password Warning Period: The number of days before the password expires that the user will be warned. A zero means no warning is given.
Password Inactivity Period: The number of days after the password expires that the account will be disabled. A negative value means the account is never disabled.
Account Expiration Date: The date when the account will be disabled, expressed as the number of days since January 1, 1970. A zero means the account never expires.
Reserved Field: A field for future use.
The /etc/shadow file can be modified by using the commands passwd and chage, which are used to change the password and the password aging information of a user, respectively. The /etc/shadow file should not be edited directly, but always through the tools provided by the distribution. For more details, see the shadow manual page.
Reference:
LPIC-1 Exam 102 Objectives, Topic 110: Security, Subtopic 110.2: Use sudo to manage access to the root account, Weight: 2, Key Knowledge Areas: Configure sudo and sudoers. Use sudo to execute commands as another user.
LPIC-1 Exam 102 Learning Materials, Topic 110: Security, Subtopic 110.2: Use sudo to manage access to the root account, Section 110.2.1: sudo and sudoers, Page 3-5.
Welche Datei ermöglicht es einem Benutzer, bei Verwendung von Sendmail oder einem ähnlichen MTA-System alle seine E-Mails an eine andere Adresse umzuleiten, und kann vom Benutzer selbst konfiguriert werden?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Welche Datei im CUPS-Konfigurationsverzeichnis enthält die Definition der Drucker?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Mit welchem Befehl wird die Hardwareuhr mit der Systemuhr synchronisiert? (Geben Sie NUR den Befehl ohne Pfad oder Parameter an.)
정답:
hwclocksbinhwclockusrsbinhwclock
Explanation:
The command that is used to sync the hardware clock to the system clock is:
hwclock --systohc
This command copies the current system time to the hardware clock, which runs even when the system is shut down. It is equivalent to the command hwclock -w12. The hardware clock is also called the BIOS clock or the RTC (Real Time Clock)3.
Explanation:
The command that is used to sync the hardware clock to the system clock is:
hwclock --systohc
This command copies the current system time to the hardware clock, which runs even when the system is shut down. It is equivalent to the command hwclock -w12. The hardware clock is also called the BIOS clock or the RTC (Real Time Clock)3.
Welcher in systemd enthaltene Befehl unterstützt die Auswahl von Nachrichten aus dem systemd-Journal nach Kriterien wie Zeit oder Einheitenname? (Geben Sie nur den Befehl ohne Pfad oder Parameter an.)
정답:
journalctl
Explanation:
The command journalctl is included in systemd and supports selecting messages from the systemd journal by criteria such as time or unit name. The systemd journal is a binary log file that stores system and service messages. The journalctl command can be used to view, filter, export, and manipulate the journal entries. For example, to show all messages from a specific unit, such as sshd.service, the command would be:
journalctl -u sshd.service
To show all messages from a specific time range, such as yesterday, the command would be:
journalctl --since=yesterday
The journalctl command has many options and arguments that can be used to customize the output and perform various operations on the journal. For more information, see the man page of journalctl or the official documentation1. Reference: [LPI 102-500 Exam Objectives], Topic 106.2: System logging, Weight: 3. [systemd-journald.service(8) - systemd - Debian unstable - Debian Manpages], Section NAME.
Explanation:
The command journalctl is included in systemd and supports selecting messages from the systemd journal by criteria such as time or unit name. The systemd journal is a binary log file that stores system and service messages. The journalctl command can be used to view, filter, export, and manipulate the journal entries. For example, to show all messages from a specific unit, such as sshd.service, the command would be:
journalctl -u sshd.service
To show all messages from a specific time range, such as yesterday, the command would be:
journalctl --since=yesterday
The journalctl command has many options and arguments that can be used to customize the output and perform various operations on the journal. For more information, see the man page of journalctl or the official documentation1. Reference: [LPI 102-500 Exam Objectives], Topic 106.2: System logging, Weight: 3. [systemd-journald.service(8) - systemd - Debian unstable - Debian Manpages], Section NAME.
Angesichts des folgenden Ausschnitts der sudo-Konfiguration:
Jane ANY = NOPASSWD: / bin / kill, / bin / id, PASSWD: / sbin / fdisk
Welche der folgenden Aussagen sind wahr? (Wählen Sie drei aus.)
Jane ANY = NOPASSWD: / bin / kill, / bin / id, PASSWD: / sbin / fdisk
Welche der folgenden Aussagen sind wahr? (Wählen Sie drei aus.)
