Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

201-450 LPIC-2 Exam 201, Part 1 of 2, version 4.5 Questions and Answers

Questions 4

Which of the following best describes the format of the /etc/fstab file?

Options:

A.

device name; filesystem type; mount point; mount options; dump filesystem; fsck order

B.

device name; mount point; filesystem type; mount options; dump filesystem; fsck order

C.

device name; mount point; mount options; filesystem type; dump filesystem; fsck order

D.

mount point; filesystem type; device name; mount options; dump filesystem; fsck order

E.

mount point; device name; filesystem type; mount options; dump filesystem; fsck order

Buy Now
Questions 5

The correct command sequence to create and mount logical volumes on a Linux system is:

Options:

A.

lvcreate, pvcreate, vgcreate, mkfs, mount

B.

pvcreate, vgcreate, lvcreate, mkfs, mount

C.

vgcreate, lvcreate, pvcreate, mount, mkfs

D.

mkfs, pvcreate, vgcreate, lvcreate, mount

E.

pvcreate, lvcreate, vgcreate, mkfs, mount

Buy Now
Questions 6

What command will remove a physical volume from a volume group? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 7

What is the purpose of the command vgextend?

Options:

A.

Extend a volume group ' s footprint on disk.

B.

Add physical volumes to an existing volume group.

C.

Increase the number of days between scheduled error checking.

D.

Create a volume group which uses all available space on disk.

Buy Now
Questions 8

How can the label root be added to the ext4 filesystem on /dev/sda1?

Options:

A.

relabel /dev/sda1 root

B.

tune2fs -L root /dev/sda1

C.

echo ' root ' > /proc/fs/sda1/label

D.

labelfs --device /dev/sda1 root

Buy Now
Questions 9

What are the options to node.startup in the iscsid.conf file? (Choose TWO correct answers.)

Options:

A.

login

B.

initiate

C.

manual

D.

discover

E.

automatic

Buy Now
Questions 10

In the below example output, which columns detail the percent of time the CPU spent running non-kernel code and the percent of time the CPU spent running kernel code? (Choose TWO correct answers.)

# vmstat 1 100

procs -----------memory---------- ---swap-- -----io---- --system-- ----cpu----

r b swpd free buff cache si so bi bo in cs us sy id wa

0 0 0 282120 134108 5797012 0 0 0 2 0 0 0 0 100 0

0 0 0 282120 134108 5797012 0 0 0 0 1007 359 0 0 100 0

0 0 0 282120 134108 5797012 0 0 0 0 1117 577 0 0 100 0

0 0 0 282120 134108 5797012 0 0 0 0 1007 366 0 0 100 0

Options:

A.

id

B.

us

C.

wa

D.

sy

Buy Now
Questions 11

In capacity planning exercises, which tools assist in listing and identifying processes of interest? (Choose TWO correct answers.)

Options:

A.

acpid

B.

lsof

C.

pstree

D.

telinit

Buy Now
Questions 12

What option in the collectd configuration file is required in order to define what to start monitoring?

Options:

A.

LoadModule

B.

Module

C.

Plugin

D.

LoadPlugin

Buy Now
Questions 13

A system with SysV-init has a service installed called apache2. Which file controls the start and stop of this service and is referenced by the various runlevel directories?

Options:

A.

/etc/init.d/apache2

B.

/etc/rc2.d/70apache2

C.

/etc/rc2.d/apache2

D.

/etc/rc2.d/apache2.start

Buy Now
Questions 14

Why is the root file system mounted read-only during boot and remounted with write permission later on?

Options:

A.

Because if problems with the root file system are detected during the boot, fsck can be run, without risk of damage.

B.

Because this way crackers cannot collect information about root with boot sniffers.

C.

To avoid writing to the disk, unless the root password is known.

D.

To avoid other operating systems overwriting the Linux root partition.

E.

Because the disk has its own write protection that cannot be changed by the operating system.

Buy Now
Questions 15

What are the main network services used by the PXE protocol? (Choose TWO correct answers.)

Options:

A.

DNS

B.

DHCP

C.

HTTP

D.

TFTP

E.

NFS

Buy Now
Questions 16

What is the functionality that PXE provides?

Options:

A.

The ability to boot a computer using its network interface.

B.

The ability to launch an remote X11 desktop on a computer.

C.

The ability to verify a system ' s configuration after completing the boot process.

D.

The ability to verify a system ' s configuration before completing the boot process.

Buy Now
Questions 17

Which file tells GRUB the paths of the filesystem partitions in both Linux format and in the GRUB syntax? (Specify the file name only with no path information)

Options:

Buy Now
Questions 18

Which of the following configuration files are used by tcpwrapper?

Options:

A.

/etc/tcpd.allow and etc/tcpd.deny

B.

/etc/tcpwrapper.allow and /etc/tcpwrapper.deny

C.

/etc/hosts.allow and /etc/hosts.deny

D.

/etc/service.allow and /etc/service.deny

Buy Now
Questions 19

Which of the following commands displays the physical path of the kernel module named dummy?

Options:

A.

modprobe –i dummy

B.

modinfo –n dummy

C.

modpath –v dummy

D.

depmod –n dummy

E.

modshow –p dummy

Buy Now
Questions 20

Which directory contains system-specific systemd unit files? (Specify the full path to the directory.)

Options:

Buy Now
Questions 21

What command is used to send messages to all users currently logged in? (Specify ONLY the command without any path or parameters.)

Options:

Buy Now
Questions 22

Which of the following is a userspace application used to modify EFI entries on a Linux system?

Options:

A.

efieditor

B.

configefi

C.

efimanager

D.

efiboottmgr

E.

efibootedit

Buy Now
Questions 23

What is the purpose of an initramfs during the Linux system start?

Options:

A.

It loads required modules and starts sub sytems like LVM to make the root file system accessible to the kernel

B.

It moves the kernel from normal system memory to initram memory to speed up kernel access

C.

It copies the root file system’s content to RAM to speed up the system and reduce writes to disk

D.

It creates a ram disk to store volatile data for directories like /tmp to reduce writes to disk

Buy Now
Questions 24

Which of the following tools are used to measure memory usage? (Choose THREE correct answers.)

Options:

A.

mpstat

B.

pstree

C.

sar

D.

top

E.

vmstat

Buy Now
Questions 25

Which of the following is a side effect of extensive usage of swap space?

Options:

A.

The root filesystem may become full because swap space is always located on the system root partition.

B.

The overall system performance may degrade because of heavy hard disk use and memory reorganization.

C.

Since processes always exist completely in either RAM or swap, regular RAM may become unused if the kernel does not move processes back from the swap space to memory.

D.

The memory may become fragmented and slow down the access to memory pages. However, this can be kept to a minimum by the regular use of memfrag -d.

E.

Applications need to restart because their virtual memory addresses change to reflect memory relocation to the swap address area.

Buy Now
Questions 26

Which of the following commands will provide the PIDs of the processes sorted by which are using the most CPU cycles on the Linux system?

Options:

A.

top

B.

uptime

C.

ps aux

D.

vmstat

E.

freemem

Buy Now
Questions 27

What happens if the Linux kernel can ' t mount the root filesystem when booting?

Options:

A.

An error message is shown and the administrator is asked by the kernel to specify a valid root filesystem to continue the boot process.

B.

An error message is shown and the system reboots after a keypress.

C.

An error message is shown and the system boots in maintenance mode.

D.

An error message is shown showing which device couldn ' t be mounted or informing that init couldn ' t be found.

E.

An error message is shown stating that the corresponding kernel module couldn ' t be loaded.

Buy Now
Questions 28

What is the command to add another IP address (192.168.1.2) to a network interface (eth0) that already has (at least) one IP address in the 192.168.1.0/24 subnet?

Options:

A.

ip add addr 192.168.1.2/32 dev eth0

B.

ifconfig eth0 192.168.1.2 netmask 255.255.255.255

C.

ip addr add 192.168.1.2/32 dev eth0

D.

ipconfig eth0 192.168.1.2

Buy Now
Questions 29

A network client has an ethernet interface (eth0) configured with an IP address in the subnet 192.168.0.0/24. This subnet has a router, with the IP address 192.168.0.1, that connects this subnet to the Internet. What needs to be done on the client to enable it to use the router as its default gateway? (Choose TWO correct answers.)

Options:

A.

route add default gw 192.168.0.1 eth0

B.

ifconfig eth0 defaultroute 192.168.0.1

C.

ip route add default via 192.168.0.1 dev eth0

D.

echo defaultroute 192.168.0.1 > > /etc/resolv.conf

E.

route add defaultgw=192.168.0.1 if=eth0

Buy Now
Questions 30

Which of the following filter keywords for tcpdump specify the transfer direction for network packets? (Choose TWO correct answers.)

Options:

A.

source

B.

src

C.

dest

D.

src or dst

E.

both

Buy Now
Questions 31

Under which of the following circumstances would the command ping output the string (DUP!)?

Options:

A.

When the ICMP packets are send to a broadcast address and multiple hosts respond.

B.

When the host being sent ICMP packets is on a different network.

C.

When the router responds to the ICMP packet in addition to the host receiving the ICMP packets.

D.

When the host sending the ICMP packet is the same host as the one receiving the ICMP packets.