정답: A,C,D
설명: (DumpTOP 회원만 볼 수 있음)
Die X11-Konfigurationsdatei xorg.conf ist in Abschnitte unterteilt. Wie ist der Inhalt des Abschnitts SectionName mit diesem Abschnitt verknüpft?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Welches der folgenden Wörter wird verwendet, um die Datensätze, die von einer SELECT-Abfrage zurückgegeben werden, basierend auf den angegebenen Kriterien für die Werte in den Datensätzen einzuschränken?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Welche Datei enthält eine Reihe von Diensten und Hosts, die über ein TCP-Wrapper-Programm wie tcpd eine Verbindung zum Server herstellen dürfen? (Geben Sie den vollständigen Namen der Datei einschließlich Pfad an.)https://lh3.googleusercontent.com/-5cd-clmKnbk/AAAAAAAAAAAI/AAAAAAAAAADM/-SXesH19Ido/s46-ck-no/photo.jpg
정답:
etchostsallow
Explanation:
The /etc/hosts.allow file contains a set of rules that specify which services and hosts are allowed to connect to the server by going through a TCP Wrapper program such as tcpd. TCP Wrappers are a security mechanism that can filter incoming requests based on the source address, destination address, and service name. TCP Wrappers can also perform logging, redirection, and execution of commands based on the rules.
The /etc/hosts.allow file has the following format:
service_list : host_list [ : option_list ]
The service_list is a comma-separated list of service names, such as sshd, telnet, or ftp. The host_list is a comma-separated list of host names, IP addresses, or network masks that are allowed to access the services. The option_list is an optional list of keywords that can modify the behavior of the rule, such as twist, spawn, deny, or allow.
For example, the following rule in /etc/hosts.allow allows ssh access from any host in the 192.168.1.0/24 network, and logs the connection attempt:
sshd : 192.168.1.0/255.255.255.0 : spawn /bin/echo %a from %h attempted to access %d >> /var/log/sshd.log The /etc/hosts.allow file is processed before the /etc/hosts.deny file, which contains the rules for denying access to the server. If a request matches a rule in /etc/hosts.allow, it is granted access and the processing stops. If it does not match any rule in /etc/hosts.allow, it is checked against the rules in /etc/hosts.deny. If it matches a rule in /etc/hosts.deny, it is denied access and the processing stops. If it does not match any rule in either file, it is granted access by default.
Reference:
LPI 102-500 Exam Objectives, Topic 110.3: Implement host security
LPI 102-500 Study Guide, Chapter 10: Securing Your System, Section 10.3: TCP Wrappers hosts.allow man page
Explanation:
The /etc/hosts.allow file contains a set of rules that specify which services and hosts are allowed to connect to the server by going through a TCP Wrapper program such as tcpd. TCP Wrappers are a security mechanism that can filter incoming requests based on the source address, destination address, and service name. TCP Wrappers can also perform logging, redirection, and execution of commands based on the rules.
The /etc/hosts.allow file has the following format:
service_list : host_list [ : option_list ]
The service_list is a comma-separated list of service names, such as sshd, telnet, or ftp. The host_list is a comma-separated list of host names, IP addresses, or network masks that are allowed to access the services. The option_list is an optional list of keywords that can modify the behavior of the rule, such as twist, spawn, deny, or allow.
For example, the following rule in /etc/hosts.allow allows ssh access from any host in the 192.168.1.0/24 network, and logs the connection attempt:
sshd : 192.168.1.0/255.255.255.0 : spawn /bin/echo %a from %h attempted to access %d >> /var/log/sshd.log The /etc/hosts.allow file is processed before the /etc/hosts.deny file, which contains the rules for denying access to the server. If a request matches a rule in /etc/hosts.allow, it is granted access and the processing stops. If it does not match any rule in /etc/hosts.allow, it is checked against the rules in /etc/hosts.deny. If it matches a rule in /etc/hosts.deny, it is denied access and the processing stops. If it does not match any rule in either file, it is granted access by default.
Reference:
LPI 102-500 Exam Objectives, Topic 110.3: Implement host security
LPI 102-500 Study Guide, Chapter 10: Securing Your System, Section 10.3: TCP Wrappers hosts.allow man page
Mit welchem der folgenden Befehle werden Schlüssel vorab geladen und verwaltet, die für die automatische Authentifizierung beim Anmelden bei anderen Computern mithilfe von SSH verwendet werden?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Welchen Mechanismus verwendet ggfe zur Interaktion mit dem SSH-Agenten?
정답: A
Wie lautet der Befehl zum Löschen des Standardgateways aus der IP-Routing-Tabelle des Systems? (Wähle ZWEI richtige Antworten.)
정답: A,D
설명: (DumpTOP 회원만 볼 수 있음)
Welche der folgenden Dateien können je nach Systemkonfiguration verwendet werden, um auf diesem Host ausgeführte Netzwerkdienste zu aktivieren und zu deaktivieren?
정답: E
설명: (DumpTOP 회원만 볼 수 있음)