Buy Now
Questions 32

Considering the following kernel IP routing table below, which of the following commands must be used to remove the route to the network 10.10.1.0/24? (Select TWO answers)

Kernel IP routing table

Destination Gateway Genmask Flags Metric Ref Use Iface

203.0.113.162 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0

172.16.87.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0

192.168.246.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1

10.10.1.0 192.168.246.11 255.255.255.0 UG 0 0 0 eth1

127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo

0.0.0.0 203.0.113.162 0.0.0.0 UG 0 0 0 ppp0

Options:

A.

ip net delete 10.10.1.0/24

B.

route del 10.10.1.0/24

C.

route del -net 10.10.1.0/24

D.

route del 10.10.1.0/24 gw 192.168.246.11

E.

ip route delete 10.10.1.0/24

Buy Now
Questions 33

Consider the following /etc/fstab file:

/dev/hda1 swap swap defaults 0 0

/dev/hda2 / ext2 defaults 1 1

/dev/hda3 /home ext2 defaults 1 2

none /proc proc defaults 0 0

/dev/sdb1 /media/usb0 vfat user,noauto 0 0

What is one of the possible commands that an ordinary (non-root) user can use to mount the /dev/sdb1 partition on the /media/usb0 mount point? (Please enter the command with all parameters and/or options but without any file system type options.)

Options:

Buy Now
Questions 34

Which of the following is a CD-ROM filesystem standard?

Options:

A.

OSI9660

B.

ISO9660

C.

SR0FS

D.

ISO8859

E.

ROM-EO

Buy Now
Questions 35

What is the purpose of the smartd daemon?

Options:

A.

It is a user space daemon used for reading smart cards and integrated circuit chips.

B.

It attempts to automatically repair file systems upon a failed file system check.

C.

It monitors process activity and helps the kernel decide which processes to kill when the kernel overcommits.

D.

It monitors certain disk drives and attempts to predict when they will fail.

Buy Now
Questions 36

What keyword is missing in the following line from /etc/fstab in order to make a USB flash device writeable by the user fred when mounted:

/dev/sda1 /mnt/usbflash vfat defaults,users,______=fred,umask=022, 0 0

(Provide the option name only without any settings)

Options:

Buy Now
Questions 37

Which of the following are common Linux filesystem types used for root partitions? (Choose THREE correct answers.)

Options:

A.

ext4

B.

VFAT

C.

NTFS

D.

XFS

E.

Btrfs

Buy Now
Questions 38

What does a 0 in the last field (fsck order) of /etc/fstab indicate about the filesystem?

Options:

A.

The filesystem should be checked before filesystems with higher values.

B.

The filesystem should be checked after filesystems with higher values.

C.

The filesystem check counter is ignored.

D.

The filesystem has been disabled from being checked and mounted on the system.

E.

The filesystem does not require an fsck check when being mounted.

Buy Now
Questions 39

According to the Filesystem Hierarchy Standard (FHS), what is the path to the Linux kernel source and may be a symbolic link to the real Linux source code? (Please specify the full path with no version information.)

Options:

Buy Now
Questions 40

A new kernel version needs to be compiled to use a new feature. If the old kernel configuration file is available, which make target creates a configuration file for the new kernel based on the configuration of the old kernel?

Options:

Buy Now
Questions 41

Which archive format is used to create an initramfs image?

Options:

A.

gzip

B.

tar

C.

RAR

D.

cpio

E.

bzip2

Buy Now
Questions 42

On a server running the 3.4.50-11 Linux kernel, which file in the /boot directory contains the kernel configuration parameters?

Options:

A.

config-linux-3.4.50-11

B.

config-3.4.50-11

C.

system-3.4.50-11

D.

vmlinuz-3.4.50-11

E.

rc.config-3.4.50-11

Buy Now
Questions 43

Which directory contains the system-specific udev rule files? (Specify the absolute path including the directory name)

Options:

Buy Now
Questions 44

How is the source code for the main Linux kernel modules distributed?

Options:

A.

It is included with the Linux kernel source code.

B.

The kernel modules are downloaded on demand as they are used during compilation.

C.

The kernel modules have their own release cycle and can be maintained separately from the Linux kernel source.

D.

It is provided as a separate download alongside the Linux kernel source code of the same version.

Buy Now
Questions 45

What is the device name for the first SCSI tape drive on a system when used without automatic rewinding after each write operation? (Please specify the full path to the device.)

Options:

Buy Now
Questions 46

Which of the following files will be looked for and used by GNU make, if one of them exists, unless a different file is specified on the command line when trying to compile software from source code? (Choose TWO correct answers.)

Options:

A.

configure

B.

config.h.in

C.

makefile

D.

Makefile

E.

Makefile.in

Buy Now
Questions 47

When a makefile is included in a source code package, what are commonly defined targets in the file?

Options:

A.

CFLAGS, CPPFLAGS, LIBS, LDFLAGS

B.

clean, install, uninstall

C.

PATHS, DESTDIR, LIBS, LDFLAGS

D.

prefix, exec_prefix, bindir, mandir

Buy Now
Questions 48

Which file contains the text message that is displayed after logging into the console? (Specify the full name of the file, including path.)

Options:

Buy Now
Exam Code: 201-450
Exam Name: LPIC-2 Exam 201, Part 1 of 2, version 4.5
Last Update: Apr 30, 2026
Questions: 161

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 201-450 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 201-450 pdf